eapol_test to Freeradius with PEAP and MSCHAPv2

Munroe Sollog mus3 at lehigh.edu
Fri Aug 16 17:35:19 CEST 2019


I am trying to confirm my configuration is valid.  I am using winbind with
Freeradius to auth against AD using PEAP/MSCHAPv2.  Below is the
'freeradius -X' output from the following commands.  It seems like radtest
works fine but eapol_test does not.  I'm assuming it is a problem with my
eap configuration, but I'm stumped:

radtest -t mschap x19a19 ****** 128.180.1.12 0 cisco99

eapol_test -c eapoltest.conf -a 128.180.1.12 -scisco99 -M00:0a:cd:31:6c:b4
-N4:x:0x80B40A0A -o radiuscert.out


FreeRADIUS Version 3.0.17

Copyright (C) 1999-2017 The FreeRADIUS server project and contributors

There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A

PARTICULAR PURPOSE

You may redistribute copies of FreeRADIUS under the terms of the

GNU General Public License

For more information about these matters, see the file named COPYRIGHT

Starting - reading configuration files ...

including dictionary file /usr/share/freeradius/dictionary

including dictionary file /usr/share/freeradius/dictionary.dhcp

including dictionary file /usr/share/freeradius/dictionary.vqp

including dictionary file /etc/freeradius/3.0/dictionary

including configuration file /etc/freeradius/3.0/radiusd.conf

including configuration file /etc/freeradius/3.0/proxy.conf

including configuration file /etc/freeradius/3.0/clients.conf

including files in directory /etc/freeradius/3.0/mods-enabled/

including configuration file /etc/freeradius/3.0/mods-enabled/replicate

including configuration file /etc/freeradius/3.0/mods-enabled/radutmp

including configuration file /etc/freeradius/3.0/mods-enabled/eap

including configuration file /etc/freeradius/3.0/mods-enabled/ldap

including configuration file /etc/freeradius/3.0/mods-enabled/passwd

including configuration file /etc/freeradius/3.0/mods-enabled/files

including configuration file /etc/freeradius/3.0/mods-enabled/soh

including configuration file /etc/freeradius/3.0/mods-enabled/digest

including configuration file /etc/freeradius/3.0/mods-enabled/detail.log

including configuration file /etc/freeradius/3.0/mods-enabled/utf8

including configuration file /etc/freeradius/3.0/mods-enabled/ntlm_auth

including configuration file /etc/freeradius/3.0/mods-enabled/attr_filter

including configuration file /etc/freeradius/3.0/mods-enabled/mschap

including configuration file /etc/freeradius/3.0/mods-enabled/preprocess

including configuration file /etc/freeradius/3.0/mods-enabled/unix

including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp

including configuration file
/etc/freeradius/3.0/mods-enabled/dynamic_clients

including configuration file /etc/freeradius/3.0/mods-enabled/realm

including configuration file /etc/freeradius/3.0/mods-enabled/detail

including configuration file /etc/freeradius/3.0/mods-enabled/logintime

including configuration file /etc/freeradius/3.0/mods-enabled/expiration

including configuration file /etc/freeradius/3.0/mods-enabled/exec

including configuration file /etc/freeradius/3.0/mods-enabled/unpack

including configuration file /etc/freeradius/3.0/mods-enabled/chap

including configuration file /etc/freeradius/3.0/mods-enabled/cache_eap

including configuration file /etc/freeradius/3.0/mods-enabled/always

including configuration file /etc/freeradius/3.0/mods-enabled/linelog

including configuration file /etc/freeradius/3.0/mods-enabled/expr

including configuration file /etc/freeradius/3.0/mods-enabled/pap

including configuration file /etc/freeradius/3.0/mods-enabled/echo

including files in directory /etc/freeradius/3.0/policy.d/

including configuration file /etc/freeradius/3.0/policy.d/eap

including configuration file /etc/freeradius/3.0/policy.d/cui

including configuration file /etc/freeradius/3.0/policy.d/filter

including configuration file /etc/freeradius/3.0/policy.d/debug

including configuration file
/etc/freeradius/3.0/policy.d/moonshot-targeted-ids

including configuration file /etc/freeradius/3.0/policy.d/dhcp

including configuration file /etc/freeradius/3.0/policy.d/control

including configuration file /etc/freeradius/3.0/policy.d/abfab-tr

including configuration file /etc/freeradius/3.0/policy.d/canonicalization

including configuration file /etc/freeradius/3.0/policy.d/accounting

including configuration file /etc/freeradius/3.0/policy.d/operator-name

including files in directory /etc/freeradius/3.0/sites-enabled/

including configuration file /etc/freeradius/3.0/sites-enabled/default

including configuration file /etc/freeradius/3.0/sites-enabled/inner-tunnel

main {

 security {

  user = "freerad"

  group = "freerad"

  allow_core_dumps = no

 }

name = "freeradius"

prefix = "/usr"

localstatedir = "/var"

logdir = "/var/log/freeradius"

run_dir = "/var/run/freeradius"

}

main {

name = "freeradius"

prefix = "/usr"

localstatedir = "/var"

sbindir = "/usr/sbin"

logdir = "/var/log/freeradius"

run_dir = "/var/run/freeradius"

libdir = "/usr/lib/freeradius"

radacctdir = "/var/log/freeradius/radacct"

hostname_lookups = no

max_request_time = 30

cleanup_delay = 5

max_requests = 16384

pidfile = "/var/run/freeradius/freeradius.pid"

checkrad = "/usr/sbin/checkrad"

debug_level = 0

proxy_requests = yes

 log {

  stripped_names = no

  auth = yes

  auth_badpass = yes

  auth_goodpass = no

  colourise = yes

  msg_denied = "You are already logged in - access denied"

 }

 resources {

 }

 security {

  max_attributes = 200

  reject_delay = 1.000000

  status_server = yes

 }

}

radiusd: #### Loading Realms and Home Servers ####

 proxy server {

  retry_delay = 5

  retry_count = 3

  default_fallback = no

  dead_time = 120

  wake_all_if_all_dead = no

 }

 home_server localhost {

  ipaddr = 127.0.0.1

  port = 1812

  type = "auth"

  secret = <<< secret >>>

  response_window = 20.000000

  response_timeouts = 1

  max_outstanding = 65536

  zombie_period = 40

  status_check = "status-server"

  ping_interval = 30

  check_interval = 30

  check_timeout = 4

  num_answers_to_alive = 3

  revive_interval = 120

  limit {

  max_connections = 16

  max_requests = 0

  lifetime = 0

  idle_timeout = 0

  }

  coa {

  irt = 2

  mrt = 16

  mrc = 5

  mrd = 30

  }

 }

 home_server_pool my_auth_failover {

type = fail-over

home_server = localhost

 }

 realm example.com {

auth_pool = my_auth_failover

 }

 realm LOCAL {

 }

radiusd: #### Loading Clients ####

 client localhost {

  ipaddr = 127.0.0.1

  require_message_authenticator = no

  secret = <<< secret >>>

  nas_type = "other"

  proto = "*"

  limit {

  max_connections = 16

  lifetime = 0

  idle_timeout = 30

  }

 }

 client localhost_ipv6 {

  ipv6addr = ::1

  require_message_authenticator = no

  secret = <<< secret >>>

  limit {

  max_connections = 16

  lifetime = 0

  idle_timeout = 30

  }

 }

 client aruba {

  ipaddr = 128.180.8.128/27

  require_message_authenticator = no

  secret = <<< secret >>>

  proto = "*"

  limit {

  max_connections = 32

  lifetime = 0

  idle_timeout = 30

  }

 }

 client newguy {

  ipaddr = 128.180.10.10

  require_message_authenticator = no

  secret = <<< secret >>>

  proto = "*"

  limit {

  max_connections = 16

  lifetime = 0

  idle_timeout = 30

  }

 }

Debugger not attached

 # Creating Auth-Type = mschap

 # Creating Auth-Type = digest

 # Creating Auth-Type = eap

 # Creating Auth-Type = PAP

 # Creating Auth-Type = CHAP

 # Creating Auth-Type = MS-CHAP

/etc/freeradius/3.0/sites-enabled/inner-tunnel[227]: Duplicate module
'mschap'

radiusd: #### Instantiating modules ####

 modules {

  # Loaded module rlm_replicate

  # Loading module "replicate" from file
/etc/freeradius/3.0/mods-enabled/replicate

  # Loaded module rlm_radutmp

  # Loading module "radutmp" from file
/etc/freeradius/3.0/mods-enabled/radutmp

  radutmp {

  filename = "/var/log/freeradius/radutmp"

  username = "%{User-Name}"

  case_sensitive = yes

  check_with_nas = yes

  permissions = 384

  caller_id = yes

  }

  # Loaded module rlm_eap

  # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap

  eap {

  default_eap_type = "peap"

  timer_expire = 60

  ignore_unknown_eap_types = no

  cisco_accounting_username_bug = no

  max_sessions = 16384

  }

  # Loaded module rlm_ldap

  # Loading module "ldap" from file /etc/freeradius/3.0/mods-enabled/ldap

  ldap {

  server = "nis.cc.lehigh.edu"

  identity = "uid=Replicator,dc=lehigh,dc=edu"

  password = <<< secret >>>

   sasl {

   }

   user {

   scope = "sub"

   access_positive = yes

    sasl {

    }

   }

   group {

   filter = "(objectClass=posixGroup)"

   scope = "sub"

   name_attribute = "cn"

   membership_attribute = "memberOf"

   cacheable_name = no

   cacheable_dn = no

   }

   client {

   filter = "(objectClass=radiusClient)"

   scope = "sub"

   base_dn = "dc=lehigh,dc=edu"

   }

   profile {

   }

   options {

   ldap_debug = 40

   chase_referrals = yes

   rebind = yes

   net_timeout = 1

   res_timeout = 10

   srv_timelimit = 3

   idle = 60

   probes = 3

   interval = 3

   }

   tls {

   start_tls = no

   }

  }

Creating attribute LDAP-Group

  # Loaded module rlm_passwd

  # Loading module "etc_passwd" from file
/etc/freeradius/3.0/mods-enabled/passwd

  passwd etc_passwd {

  filename = "/etc/passwd"

  format = "*User-Name:Crypt-Password:"

  delimiter = ":"

  ignore_nislike = no

  ignore_empty = yes

  allow_multiple_keys = no

  hash_size = 100

  }

  # Loaded module rlm_files

  # Loading module "files" from file /etc/freeradius/3.0/mods-enabled/files

  files {

  filename = "/etc/freeradius/3.0/mods-config/files/authorize"

  acctusersfile = "/etc/freeradius/3.0/mods-config/files/accounting"

  preproxy_usersfile = "/etc/freeradius/3.0/mods-config/files/pre-proxy"

  }

  # Loaded module rlm_soh

  # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh

  soh {

  dhcp = yes

  }

  # Loaded module rlm_digest

  # Loading module "digest" from file
/etc/freeradius/3.0/mods-enabled/digest

  # Loaded module rlm_detail

  # Loading module "auth_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  detail auth_log {

  filename =
"/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"

  header = "%t"

  permissions = 384

  locking = no

  escape_filenames = no

  log_packet_header = no

  }

  # Loading module "reply_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  detail reply_log {

  filename =
"/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"

  header = "%t"

  permissions = 384

  locking = no

  escape_filenames = no

  log_packet_header = no

  }

  # Loading module "pre_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  detail pre_proxy_log {

  filename =
"/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"

  header = "%t"

  permissions = 384

  locking = no

  escape_filenames = no

  log_packet_header = no

  }

  # Loading module "post_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  detail post_proxy_log {

  filename =
"/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"

  header = "%t"

  permissions = 384

  locking = no

  escape_filenames = no

  log_packet_header = no

  }

  # Loaded module rlm_utf8

  # Loading module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8

  # Loaded module rlm_exec

  # Loading module "ntlm_auth" from file
/etc/freeradius/3.0/mods-enabled/ntlm_auth

  exec ntlm_auth {

  wait = yes

  program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN
--username=%{mschap:User-Name} --password=%{User-Password}"

  shell_escape = yes

  }

  # Loaded module rlm_attr_filter

  # Loading module "attr_filter.post-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

  attr_filter attr_filter.post-proxy {

  filename = "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy"

  key = "%{Realm}"

  relaxed = no

  }

  # Loading module "attr_filter.pre-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

  attr_filter attr_filter.pre-proxy {

  filename = "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy"

  key = "%{Realm}"

  relaxed = no

  }

  # Loading module "attr_filter.access_reject" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

  attr_filter attr_filter.access_reject {

  filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_reject"

  key = "%{User-Name}"

  relaxed = no

  }

  # Loading module "attr_filter.access_challenge" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

  attr_filter attr_filter.access_challenge {

  filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge"

  key = "%{User-Name}"

  relaxed = no

  }

  # Loading module "attr_filter.accounting_response" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

  attr_filter attr_filter.accounting_response {

  filename =
"/etc/freeradius/3.0/mods-config/attr_filter/accounting_response"

  key = "%{User-Name}"

  relaxed = no

  }

  # Loaded module rlm_mschap

  # Loading module "mschap" from file
/etc/freeradius/3.0/mods-enabled/mschap

  mschap {

  use_mppe = yes

  require_encryption = no

  require_strong = no

  with_ntdomain_hack = yes

   passchange {

   }

  allow_retry = yes

  winbind_retry_with_normalised_username = no

  }

  # Loaded module rlm_preprocess

  # Loading module "preprocess" from file
/etc/freeradius/3.0/mods-enabled/preprocess

  preprocess {

  huntgroups = "/etc/freeradius/3.0/mods-config/preprocess/huntgroups"

  hints = "/etc/freeradius/3.0/mods-config/preprocess/hints"

  with_ascend_hack = no

  ascend_channels_per_line = 23

  with_ntdomain_hack = no

  with_specialix_jetstream_hack = no

  with_cisco_vsa_hack = no

  with_alvarion_vsa_hack = no

  }

  # Loaded module rlm_unix

  # Loading module "unix" from file /etc/freeradius/3.0/mods-enabled/unix

  unix {

  radwtmp = "/var/log/freeradius/radwtmp"

  }

Creating attribute Unix-Group

  # Loading module "sradutmp" from file
/etc/freeradius/3.0/mods-enabled/sradutmp

  radutmp sradutmp {

  filename = "/var/log/freeradius/sradutmp"

  username = "%{User-Name}"

  case_sensitive = yes

  check_with_nas = yes

  permissions = 420

  caller_id = no

  }

  # Loaded module rlm_dynamic_clients

  # Loading module "dynamic_clients" from file
/etc/freeradius/3.0/mods-enabled/dynamic_clients

  # Loaded module rlm_realm

  # Loading module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm

  realm IPASS {

  format = "prefix"

  delimiter = "/"

  ignore_default = no

  ignore_null = no

  }

  # Loading module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm

  realm suffix {

  format = "suffix"

  delimiter = "@"

  ignore_default = no

  ignore_null = no

  }

  # Loading module "realmpercent" from file
/etc/freeradius/3.0/mods-enabled/realm

  realm realmpercent {

  format = "suffix"

  delimiter = "%"

  ignore_default = no

  ignore_null = no

  }

  # Loading module "ntdomain" from file
/etc/freeradius/3.0/mods-enabled/realm

  realm ntdomain {

  format = "prefix"

  delimiter = "\\"

  ignore_default = no

  ignore_null = no

  }

  # Loading module "detail" from file
/etc/freeradius/3.0/mods-enabled/detail

  detail {

  filename =
"/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"

  header = "%t"

  permissions = 384

  locking = no

  escape_filenames = no

  log_packet_header = no

  }

  # Loaded module rlm_logintime

  # Loading module "logintime" from file
/etc/freeradius/3.0/mods-enabled/logintime

  logintime {

  minimum_timeout = 60

  }

  # Loaded module rlm_expiration

  # Loading module "expiration" from file
/etc/freeradius/3.0/mods-enabled/expiration

  # Loading module "exec" from file /etc/freeradius/3.0/mods-enabled/exec

  exec {

  wait = no

  input_pairs = "request"

  shell_escape = yes

  timeout = 10

  }

  # Loaded module rlm_unpack

  # Loading module "unpack" from file
/etc/freeradius/3.0/mods-enabled/unpack

  # Loaded module rlm_chap

  # Loading module "chap" from file /etc/freeradius/3.0/mods-enabled/chap

  # Loaded module rlm_cache

  # Loading module "cache_eap" from file
/etc/freeradius/3.0/mods-enabled/cache_eap

  cache cache_eap {

  driver = "rlm_cache_rbtree"

  key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"

  ttl = 15

  max_entries = 0

  epoch = 0

  add_stats = no

  }

  # Loaded module rlm_always

  # Loading module "reject" from file
/etc/freeradius/3.0/mods-enabled/always

  always reject {

  rcode = "reject"

  simulcount = 0

  mpp = no

  }

  # Loading module "fail" from file /etc/freeradius/3.0/mods-enabled/always

  always fail {

  rcode = "fail"

  simulcount = 0

  mpp = no

  }

  # Loading module "ok" from file /etc/freeradius/3.0/mods-enabled/always

  always ok {

  rcode = "ok"

  simulcount = 0

  mpp = no

  }

  # Loading module "handled" from file
/etc/freeradius/3.0/mods-enabled/always

  always handled {

  rcode = "handled"

  simulcount = 0

  mpp = no

  }

  # Loading module "invalid" from file
/etc/freeradius/3.0/mods-enabled/always

  always invalid {

  rcode = "invalid"

  simulcount = 0

  mpp = no

  }

  # Loading module "userlock" from file
/etc/freeradius/3.0/mods-enabled/always

  always userlock {

  rcode = "userlock"

  simulcount = 0

  mpp = no

  }

  # Loading module "notfound" from file
/etc/freeradius/3.0/mods-enabled/always

  always notfound {

  rcode = "notfound"

  simulcount = 0

  mpp = no

  }

  # Loading module "noop" from file /etc/freeradius/3.0/mods-enabled/always

  always noop {

  rcode = "noop"

  simulcount = 0

  mpp = no

  }

  # Loading module "updated" from file
/etc/freeradius/3.0/mods-enabled/always

  always updated {

  rcode = "updated"

  simulcount = 0

  mpp = no

  }

  # Loaded module rlm_linelog

  # Loading module "linelog" from file
/etc/freeradius/3.0/mods-enabled/linelog

  linelog {

  filename = "/var/log/freeradius/linelog"

  escape_filenames = no

  syslog_severity = "info"

  permissions = 384

  format = "This is a log message for %{User-Name}"

  reference = "messages.%{%{reply:Packet-Type}:-default}"

  }

  # Loading module "log_accounting" from file
/etc/freeradius/3.0/mods-enabled/linelog

  linelog log_accounting {

  filename = "/var/log/freeradius/linelog-accounting"

  escape_filenames = no

  syslog_severity = "info"

  permissions = 384

  format = ""

  reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"

  }

  # Loaded module rlm_expr

  # Loading module "expr" from file /etc/freeradius/3.0/mods-enabled/expr

  expr {

  safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
/äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"

  }

  # Loaded module rlm_pap

  # Loading module "pap" from file /etc/freeradius/3.0/mods-enabled/pap

  pap {

  normalise = yes

  }

  # Loading module "echo" from file /etc/freeradius/3.0/mods-enabled/echo

  exec echo {

  wait = yes

  program = "/bin/echo %{User-Name}"

  input_pairs = "request"

  output_pairs = "reply"

  shell_escape = yes

  }

  instantiate {

  }

  # Instantiating module "eap" from file
/etc/freeradius/3.0/mods-enabled/eap

   # Linked to sub-module rlm_eap_md5

   # Linked to sub-module rlm_eap_leap

   # Linked to sub-module rlm_eap_gtc

   gtc {

   challenge = "Password: "

   auth_type = "PAP"

   }

   # Linked to sub-module rlm_eap_tls

   tls {

   tls = "tls-common"

   }

   tls-config tls-common {

   verify_depth = 0

   ca_path = "/etc/freeradius/3.0/certs"

   pem_file_type = yes

   private_key_file = "/etc/ssl/private/ssl-cert-snakeoil.key"

   certificate_file = "/etc/ssl/certs/ssl-cert-snakeoil.pem"

   ca_file = "/etc/ssl/certs/ca-certificates.crt"

   private_key_password = <<< secret >>>

   dh_file = "/etc/freeradius/3.0/certs/dh"

   fragment_size = 1024

   include_length = yes

   auto_chain = yes

   check_crl = no

   check_all_crl = no

   cipher_list = "DEFAULT"

   cipher_server_preference = no

   ecdh_curve = "prime256v1"

   tls_max_version = ""

   tls_min_version = "1.0"

    cache {

    enable = no

    lifetime = 24

    max_entries = 255

    }

    verify {

    skip_if_ocsp_ok = no

    }

    ocsp {

    enable = no

    override_cert_url = yes

    url = "http://127.0.0.1/ocsp/"

    use_nonce = yes

    timeout = 0

    softfail = no

    }

   }

   # Linked to sub-module rlm_eap_ttls

   ttls {

   tls = "tls-common"

   default_eap_type = "mschap"

   copy_request_to_tunnel = no

   use_tunneled_reply = no

   virtual_server = "inner-tunnel"

   include_length = yes

   require_client_cert = no

   }

tls: Using cached TLS configuration from previous invocation

   # Linked to sub-module rlm_eap_peap

   peap {

   tls = "tls-common"

   default_eap_type = "mschapv2"

   copy_request_to_tunnel = no

   use_tunneled_reply = no

   proxy_tunneled_request_as_eap = yes

   virtual_server = "inner-tunnel"

   soh = no

   require_client_cert = no

   }

tls: Using cached TLS configuration from previous invocation

   # Linked to sub-module rlm_eap_mschapv2

   mschapv2 {

   with_ntdomain_hack = no

   send_error = no

   }

  # Instantiating module "ldap" from file
/etc/freeradius/3.0/mods-enabled/ldap

rlm_ldap: libldap vendor: OpenLDAP, version: 20447

   accounting {

   reference = "%{tolower:type.%{Acct-Status-Type}}"

   }

   post-auth {

   reference = "."

   }

rlm_ldap (ldap): Initialising connection pool

   pool {

   start = 5

   min = 3

   max = 32

   spare = 10

   uses = 0

   lifetime = 0

   cleanup_interval = 30

   idle_timeout = 60

   retry_delay = 30

   spread = no

   }

rlm_ldap (ldap): Opening additional connection (0), 1 of 32 pending slots
used

rlm_ldap (ldap): Connecting to ldap://nis.cc.lehigh.edu:389

rlm_ldap (ldap): Waiting for bind result...

rlm_ldap (ldap): Bind successful

rlm_ldap (ldap): Opening additional connection (1), 1 of 31 pending slots
used

rlm_ldap (ldap): Connecting to ldap://nis.cc.lehigh.edu:389

rlm_ldap (ldap): Waiting for bind result...

rlm_ldap (ldap): Bind successful

rlm_ldap (ldap): Opening additional connection (2), 1 of 30 pending slots
used

rlm_ldap (ldap): Connecting to ldap://nis.cc.lehigh.edu:389

rlm_ldap (ldap): Waiting for bind result...

rlm_ldap (ldap): Bind successful

rlm_ldap (ldap): Opening additional connection (3), 1 of 29 pending slots
used

rlm_ldap (ldap): Connecting to ldap://nis.cc.lehigh.edu:389

rlm_ldap (ldap): Waiting for bind result...

rlm_ldap (ldap): Bind successful

rlm_ldap (ldap): Opening additional connection (4), 1 of 28 pending slots
used

rlm_ldap (ldap): Connecting to ldap://nis.cc.lehigh.edu:389

rlm_ldap (ldap): Waiting for bind result...

rlm_ldap (ldap): Bind successful

  # Instantiating module "etc_passwd" from file
/etc/freeradius/3.0/mods-enabled/passwd

rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no

  # Instantiating module "files" from file
/etc/freeradius/3.0/mods-enabled/files

reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize

reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting

reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy

  # Instantiating module "auth_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

rlm_detail (auth_log): 'User-Password' suppressed, will not appear in
detail output

  # Instantiating module "reply_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  # Instantiating module "pre_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  # Instantiating module "post_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log

  # Instantiating module "attr_filter.post-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/post-proxy

  # Instantiating module "attr_filter.pre-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy

  # Instantiating module "attr_filter.access_reject" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/access_reject

[/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item
"FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT".

[/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item
"FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT".

  # Instantiating module "attr_filter.access_challenge" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/access_challenge

  # Instantiating module "attr_filter.accounting_response" from file
/etc/freeradius/3.0/mods-enabled/attr_filter

reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/accounting_response

  # Instantiating module "mschap" from file
/etc/freeradius/3.0/mods-enabled/mschap

rlm_mschap (mschap): Initialising connection pool

   pool {

   start = 5

   min = 3

   max = 32

   spare = 10

   uses = 0

   lifetime = 86400

   cleanup_interval = 300

   idle_timeout = 600

   retry_delay = 30

   spread = no

   }

rlm_mschap (mschap): Opening additional connection (0), 1 of 32 pending
slots used

rlm_mschap (mschap): Opening additional connection (1), 1 of 31 pending
slots used

rlm_mschap (mschap): Opening additional connection (2), 1 of 30 pending
slots used

rlm_mschap (mschap): Opening additional connection (3), 1 of 29 pending
slots used

rlm_mschap (mschap): Opening additional connection (4), 1 of 28 pending
slots used

rlm_mschap (mschap): authenticating directly to winbind

  # Instantiating module "preprocess" from file
/etc/freeradius/3.0/mods-enabled/preprocess

reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/huntgroups

reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints

  # Instantiating module "IPASS" from file
/etc/freeradius/3.0/mods-enabled/realm

  # Instantiating module "suffix" from file
/etc/freeradius/3.0/mods-enabled/realm

  # Instantiating module "realmpercent" from file
/etc/freeradius/3.0/mods-enabled/realm

  # Instantiating module "ntdomain" from file
/etc/freeradius/3.0/mods-enabled/realm

  # Instantiating module "detail" from file
/etc/freeradius/3.0/mods-enabled/detail

  # Instantiating module "logintime" from file
/etc/freeradius/3.0/mods-enabled/logintime

  # Instantiating module "expiration" from file
/etc/freeradius/3.0/mods-enabled/expiration

  # Instantiating module "cache_eap" from file
/etc/freeradius/3.0/mods-enabled/cache_eap

rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree)
loaded and linked

  # Instantiating module "reject" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "fail" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "ok" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "handled" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "invalid" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "userlock" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "notfound" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "noop" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "updated" from file
/etc/freeradius/3.0/mods-enabled/always

  # Instantiating module "linelog" from file
/etc/freeradius/3.0/mods-enabled/linelog

  # Instantiating module "log_accounting" from file
/etc/freeradius/3.0/mods-enabled/linelog

  # Instantiating module "pap" from file
/etc/freeradius/3.0/mods-enabled/pap

 } # modules

radiusd: #### Loading Virtual Servers ####

server { # from file /etc/freeradius/3.0/radiusd.conf

} # server

server default { # from file /etc/freeradius/3.0/sites-enabled/default

 # Loading authenticate {...}

 # Loading authorize {...}

 # Loading preacct {...}

 # Loading accounting {...}

Ignoring "sql" (see raddb/mods-available/README.rst)

 # Loading post-proxy {...}

 # Loading post-auth {...}

} # server default

server inner-tunnel { # from file
/etc/freeradius/3.0/sites-enabled/inner-tunnel

 # Loading authenticate {...}

 # Loading authorize {...}

 # Loading session {...}

 # Loading post-proxy {...}

 # Loading post-auth {...}

 # Skipping contents of 'if' as it is always 'false' --
/etc/freeradius/3.0/sites-enabled/inner-tunnel:332

} # server inner-tunnel

radiusd: #### Opening IP addresses and Ports ####

listen {

  type = "auth"

  ipaddr = *

  port = 0

   limit {

   max_connections = 16

   lifetime = 0

   idle_timeout = 30

   }

}

listen {

  type = "acct"

  ipaddr = *

  port = 0

   limit {

   max_connections = 16

   lifetime = 0

   idle_timeout = 30

   }

}

listen {

  type = "auth"

  ipv6addr = ::

  port = 0

   limit {

   max_connections = 16

   lifetime = 0

   idle_timeout = 30

   }

}

listen {

  type = "acct"

  ipv6addr = ::

  port = 0

   limit {

   max_connections = 16

   lifetime = 0

   idle_timeout = 30

   }

}

listen {

  type = "auth"

  ipaddr = 127.0.0.1

  port = 18120

}

Listening on auth address * port 1812 bound to server default

Listening on acct address * port 1813 bound to server default

Listening on auth address :: port 1812 bound to server default

Listening on acct address :: port 1813 bound to server default

Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel

Listening on proxy address * port 37360

Listening on proxy address :: port 46230

Ready to process requests

(0) Received Access-Request Id 113 from 128.180.10.10:34962 to
128.180.1.12:1812 length 132

(0)   User-Name = "x19a19"

(0)   NAS-IP-Address = 128.180.10.10

(0)   NAS-Port = 0

(0)   Message-Authenticator = 0xd2299e996c2559b442f336ffd22bcfdf

(0)   MS-CHAP-Challenge = 0x717914d8dcc9dabf

(0)   MS-CHAP-Response =
0x00010000000000000000000000000000000000000000000000009d01363bd318984664b9f8328b826e2cb6d60cb550d21a53

(0) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(0)   authorize {

(0)     policy filter_username {

(0)       if (&User-Name) {

(0)       if (&User-Name)  -> TRUE

(0)       if (&User-Name)  {

(0)         if (&User-Name =~ / /) {

(0)         if (&User-Name =~ / /)  -> FALSE

(0)         if (&User-Name =~ /@[^@]*@/ ) {

(0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(0)         if (&User-Name =~ /\.\./ ) {

(0)         if (&User-Name =~ /\.\./ )  -> FALSE

(0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(0)         if (&User-Name =~ /\.$/)  {

(0)         if (&User-Name =~ /\.$/)   -> FALSE

(0)         if (&User-Name =~ /@\./)  {

(0)         if (&User-Name =~ /@\./)   -> FALSE

(0)       } # if (&User-Name)  = notfound

(0)     } # policy filter_username = notfound

(0)     [preprocess] = ok

(0) mschap: Found MS-CHAP attributes.  Setting 'Auth-Type  = mschap'

(0)     [mschap] = ok

(0) suffix: Checking for suffix after "@"

(0) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(0) suffix: No such realm "NULL"

(0)     [suffix] = noop

(0) eap: No EAP-Message, not doing EAP

(0)     [eap] = noop

(0)     [expiration] = noop

(0)     [logintime] = noop

(0)   } # authorize = ok

(0) Found Auth-Type = mschap

(0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(0)   authenticate {

(0) mschap: Client is using MS-CHAPv1 with NT-Password

(0) mschap: EXPAND %{mschap:User-Name}

(0) mschap:    --> x19a19

rlm_mschap (mschap): Reserved connection (0)

(0) mschap: sending authentication request user='x19a19' domain='AD'

rlm_mschap (mschap): Released connection (0)

Need 5 more connections to reach 10 spares

rlm_mschap (mschap): Opening additional connection (5), 1 of 27 pending
slots used

(0) mschap: Authenticated successfully

(0) mschap: adding MS-CHAPv1 MPPE keys

(0)     [mschap] = ok

(0)   } # authenticate = ok

(0) # Executing section post-auth from file
/etc/freeradius/3.0/sites-enabled/default

(0)   post-auth {

(0)     update {

(0)       No attributes updated

(0)     } # update = noop

(0)     [exec] = noop

(0)     policy remove_reply_message_if_eap {

(0)       if (&reply:EAP-Message && &reply:Reply-Message) {

(0)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE

(0)       else {

(0)         [noop] = noop

(0)       } # else = noop

(0)     } # policy remove_reply_message_if_eap = noop

(0)   } # post-auth = noop

(0) Login OK: [x19a19] (from client newguy port 0)

(0) Sent Access-Accept Id 113 from 128.180.1.12:1812 to 128.180.10.10:34962
length 0

(0)   MS-CHAP-MPPE-Keys = 0x00000000000000008781fa9a8c20b6fc04a18ace43fcea9b

(0)   MS-MPPE-Encryption-Policy = Encryption-Allowed

(0)   MS-MPPE-Encryption-Types = RC4-40or128-bit-Allowed

(0) Finished request

Waking up in 4.9 seconds.

(0) Cleaning up request packet ID 113 with timestamp +8

Ready to process requests

(1) Received Access-Request Id 0 from 128.180.10.10:59365 to
128.180.1.12:1812 length 126

(1)   User-Name = "x19a19"

(1)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(1)   Framed-MTU = 1400

(1)   NAS-Port-Type = Wireless-802.11

(1)   Service-Type = Framed-User

(1)   Connect-Info = "CONNECT 11Mbps 802.11b"

(1)   NAS-IP-Address = 128.180.10.10

(1)   EAP-Message = 0x0252000b01783139613139

(1)   Message-Authenticator = 0x14198cfe38a2581104d19a1faa75c00a

(1) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(1)   authorize {

(1)     policy filter_username {

(1)       if (&User-Name) {

(1)       if (&User-Name)  -> TRUE

(1)       if (&User-Name)  {

(1)         if (&User-Name =~ / /) {

(1)         if (&User-Name =~ / /)  -> FALSE

(1)         if (&User-Name =~ /@[^@]*@/ ) {

(1)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(1)         if (&User-Name =~ /\.\./ ) {

(1)         if (&User-Name =~ /\.\./ )  -> FALSE

(1)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(1)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(1)         if (&User-Name =~ /\.$/)  {

(1)         if (&User-Name =~ /\.$/)   -> FALSE

(1)         if (&User-Name =~ /@\./)  {

(1)         if (&User-Name =~ /@\./)   -> FALSE

(1)       } # if (&User-Name)  = notfound

(1)     } # policy filter_username = notfound

(1)     [preprocess] = ok

(1)     [mschap] = noop

(1) suffix: Checking for suffix after "@"

(1) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(1) suffix: No such realm "NULL"

(1)     [suffix] = noop

(1) eap: Peer sent EAP Response (code 2) ID 82 length 11

(1) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the
rest of authorize

(1)     [eap] = ok

(1)   } # authorize = ok

(1) Found Auth-Type = eap

(1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(1)   authenticate {

(1) eap: Peer sent packet with method EAP Identity (1)

(1) eap: Calling submodule eap_peap to process data

(1) eap_peap: Initiating new EAP-TLS session

(1) eap_peap: [eaptls start] = request

(1) eap: Sending EAP Request (code 1) ID 83 length 6

(1) eap: EAP session adding &reply:State = 0xcadff709ca8cee11

(1)     [eap] = handled

(1)   } # authenticate = handled

(1) Using Post-Auth-Type Challenge

(1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(1)   Challenge { ... } # empty sub-section is ignored

(1) Sent Access-Challenge Id 0 from 128.180.1.12:1812 to 128.180.10.10:59365
length 0

(1)   EAP-Message = 0x015300061920

(1)   Message-Authenticator = 0x00000000000000000000000000000000

(1)   State = 0xcadff709ca8cee110012e36e99246512

(1) Finished request

Waking up in 4.9 seconds.

(2) Received Access-Request Id 1 from 128.180.10.10:59365 to
128.180.1.12:1812 length 327

(2)   User-Name = "x19a19"

(2)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(2)   Framed-MTU = 1400

(2)   NAS-Port-Type = Wireless-802.11

(2)   Service-Type = Framed-User

(2)   Connect-Info = "CONNECT 11Mbps 802.11b"

(2)   NAS-IP-Address = 128.180.10.10

(2)   EAP-Message =
0x025300c21980000000b816030100b3010000af0303474f6239c8725b89b678c754ae687bf951e6b05efc689ddc504fdd7fe46a8c00000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b00

(2)   State = 0xcadff709ca8cee110012e36e99246512

(2)   Message-Authenticator = 0x07637ad8892b3fede78b56b64ca9c2e1

(2) session-state: No cached attributes

(2) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(2)   authorize {

(2)     policy filter_username {

(2)       if (&User-Name) {

(2)       if (&User-Name)  -> TRUE

(2)       if (&User-Name)  {

(2)         if (&User-Name =~ / /) {

(2)         if (&User-Name =~ / /)  -> FALSE

(2)         if (&User-Name =~ /@[^@]*@/ ) {

(2)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(2)         if (&User-Name =~ /\.\./ ) {

(2)         if (&User-Name =~ /\.\./ )  -> FALSE

(2)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(2)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(2)         if (&User-Name =~ /\.$/)  {

(2)         if (&User-Name =~ /\.$/)   -> FALSE

(2)         if (&User-Name =~ /@\./)  {

(2)         if (&User-Name =~ /@\./)   -> FALSE

(2)       } # if (&User-Name)  = notfound

(2)     } # policy filter_username = notfound

(2)     [preprocess] = ok

(2)     [mschap] = noop

(2) suffix: Checking for suffix after "@"

(2) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(2) suffix: No such realm "NULL"

(2)     [suffix] = noop

(2) eap: Peer sent EAP Response (code 2) ID 83 length 194

(2) eap: Continuing tunnel setup

(2)     [eap] = ok

(2)   } # authorize = ok

(2) Found Auth-Type = eap

(2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(2)   authenticate {

(2) eap: Expiring EAP session with state 0xcadff709ca8cee11

(2) eap: Finished EAP session with state 0xcadff709ca8cee11

(2) eap: Previous EAP request found for state 0xcadff709ca8cee11, released
from the list

(2) eap: Peer sent packet with method EAP PEAP (25)

(2) eap: Calling submodule eap_peap to process data

(2) eap_peap: Continuing EAP-TLS

(2) eap_peap: Peer indicated complete TLS record size will be 184 bytes

(2) eap_peap: Got complete TLS record (184 bytes)

(2) eap_peap: [eaptls verify] = length included

(2) eap_peap: (other): before SSL initialization

(2) eap_peap: TLS_accept: before SSL initialization

(2) eap_peap: TLS_accept: before SSL initialization

(2) eap_peap: <<< recv UNKNOWN TLS VERSION ?0304? [length 00b3]

(2) eap_peap: TLS_accept: SSLv3/TLS read client hello

(2) eap_peap: >>> send TLS 1.2  [length 003d]

(2) eap_peap: TLS_accept: SSLv3/TLS write server hello

(2) eap_peap: >>> send TLS 1.2  [length 02ff]

(2) eap_peap: TLS_accept: SSLv3/TLS write certificate

(2) eap_peap: >>> send TLS 1.2  [length 014d]

(2) eap_peap: TLS_accept: SSLv3/TLS write key exchange

(2) eap_peap: >>> send TLS 1.2  [length 0004]

(2) eap_peap: TLS_accept: SSLv3/TLS write server done

(2) eap_peap: TLS_accept: Need to read more data: SSLv3/TLS write server
done

(2) eap_peap: In SSL Handshake Phase

(2) eap_peap: In SSL Accept mode

(2) eap_peap: [eaptls process] = handled

(2) eap: Sending EAP Request (code 1) ID 84 length 1004

(2) eap: EAP session adding &reply:State = 0xcadff709cb8bee11

(2)     [eap] = handled

(2)   } # authenticate = handled

(2) Using Post-Auth-Type Challenge

(2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(2)   Challenge { ... } # empty sub-section is ignored

(2) Sent Access-Challenge Id 1 from 128.180.1.12:1812 to 128.180.10.10:59365
length 0

(2)   EAP-Message =
0x015403ec19c0000004a1160303003d020000390303b2726d63d9acd061f06be8d708942f99f194aa1aeabce107444f574e4752440100c030000011ff01000100000b0004030001020017000016030302ff0b0002fb0002f80002f5308202f1308201d9a00302010202146434b6d539827cbeb8e5394cc7

(2)   Message-Authenticator = 0x00000000000000000000000000000000

(2)   State = 0xcadff709cb8bee110012e36e99246512

(2) Finished request

Waking up in 4.9 seconds.

(3) Received Access-Request Id 2 from 128.180.10.10:59365 to
128.180.1.12:1812 length 139

(3)   User-Name = "x19a19"

(3)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(3)   Framed-MTU = 1400

(3)   NAS-Port-Type = Wireless-802.11

(3)   Service-Type = Framed-User

(3)   Connect-Info = "CONNECT 11Mbps 802.11b"

(3)   NAS-IP-Address = 128.180.10.10

(3)   EAP-Message = 0x025400061900

(3)   State = 0xcadff709cb8bee110012e36e99246512

(3)   Message-Authenticator = 0xc61b1942472f47e34aa249cd31ef3303

(3) session-state: No cached attributes

(3) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(3)   authorize {

(3)     policy filter_username {

(3)       if (&User-Name) {

(3)       if (&User-Name)  -> TRUE

(3)       if (&User-Name)  {

(3)         if (&User-Name =~ / /) {

(3)         if (&User-Name =~ / /)  -> FALSE

(3)         if (&User-Name =~ /@[^@]*@/ ) {

(3)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(3)         if (&User-Name =~ /\.\./ ) {

(3)         if (&User-Name =~ /\.\./ )  -> FALSE

(3)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(3)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(3)         if (&User-Name =~ /\.$/)  {

(3)         if (&User-Name =~ /\.$/)   -> FALSE

(3)         if (&User-Name =~ /@\./)  {

(3)         if (&User-Name =~ /@\./)   -> FALSE

(3)       } # if (&User-Name)  = notfound

(3)     } # policy filter_username = notfound

(3)     [preprocess] = ok

(3)     [mschap] = noop

(3) suffix: Checking for suffix after "@"

(3) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(3) suffix: No such realm "NULL"

(3)     [suffix] = noop

(3) eap: Peer sent EAP Response (code 2) ID 84 length 6

(3) eap: Continuing tunnel setup

(3)     [eap] = ok

(3)   } # authorize = ok

(3) Found Auth-Type = eap

(3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(3)   authenticate {

(3) eap: Expiring EAP session with state 0xcadff709cb8bee11

(3) eap: Finished EAP session with state 0xcadff709cb8bee11

(3) eap: Previous EAP request found for state 0xcadff709cb8bee11, released
from the list

(3) eap: Peer sent packet with method EAP PEAP (25)

(3) eap: Calling submodule eap_peap to process data

(3) eap_peap: Continuing EAP-TLS

(3) eap_peap: Peer ACKed our handshake fragment

(3) eap_peap: [eaptls verify] = request

(3) eap_peap: [eaptls process] = handled

(3) eap: Sending EAP Request (code 1) ID 85 length 197

(3) eap: EAP session adding &reply:State = 0xcadff709c88aee11

(3)     [eap] = handled

(3)   } # authenticate = handled

(3) Using Post-Auth-Type Challenge

(3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(3)   Challenge { ... } # empty sub-section is ignored

(3) Sent Access-Challenge Id 2 from 128.180.1.12:1812 to 128.180.10.10:59365
length 0

(3)   EAP-Message =
0x015500c5190068700f38c16446f3d95f1ef117c2250f7a85ec2b22c2c4ee2109b3ea42dd1a8959feee16d952e01eab4820e6d752ce69ab0d285913ec725dc0f8acfdeeeaa79fce2ca0e607c806f22d489226d805cad62f4770167b67a1e78453d522af954433a060530439d42079d989e378582cd3efbe

(3)   Message-Authenticator = 0x00000000000000000000000000000000

(3)   State = 0xcadff709c88aee110012e36e99246512

(3) Finished request

Waking up in 4.9 seconds.

(4) Received Access-Request Id 3 from 128.180.10.10:59365 to
128.180.1.12:1812 length 269

(4)   User-Name = "x19a19"

(4)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(4)   Framed-MTU = 1400

(4)   NAS-Port-Type = Wireless-802.11

(4)   Service-Type = Framed-User

(4)   Connect-Info = "CONNECT 11Mbps 802.11b"

(4)   NAS-IP-Address = 128.180.10.10

(4)   EAP-Message =
0x0255008819800000007e16030300461000004241043eaa2a21a0683bda47be7fdfeba010636df133f02b947599550988115b59414f6fa0c7b8bbda10330aba95cfb743fb406d0590fd3e48f9fa9c0a8bc8b07f9098140303000101160303002812a05b04d255849a789ba05cafb2b21a3a4d389bea908a

(4)   State = 0xcadff709c88aee110012e36e99246512

(4)   Message-Authenticator = 0x7a0d7cffe63eb52c7bdab225126116d8

(4) session-state: No cached attributes

(4) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(4)   authorize {

(4)     policy filter_username {

(4)       if (&User-Name) {

(4)       if (&User-Name)  -> TRUE

(4)       if (&User-Name)  {

(4)         if (&User-Name =~ / /) {

(4)         if (&User-Name =~ / /)  -> FALSE

(4)         if (&User-Name =~ /@[^@]*@/ ) {

(4)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(4)         if (&User-Name =~ /\.\./ ) {

(4)         if (&User-Name =~ /\.\./ )  -> FALSE

(4)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(4)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(4)         if (&User-Name =~ /\.$/)  {

(4)         if (&User-Name =~ /\.$/)   -> FALSE

(4)         if (&User-Name =~ /@\./)  {

(4)         if (&User-Name =~ /@\./)   -> FALSE

(4)       } # if (&User-Name)  = notfound

(4)     } # policy filter_username = notfound

(4)     [preprocess] = ok

(4)     [mschap] = noop

(4) suffix: Checking for suffix after "@"

(4) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(4) suffix: No such realm "NULL"

(4)     [suffix] = noop

(4) eap: Peer sent EAP Response (code 2) ID 85 length 136

(4) eap: Continuing tunnel setup

(4)     [eap] = ok

(4)   } # authorize = ok

(4) Found Auth-Type = eap

(4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(4)   authenticate {

(4) eap: Expiring EAP session with state 0xcadff709c88aee11

(4) eap: Finished EAP session with state 0xcadff709c88aee11

(4) eap: Previous EAP request found for state 0xcadff709c88aee11, released
from the list

(4) eap: Peer sent packet with method EAP PEAP (25)

(4) eap: Calling submodule eap_peap to process data

(4) eap_peap: Continuing EAP-TLS

(4) eap_peap: Peer indicated complete TLS record size will be 126 bytes

(4) eap_peap: Got complete TLS record (126 bytes)

(4) eap_peap: [eaptls verify] = length included

(4) eap_peap: TLS_accept: SSLv3/TLS write server done

(4) eap_peap: <<< recv TLS 1.2  [length 0046]

(4) eap_peap: TLS_accept: SSLv3/TLS read client key exchange

(4) eap_peap: TLS_accept: SSLv3/TLS read change cipher spec

(4) eap_peap: <<< recv TLS 1.2  [length 0010]

(4) eap_peap: TLS_accept: SSLv3/TLS read finished

(4) eap_peap: >>> send TLS 1.2  [length 0001]

(4) eap_peap: TLS_accept: SSLv3/TLS write change cipher spec

(4) eap_peap: >>> send TLS 1.2  [length 0010]

(4) eap_peap: TLS_accept: SSLv3/TLS write finished

(4) eap_peap: (other): SSL negotiation finished successfully

(4) eap_peap: SSL Connection Established

(4) eap_peap: [eaptls process] = handled

(4) eap: Sending EAP Request (code 1) ID 86 length 57

(4) eap: EAP session adding &reply:State = 0xcadff709c989ee11

(4)     [eap] = handled

(4)   } # authenticate = handled

(4) Using Post-Auth-Type Challenge

(4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(4)   Challenge { ... } # empty sub-section is ignored

(4) Sent Access-Challenge Id 3 from 128.180.1.12:1812 to 128.180.10.10:59365
length 0

(4)   EAP-Message =
0x0156003919001403030001011603030028b108f9b7cde68163c7abf7ee19e4a45cbaacd44bfcb4b7ffcfd19a2af9cc3c2514c0a6aab5d48806

(4)   Message-Authenticator = 0x00000000000000000000000000000000

(4)   State = 0xcadff709c989ee110012e36e99246512

(4) Finished request

Waking up in 4.9 seconds.

(5) Received Access-Request Id 4 from 128.180.10.10:59365 to
128.180.1.12:1812 length 139

(5)   User-Name = "x19a19"

(5)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(5)   Framed-MTU = 1400

(5)   NAS-Port-Type = Wireless-802.11

(5)   Service-Type = Framed-User

(5)   Connect-Info = "CONNECT 11Mbps 802.11b"

(5)   NAS-IP-Address = 128.180.10.10

(5)   EAP-Message = 0x025600061900

(5)   State = 0xcadff709c989ee110012e36e99246512

(5)   Message-Authenticator = 0x78d21582ec1dc1c067d5e3b7a73470d5

(5) session-state: No cached attributes

(5) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(5)   authorize {

(5)     policy filter_username {

(5)       if (&User-Name) {

(5)       if (&User-Name)  -> TRUE

(5)       if (&User-Name)  {

(5)         if (&User-Name =~ / /) {

(5)         if (&User-Name =~ / /)  -> FALSE

(5)         if (&User-Name =~ /@[^@]*@/ ) {

(5)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(5)         if (&User-Name =~ /\.\./ ) {

(5)         if (&User-Name =~ /\.\./ )  -> FALSE

(5)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(5)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(5)         if (&User-Name =~ /\.$/)  {

(5)         if (&User-Name =~ /\.$/)   -> FALSE

(5)         if (&User-Name =~ /@\./)  {

(5)         if (&User-Name =~ /@\./)   -> FALSE

(5)       } # if (&User-Name)  = notfound

(5)     } # policy filter_username = notfound

(5)     [preprocess] = ok

(5)     [mschap] = noop

(5) suffix: Checking for suffix after "@"

(5) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(5) suffix: No such realm "NULL"

(5)     [suffix] = noop

(5) eap: Peer sent EAP Response (code 2) ID 86 length 6

(5) eap: Continuing tunnel setup

(5)     [eap] = ok

(5)   } # authorize = ok

(5) Found Auth-Type = eap

(5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(5)   authenticate {

(5) eap: Expiring EAP session with state 0xcadff709c989ee11

(5) eap: Finished EAP session with state 0xcadff709c989ee11

(5) eap: Previous EAP request found for state 0xcadff709c989ee11, released
from the list

(5) eap: Peer sent packet with method EAP PEAP (25)

(5) eap: Calling submodule eap_peap to process data

(5) eap_peap: Continuing EAP-TLS

(5) eap_peap: Peer ACKed our handshake fragment.  handshake is finished

(5) eap_peap: [eaptls verify] = success

(5) eap_peap: [eaptls process] = success

(5) eap_peap: Session established.  Decoding tunneled attributes

(5) eap_peap: PEAP state TUNNEL ESTABLISHED

(5) eap: Sending EAP Request (code 1) ID 87 length 40

(5) eap: EAP session adding &reply:State = 0xcadff709ce88ee11

(5)     [eap] = handled

(5)   } # authenticate = handled

(5) Using Post-Auth-Type Challenge

(5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(5)   Challenge { ... } # empty sub-section is ignored

(5) Sent Access-Challenge Id 4 from 128.180.1.12:1812 to 128.180.10.10:59365
length 0

(5)   EAP-Message =
0x015700281900170303001db108f9b7cde6816431adb89b4dc4f23dd7282f394bc022d311a1bdfe66

(5)   Message-Authenticator = 0x00000000000000000000000000000000

(5)   State = 0xcadff709ce88ee110012e36e99246512

(5) Finished request

Waking up in 4.9 seconds.

(6) Received Access-Request Id 5 from 128.180.10.10:59365 to
128.180.1.12:1812 length 175

(6)   User-Name = "x19a19"

(6)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(6)   Framed-MTU = 1400

(6)   NAS-Port-Type = Wireless-802.11

(6)   Service-Type = Framed-User

(6)   Connect-Info = "CONNECT 11Mbps 802.11b"

(6)   NAS-IP-Address = 128.180.10.10

(6)   EAP-Message =
0x0257002a1900170303001f12a05b04d255849bddf78de76140467010a53eb9c63bb90d71c01bd9284b0e

(6)   State = 0xcadff709ce88ee110012e36e99246512

(6)   Message-Authenticator = 0xd476c0508f71343fa63d5fef151920e9

(6) session-state: No cached attributes

(6) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(6)   authorize {

(6)     policy filter_username {

(6)       if (&User-Name) {

(6)       if (&User-Name)  -> TRUE

(6)       if (&User-Name)  {

(6)         if (&User-Name =~ / /) {

(6)         if (&User-Name =~ / /)  -> FALSE

(6)         if (&User-Name =~ /@[^@]*@/ ) {

(6)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(6)         if (&User-Name =~ /\.\./ ) {

(6)         if (&User-Name =~ /\.\./ )  -> FALSE

(6)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(6)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(6)         if (&User-Name =~ /\.$/)  {

(6)         if (&User-Name =~ /\.$/)   -> FALSE

(6)         if (&User-Name =~ /@\./)  {

(6)         if (&User-Name =~ /@\./)   -> FALSE

(6)       } # if (&User-Name)  = notfound

(6)     } # policy filter_username = notfound

(6)     [preprocess] = ok

(6)     [mschap] = noop

(6) suffix: Checking for suffix after "@"

(6) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(6) suffix: No such realm "NULL"

(6)     [suffix] = noop

(6) eap: Peer sent EAP Response (code 2) ID 87 length 42

(6) eap: Continuing tunnel setup

(6)     [eap] = ok

(6)   } # authorize = ok

(6) Found Auth-Type = eap

(6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(6)   authenticate {

(6) eap: Expiring EAP session with state 0xcadff709ce88ee11

(6) eap: Finished EAP session with state 0xcadff709ce88ee11

(6) eap: Previous EAP request found for state 0xcadff709ce88ee11, released
from the list

(6) eap: Peer sent packet with method EAP PEAP (25)

(6) eap: Calling submodule eap_peap to process data

(6) eap_peap: Continuing EAP-TLS

(6) eap_peap: [eaptls verify] = ok

(6) eap_peap: Done initial handshake

(6) eap_peap: [eaptls process] = ok

(6) eap_peap: Session established.  Decoding tunneled attributes

(6) eap_peap: PEAP state WAITING FOR INNER IDENTITY

(6) eap_peap: Identity - x19a19

(6) eap_peap: Got inner identity 'x19a19'

(6) eap_peap: Setting default EAP type for tunneled EAP session

(6) eap_peap: Got tunneled request

(6) eap_peap:   EAP-Message = 0x0257000b01783139613139

(6) eap_peap: Setting User-Name to x19a19

(6) eap_peap: Sending tunneled request to inner-tunnel

(6) eap_peap:   EAP-Message = 0x0257000b01783139613139

(6) eap_peap:   FreeRADIUS-Proxied-To = 127.0.0.1

(6) eap_peap:   User-Name = "x19a19"

(6) Virtual server inner-tunnel received request

(6)   EAP-Message = 0x0257000b01783139613139

(6)   FreeRADIUS-Proxied-To = 127.0.0.1

(6)   User-Name = "x19a19"

(6) WARNING: Outer and inner identities are the same.  User privacy is
compromised.

(6) server inner-tunnel {

(6)   # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/inner-tunnel

(6)     authorize {

(6)       policy filter_username {

(6)         if (&User-Name) {

(6)         if (&User-Name)  -> TRUE

(6)         if (&User-Name)  {

(6)           if (&User-Name =~ / /) {

(6)           if (&User-Name =~ / /)  -> FALSE

(6)           if (&User-Name =~ /@[^@]*@/ ) {

(6)           if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(6)           if (&User-Name =~ /\.\./ ) {

(6)           if (&User-Name =~ /\.\./ )  -> FALSE

(6)           if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(6)           if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
-> FALSE

(6)           if (&User-Name =~ /\.$/)  {

(6)           if (&User-Name =~ /\.$/)   -> FALSE

(6)           if (&User-Name =~ /@\./)  {

(6)           if (&User-Name =~ /@\./)   -> FALSE

(6)         } # if (&User-Name)  = notfound

(6)       } # policy filter_username = notfound

(6)       [chap] = noop

(6)       [mschap] = noop

(6) suffix: Checking for suffix after "@"

(6) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(6) suffix: No such realm "NULL"

(6)       [suffix] = noop

(6)       update control {

(6)         &Proxy-To-Realm := LOCAL

(6)       } # update control = noop

(6) eap: Peer sent EAP Response (code 2) ID 87 length 11

(6) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the
rest of authorize

(6)       [eap] = ok

(6)     } # authorize = ok

(6)   Found Auth-Type = eap

(6)   Auth-Type sub-section not found.  Ignoring.

(6)   # Executing group from file
/etc/freeradius/3.0/sites-enabled/inner-tunnel

(6)   Failed to authenticate the user

(6)   Using Post-Auth-Type Reject

(6)   # Executing group from file
/etc/freeradius/3.0/sites-enabled/inner-tunnel

(6)     Post-Auth-Type REJECT {

(6) attr_filter.access_reject: EXPAND %{User-Name}

(6) attr_filter.access_reject:    --> x19a19

(6) attr_filter.access_reject: Matched entry DEFAULT at line 11

(6)       [attr_filter.access_reject] = updated

(6)       update outer.session-state {

(6)         No attributes updated

(6)       } # update outer.session-state = noop

(6)     } # Post-Auth-Type REJECT = updated

(6)   Login incorrect: [x19a19/<via Auth-Type = eap>] (from client newguy
port 0 via TLS tunnel)

(6) } # server inner-tunnel

(6) Virtual server sending reply

(6) eap_peap: Got tunneled reply code 3

(6) eap_peap: Got tunneled reply RADIUS code 3

(6) eap_peap: Tunneled authentication was rejected

(6) eap_peap: FAILURE

(6) eap: Sending EAP Request (code 1) ID 88 length 46

(6) eap: EAP session adding &reply:State = 0xcadff709cf87ee11

(6)     [eap] = handled

(6)   } # authenticate = handled

(6) Using Post-Auth-Type Challenge

(6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(6)   Challenge { ... } # empty sub-section is ignored

(6) Sent Access-Challenge Id 5 from 128.180.1.12:1812 to 128.180.10.10:59365
length 0

(6)   EAP-Message =
0x0158002e19001703030023b108f9b7cde681651a2a2a030dd98c8b78203631db68a8190b1757ca080d4996a6a3c1

(6)   Message-Authenticator = 0x00000000000000000000000000000000

(6)   State = 0xcadff709cf87ee110012e36e99246512

(6) Finished request

Waking up in 4.9 seconds.

(7) Received Access-Request Id 6 from 128.180.10.10:59365 to
128.180.1.12:1812 length 179

(7)   User-Name = "x19a19"

(7)   Calling-Station-Id = "00-0A-CD-31-6C-B4"

(7)   Framed-MTU = 1400

(7)   NAS-Port-Type = Wireless-802.11

(7)   Service-Type = Framed-User

(7)   Connect-Info = "CONNECT 11Mbps 802.11b"

(7)   NAS-IP-Address = 128.180.10.10

(7)   EAP-Message =
0x0258002e1900170303002312a05b04d255849c6d0673a9281f2c48255f5ef872b2f7056d9bdfcafc05217f594132

(7)   State = 0xcadff709cf87ee110012e36e99246512

(7)   Message-Authenticator = 0x28d4f911a5e294a3c8fe519a5b05695d

(7) session-state: No cached attributes

(7) # Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default

(7)   authorize {

(7)     policy filter_username {

(7)       if (&User-Name) {

(7)       if (&User-Name)  -> TRUE

(7)       if (&User-Name)  {

(7)         if (&User-Name =~ / /) {

(7)         if (&User-Name =~ / /)  -> FALSE

(7)         if (&User-Name =~ /@[^@]*@/ ) {

(7)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE

(7)         if (&User-Name =~ /\.\./ ) {

(7)         if (&User-Name =~ /\.\./ )  -> FALSE

(7)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {

(7)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE

(7)         if (&User-Name =~ /\.$/)  {

(7)         if (&User-Name =~ /\.$/)   -> FALSE

(7)         if (&User-Name =~ /@\./)  {

(7)         if (&User-Name =~ /@\./)   -> FALSE

(7)       } # if (&User-Name)  = notfound

(7)     } # policy filter_username = notfound

(7)     [preprocess] = ok

(7)     [mschap] = noop

(7) suffix: Checking for suffix after "@"

(7) suffix: No '@' in User-Name = "x19a19", looking up realm NULL

(7) suffix: No such realm "NULL"

(7)     [suffix] = noop

(7) eap: Peer sent EAP Response (code 2) ID 88 length 46

(7) eap: Continuing tunnel setup

(7)     [eap] = ok

(7)   } # authorize = ok

(7) Found Auth-Type = eap

(7) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(7)   authenticate {

(7) eap: Expiring EAP session with state 0xcadff709cf87ee11

(7) eap: Finished EAP session with state 0xcadff709cf87ee11

(7) eap: Previous EAP request found for state 0xcadff709cf87ee11, released
from the list

(7) eap: Peer sent packet with method EAP PEAP (25)

(7) eap: Calling submodule eap_peap to process data

(7) eap_peap: Continuing EAP-TLS

(7) eap_peap: [eaptls verify] = ok

(7) eap_peap: Done initial handshake

(7) eap_peap: [eaptls process] = ok

(7) eap_peap: Session established.  Decoding tunneled attributes

(7) eap_peap: PEAP state send tlv failure

(7) eap_peap: Received EAP-TLV response

(7) eap_peap:   ERROR: The users session was previously rejected: returning
reject (again.)

(7) eap_peap:   This means you need to read the PREVIOUS messages in the
debug output

(7) eap_peap:   to find out the reason why the user was rejected

(7) eap_peap:   Look for "reject" or "fail".  Those earlier messages will
tell you

(7) eap_peap:   what went wrong, and how to fix the problem

(7) eap: ERROR: Failed continuing EAP PEAP (25) session.  EAP sub-module
failed

(7) eap: Sending EAP Failure (code 4) ID 88 length 4

(7) eap: Failed in EAP select

(7)     [eap] = invalid

(7)   } # authenticate = invalid

(7) Failed to authenticate the user

(7) Using Post-Auth-Type Reject

(7) # Executing group from file /etc/freeradius/3.0/sites-enabled/default

(7)   Post-Auth-Type REJECT {

(7) attr_filter.access_reject: EXPAND %{User-Name}

(7) attr_filter.access_reject:    --> x19a19

(7) attr_filter.access_reject: Matched entry DEFAULT at line 11

(7)     [attr_filter.access_reject] = updated

(7)     [eap] = noop

(7)     policy remove_reply_message_if_eap {

(7)       if (&reply:EAP-Message && &reply:Reply-Message) {

(7)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE

(7)       else {

(7)         [noop] = noop

(7)       } # else = noop

(7)     } # policy remove_reply_message_if_eap = noop

(7)   } # Post-Auth-Type REJECT = updated

(7) Login incorrect (eap_peap: The users session was previously rejected:
returning reject (again.)): [x19a19/<via Auth-Type = eap>] (from client
newguy port 0 cli 00-0A-CD-31-6C-B4)

(7) Delaying response for 1.000000 seconds

Waking up in 0.3 seconds.

Waking up in 0.6 seconds.

(7) Sending delayed response

(7) Sent Access-Reject Id 6 from 128.180.1.12:1812 to 128.180.10.10:59365
length 44

(7)   EAP-Message = 0x04580004

(7)   Message-Authenticator = 0x00000000000000000000000000000000

Waking up in 3.9 seconds.






-- 
Munroe Sollog
Senior Network Engineer
munroe at lehigh.edu


More information about the Freeradius-Users mailing list