Failed authentication on FreeRadius

Tal Nur nurtal at yahoo.com
Thu Jun 27 14:14:47 CEST 2019


I installed FR 3.0.20 with plain text file storing users and their passwords.When I tried to connect end user bob at turan.kz via WiFi AP I failed.What is my mistake?
Here is output of freeradius  -X command during connection attempt:
 Received Access-Request Id 30 from 89.250.80.7:1026 to 89.250.80.6:1812 length 182
   User-Name = "bob at turan.kz"
   NAS-IP-Address = 192.168.0.1
   NAS-Port = 0
   Called-Station-Id = "C8-3A-35-40-1C-F0"
   Calling-Station-Id = "84-B1-53-DF-3E-BC"
   Framed-MTU = 1400
   NAS-Port-Type = Wireless-802.11
   EAP-Message = 0x02070030190017030300253bc5db1b0542fe953989206abc908f78fc9bd5babd5d93bf8913bf3d361ea67cccdf066be5
   State = 0xfefad346fbfdca45684956ecf2b10489
   Message-Authenticator = 0x1d94ee8285d897bee4e535fc3012a89a
 Restoring &session-state
   &session-state:TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384"
   &session-state:TLS-Session-Version = "TLS 1.2"
 # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
   authorize {
     policy filter_username {
       if (&User-Name) {
       if (&User-Name)  -> TRUE
       if (&User-Name)  {
         if (&User-Name =~ / /) {
         if (&User-Name =~ / /)  -> FALSE
         if (&User-Name =~ /@[^@]*@/ ) {
         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
         if (&User-Name =~ /\.\./ ) {
         if (&User-Name =~ /\.\./ )  -> FALSE
         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
         if (&User-Name =~ /\.$/)  {
         if (&User-Name =~ /\.$/)   -> FALSE
         if (&User-Name =~ /@\./)  {
         if (&User-Name =~ /@\./)   -> FALSE
       } # if (&User-Name)  = notfound
     } # policy filter_username = notfound
     [preprocess] = ok
     [chap] = noop
     [mschap] = noop
     [digest] = noop
 suffix: Checking for suffix after "@"
 suffix: Looking up realm "turan.kz" for User-Name = "bob at turan.kz"
 suffix: Found realm "turan.kz"
 suffix: Adding Realm = "turan.kz"
 suffix: Authentication realm is LOCAL
     [suffix] = ok
 eap: Peer sent EAP Response (code 2) ID 7 length 48
 eap: Continuing tunnel setup
     [eap] = ok
   } # authorize = ok
 Found Auth-Type = eap
 # Executing group from file /usr/local/etc/raddb/sites-enabled/default
   authenticate {
 eap: Expiring EAP session with state 0xfefad346fbfdca45
 eap: Finished EAP session with state 0xfefad346fbfdca45
 eap: Previous EAP request found for state 0xfefad346fbfdca45, released from the list
 eap: Peer sent packet with method EAP PEAP (25)
 eap: Calling submodule eap_peap to process data
 eap_peap: Continuing EAP-TLS
 eap_peap: [eaptls verify] = ok
 eap_peap: Done initial handshake
 eap_peap: [eaptls process] = ok
 eap_peap: Session established.  Decoding tunneled attributes
 eap_peap: PEAP state WAITING FOR INNER IDENTITY
 eap_peap: Identity - bob at turan.kz
 eap_peap: Got inner identity 'bob at turan.kz'
 eap_peap: Setting default EAP type for tunneled EAP session
 eap_peap: Got tunneled request
 eap_peap:   EAP-Message = 0x0207001101626f6240747572616e2e6b7a
 eap_peap: Setting User-Name to bob at turan.kz
 eap_peap: Sending tunneled request to eduroam-inner-tunnel
 eap_peap:   EAP-Message = 0x0207001101626f6240747572616e2e6b7a
 eap_peap:   FreeRADIUS-Proxied-To = 127.0.0.1
 eap_peap:   User-Name = "bob at turan.kz"
 eap_peap:   NAS-IP-Address = 192.168.0.1
 eap_peap:   NAS-Port = 0
 eap_peap:   Called-Station-Id = "C8-3A-35-40-1C-F0"
 eap_peap:   Calling-Station-Id = "84-B1-53-DF-3E-BC"
 eap_peap:   Framed-MTU = 1400
 eap_peap:   NAS-Port-Type = Wireless-802.11
 eap_peap:   Event-Timestamp = "Jun 26 2019 07:06:42 UTC"
 Virtual server eduroam-inner-tunnel received request
   EAP-Message = 0x0207001101626f6240747572616e2e6b7a
   FreeRADIUS-Proxied-To = 127.0.0.1
   User-Name = "bob at turan.kz"
   NAS-IP-Address = 192.168.0.1
   NAS-Port = 0
   Called-Station-Id = "C8-3A-35-40-1C-F0"
   Calling-Station-Id = "84-B1-53-DF-3E-BC"
   Framed-MTU = 1400
   NAS-Port-Type = Wireless-802.11
   Event-Timestamp = "Jun 26 2019 07:06:42 UTC"
 WARNING: Outer and inner identities are the same.  User privacy is compromised.
 server eduroam-inner-tunnel {
   # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
     authorize {
 auth_log: EXPAND /usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d
 auth_log:    --> /usr/local/var/log/radius/radacct/89.250.80.7/auth-detail-20190626
 auth_log: /usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/89.250.80.7/auth-detail-20190626
 auth_log: EXPAND %t
 auth_log:    --> Wed Jun 26 07:06:42 2019
       [auth_log] = ok
 eap: Peer sent EAP Response (code 2) ID 7 length 17
 eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
       [eap] = ok
 files: users: Matched entry bob at turan.kz at line 87
 files: EXPAND Hello, %{User-Name}
 files:    --> Hello, bob at turan.kz
       [files] = ok
       [mschap] = noop
 pap: WARNING: Auth-Type already set.  Not setting to PAP
       [pap] = noop
     } # authorize = ok
   Found Auth-Type = eap
   # Executing group from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
     authenticate {
 eap: Peer sent packet with method EAP Identity (1)
 eap: Calling submodule eap_mschapv2 to process data
 eap_mschapv2: Issuing Challenge
 eap: Sending EAP Request (code 1) ID 8 length 43
 eap: EAP session adding &reply:State = 0x58cb71f258c36b09
       [eap] = handled
     } # authenticate = handled
 } # server eduroam-inner-tunnel
 Virtual server sending reply
   Reply-Message = "Hello, bob at turan.kz"
   EAP-Message = 0x0108002b1a01080026106a0612ff605c3452f6e178745c8eba94667265657261646975732d332e302e3230
   Message-Authenticator = 0x00000000000000000000000000000000
   State = 0x58cb71f258c36b095384618a82349908
 eap_peap: Got tunneled reply code 11
 eap_peap:   Reply-Message = "Hello, bob at turan.kz"
 eap_peap:   EAP-Message = 0x0108002b1a01080026106a0612ff605c3452f6e178745c8eba94667265657261646975732d332e302e3230
 eap_peap:   Message-Authenticator = 0x00000000000000000000000000000000
 eap_peap:   State = 0x58cb71f258c36b095384618a82349908
 eap_peap: Got tunneled reply RADIUS code 11
 eap_peap:   Reply-Message = "Hello, bob at turan.kz"
 eap_peap:   EAP-Message = 0x0108002b1a01080026106a0612ff605c3452f6e178745c8eba94667265657261646975732d332e302e3230
 eap_peap:   Message-Authenticator = 0x00000000000000000000000000000000
 eap_peap:   State = 0x58cb71f258c36b095384618a82349908
 eap_peap: Got tunneled Access-Challenge
 eap: Sending EAP Request (code 1) ID 8 length 74
 eap: EAP session adding &reply:State = 0xfefad346f8f2ca45
     [eap] = handled
   } # authenticate = handled
 Using Post-Auth-Type Challenge
 # Executing group from file /usr/local/etc/raddb/sites-enabled/default
   Challenge { ... } # empty sub-section is ignored
 session-state: Saving cached attributes
   TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384"
   TLS-Session-Version = "TLS 1.2"
 Sent Access-Challenge Id 30 from 89.250.80.6:1812 to 89.250.80.7:1026 length 0
   EAP-Message = 0x0108004a1900170303003f65d2d81fede8586ad658fe2ef68148cdd00a0fe7d7b86fc891c73f2c4382c50fe3d4c8d8c75decf5ed2e079ab13f12c470df1c6d7eba8b61fcf7cfda3a4603
   Message-Authenticator = 0x00000000000000000000000000000000
   State = 0xfefad346f8f2ca45684956ecf2b10489
 Finished request



More information about the Freeradius-Users mailing list