IKEv2 vpn authenticate by freeradius

网络时代 1511815642 at qq.com
Wed Jun 22 14:01:56 UTC 2022


Hello everyone,
Routing: MikroTik v6.48.6
freeradius-server-3.0.21
In the actual test, freeradius sends Access-Accept,See the last output section below. The router log shows that the authentication fails. MikroTik tech support can't find a reason so far.
All certificates are created in freeradius and imported into ROS.



[e_zhangiso at myradius ~]$ su Password:  [root at myradius e_zhangiso]# radtest vtest1 zsl123 localhost 18120 testing123 Sent Access-Request Id 19 from 0.0.0.0:38185 to 127.0.0.1:1812 length 76 	User-Name = "vtest1" 	User-Password = "zsl123" 	NAS-IP-Address = 93.191.168.52 	NAS-Port = 18120 	Message-Authenticator = 0x00 	Cleartext-Password = "zsl123" Received Access-Accept Id 19 from 127.0.0.1:1812 to 127.0.0.1:38185 length 20 [root at myradius e_zhangiso]# cd /usr/local/bin/ [root at myradius bin]# ls dbus-cleanup-sockets                radattr dbus-daemon                         radclient dbus-launch                         radcrypt dbus-monitor                        radeapclient dbus-run-session                    radlast dbus-send                           radsqlrelay dbus-test-tool                      radtest dbus-update-activation-environment  radwho dbus-uuidgen                        radzap dhcpclient                          smbencrypt eapol_test                          ttls-eap-mschapv2.conf map_unit                            x86_64-unknown-linux-gnu-pkg-config peap-mschapv2.conf                  xmlwf pkg-config [root at myradius bin]# eapol_test -c peap-mschapv2.conf -s testing123 Reading configuration file 'peap-mschapv2.conf' Line: 4 - start of a new network block ssid - hexdump_ascii(len=7):      65 78 61 6d 70 6c 65                              example          key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 identity - hexdump_ascii(len=6):      76 74 65 73 74 31                                 vtest1           anonymous_identity - hexdump_ascii(len=9):      61 6e 6f 6e 79 6d 6f 75 73                        anonymous        password - hexdump_ascii(len=6):      7a 73 6c 31 32 33                                 zsl123           phase2 - hexdump_ascii(len=13):      61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2    ca_cert - hexdump_ascii(len=33):      2f 75 73 72 2f 6c 6f 63 61 6c 2f 65 74 63 2f 72   /usr/local/etc/r      61 64 64 62 2f 63 65 72 74 73 2f 63 61 2e 64 65   addb/certs/ca.de      72                                                r                Priority group 0    id=0 ssid='example' Authentication server 127.0.0.1:1812 RADIUS local address: 127.0.0.1:39667 ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=65 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param=) EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=9):      61 6e 6f 6e 79 6d 6f 75 73                        anonymous        EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=14) TX EAP -> RADIUS - hexdump(len=14): 02 41 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len=9): 61 6e 6f 6e 79 6d 6f 75 73 Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=0 length=132    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=16       Value: 0241000e01616e6f6e796d6f7573    Attribute 80 (Message-Authenticator) length=18       Value: e6fe724b117116e92d8a5d054dede1c6 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 80 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=0 length=80    Attribute 79 (EAP-Message) length=24       Value: 014200160410a44c9c9a99e40191e15c62409e8d64ea    Attribute 80 (Message-Authenticator) length=18       Value: ca0fab2024ada856096ea47d73c8bcee    Attribute 24 (State) length=18       Value: efe8f55defaaf11214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=66 len=22) from RADIUS server: EAP-Request-MD5 (4) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=66 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 42 00 06 03 19 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=1 length=142    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=8       Value: 024200060319    Attribute 24 (State) length=18       Value: efe8f55defaaf11214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: 0a259313bcbd65dbe29df8ca05e69801 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=1 length=64    Attribute 79 (EAP-Message) length=8       Value: 014300061920    Attribute 80 (Message-Authenticator) length=18       Value: ed336a4c7ff6c981769455b7f757a5db    Attribute 24 (State) length=18       Value: efe8f55deeabec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=67 len=6) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=67 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options OpenSSL: tls_connection_ca_cert - Failed to load root certificates error:00000000:lib(0):func(0):reason(0) OpenSSL: tls_connection_ca_cert - loaded DER format CA certificate CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 01 01 18 OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello) OpenSSL: Message - hexdump(len=280): 01 00 01 14 03 03 cb 2e 6f 2c 46 d4 84 50 99 20 9b ab 25 1e 7b 1a 70 35 33 42 41 66 70 e9 f8 51 a3 8e bf aa 24 d7 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 ff 01 00 00 3f 00 0b 00 04 03 00 01 02 00 0a 00 0a 00 08 00 17 00 19 00 18 00 16 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv2/v3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv2/v3 read server hello A SSL: SSL_connect - want more data SSL: 285 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 285 bytes left to be sent out (of total 285 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x111f3c0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=295) TX EAP -> RADIUS - hexdump(len=295): 02 43 01 27 19 80 00 00 01 1d 16 03 01 01 18 01 00 01 14 03 03 cb 2e 6f 2c 46 d4 84 50 99 20 9b ab 25 1e 7b 1a 70 35 33 42 41 66 70 e9 f8 51 a3 8e bf aa 24 d7 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 ff 01 00 00 3f 00 0b 00 04 03 00 01 02 00 0a 00 0a 00 08 00 17 00 19 00 18 00 16 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=2 length=433    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=44       Value: 16000d0020001e060106020603050105020503040104020403030103020303020102020203000f000101    Attribute 24 (State) length=18       Value: efe8f55deeabec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: bcfba080a0d2ea24d52c416ef7ed4722 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=2 length=1068    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=247       Value: 03551d1f042f302d302ba029a0278625687474703a2f2f7777772e6578616d706c652e636f6d2f6578616d706c655f63612e63726c30180603551d200411300f300d060b2b0601040182be6801030230090603551d1304023000300b0603551d0f0404030205e030410603551d11043a303882197261646975732e74657374656e74657270726973652e6e6574a01b06082b06010505070808a00f0c0d2a2e6578616d706c652e636f6d300d06092a864886f70d01010b050003820101009f9ce9bd1c2537106c790bfc07290bc8b4b8456372bf63e5a3c37c800ac5eccf01758ce5cc844a35ab43fc8b3762eb5058c1d56e75882f    Attribute 80 (Message-Authenticator) length=18       Value: 3cd976898d71efd3776fed6f8454ddad    Attribute 24 (State) length=18       Value: efe8f55dedacec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=68 len=1004) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=68 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1004) - Flags 0xc0 SSL: TLS Message Length: 2760 SSL: Need 1766 bytes more input data SSL: Building ACK (type=25 id=68 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1110cd0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 44 00 06 19 00 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=3 length=142    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=8       Value: 024400061900    Attribute 24 (State) length=18       Value: efe8f55dedacec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: d8c50f9e864d3c1fc0bb78df5c3185e7 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1064 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=3 length=1064    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=255       Value: 0b300906035504061302434e310b300906035504080c024744310b300906035504070c02535a31133011060355040a0c0a527569516920496e632e310e300c060355040b0c0552756951693120301e06092a864886f70d0109011611313531313831353634324071712e636f6d3110300e06035504030c0743415f54455354301e170d3232303632313038303833395a170d3233303632313038303833395a308180310b300906035504061302434e310b300906035504080c024744310b300906035504070c02535a31133011060355040a0c0a527569516920496e632e310e300c060355040b0c0552756951693120301e06092a864886f70d010901    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=243       Value: fa00ce72db14ee1b0d5853979b2ee624c57b37dfa49c7e9e25dc51ce83382baa8af693001cc9b3931642c9355c4401f00f7766d862f4fc17a009ed0d8f963b5569c47a21486e4efa950203010001a382013430820130301d0603551d0e041604142df8c42bc2e019ae77764af4179832e75edcb6b93081b50603551d230481ad3081aa80142df8c42bc2e019ae77764af4179832e75edcb6b9a18186a48183308180310b300906035504061302434e310b300906035504080c024744310b300906035504070c02535a31133011060355040a0c0a527569516920496e632e310e300c060355040b0c055275695169312030    Attribute 80 (Message-Authenticator) length=18       Value: a13b568e8e11ba349ae8d0bb27f0f5e4    Attribute 24 (State) length=18       Value: efe8f55decadec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=69 len=1000) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=69 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1000) - Flags 0x40 SSL: Need 772 bytes more input data SSL: Building ACK (type=25 id=69 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x110fc50 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 45 00 06 19 00 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=4 length=142    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=8       Value: 024500061900    Attribute 24 (State) length=18       Value: efe8f55decadec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: a07a7d96fe448cc4f3e58072e370eb5b Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 842 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=4 length=842    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=255       Value: 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    Attribute 79 (EAP-Message) length=255       Value: 4568fb06010100a84c644a3a507800915a12b1ad028d6b0c7630f3734b18a7499da043908651a2d5768fdcb341a1e1c4e83c49ad3448c0622157f0fcbd8a4be9ae05fe8f4963c71501264d359a83debbe9af0f6d15d87f36090446882dc8e7de2ac67e003f8fa339bf9fab0c9c37c29e709c546183557b1a59c37086eedb2ea0d5b389f06165cd9bb315640eb7ae3b77da4f6855b51cbf373951f8d0ff39c99ecb74d6021d695cc4f4ee303275e220d55cc24b31f7aa7d9989f260bde58dadcd2e8ba6c3ed47acd6688543eca490bff1560dcf08c3d7bf6a9446fcad85589b23ad7d804b5843903727c6229e1ed925488cdfb33152b275ec72ca9aa3dc    Attribute 79 (EAP-Message) length=21       Value: 9380def39800c6e003d916030300040e000000    Attribute 80 (Message-Authenticator) length=18       Value: 85b347d13ca5839548002780d80a825c    Attribute 24 (State) length=18       Value: efe8f55debaeec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=70 len=778) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=70 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=778) - Flags 0x00 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 3e OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello) OpenSSL: Message - hexdump(len=62): 02 00 00 3a 03 03 18 0c 45 37 9f 01 e3 aa 52 ee 64 a5 c2 76 13 04 7f 3d fd 8d 30 9f 83 11 ff 14 1a a9 06 92 19 e5 00 c0 30 00 00 12 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 0f 00 01 01 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 09 25 OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate) OpenSSL: Message - hexdump(len=2341): 0b 00 09 21 00 09 1e 00 04 59 30 82 04 55 30 82 03 3d a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 80 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0b 30 09 06 03 55 04 08 0c 02 47 44 31 0b 30 09 06 03 55 04 07 0c 02 53 5a 31 13 30 11 06 03 55 04 0a 0c 0a 52 75 69 51 69 20 49 6e 63 2e 31 0e 30 0c 06 03 55 04 0b 0c 05 52 75 69 51 69 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 31 35 31 31 38 31 35 36 34 32 40 71 71 2e 63 6f 6d 31 10 30 0e 06 03 55 04 03 0c 07 43 41 5f 54 45 53 54 30 1e 17 0d 32 32 30 36 32 31 30 38 32 33 35 31 5a 17 0d 32 33 30 36 32 31 30 38 32 33 35 31 5a 30 81 92 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0b 30 09 06 03 55 04 08 0c 02 47 44 31 0b 30 09 06 03 55 04 07 0c 02 53 5a 31 13 30 11 06 03 55 04 0a 0c 0a 52 75 69 51 69 20 49 6e 63 2e 31 0e 30 0c 06 03 55 04 0b 0c 05 52 75 69 51 69 31 22 30 20 06 03 55 04 03 0c 19 72 61 64 69 75 73 2e 74 65 73 74 65 6e 74 65 72 70 72 69 73 65 2e 6e 65 74 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 31 35 31 31 38 31 35 36 34 32 40 71 71 2e 63 6f 6d 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c0 cf 7d 98 46 df cf db bd 38 64 f1 36 7a c4 8a 39 37 0a b5 ef 23 f1 8a 8f 37 d5 62 97 82 72 d5 a4 5f 29 eb 3c f4 21 ed 1d 16 82 c6 c5 1d 0b 5c 90 15 87 3e 20 db 21 cb ac 31 a4 3a 94 55 9a dc ac e1 18 19 e0 c2 d2 b7 da aa 9c ec 14 36 f0 8f 7d a9 67 ba df 69 2f 55 b3 33 8e 32 f8 17 45 94 ce 51 27 04 2d 75 30 b7 b6 4d 5a 9a 96 1f fe 9b e0 b3 a5 40 4d 21 0d d1 cd 35 7b 5b 7c a2 07 29 98 30 42 e5 be 96 ac 98 ff f7 97 1b 38 29 32 4c 44 4d 00 cb 7e 23 27 1f 05 aa 4d af 93 f7 48 a5 8a 5f c5 28 f4 c0 34 ef 0a 09 97 67 7d e8 b3 85 d2 d5 ed 97 df e0 35 11 5c 87 49 35 e0 e3 75 d8 d6 2c 35 fd 4f ff 28 c3 f6 14 31 fb 3b 08 db 06 82 96 5c 40 ed ac 30 7c 8b ea 8e fd 92 f6 dd b6 e0 13 9a c4 61 20 93 bf bb 71 84 71 7e 3f b5 0b a2 59 01 89 bc 1b bd fb 53 cc a2 d0 07 a7 06 c7 02 03 01 00 01 a3 81 c5 30 81 c2 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 18 06 03 55 1d 20 04 11 30 0f 30 0d 06 0b 2b 06 01 04 01 82 be 68 01 03 02 30 09 06 03 55 1d 13 04 02 30 00 30 0b 06 03 55 1d 0f 04 04 03 02 05 e0 30 41 06 03 55 1d 11 04 3a 30 38 82 19 72 61 64 69 75 73 2e 74 65 73 74 65 6e 74 65 72 70 72 69 73 65 2e 6e 65 74 a0 1b 06 08 2b 06 01 05 05 07 08 08 a0 0f 0c 0d 2a 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 9f 9c e9 bd 1c 25 37 10 6c 79 0b fc 07 29 0b c8 b4 b8 45 63 72 bf 63 e5 a3 c3 7c 80 0a c5 ec cf 01 75 8c e5 cc 84 4a 35 ab 43 fc 8b 37 62 eb 50 58 c1 d5 6e 75 88 2f b0 9b 39 42 27 65 fc ef 3f 05 67 ec 4d 51 9e b2 94 97 db 52 b6 4c d8 9e 7b c9 76 8e 2a 8e f9 03 cf 9e 32 8a 8b d0 cb 0b ad 6a ab 99 e5 69 82 d6 e8 b6 6a d6 2f 97 19 c6 f0 58 7e 7f 38 35 f7 71 c5 93 42 5e 4f 78 af 21 de c0 1a 5d 49 0d a8 e9 4e ba 07 14 b3 53 f0 b4 80 6a d9 35 bb db 86 e0 f7 c0 71 95 68 2c 53 12 c6 e8 e9 9c f2 99 1d 64 58 c4 80 3f f5 b6 90 ca 70 23 6a 05 9e 18 a5 8a a0 f6 bb 0c 5f d0 b5 6f 8c b1 46 0a a4 c7 fc af dd c4 96 b2 b3 95 44 a0 ea ae 29 9e 23 85 d6 85 18 db 05 27 84 43 5e ff 70 57 a0 ca ec 70 9d 80 94 51 cf 18 69 9f f1 a0 e1 1e 4d 23 e7 23 4b 60 a1 e7 b2 eb 93 88 49 88 f5 00 04 bf 30 82 04 bb 30 82 03 a3 a0 03 02 01 02 02 09 00 83 54 c9 00 ae 76 23 31 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 80 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0b 30 09 06 03 55 04 08 0c 02 47 44 31 0b 30 09 06 03 55 04 07 0c 02 53 5a 31 13 30 11 06 03 55 04 0a 0c 0a 52 75 69 51 69 20 49 6e 63 2e 31 0e 30 0c 06 03 55 04 0b 0c 05 52 75 69 51 69 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 31 35 31 31 38 31 35 36 34 32 40 71 71 2e 63 6f 6d 31 10 30 0e 06 03 55 04 03 0c 07 43 41 5f 54 45 53 54 30 1e 17 0d 32 32 30 36 32 31 30 38 30 38 33 39 5a 17 0d 32 33 30 36 32 31 30 38 30 38 33 39 5a 30 81 80 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0b 30 09 06 03 55 04 08 0c 02 47 44 31 0b 30 09 06 03 55 04 07 0c 02 53 5a 31 13 30 11 06 03 55 04 0a 0c 0a 52 75 69 51 69 20 49 6e 63 2e 31 0e 30 0c 06 03 55 04 0b 0c 05 52 75 69 51 69 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 31 35 31 31 38 31 35 36 34 32 40 71 71 2e 63 6f 6d 31 10 30 0e 06 03 55 04 03 0c 07 43 41 5f 54 45 53 54 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 cc 00 b6 08 69 b4 a7 40 47 7f 66 a9 62 3b 85 02 a6 62 e1 b9 24 61 e4 0d 2b 8a b2 93 38 2c 9e bd 19 ab 92 f3 a3 aa 5b 10 10 65 c2 59 25 3e 9d af 5d 9a 4b 8e 74 db 36 51 99 05 91 d9 a0 e5 6f 6d 76 17 a4 1f 2e 90 db c6 93 c7 27 b8 35 8e 94 9a 73 3c 20 e9 a2 49 4c 4d c9 45 9a 80 f5 57 cc ab 7a dc fe f0 70 8c da fc b4 7a ee ee 48 c4 91 09 1d d1 b4 a1 a6 c3 cc 78 e4 c5 0e 5d 29 c6 36 92 fe f3 68 9d 9e 8e 98 85 bc 8d f6 3f 9b b2 0c 13 a1 51 ef fa db cb a3 5c f4 d1 5b 47 cf 90 d1 9b 07 ce aa 98 6f f2 31 62 01 1d 2d 33 ab 86 78 a1 aa 3a 14 5e cd 70 9a fa 00 ce 72 db 14 ee 1b 0d 58 53 97 9b 2e e6 24 c5 7b 37 df a4 9c 7e 9e 25 dc 51 ce 83 38 2b aa 8a f6 93 00 1c c9 b3 93 16 42 c9 35 5c 44 01 f0 0f 77 66 d8 62 f4 fc 17 a0 09 ed 0d 8f 96 3b 55 69 c4 7a 21 48 6e 4e fa 95 02 03 01 00 01 a3 82 01 34 30 82 01 30 30 1d 06 03 55 1d 0e 04 16 04 14 2d f8 c4 2b c2 e0 19 ae 77 76 4a f4 17 98 32 e7 5e dc b6 b9 30 81 b5 06 03 55 1d 23 04 81 ad 30 81 aa 80 14 2d f8 c4 2b c2 e0 19 ae 77 76 4a f4 17 98 32 e7 5e dc b6 b9 a1 81 86 a4 81 83 30 81 80 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 0b 30 09 06 03 55 04 08 0c 02 47 44 31 0b 30 09 06 03 55 04 07 0c 02 53 5a 31 13 30 11 06 03 55 04 0a 0c 0a 52 75 69 51 69 20 49 6e 63 2e 31 0e 30 0c 06 03 55 04 0b 0c 05 52 75 69 51 69 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 31 35 31 31 38 31 35 36 34 32 40 71 71 2e 63 6f 6d 31 10 30 0e 06 03 55 04 03 0c 07 43 41 5f 54 45 53 54 82 09 00 83 54 c9 00 ae 76 23 31 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 86 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 84 3e 19 a9 85 c3 13 86 9d f6 31 f4 09 b9 5a 36 54 bd 10 ad 0e d4 1a 25 cf 69 98 de b1 9f 1b 14 5d 82 47 81 16 7b f8 f9 2c 98 ce be 0e b9 d5 49 23 5c ee 7c 4e c2 a3 73 ba 52 19 44 40 70 08 d3 5a a1 a9 0f 4f 61 b7 4e e3 29 1d 3b 18 17 61 6c 1f a4 8f b7 48 79 18 e9 ca d3 86 c7 43 a6 71 59 74 6f 91 37 4c 7d 9f 14 b8 f2 f3 21 90 8d 7f d8 b2 0c 66 d0 0b e0 1f d1 31 87 63 ac d5 a8 bd 34 85 7b ec 91 9b a4 02 c0 fc bb da 60 49 eb 30 05 3b 00 c4 95 a9 51 90 b4 7d a0 4c e1 a1 22 bf d8 bc 0d 89 e4 67 c2 85 2f 94 94 30 d0 39 b0 80 0e 80 ac 31 45 0d e7 d5 b8 07 6c bf f9 5c ec 6c 4c b8 4f 03 05 43 c4 55 7f a2 f8 ce d6 e8 9c 99 0c 20 8a 51 83 47 40 ca fd cd 70 7f 4c 4b f0 07 a4 31 eb 07 3e 87 6e 2c 02 15 9c 8e 88 2a b3 43 df 90 d5 64 df c3 7f 21 ff e9 9e 30 d4 e1 00 58 5a OpenSSL: Peer certificate - depth 1 Certificate:     Data:         Version: 3 (0x2)         Serial Number:             83:54:c9:00:ae:76:23:31     Signature Algorithm: sha256WithRSAEncryption         Issuer: C=CN, ST=GD, L=SZ, O=RuiQi Inc., OU=RuiQi/emailAddress=1511815642 at qq.com, CN=CA_TEST         Validity             Not Before: Jun 21 08:08:39 2022 GMT             Not After : Jun 21 08:08:39 2023 GMT         Subject: C=CN, ST=GD, L=SZ, O=RuiQi Inc., OU=RuiQi/emailAddress=1511815642 at qq.com, CN=CA_TEST         Subject Public Key Info:             Public Key Algorithm: rsaEncryption                 Public-Key: (2048 bit)                 Modulus:                     00:cc:00:b6:08:69:b4:a7:40:47:7f:66:a9:62:3b:                     85:02:a6:62:e1:b9:24:61:e4:0d:2b:8a:b2:93:38:                     2c:9e:bd:19:ab:92:f3:a3:aa:5b:10:10:65:c2:59:                     25:3e:9d:af:5d:9a:4b:8e:74:db:36:51:99:05:91:                     d9:a0:e5:6f:6d:76:17:a4:1f:2e:90:db:c6:93:c7:                     27:b8:35:8e:94:9a:73:3c:20:e9:a2:49:4c:4d:c9:                     45:9a:80:f5:57:cc:ab:7a:dc:fe:f0:70:8c:da:fc:                     b4:7a:ee:ee:48:c4:91:09:1d:d1:b4:a1:a6:c3:cc:                     78:e4:c5:0e:5d:29:c6:36:92:fe:f3:68:9d:9e:8e:                     98:85:bc:8d:f6:3f:9b:b2:0c:13:a1:51:ef:fa:db:                     cb:a3:5c:f4:d1:5b:47:cf:90:d1:9b:07:ce:aa:98:                     6f:f2:31:62:01:1d:2d:33:ab:86:78:a1:aa:3a:14:                     5e:cd:70:9a:fa:00:ce:72:db:14:ee:1b:0d:58:53:                     97:9b:2e:e6:24:c5:7b:37:df:a4:9c:7e:9e:25:dc:                     51:ce:83:38:2b:aa:8a:f6:93:00:1c:c9:b3:93:16:                     42:c9:35:5c:44:01:f0:0f:77:66:d8:62:f4:fc:17:                     a0:09:ed:0d:8f:96:3b:55:69:c4:7a:21:48:6e:4e:                     fa:95                 Exponent: 65537 (0x10001)         X509v3 extensions:             X509v3 Subject Key Identifier:                  2D:F8:C4:2B:C2:E0:19:AE:77:76:4A:F4:17:98:32:E7:5E:DC:B6:B9             X509v3 Authority Key Identifier:                  keyid:2D:F8:C4:2B:C2:E0:19:AE:77:76:4A:F4:17:98:32:E7:5E:DC:B6:B9                 DirName:/C=CN/ST=GD/L=SZ/O=RuiQi Inc./OU=RuiQi/emailAddress=1511815642 at qq.com/CN=CA_TEST                 serial:83:54:C9:00:AE:76:23:31             X509v3 Basic Constraints: critical                 CA:TRUE             X509v3 Key Usage: critical                 Digital Signature, Certificate Sign, CRL Sign             X509v3 CRL Distribution Points:                  Full Name:                   URI:http://www.example.org/example_ca.crl     Signature Algorithm: sha256WithRSAEncryption          84:3e:19:a9:85:c3:13:86:9d:f6:31:f4:09:b9:5a:36:54:bd:          10:ad:0e:d4:1a:25:cf:69:98:de:b1:9f:1b:14:5d:82:47:81:          16:7b:f8:f9:2c:98:ce:be:0e:b9:d5:49:23:5c:ee:7c:4e:c2:          a3:73:ba:52:19:44:40:70:08:d3:5a:a1:a9:0f:4f:61:b7:4e:          e3:29:1d:3b:18:17:61:6c:1f:a4:8f:b7:48:79:18:e9:ca:d3:          86:c7:43:a6:71:59:74:6f:91:37:4c:7d:9f:14:b8:f2:f3:21:          90:8d:7f:d8:b2:0c:66:d0:0b:e0:1f:d1:31:87:63:ac:d5:a8:          bd:34:85:7b:ec:91:9b:a4:02:c0:fc:bb:da:60:49:eb:30:05:          3b:00:c4:95:a9:51:90:b4:7d:a0:4c:e1:a1:22:bf:d8:bc:0d:          89:e4:67:c2:85:2f:94:94:30:d0:39:b0:80:0e:80:ac:31:45:          0d:e7:d5:b8:07:6c:bf:f9:5c:ec:6c:4c:b8:4f:03:05:43:c4:          55:7f:a2:f8:ce:d6:e8:9c:99:0c:20:8a:51:83:47:40:ca:fd:          cd:70:7f:4c:4b:f0:07:a4:31:eb:07:3e:87:6e:2c:02:15:9c:          8e:88:2a:b3:43:df:90:d5:64:df:c3:7f:21:ff:e9:9e:30:d4:          e1:00:58:5a CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=CN/ST=GD/L=SZ/O=RuiQi Inc./OU=RuiQi/emailAddress=1511815642 at qq.com/CN=CA_TEST' hash=cf803820f0de23195a5a995b6de5517777b404df7d1e680754b49676687edebf TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=CN/ST=GD/L=SZ/O=RuiQi Inc./OU=RuiQi/emailAddress=1511815642 at qq.com/CN=CA_TEST' OpenSSL: Peer certificate - depth 0 Certificate:     Data:         Version: 3 (0x2)         Serial Number: 2 (0x2)     Signature Algorithm: sha256WithRSAEncryption         Issuer: C=CN, ST=GD, L=SZ, O=RuiQi Inc., OU=RuiQi/emailAddress=1511815642 at qq.com, CN=CA_TEST         Validity             Not Before: Jun 21 08:23:51 2022 GMT             Not After : Jun 21 08:23:51 2023 GMT         Subject: C=CN, ST=GD, L=SZ, O=RuiQi Inc., OU=RuiQi, CN=radius.testenterprise.net/emailAddress=1511815642 at qq.com         Subject Public Key Info:             Public Key Algorithm: rsaEncryption                 Public-Key: (2048 bit)                 Modulus:                     00:c0:cf:7d:98:46:df:cf:db:bd:38:64:f1:36:7a:                     c4:8a:39:37:0a:b5:ef:23:f1:8a:8f:37:d5:62:97:                     82:72:d5:a4:5f:29:eb:3c:f4:21:ed:1d:16:82:c6:                     c5:1d:0b:5c:90:15:87:3e:20:db:21:cb:ac:31:a4:                     3a:94:55:9a:dc:ac:e1:18:19:e0:c2:d2:b7:da:aa:                     9c:ec:14:36:f0:8f:7d:a9:67:ba:df:69:2f:55:b3:                     33:8e:32:f8:17:45:94:ce:51:27:04:2d:75:30:b7:                     b6:4d:5a:9a:96:1f:fe:9b:e0:b3:a5:40:4d:21:0d:                     d1:cd:35:7b:5b:7c:a2:07:29:98:30:42:e5:be:96:                     ac:98:ff:f7:97:1b:38:29:32:4c:44:4d:00:cb:7e:                     23:27:1f:05:aa:4d:af:93:f7:48:a5:8a:5f:c5:28:                     f4:c0:34:ef:0a:09:97:67:7d:e8:b3:85:d2:d5:ed:                     97:df:e0:35:11:5c:87:49:35:e0:e3:75:d8:d6:2c:                     35:fd:4f:ff:28:c3:f6:14:31:fb:3b:08:db:06:82:                     96:5c:40:ed:ac:30:7c:8b:ea:8e:fd:92:f6:dd:b6:                     e0:13:9a:c4:61:20:93:bf:bb:71:84:71:7e:3f:b5:                     0b:a2:59:01:89:bc:1b:bd:fb:53:cc:a2:d0:07:a7:                     06:c7                 Exponent: 65537 (0x10001)         X509v3 extensions:             X509v3 Extended Key Usage:                  TLS Web Server Authentication             X509v3 CRL Distribution Points:                  Full Name:                   URI:http://www.example.com/example_ca.crl             X509v3 Certificate Policies:                  Policy: 1.3.6.1.4.1.40808.1.3.2             X509v3 Basic Constraints:                  CA:FALSE             X509v3 Key Usage:                  Digital Signature, Non Repudiation, Key Encipherment             X509v3 Subject Alternative Name:                  DNS:radius.testenterprise.net, othername:<unsupported>     Signature Algorithm: sha256WithRSAEncryption          9f:9c:e9:bd:1c:25:37:10:6c:79:0b:fc:07:29:0b:c8:b4:b8:          45:63:72:bf:63:e5:a3:c3:7c:80:0a:c5:ec:cf:01:75:8c:e5:          cc:84:4a:35:ab:43:fc:8b:37:62:eb:50:58:c1:d5:6e:75:88:          2f:b0:9b:39:42:27:65:fc:ef:3f:05:67:ec:4d:51:9e:b2:94:          97:db:52:b6:4c:d8:9e:7b:c9:76:8e:2a:8e:f9:03:cf:9e:32:          8a:8b:d0:cb:0b:ad:6a:ab:99:e5:69:82:d6:e8:b6:6a:d6:2f:          97:19:c6:f0:58:7e:7f:38:35:f7:71:c5:93:42:5e:4f:78:af:          21:de:c0:1a:5d:49:0d:a8:e9:4e:ba:07:14:b3:53:f0:b4:80:          6a:d9:35:bb:db:86:e0:f7:c0:71:95:68:2c:53:12:c6:e8:e9:          9c:f2:99:1d:64:58:c4:80:3f:f5:b6:90:ca:70:23:6a:05:9e:          18:a5:8a:a0:f6:bb:0c:5f:d0:b5:6f:8c:b1:46:0a:a4:c7:fc:          af:dd:c4:96:b2:b3:95:44:a0:ea:ae:29:9e:23:85:d6:85:18:          db:05:27:84:43:5e:ff:70:57:a0:ca:ec:70:9d:80:94:51:cf:          18:69:9f:f1:a0:e1:1e:4d:23:e7:23:4b:60:a1:e7:b2:eb:93:          88:49:88:f5 OpenSSL: Certificate Policy 1.3.6.1.4.1.40808.1.3.2 CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=CN/ST=GD/L=SZ/O=RuiQi Inc./OU=RuiQi/CN=radius.testenterprise.net/emailAddress=1511815642 at qq.com' hash=e5a34c125494ec5850da2acbfcd943c1ff0640e80d87d1e73dab9cd00218a4fd CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius.testenterprise.net TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=CN/ST=GD/L=SZ/O=RuiQi Inc./OU=RuiQi/CN=radius.testenterprise.net/emailAddress=1511815642 at qq.com' EAP: Status notification: remote certificate verification (param=success) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 01 4d OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange) OpenSSL: Message - hexdump(len=333): 0c 00 01 49 03 00 17 41 04 b5 3c 82 5d 83 8d 70 1b 6d 4a ef e6 93 2d 1b 1a 6a 56 1c b1 96 4f bf 8b f0 85 a0 d7 97 27 07 e9 3f 47 a9 c7 89 cd f2 56 36 f0 d8 ae fb ba c1 81 c7 c9 83 a8 23 6a a4 ab 7a 3a ef 54 7e 45 68 fb 06 01 01 00 a8 4c 64 4a 3a 50 78 00 91 5a 12 b1 ad 02 8d 6b 0c 76 30 f3 73 4b 18 a7 49 9d a0 43 90 86 51 a2 d5 76 8f dc b3 41 a1 e1 c4 e8 3c 49 ad 34 48 c0 62 21 57 f0 fc bd 8a 4b e9 ae 05 fe 8f 49 63 c7 15 01 26 4d 35 9a 83 de bb e9 af 0f 6d 15 d8 7f 36 09 04 46 88 2d c8 e7 de 2a c6 7e 00 3f 8f a3 39 bf 9f ab 0c 9c 37 c2 9e 70 9c 54 61 83 55 7b 1a 59 c3 70 86 ee db 2e a0 d5 b3 89 f0 61 65 cd 9b b3 15 64 0e b7 ae 3b 77 da 4f 68 55 b5 1c bf 37 39 51 f8 d0 ff 39 c9 9e cb 74 d6 02 1d 69 5c c4 f4 ee 30 32 75 e2 20 d5 5c c2 4b 31 f7 aa 7d 99 89 f2 60 bd e5 8d ad cd 2e 8b a6 c3 ed 47 ac d6 68 85 43 ec a4 90 bf f1 56 0d cf 08 c3 d7 bf 6a 94 46 fc ad 85 58 9b 23 ad 7d 80 4b 58 43 90 37 27 c6 22 9e 1e d9 25 48 8c df b3 31 52 b2 75 ec 72 ca 9a a3 dc 93 80 de f3 98 00 c6 e0 03 d9 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 04 OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done) OpenSSL: Message - hexdump(len=4): 0e 00 00 00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 46 OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange) OpenSSL: Message - hexdump(len=70): 10 00 00 42 41 04 f9 4d 13 c6 79 8d ab c9 ac fd c0 a7 78 3d 66 72 4f 87 5f 91 f1 59 8e 41 63 d2 0b 3b 00 bb 33 4c e3 dd f2 6b 0c c9 7c cf c8 3f 95 27 48 f2 ec b0 18 af 6b 57 e6 fa a5 81 c5 47 aa b7 20 2a 2b 64 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 14 03 03 00 01 OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/) OpenSSL: Message - hexdump(len=1): 01 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 28 OpenSSL: TX ver=0x303 content_type=22 (handshake/finished) OpenSSL: Message - hexdump(len=16): 14 00 00 0c 85 72 11 bb cd af ed 5b 6c 66 9f 62 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 126 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 126 bytes left to be sent out (of total 126 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x112a4f0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=136) TX EAP -> RADIUS - hexdump(len=136): 02 46 00 88 19 80 00 00 00 7e 16 03 03 00 46 10 00 00 42 41 04 f9 4d 13 c6 79 8d ab c9 ac fd c0 a7 78 3d 66 72 4f 87 5f 91 f1 59 8e 41 63 d2 0b 3b 00 bb 33 4c e3 dd f2 6b 0c c9 7c cf c8 3f 95 27 48 f2 ec b0 18 af 6b 57 e6 fa a5 81 c5 47 aa b7 20 2a 2b 64 14 03 03 00 01 01 16 03 03 00 28 88 d9 f3 3b 8b ea 0b 89 ae 52 46 98 12 79 71 6b ba 3b 8e 6c a7 0e 59 d7 ae 79 49 60 ef 81 c3 6b d3 7e 98 91 7f f0 e3 5a Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=5 length=272    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=138       Value: 0246008819800000007e1603030046100000424104f94d13c6798dabc9acfdc0a7783d66724f875f91f1598e4163d20b3b00bb334ce3ddf26b0cc97ccfc83f952748f2ecb018af6b57e6faa581c547aab7202a2b64140303000101160303002888d9f33b8bea0b89ae5246981279716bba3b8e6ca70e59d7ae794960ef81c36bd37e98917ff0e35a    Attribute 24 (State) length=18       Value: efe8f55debaeec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: 5b6fac27bc8eed000d3583be3cbc3d89 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 115 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=5 length=115    Attribute 79 (EAP-Message) length=59       Value: 0147003919001403030001011603030028928fc7eaaf149c20f409fa31ae0382a5ad74524dd1117d4019f35ba350f27f42d03839545957681e    Attribute 80 (Message-Authenticator) length=18       Value: e29d980e66948096a9317cf7ece69db6    Attribute 24 (State) length=18       Value: efe8f55deaafec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=71 len=57) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=71 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=57) - Flags 0x00 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 14 03 03 00 01 OpenSSL: RX ver=0x303 content_type=20 (change cipher spec/) OpenSSL: Message - hexdump(len=1): 01 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 28 OpenSSL: RX ver=0x303 content_type=22 (handshake/finished) OpenSSL: Message - hexdump(len=16): 14 00 00 0c b1 ea 13 95 ae f1 6f e7 91 ef 48 01 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out OpenSSL: Handshake finished - resumed=0 SSL: No Application Data included SSL: Using TLS version TLSv1.2 SSL: No data to be sent out EAP-PEAP: TLS done, proceed to Phase 2 EAP-PEAP: using label 'client EAP encryption' in key derivation EAP-PEAP: Derived key - hexdump(len=64): d7 3d 78 a8 00 46 b8 4f 1a 7a b0 3d 8d 91 d6 99 f3 f2 b2 e4 9f 7d 1b db 26 c1 e4 87 f4 c4 bc b9 cc 3b 4d 83 a6 cc 38 2a 34 22 99 b7 99 ab c1 ed bf b3 da f5 0d 16 91 11 e0 00 ff ac 07 56 38 dc EAP-PEAP: Derived EMSK - hexdump(len=64): 3d 67 3a 3b cd 60 8f 0d c7 c0 da 46 36 9e f2 ef cf 6e 44 c2 43 40 bf 14 bf a2 8f 84 d7 ff 32 9e a0 5b 91 58 77 be 7f a5 f0 65 0d 5c f1 fa 6f f9 c3 aa 3b ec 93 01 9a df eb 9e f6 d1 1e cd a1 a0 EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 cb 2e 6f 2c 46 d4 84 50 99 20 9b ab 25 1e 7b 1a 70 35 33 42 41 66 70 e9 f8 51 a3 8e bf aa 24 d7 18 0c 45 37 9f 01 e3 aa 52 ee 64 a5 c2 76 13 04 7f 3d fd 8d 30 9f 83 11 ff 14 1a a9 06 92 19 e5 SSL: Building ACK (type=25 id=71 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1110570 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 47 00 06 19 00 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=6 length=142    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=8       Value: 024700061900    Attribute 24 (State) length=18       Value: efe8f55deaafec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: 114302babf729e4196c4b4e4f951c43d Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 98 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=6 length=98    Attribute 79 (EAP-Message) length=42       Value: 014800281900170303001d928fc7eaaf149c21a411db5fc7c795b368ca70bd3ada1fcd7a6c9d6fbd    Attribute 80 (Message-Authenticator) length=18       Value: a2265a42cf8b563971fd5392506b51a2    Attribute 24 (State) length=18       Value: efe8f55de9a0ec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=72 len=40) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=72 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=40) - Flags 0x00 EAP-PEAP: received 34 bytes encrypted data for Phase 2 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 1d EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 48 00 05 01 EAP-PEAP: received Phase 2: code=1 identifier=72 length=5 EAP-PEAP: Phase 2 Request: type=1 EAP: using real identity - hexdump_ascii(len=6):      76 74 65 73 74 31                                 vtest1           EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): 02 48 00 0b 01 76 74 65 73 74 31 OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 1f SSL: 36 bytes left to be sent out (of total 36 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x112b080 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=42) TX EAP -> RADIUS - hexdump(len=42): 02 48 00 2a 19 00 17 03 03 00 1f 88 d9 f3 3b 8b ea 0b 8a be 0e 1e 58 a3 26 fb 94 9c e0 b0 e5 99 bf 8e e6 ce f1 7b a4 6a 6f 77 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=7 length=178    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=44       Value: 0248002a1900170303001f88d9f33b8bea0b8abe0e1e58a326fb949ce0b0e599bf8ee6cef17ba46a6f77    Attribute 24 (State) length=18       Value: efe8f55de9a0ec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: 1cd5aad9eaead9661eba6a71f930d048 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 132 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=7 length=132    Attribute 79 (EAP-Message) length=76       Value: 0149004a1900170303003f928fc7eaaf149c22ef5d7394626b2244b5692fec656242a2bd5243a3ad76cb554306e4647d9c3c626e04021a623972c53b8321ad62d482710a80245fa079ac    Attribute 80 (Message-Authenticator) length=18       Value: b723eb4f8324d9a031c5bd4d6702af6c    Attribute 24 (State) length=18       Value: efe8f55de8a1ec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=73 len=74) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=73 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=74) - Flags 0x00 EAP-PEAP: received 68 bytes encrypted data for Phase 2 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 3f EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=39): 1a 01 49 00 26 10 63 84 b7 ca bc bd 3d da 7c 7a 86 82 a5 00 c0 d2 66 72 65 65 72 61 64 69 75 73 2d 33 2e 30 2e 32 31 EAP-PEAP: received Phase 2: code=1 identifier=73 length=43 EAP-PEAP: Phase 2 Request: type=26 EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 EAP-MSCHAPV2: RX identifier 73 mschapv2_id 73 EAP-MSCHAPV2: Received challenge EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=17):      66 72 65 65 72 61 64 69 75 73 2d 33 2e 30 2e 32   freeradius-3.0.2      31                                                1                EAP-MSCHAPV2: Generating Challenge Response Get randomness: len=16 entropy=0 random from os_get_random - hexdump(len=16): f2 78 69 1d 8c 98 c5 58 60 8a d5 56 dc b6 c5 53 random_mix_pool - hexdump(len=20): 0d b9 b1 bf 70 7c bd fa 8b 8c 0a 46 d8 96 87 a4 8e 89 0d 7d random from internal pool - hexdump(len=16): 52 c7 66 0a bf 85 ed d3 d8 c1 5b 8c 5d 36 f0 8e mixed random - hexdump(len=16): a0 bf 0f 17 33 1d 28 8b b8 4b 8e da 81 80 35 dd MSCHAPV2: Identity - hexdump_ascii(len=6):      76 74 65 73 74 31                                 vtest1           MSCHAPV2: Username - hexdump_ascii(len=6):      76 74 65 73 74 31                                 vtest1           MSCHAPV2: auth_challenge - hexdump(len=16): 63 84 b7 ca bc bd 3d da 7c 7a 86 82 a5 00 c0 d2 MSCHAPV2: peer_challenge - hexdump(len=16): a0 bf 0f 17 33 1d 28 8b b8 4b 8e da 81 80 35 dd MSCHAPV2: username - hexdump_ascii(len=6):      76 74 65 73 74 31                                 vtest1           MSCHAPV2: password - hexdump_ascii(len=6):      7a 73 6c 31 32 33                                 zsl123           MSCHAPV2: NT Response - hexdump(len=24): 4e ba c2 65 72 e6 70 43 7d 32 ee 45 a7 32 2e 4f 09 5e cd f0 e0 ad cf 04 MSCHAPV2: Auth Response - hexdump(len=20): 3a 3e 84 42 57 48 e2 b8 bb 73 be 5d 5b 65 52 eb 77 6c 28 d6 MSCHAPV2: Master Key - hexdump(len=16): 02 91 df 83 5f 20 a3 85 ad 76 df 6a b6 e7 f3 d6 EAP-MSCHAPV2: TX identifier 73 mschapv2_id 73 (response) EAP-PEAP: Encrypting Phase 2 data - hexdump(len=65): 02 49 00 41 1a 02 49 00 3c 31 a0 bf 0f 17 33 1d 28 8b b8 4b 8e da 81 80 35 dd 00 00 00 00 00 00 00 00 4e ba c2 65 72 e6 70 43 7d 32 ee 45 a7 32 2e 4f 09 5e cd f0 e0 ad cf 04 00 76 74 65 73 74 31 OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 55 SSL: 90 bytes left to be sent out (of total 90 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x112b7c0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=96) TX EAP -> RADIUS - hexdump(len=96): 02 49 00 60 19 00 17 03 03 00 55 88 d9 f3 3b 8b ea 0b 8b 2c d5 2c 10 62 b5 66 b2 7e 85 35 f9 98 d0 24 69 b7 57 da 36 b3 3d 93 35 22 6f 71 46 8d 62 b5 87 10 78 07 b7 66 3e b9 5b df 21 b3 df dd 02 be 49 3f ee 24 80 b4 fc 94 96 49 f1 5f c2 51 62 3b 7f 1b e1 03 20 9f 49 bc b5 6e 38 78 51 e1 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=8 length=232    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=98       Value: 024900601900170303005588d9f33b8bea0b8b2cd52c1062b566b27e8535f998d02469b757da36b33d9335226f71468d62b587107807b7663eb95bdf21b3dfdd02be493fee2480b4fc949649f15fc251623b7f1be103209f49bcb56e387851e1    Attribute 24 (State) length=18       Value: efe8f55de8a1ec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: 0edb87959e291938fe8d8654f558761b Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 140 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=8 length=140    Attribute 79 (EAP-Message) length=84       Value: 014a005219001703030047928fc7eaaf149c235370eaa911f51c86fca36c3768b4513fb9497cfe2c88a641ceab3575b5d4bb3f2e97d9eca41ea824a1d4e3b9a710e3c98349ce5bdc7121cce2123b3304e850    Attribute 80 (Message-Authenticator) length=18       Value: 6eb4fdfb2c1c5ef913f2e52bf339bb41    Attribute 24 (State) length=18       Value: efe8f55de7a2ec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=74 len=82) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=74 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=82) - Flags 0x00 EAP-PEAP: received 76 bytes encrypted data for Phase 2 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 47 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 49 00 2e 53 3d 33 41 33 45 38 34 34 32 35 37 34 38 45 32 42 38 42 42 37 33 42 45 35 44 35 42 36 35 35 32 45 42 37 37 36 43 32 38 44 36 EAP-PEAP: received Phase 2: code=1 identifier=74 length=51 EAP-PEAP: Phase 2 Request: type=26 EAP-MSCHAPV2: RX identifier 74 mschapv2_id 73 EAP-MSCHAPV2: Received success EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): EAP-MSCHAPV2: Authentication succeeded EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): 02 4a 00 06 1a 03 OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 1a SSL: 31 bytes left to be sent out (of total 31 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1129320 EAP: Session-Id - hexdump(len=65): 19 cb 2e 6f 2c 46 d4 84 50 99 20 9b ab 25 1e 7b 1a 70 35 33 42 41 66 70 e9 f8 51 a3 8e bf aa 24 d7 18 0c 45 37 9f 01 e3 aa 52 ee 64 a5 c2 76 13 04 7f 3d fd 8d 30 9f 83 11 ff 14 1a a9 06 92 19 e5 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=37) TX EAP -> RADIUS - hexdump(len=37): 02 4a 00 25 19 00 17 03 03 00 1a 88 d9 f3 3b 8b ea 0b 8c 0d dd 43 bc c4 d9 54 94 ab de cb 9c 25 7f ea 30 38 3b Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=9 length=173    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=39       Value: 024a00251900170303001a88d9f33b8bea0b8c0ddd43bcc4d95494abdecb9c257fea30383b    Attribute 24 (State) length=18       Value: efe8f55de7a2ec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: a9c37720b1a796dc832de0dd1106d3af Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 104 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=9 length=104    Attribute 79 (EAP-Message) length=48       Value: 014b002e19001703030023928fc7eaaf149c24a561a91ca0a7d43d986492197bc383d3e93d99cf48fa096f3e9061    Attribute 80 (Message-Authenticator) length=18       Value: 49faaa5adc5ad4ad980f4c7d2e73ea01    Attribute 24 (State) length=18       Value: efe8f55de6a3ec1214b7abcd56f4cf59 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=75 len=46) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=75 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=46) - Flags 0x00 EAP-PEAP: received 40 bytes encrypted data for Phase 2 OpenSSL: RX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 23 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 4b 00 0b 21 80 03 00 02 00 01 EAP-PEAP: received Phase 2: code=1 identifier=75 length=11 EAP-PEAP: Phase 2 Request: type=33 EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 EAP-TLV: Result TLV - hexdump(len=2): 00 01 EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): 02 4b 00 0b 21 80 03 00 02 00 01 OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 17 03 03 00 23 SSL: 40 bytes left to be sent out (of total 40 bytes) EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1110f20 EAP: Session-Id - hexdump(len=65): 19 cb 2e 6f 2c 46 d4 84 50 99 20 9b ab 25 1e 7b 1a 70 35 33 42 41 66 70 e9 f8 51 a3 8e bf aa 24 d7 18 0c 45 37 9f 01 e3 aa 52 ee 64 a5 c2 76 13 04 7f 3d fd 8d 30 9f 83 11 ff 14 1a a9 06 92 19 e5 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=46) TX EAP -> RADIUS - hexdump(len=46): 02 4b 00 2e 19 00 17 03 03 00 23 88 d9 f3 3b 8b ea 0b 8d b1 fa 7e 67 b9 6d 6e d1 13 06 bf 21 e5 7c b3 d2 2f dc ea 0e 57 c9 09 dd eb 63 d5 Encapsulating EAP message into a RADIUS packet   Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=10 length=182    Attribute 1 (User-Name) length=11       Value: 'anonymous'    Attribute 4 (NAS-IP-Address) length=6       Value: 127.0.0.1    Attribute 31 (Calling-Station-Id) length=19       Value: '02-00-00-00-00-01'    Attribute 12 (Framed-MTU) length=6       Value: 1400    Attribute 61 (NAS-Port-Type) length=6       Value: 19    Attribute 6 (Service-Type) length=6       Value: 2    Attribute 77 (Connect-Info) length=24       Value: 'CONNECT 11Mbps 802.11b'    Attribute 79 (EAP-Message) length=48       Value: 024b002e1900170303002388d9f33b8bea0b8db1fa7e67b96d6ed11306bf21e57cb3d22fdcea0e57c909ddeb63d5    Attribute 24 (State) length=18       Value: efe8f55de6a3ec1214b7abcd56f4cf59    Attribute 80 (Message-Authenticator) length=18       Value: 8c7c7590d523c8464d550b15de0202e7 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 168 bytes from RADIUS server Received RADIUS message RADIUS message: code=2 (Access-Accept) identifier=10 length=168    Attribute 1 (User-Name) length=8       Value: 'vtest1'    Attribute 26 (Vendor-Specific) length=58       Value: 000001371134816f3d39758459c26d572cb441d0f94e379e354c9f7362cc24f0a6dac1852f364065dc89cd8c2d717b7868032ab014e0d550    Attribute 26 (Vendor-Specific) length=58       Value: 0000013710348eca20c889493135f9230cb4258d1ec7af7c516b928608f54387b53b287de1a0aa15630d8b5008067f8638f5142f86766a21    Attribute 79 (EAP-Message) length=6       Value: 034b0004    Attribute 80 (Message-Authenticator) length=18       Value: f480b1e1131dfb9e5aabd0924d6e3c3e STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station MS-MPPE-Send-Key (sign) - hexdump(len=32): cc 3b 4d 83 a6 cc 38 2a 34 22 99 b7 99 ab c1 ed bf b3 da f5 0d 16 91 11 e0 00 ff ac 07 56 38 dc MS-MPPE-Recv-Key (crypt) - hexdump(len=32): d7 3d 78 a8 00 46 b8 4f 1a 7a b0 3d 8d 91 d6 99 f3 f2 b2 e4 9f 7d 1b db 26 c1 e4 87 f4 c4 bc b9 decapsulated EAP packet (code=3 id=75 len=4) from RADIUS server: EAP Success EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (param=success) EAP: EAP entering state SUCCESS CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required WPA: EAPOL processing complete Cancelling authentication timeout State: DISCONNECTED -> COMPLETED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE eapol_sm_cb: result=1 EAPOL: Successfully fetched key (len=32) PMK from EAPOL - hexdump(len=32): d7 3d 78 a8 00 46 b8 4f 1a 7a b0 3d 8d 91 d6 99 f3 f2 b2 e4 9f 7d 1b db 26 c1 e4 87 f4 c4 bc b9 No EAP-Key-Name received from server WPA: Clear old PMK and PTK EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit ENGINE: engine deinit MPPE keys OK: 1  mismatch: 0 SUCCESS [root at myradius bin]# ip address 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00     inet 127.0.0.1/8 scope host lo        valid_lft forever preferred_lft forever     inet6 ::1/128 scope host         valid_lft forever preferred_lft forever 2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000     link/ether 00:0c:29:2e:e0:45 brd ff:ff:ff:ff:ff:ff     inet 10.0.8.22/24 brd 10.0.8.255 scope global noprefixroute dynamic ens33        valid_lft 404sec preferred_lft 404sec     inet6 fe80::1222:d3d2:1f4c:1819/64 scope link noprefixroute         valid_lft forever preferred_lft forever 3: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000     link/ether 52:54:00:05:20:8f brd ff:ff:ff:ff:ff:ff     inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0        valid_lft forever preferred_lft forever 4: virbr0-nic: <BROADCAST,MULTICAST> mtu 1500 qdisc pfifo_fast master virbr0 state DOWN group default qlen 1000     link/ether 52:54:00:05:20:8f brd ff:ff:ff:ff:ff:ff [root at myradius bin]# lsof -i:1812 COMMAND  PID USER   FD   TYPE DEVICE SIZE/OFF NODE NAME radiusd 3370 root    7u  IPv4  43176      0t0  UDP *:radius  radiusd 3370 root    9u  IPv6  43178      0t0  UDP *:radius  [root at myradius bin]# kill 3370 [root at myradius bin]# radiusd -X FreeRADIUS Version 3.0.21 Copyright (C) 1999-2019 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/local/share/freeradius/dictionary including dictionary file /usr/local/share/freeradius/dictionary.dhcp including dictionary file /usr/local/share/freeradius/dictionary.vqp including dictionary file /usr/local/etc/raddb/dictionary including configuration file /usr/local/etc/raddb/radiusd.conf including configuration file /usr/local/etc/raddb/proxy.conf including configuration file /usr/local/etc/raddb/clients.conf including files in directory /usr/local/etc/raddb/mods-enabled/ including configuration file /usr/local/etc/raddb/mods-enabled/always including configuration file /usr/local/etc/raddb/mods-enabled/attr_filter including configuration file /usr/local/etc/raddb/mods-enabled/cache_eap including configuration file /usr/local/etc/raddb/mods-enabled/chap including configuration file /usr/local/etc/raddb/mods-enabled/date including configuration file /usr/local/etc/raddb/mods-enabled/detail including configuration file /usr/local/etc/raddb/mods-enabled/detail.log including configuration file /usr/local/etc/raddb/mods-enabled/digest including configuration file /usr/local/etc/raddb/mods-enabled/dynamic_clients including configuration file /usr/local/etc/raddb/mods-enabled/eap including configuration file /usr/local/etc/raddb/mods-enabled/echo including configuration file /usr/local/etc/raddb/mods-enabled/exec including configuration file /usr/local/etc/raddb/mods-enabled/expiration including configuration file /usr/local/etc/raddb/mods-enabled/expr including configuration file /usr/local/etc/raddb/mods-enabled/files including configuration file /usr/local/etc/raddb/mods-enabled/linelog including configuration file /usr/local/etc/raddb/mods-enabled/logintime including configuration file /usr/local/etc/raddb/mods-enabled/mschap including configuration file /usr/local/etc/raddb/mods-enabled/ntlm_auth including configuration file /usr/local/etc/raddb/mods-enabled/pap including configuration file /usr/local/etc/raddb/mods-enabled/passwd including configuration file /usr/local/etc/raddb/mods-enabled/preprocess including configuration file /usr/local/etc/raddb/mods-enabled/radutmp including configuration file /usr/local/etc/raddb/mods-enabled/realm including configuration file /usr/local/etc/raddb/mods-enabled/replicate including configuration file /usr/local/etc/raddb/mods-enabled/soh including configuration file /usr/local/etc/raddb/mods-enabled/sradutmp including configuration file /usr/local/etc/raddb/mods-enabled/unix including configuration file /usr/local/etc/raddb/mods-enabled/unpack including configuration file /usr/local/etc/raddb/mods-enabled/utf8 including files in directory /usr/local/etc/raddb/policy.d/ including configuration file /usr/local/etc/raddb/policy.d/abfab-tr including configuration file /usr/local/etc/raddb/policy.d/accounting including configuration file /usr/local/etc/raddb/policy.d/canonicalization including configuration file /usr/local/etc/raddb/policy.d/control including configuration file /usr/local/etc/raddb/policy.d/cui including configuration file /usr/local/etc/raddb/policy.d/debug including configuration file /usr/local/etc/raddb/policy.d/dhcp including configuration file /usr/local/etc/raddb/policy.d/eap including configuration file /usr/local/etc/raddb/policy.d/filter including configuration file /usr/local/etc/raddb/policy.d/moonshot-targeted-ids including configuration file /usr/local/etc/raddb/policy.d/operator-name including configuration file /usr/local/etc/raddb/policy.d/rfc7542 including files in directory /usr/local/etc/raddb/sites-enabled/ including configuration file /usr/local/etc/raddb/sites-enabled/default including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel main {  security {  	allow_core_dumps = no  } 	name = "radiusd" 	prefix = "/usr/local" 	localstatedir = "/usr/local/var" 	logdir = "/usr/local/var/log/radius" 	run_dir = "/usr/local/var/run/radiusd" } main { 	name = "radiusd" 	prefix = "/usr/local" 	localstatedir = "/usr/local/var" 	sbindir = "/usr/local/sbin" 	logdir = "/usr/local/var/log/radius" 	run_dir = "/usr/local/var/run/radiusd" 	libdir = "/usr/local/lib" 	radacctdir = "/usr/local/var/log/radius/radacct" 	hostname_lookups = no 	max_request_time = 30 	cleanup_delay = 5 	max_requests = 16384 	pidfile = "/usr/local/var/run/radiusd/radiusd.pid" 	checkrad = "/usr/local/sbin/checkrad" 	debug_level = 0 	proxy_requests = yes  log {  	stripped_names = no  	auth = no  	auth_badpass = no  	auth_goodpass = no  	colourise = yes  	msg_denied = "You are already logged in - access denied"  }  resources {  }  security {  	max_attributes = 200  	reject_delay = 1.000000  	status_server = yes  	allow_vulnerable_openssl = "no"  } } radiusd: #### Loading Realms and Home Servers ####  proxy server {  	retry_delay = 5  	retry_count = 3  	default_fallback = no  	dead_time = 120  	wake_all_if_all_dead = no  }  home_server localhost {  	ipaddr = 127.0.0.1  	port = 1812  	type = "auth"  	secret = <<< secret >>>  	response_window = 20.000000  	response_timeouts = 1  	max_outstanding = 65536  	zombie_period = 40  	status_check = "status-server"  	ping_interval = 30  	check_interval = 30  	check_timeout = 4  	num_answers_to_alive = 3  	revive_interval = 120   limit {   	max_connections = 16   	max_requests = 0   	lifetime = 0   	idle_timeout = 0   }   coa {   	irt = 2   	mrt = 16   	mrc = 5   	mrd = 30   }  }  home_server_pool my_auth_failover { 	type = fail-over 	home_server = localhost  }  realm example.com { 	auth_pool = my_auth_failover  }  realm LOCAL {  } radiusd: #### Loading Clients ####  client localhost {  	ipaddr = 127.0.0.1  	require_message_authenticator = no  	secret = <<< secret >>>  	nas_type = "other"  	proto = "*"   limit {   	max_connections = 16   	lifetime = 0   	idle_timeout = 30   }  }  client localhost_ipv6 {  	ipv6addr = ::1  	require_message_authenticator = no  	secret = <<< secret >>>   limit {   	max_connections = 16   	lifetime = 0   	idle_timeout = 30   }  }  client socket_client {  	ipaddr = 10.0.8.18  	require_message_authenticator = no  	secret = <<< secret >>>   limit {   	max_connections = 16   	lifetime = 0   	idle_timeout = 30   }  } Debugger not attached  # Creating Auth-Type = mschap  # Creating Auth-Type = digest  # Creating Auth-Type = eap  # Creating Auth-Type = PAP  # Creating Auth-Type = CHAP  # Creating Auth-Type = MS-CHAP radiusd: #### Instantiating modules ####  modules {   # Loaded module rlm_always   # Loading module "reject" from file /usr/local/etc/raddb/mods-enabled/always   always reject {   	rcode = "reject"   	simulcount = 0   	mpp = no   }   # Loading module "fail" from file /usr/local/etc/raddb/mods-enabled/always   always fail {   	rcode = "fail"   	simulcount = 0   	mpp = no   }   # Loading module "ok" from file /usr/local/etc/raddb/mods-enabled/always   always ok {   	rcode = "ok"   	simulcount = 0   	mpp = no   }   # Loading module "handled" from file /usr/local/etc/raddb/mods-enabled/always   always handled {   	rcode = "handled"   	simulcount = 0   	mpp = no   }   # Loading module "invalid" from file /usr/local/etc/raddb/mods-enabled/always   always invalid {   	rcode = "invalid"   	simulcount = 0   	mpp = no   }   # Loading module "userlock" from file /usr/local/etc/raddb/mods-enabled/always   always userlock {   	rcode = "userlock"   	simulcount = 0   	mpp = no   }   # Loading module "notfound" from file /usr/local/etc/raddb/mods-enabled/always   always notfound {   	rcode = "notfound"   	simulcount = 0   	mpp = no   }   # Loading module "noop" from file /usr/local/etc/raddb/mods-enabled/always   always noop {   	rcode = "noop"   	simulcount = 0   	mpp = no   }   # Loading module "updated" from file /usr/local/etc/raddb/mods-enabled/always   always updated {   	rcode = "updated"   	simulcount = 0   	mpp = no   }   # Loaded module rlm_attr_filter   # Loading module "attr_filter.post-proxy" from file /usr/local/etc/raddb/mods-enabled/attr_filter   attr_filter attr_filter.post-proxy {   	filename = "/usr/local/etc/raddb/mods-config/attr_filter/post-proxy"   	key = "%{Realm}"   	relaxed = no   }   # Loading module "attr_filter.pre-proxy" from file /usr/local/etc/raddb/mods-enabled/attr_filter   attr_filter attr_filter.pre-proxy {   	filename = "/usr/local/etc/raddb/mods-config/attr_filter/pre-proxy"   	key = "%{Realm}"   	relaxed = no   }   # Loading module "attr_filter.access_reject" from file /usr/local/etc/raddb/mods-enabled/attr_filter   attr_filter attr_filter.access_reject {   	filename = "/usr/local/etc/raddb/mods-config/attr_filter/access_reject"   	key = "%{User-Name}"   	relaxed = no   }   # Loading module "attr_filter.access_challenge" from file /usr/local/etc/raddb/mods-enabled/attr_filter   attr_filter attr_filter.access_challenge {   	filename = "/usr/local/etc/raddb/mods-config/attr_filter/access_challenge"   	key = "%{User-Name}"   	relaxed = no   }   # Loading module "attr_filter.accounting_response" from file /usr/local/etc/raddb/mods-enabled/attr_filter   attr_filter attr_filter.accounting_response {   	filename = "/usr/local/etc/raddb/mods-config/attr_filter/accounting_response"   	key = "%{User-Name}"   	relaxed = no   }   # Loaded module rlm_cache   # Loading module "cache_eap" from file /usr/local/etc/raddb/mods-enabled/cache_eap   cache cache_eap {   	driver = "rlm_cache_rbtree"   	key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"   	ttl = 15   	max_entries = 0   	epoch = 0   	add_stats = no   }   # Loaded module rlm_chap   # Loading module "chap" from file /usr/local/etc/raddb/mods-enabled/chap   # Loaded module rlm_date   # Loading module "date" from file /usr/local/etc/raddb/mods-enabled/date   date {   	format = "%b %e %Y %H:%M:%S %Z"   	utc = no   }   # Loading module "wispr2date" from file /usr/local/etc/raddb/mods-enabled/date   date wispr2date {   	format = "%Y-%m-%dT%H:%M:%S"   	utc = no   }   # Loaded module rlm_detail   # Loading module "detail" from file /usr/local/etc/raddb/mods-enabled/detail   detail {   	filename = "/usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"   	header = "%t"   	permissions = 384   	locking = no   	escape_filenames = no   	log_packet_header = no   }   # Loading module "auth_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   detail auth_log {   	filename = "/usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"   	header = "%t"   	permissions = 384   	locking = no   	escape_filenames = no   	log_packet_header = no   }   # Loading module "reply_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   detail reply_log {   	filename = "/usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"   	header = "%t"   	permissions = 384   	locking = no   	escape_filenames = no   	log_packet_header = no   }   # Loading module "pre_proxy_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   detail pre_proxy_log {   	filename = "/usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"   	header = "%t"   	permissions = 384   	locking = no   	escape_filenames = no   	log_packet_header = no   }   # Loading module "post_proxy_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   detail post_proxy_log {   	filename = "/usr/local/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"   	header = "%t"   	permissions = 384   	locking = no   	escape_filenames = no   	log_packet_header = no   }   # Loaded module rlm_digest   # Loading module "digest" from file /usr/local/etc/raddb/mods-enabled/digest   # Loaded module rlm_dynamic_clients   # Loading module "dynamic_clients" from file /usr/local/etc/raddb/mods-enabled/dynamic_clients   # Loaded module rlm_eap   # Loading module "eap" from file /usr/local/etc/raddb/mods-enabled/eap   eap {   	default_eap_type = "md5"   	timer_expire = 60   	ignore_unknown_eap_types = no   	cisco_accounting_username_bug = no   	max_sessions = 16384   }   # Loaded module rlm_exec   # Loading module "echo" from file /usr/local/etc/raddb/mods-enabled/echo   exec echo {   	wait = yes   	program = "/bin/echo %{User-Name}"   	input_pairs = "request"   	output_pairs = "reply"   	shell_escape = yes   }   # Loading module "exec" from file /usr/local/etc/raddb/mods-enabled/exec   exec {   	wait = no   	input_pairs = "request"   	shell_escape = yes   	timeout = 10   }   # Loaded module rlm_expiration   # Loading module "expiration" from file /usr/local/etc/raddb/mods-enabled/expiration   # Loaded module rlm_expr   # Loading module "expr" from file /usr/local/etc/raddb/mods-enabled/expr   expr {   	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /盲茅枚眉脿芒忙莽猫茅锚毛卯茂么艙霉没眉a每脛脡脰脺脽脌脗脝脟脠脡脢脣脦脧脭艗脵脹脺鸥"   }   # Loaded module rlm_files   # Loading module "files" from file /usr/local/etc/raddb/mods-enabled/files   files {   	filename = "/usr/local/etc/raddb/mods-config/files/authorize"   	acctusersfile = "/usr/local/etc/raddb/mods-config/files/accounting"   	preproxy_usersfile = "/usr/local/etc/raddb/mods-config/files/pre-proxy"   }   # Loaded module rlm_linelog   # Loading module "linelog" from file /usr/local/etc/raddb/mods-enabled/linelog   linelog {   	filename = "/usr/local/var/log/radius/linelog"   	escape_filenames = no   	syslog_severity = "info"   	permissions = 384   	format = "This is a log message for %{User-Name}"   	reference = "messages.%{%{reply:Packet-Type}:-default}"   }   # Loading module "log_accounting" from file /usr/local/etc/raddb/mods-enabled/linelog   linelog log_accounting {   	filename = "/usr/local/var/log/radius/linelog-accounting"   	escape_filenames = no   	syslog_severity = "info"   	permissions = 384   	format = ""   	reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"   }   # Loaded module rlm_logintime   # Loading module "logintime" from file /usr/local/etc/raddb/mods-enabled/logintime   logintime {   	minimum_timeout = 60   }   # Loaded module rlm_mschap   # Loading module "mschap" from file /usr/local/etc/raddb/mods-enabled/mschap   mschap {   	use_mppe = yes   	require_encryption = no   	require_strong = no   	with_ntdomain_hack = yes    passchange {    }   	allow_retry = yes   	winbind_retry_with_normalised_username = no   }   # Loading module "ntlm_auth" from file /usr/local/etc/raddb/mods-enabled/ntlm_auth   exec ntlm_auth {   	wait = yes   	program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"   	shell_escape = yes   }   # Loaded module rlm_pap   # Loading module "pap" from file /usr/local/etc/raddb/mods-enabled/pap   pap {   	normalise = yes   }   # Loaded module rlm_passwd   # Loading module "etc_passwd" from file /usr/local/etc/raddb/mods-enabled/passwd   passwd etc_passwd {   	filename = "/etc/passwd"   	format = "*User-Name:Crypt-Password:"   	delimiter = ":"   	ignore_nislike = no   	ignore_empty = yes   	allow_multiple_keys = no   	hash_size = 100   }   # Loaded module rlm_preprocess   # Loading module "preprocess" from file /usr/local/etc/raddb/mods-enabled/preprocess   preprocess {   	huntgroups = "/usr/local/etc/raddb/mods-config/preprocess/huntgroups"   	hints = "/usr/local/etc/raddb/mods-config/preprocess/hints"   	with_ascend_hack = no   	ascend_channels_per_line = 23   	with_ntdomain_hack = no   	with_specialix_jetstream_hack = no   	with_cisco_vsa_hack = no   	with_alvarion_vsa_hack = no   }   # Loaded module rlm_radutmp   # Loading module "radutmp" from file /usr/local/etc/raddb/mods-enabled/radutmp   radutmp {   	filename = "/usr/local/var/log/radius/radutmp"   	username = "%{User-Name}"   	case_sensitive = yes   	check_with_nas = yes   	permissions = 384   	caller_id = yes   }   # Loaded module rlm_realm   # Loading module "IPASS" from file /usr/local/etc/raddb/mods-enabled/realm   realm IPASS {   	format = "prefix"   	delimiter = "/"   	ignore_default = no   	ignore_null = no   }   # Loading module "suffix" from file /usr/local/etc/raddb/mods-enabled/realm   realm suffix {   	format = "suffix"   	delimiter = "@"   	ignore_default = no   	ignore_null = no   }   # Loading module "bangpath" from file /usr/local/etc/raddb/mods-enabled/realm   realm bangpath {   	format = "prefix"   	delimiter = "!"   	ignore_default = no   	ignore_null = no   }   # Loading module "realmpercent" from file /usr/local/etc/raddb/mods-enabled/realm   realm realmpercent {   	format = "suffix"   	delimiter = "%"   	ignore_default = no   	ignore_null = no   }   # Loading module "ntdomain" from file /usr/local/etc/raddb/mods-enabled/realm   realm ntdomain {   	format = "prefix"   	delimiter = "\\"   	ignore_default = no   	ignore_null = no   }   # Loaded module rlm_replicate   # Loading module "replicate" from file /usr/local/etc/raddb/mods-enabled/replicate   # Loaded module rlm_soh   # Loading module "soh" from file /usr/local/etc/raddb/mods-enabled/soh   soh {   	dhcp = yes   }   # Loading module "sradutmp" from file /usr/local/etc/raddb/mods-enabled/sradutmp   radutmp sradutmp {   	filename = "/usr/local/var/log/radius/sradutmp"   	username = "%{User-Name}"   	case_sensitive = yes   	check_with_nas = yes   	permissions = 420   	caller_id = no   }   # Loaded module rlm_unix   # Loading module "unix" from file /usr/local/etc/raddb/mods-enabled/unix   unix {   	radwtmp = "/usr/local/var/log/radius/radwtmp"   } Creating attribute Unix-Group   # Loaded module rlm_unpack   # Loading module "unpack" from file /usr/local/etc/raddb/mods-enabled/unpack   # Loaded module rlm_utf8   # Loading module "utf8" from file /usr/local/etc/raddb/mods-enabled/utf8   instantiate {   }   # Instantiating module "reject" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "fail" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "ok" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "handled" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "invalid" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "userlock" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "notfound" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "noop" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "updated" from file /usr/local/etc/raddb/mods-enabled/always   # Instantiating module "attr_filter.post-proxy" from file /usr/local/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/etc/raddb/mods-config/attr_filter/post-proxy   # Instantiating module "attr_filter.pre-proxy" from file /usr/local/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/etc/raddb/mods-config/attr_filter/pre-proxy   # Instantiating module "attr_filter.access_reject" from file /usr/local/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/etc/raddb/mods-config/attr_filter/access_reject   # Instantiating module "attr_filter.access_challenge" from file /usr/local/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/etc/raddb/mods-config/attr_filter/access_challenge   # Instantiating module "attr_filter.accounting_response" from file /usr/local/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/etc/raddb/mods-config/attr_filter/accounting_response   # Instantiating module "cache_eap" from file /usr/local/etc/raddb/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked   # Instantiating module "detail" from file /usr/local/etc/raddb/mods-enabled/detail   # Instantiating module "auth_log" from file /usr/local/etc/raddb/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output   # Instantiating module "reply_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   # Instantiating module "pre_proxy_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   # Instantiating module "post_proxy_log" from file /usr/local/etc/raddb/mods-enabled/detail.log   # Instantiating module "eap" from file /usr/local/etc/raddb/mods-enabled/eap    # Linked to sub-module rlm_eap_md5    # Linked to sub-module rlm_eap_leap    # Linked to sub-module rlm_eap_gtc    gtc {    	challenge = "Password: "    	auth_type = "PAP"    }    # Linked to sub-module rlm_eap_tls    tls {    	tls = "tls-common"    }    tls-config tls-common {    	verify_depth = 0    	ca_path = "/usr/local/etc/raddb/certs"    	pem_file_type = yes    	private_key_file = "/usr/local/etc/raddb/certs/server.pem"    	certificate_file = "/usr/local/etc/raddb/certs/server.pem"    	ca_file = "/usr/local/etc/raddb/certs/ca.pem"    	private_key_password = <<< secret >>>    	dh_file = "/usr/local/etc/raddb/certs/dh"    	fragment_size = 1024    	include_length = yes    	auto_chain = yes    	check_crl = no    	check_all_crl = no    	cipher_list = "DEFAULT"    	cipher_server_preference = no    	ecdh_curve = "prime256v1"    	disable_tlsv1 = yes    	disable_tlsv1_1 = yes    	tls_max_version = "1.2"    	tls_min_version = "1.2"     cache {     	enable = no     	lifetime = 24     	max_entries = 255     }     verify {     	skip_if_ocsp_ok = no     }     ocsp {     	enable = no     	override_cert_url = yes     	url = "http://127.0.0.1/ocsp/"     	use_nonce = yes     	timeout = 0     	softfail = no     }    }    # Linked to sub-module rlm_eap_ttls    ttls {    	tls = "tls-common"    	default_eap_type = "md5"    	copy_request_to_tunnel = no    	use_tunneled_reply = yes    	virtual_server = "inner-tunnel"    	include_length = yes    	require_client_cert = no    } tls: Using cached TLS configuration from previous invocation    # Linked to sub-module rlm_eap_peap    peap {    	tls = "tls-common"    	default_eap_type = "mschapv2"    	copy_request_to_tunnel = no    	use_tunneled_reply = yes    	proxy_tunneled_request_as_eap = yes    	virtual_server = "inner-tunnel"    	soh = no    	require_client_cert = no    } tls: Using cached TLS configuration from previous invocation    # Linked to sub-module rlm_eap_mschapv2    mschapv2 {    	with_ntdomain_hack = no    	send_error = no    }   # Instantiating module "expiration" from file /usr/local/etc/raddb/mods-enabled/expiration   # Instantiating module "files" from file /usr/local/etc/raddb/mods-enabled/files reading pairlist file /usr/local/etc/raddb/mods-config/files/authorize reading pairlist file /usr/local/etc/raddb/mods-config/files/accounting reading pairlist file /usr/local/etc/raddb/mods-config/files/pre-proxy   # Instantiating module "linelog" from file /usr/local/etc/raddb/mods-enabled/linelog   # Instantiating module "log_accounting" from file /usr/local/etc/raddb/mods-enabled/linelog   # Instantiating module "logintime" from file /usr/local/etc/raddb/mods-enabled/logintime   # Instantiating module "mschap" from file /usr/local/etc/raddb/mods-enabled/mschap rlm_mschap (mschap): using internal authentication   # Instantiating module "pap" from file /usr/local/etc/raddb/mods-enabled/pap   # Instantiating module "etc_passwd" from file /usr/local/etc/raddb/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no   # Instantiating module "preprocess" from file /usr/local/etc/raddb/mods-enabled/preprocess reading pairlist file /usr/local/etc/raddb/mods-config/preprocess/huntgroups reading pairlist file /usr/local/etc/raddb/mods-config/preprocess/hints   # Instantiating module "IPASS" from file /usr/local/etc/raddb/mods-enabled/realm   # Instantiating module "suffix" from file /usr/local/etc/raddb/mods-enabled/realm   # Instantiating module "bangpath" from file /usr/local/etc/raddb/mods-enabled/realm   # Instantiating module "realmpercent" from file /usr/local/etc/raddb/mods-enabled/realm   # Instantiating module "ntdomain" from file /usr/local/etc/raddb/mods-enabled/realm  } # modules radiusd: #### Loading Virtual Servers #### server { # from file /usr/local/etc/raddb/radiusd.conf } # server server default { # from file /usr/local/etc/raddb/sites-enabled/default  # Loading authenticate {...}  # Loading authorize {...} Ignoring "sql" (see raddb/mods-available/README.rst) Ignoring "ldap" (see raddb/mods-available/README.rst)  # Loading preacct {...}  # Loading accounting {...}  # Loading post-proxy {...}  # Loading post-auth {...} } # server default server inner-tunnel { # from file /usr/local/etc/raddb/sites-enabled/inner-tunnel  # Loading authenticate {...}  # Loading authorize {...}  # Loading session {...}  # Loading post-proxy {...}  # Loading post-auth {...}  # Skipping contents of 'if' as it is always 'false' -- /usr/local/etc/raddb/sites-enabled/inner-tunnel:336 } # server inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen {   	type = "auth"   	ipaddr = *   	port = 0    limit {    	max_connections = 16    	lifetime = 0    	idle_timeout = 30    } } listen {   	type = "acct"   	ipaddr = *   	port = 0    limit {    	max_connections = 16    	lifetime = 0    	idle_timeout = 30    } } listen {   	type = "auth"   	ipv6addr = ::   	port = 0    limit {    	max_connections = 16    	lifetime = 0    	idle_timeout = 30    } } listen {   	type = "acct"   	ipv6addr = ::   	port = 0    limit {    	max_connections = 16    	lifetime = 0    	idle_timeout = 30    } } listen {   	type = "auth"   	ipaddr = 127.0.0.1   	port = 18120 } Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel Listening on proxy address * port 50665 Listening on proxy address :: port 41272 Ready to process requests (0) Received Access-Request Id 4 from 10.0.8.18:40336 to 10.0.8.22:1812 length 156 (0)   User-Name = "vtest1" (0)   Called-Station-Id = "113.92.158.79" (0)   Calling-Station-Id = "183.8.207.18" (0)   NAS-Port-Id = "\000\000\000V" (0)   NAS-Port-Type = Virtual (0)   Service-Type = Framed-User (0)   Event-Timestamp = "Jun 21 2022 17:11:05 CST" (0)   Framed-MTU = 1400 (0)   EAP-Message = 0x0200000b01767465737431 (0)   Message-Authenticator = 0x6dcc9c62349a7c00498c6bde78e00196 (0)   NAS-Identifier = "IKEv2 vpn for freeradius_test1" (0)   NAS-IP-Address = 10.0.8.18 (0) # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default (0)   authorize { (0)     policy filter_username { (0)       if (&User-Name) { (0)       if (&User-Name)  -> TRUE (0)       if (&User-Name)  { (0)         if (&User-Name =~ / /) { (0)         if (&User-Name =~ / /)  -> FALSE (0)         if (&User-Name =~ /@[^@]*@/ ) { (0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE (0)         if (&User-Name =~ /\.\./ ) { (0)         if (&User-Name =~ /\.\./ )  -> FALSE (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  { (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE (0)         if (&User-Name =~ /\.$/)  { (0)         if (&User-Name =~ /\.$/)   -> FALSE (0)         if (&User-Name =~ /@\./)  { (0)         if (&User-Name =~ /@\./)   -> FALSE (0)       } # if (&User-Name)  = notfound (0)     } # policy filter_username = notfound (0)     [preprocess] = ok (0)     [chap] = noop (0)     [mschap] = noop (0)     [digest] = noop (0) suffix: Checking for suffix after "@" (0) suffix: No '@' in User-Name = "vtest1", looking up realm NULL (0) suffix: No such realm "NULL" (0)     [suffix] = noop (0) eap: Peer sent EAP Response (code 2) ID 0 length 11 (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0)     [eap] = ok (0)   } # authorize = ok (0) Found Auth-Type = eap (0) # Executing group from file /usr/local/etc/raddb/sites-enabled/default (0)   authenticate { (0) eap: Peer sent packet with method EAP Identity (1) (0) eap: Calling submodule eap_md5 to process data (0) eap_md5: Issuing MD5 Challenge (0) eap: Sending EAP Request (code 1) ID 1 length 22 (0) eap: EAP session adding &reply:State = 0x43ff295343fe2dbb (0)     [eap] = handled (0)   } # authenticate = handled (0) Using Post-Auth-Type Challenge (0) # Executing group from file /usr/local/etc/raddb/sites-enabled/default (0)   Challenge { ... } # empty sub-section is ignored (0) Sent Access-Challenge Id 4 from 10.0.8.22:1812 to 10.0.8.18:40336 length 0 (0)   EAP-Message = 0x01010016041080b249cf2b7ef5d05c2815a8741d7bf9 (0)   Message-Authenticator = 0x00000000000000000000000000000000 (0)   State = 0x43ff295343fe2dbbe50302a434929314 (0) Finished request Waking up in 4.9 seconds. (1) Received Access-Request Id 5 from 10.0.8.18:49996 to 10.0.8.22:1812 length 185 (1)   User-Name = "vtest1" (1)   Called-Station-Id = "113.92.158.79" (1)   Calling-Station-Id = "183.8.207.18" (1)   NAS-Port-Id = "\000\000\000V" (1)   NAS-Port-Type = Virtual (1)   Service-Type = Framed-User (1)   Event-Timestamp = "Jun 21 2022 17:11:05 CST" (1)   Framed-MTU = 1400 (1)   State = 0x43ff295343fe2dbbe50302a434929314 (1)   EAP-Message = 0x020100160410023116a7d5e0ab9c8cbea470f88e05b5 (1)   Message-Authenticator = 0x5ad2da08899da66d3b26f543f019b8ec (1)   NAS-Identifier = "IKEv2 vpn for freeradius_test1" (1)   NAS-IP-Address = 10.0.8.18 (1) session-state: No cached attributes (1) # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default (1)   authorize { (1)     policy filter_username { (1)       if (&User-Name) { (1)       if (&User-Name)  -> TRUE (1)       if (&User-Name)  { (1)         if (&User-Name =~ / /) { (1)         if (&User-Name =~ / /)  -> FALSE (1)         if (&User-Name =~ /@[^@]*@/ ) { (1)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE (1)         if (&User-Name =~ /\.\./ ) { (1)         if (&User-Name =~ /\.\./ )  -> FALSE (1)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  { (1)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE (1)         if (&User-Name =~ /\.$/)  { (1)         if (&User-Name =~ /\.$/)   -> FALSE (1)         if (&User-Name =~ /@\./)  { (1)         if (&User-Name =~ /@\./)   -> FALSE (1)       } # if (&User-Name)  = notfound (1)     } # policy filter_username = notfound (1)     [preprocess] = ok (1)     [chap] = noop (1)     [mschap] = noop (1)     [digest] = noop (1) suffix: Checking for suffix after "@" (1) suffix: No '@' in User-Name = "vtest1", looking up realm NULL (1) suffix: No such realm "NULL" (1)     [suffix] = noop (1) eap: Peer sent EAP Response (code 2) ID 1 length 22 (1) eap: No EAP Start, assuming it's an on-going EAP conversation (1)     [eap] = updated (1) files: users: Matched entry vtest1 at line 1 (1)     [files] = ok (1)     [expiration] = noop (1)     [logintime] = noop (1) pap: WARNING: Auth-Type already set.  Not setting to PAP (1)     [pap] = noop (1)   } # authorize = updated (1) Found Auth-Type = eap (1) # Executing group from file /usr/local/etc/raddb/sites-enabled/default (1)   authenticate { (1) eap: Expiring EAP session with state 0x43ff295343fe2dbb (1) eap: Finished EAP session with state 0x43ff295343fe2dbb (1) eap: Previous EAP request found for state 0x43ff295343fe2dbb, released from the list (1) eap: Peer sent packet with method EAP MD5 (4) (1) eap: Calling submodule eap_md5 to process data (1) eap: Sending EAP Success (code 3) ID 1 length 4 (1) eap: Freeing handler (1)     [eap] = ok (1)   } # authenticate = ok (1) # Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default (1)   post-auth { (1)     if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name)) { (1)     if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name))  -> FALSE (1)     update { (1)       No attributes updated for RHS &session-state: (1)     } # update = noop (1)     [exec] = noop (1)     policy remove_reply_message_if_eap { (1)       if (&reply:EAP-Message && &reply:Reply-Message) { (1)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE (1)       else { (1)         [noop] = noop (1)       } # else = noop (1)     } # policy remove_reply_message_if_eap = noop (1)   } # post-auth = noop (1) Sent Access-Accept Id 5 from 10.0.8.22:1812 to 10.0.8.18:49996 length 0 (1)   EAP-Message = 0x03010004 (1)   Message-Authenticator = 0x00000000000000000000000000000000 (1)   User-Name = "vtest1" (1) Finished request Waking up in 4.9 seconds. (0) Cleaning up request packet ID 4 with timestamp +152 (1) Cleaning up request packet ID 5 with timestamp +152 Ready to process requests


More information about the Freeradius-Users mailing list