I encountered the problem that there is an account in the database, but the authentication process feedback does not exist. Please help.

娶你苟命 qunigouming at gmail.com
Wed Dec 13 10:33:35 UTC 2023


Hi,everyone!
  Many thanks to Alan DeKok and Matthew for their previous help! Especially
the link provided by Matthew: https://knowledge.h3c.com/Theme/details/191858,
which allowed me to discover and solve part of the problem, that is, H3C
switches must be configured with authentication and authorization at the
same time, as well as the authorization problem after login.
  But I encountered a new problem: the switch authentication log showed
that the authentication had passed, but after passing the authentication,
the switch automatically closed the ssh session. I didn't find out the
specific problem from the radius debugging information and wireshark packet
capture, so I ask for your advice.
  *The following is freeradius debugging:*
Waking up in 4.9 seconds.
(8) Received Access-Request Id 120 from 192.168.1.1:38272 to
192.168.1.188:1812 length 216
(8)   User-Name = "testuser"
(8)   NAS-Identifier = "Test-4F-D-V16-37U-S6812"
(8)   Acct-Session-Id = "0000000106202307220000000108000026210"
(8)   User-Password = "testpass"
(8)   Calling-Station-Id = "192.168.1.188"
(8)   NAS-Port-Type = Virtual
(8)   H3C-NAS-Port-Name = "M-GigabitEthernet0/0/0"
(8)   Framed-IP-Address = 192.168.1.188
(8)   Service-Type = Login-User
(8)   NAS-IP-Address = 192.168.1.1
(8)   H3C-Product-ID = "H3C S6812-48X6C"
(8)   H3C-NAS-Startup-Timestamp = 1609459214
(8) # Executing section authorize from file
/usr/local/etc/raddb/sites-enabled/default
(8)   authorize {
(8)     policy filter_username {
(8)       if (&User-Name) {
(8)       if (&User-Name)  -> TRUE
(8)       if (&User-Name)  {
(8)         if (&User-Name =~ / /) {
(8)         if (&User-Name =~ / /)  -> FALSE
(8)         if (&User-Name =~ /@[^@]*@/ ) {
(8)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
(8)         if (&User-Name =~ /\.\./ ) {
(8)         if (&User-Name =~ /\.\./ )  -> FALSE
(8)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
(8)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE
(8)         if (&User-Name =~ /\.$/)  {
(8)         if (&User-Name =~ /\.$/)   -> FALSE
(8)         if (&User-Name =~ /@\./)  {
(8)         if (&User-Name =~ /@\./)   -> FALSE
(8)       } # if (&User-Name)  = notfound
(8)     } # policy filter_username = notfound
(8)     [preprocess] = ok
(8)     [chap] = noop
(8)     [mschap] = noop
(8)     [digest] = noop
(8) suffix: Checking for suffix after "@"
(8) suffix: No '@' in User-Name = "testuser", looking up realm NULL
(8) suffix: No such realm "NULL"
(8)     [suffix] = noop
(8) eap: No EAP-Message, not doing EAP
(8)     [eap] = noop
(8)     [files] = noop
(8) sql: EXPAND %{User-Name}
(8) sql:    --> testuser
(8) sql: SQL-User-Name set to 'testuser'
rlm_sql (sql): Reserved connection (0)
(8) sql: EXPAND SELECT id, username, attribute, value, op FROM radcheck
WHERE username = '%{SQL-User-Name}' ORDER BY id
(8) sql:    --> SELECT id, username, attribute, value, op FROM radcheck
WHERE username = 'testuser' ORDER BY id
(8) sql: Executing select query: SELECT id, username, attribute, value, op
FROM radcheck WHERE username = 'testuser' ORDER BY id
(8) sql: User found in radcheck table
(8) sql: Conditional check items matched, merging assignment check items
(8) sql:   Cleartext-Password := "testpass"
(8) sql: EXPAND SELECT id, username, attribute, value, op FROM radreply
WHERE username = '%{SQL-User-Name}' ORDER BY id
(8) sql:    --> SELECT id, username, attribute, value, op FROM radreply
WHERE username = 'testuser' ORDER BY id
(8) sql: Executing select query: SELECT id, username, attribute, value, op
FROM radreply WHERE username = 'testuser' ORDER BY id
(8) sql: EXPAND SELECT groupname FROM radusergroup WHERE username =
'%{SQL-User-Name}' ORDER BY priority
(8) sql:    --> SELECT groupname FROM radusergroup WHERE username =
'testuser' ORDER BY priority
(8) sql: Executing select query: SELECT groupname FROM radusergroup WHERE
username = 'testuser' ORDER BY priority
(8) sql: User not found in any groups
rlm_sql (sql): Released connection (0)
Need more connections to reach 10 spares
rlm_sql (sql): Opening additional connection (13), 1 of 26 pending slots
used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
socket, server version 10.11.6-MariaDB, protocol version 10
(8)     [sql] = ok
(8)     [expiration] = noop
(8)     [logintime] = noop
(8)     [pap] = updated
(8)   } # authorize = updated
(8) Found Auth-Type = PAP
(8) # Executing group from file /usr/local/etc/raddb/sites-enabled/default
(8)   Auth-Type PAP {
(8) pap: Login attempt with password
(8) pap: Comparing with "known good" Cleartext-Password
(8) pap: User authenticated successfully
(8)     [pap] = ok
(8)   } # Auth-Type PAP = ok
(8) # Executing section post-auth from file
/usr/local/etc/raddb/sites-enabled/default
(8)   post-auth {
(8)     if (session-state:User-Name && reply:User-Name && request:User-Name
&& (reply:User-Name == request:User-Name)) {
(8)     if (session-state:User-Name && reply:User-Name && request:User-Name
&& (reply:User-Name == request:User-Name))  -> FALSE
(8)     update {
(8)       No attributes updated for RHS &session-state:
(8)     } # update = noop
(8) sql: EXPAND .query
(8) sql:    --> .query
(8) sql: Using query template 'query'
rlm_sql (sql): Reserved connection (11)
(8) sql: EXPAND %{User-Name}
(8) sql:    --> testuser
(8) sql: SQL-User-Name set to 'testuser'
(8) sql: EXPAND INSERT INTO radpostauth (username, pass, reply, authdate )
VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
'%{reply:Packet-Type}', '%S.%M' )
(8) sql:    --> INSERT INTO radpostauth (username, pass, reply, authdate )
VALUES ( 'testuser', 'testpass', 'Access-Accept', '2023-12-13
17:55:15.084332' )
(8) sql: Executing query: INSERT INTO radpostauth (username, pass, reply,
authdate ) VALUES ( 'testuser', 'testpass', 'Access-Accept', '2023-12-13
17:55:15.084332' )
(8) sql: SQL query returned: success
(8) sql: 1 record(s) updated
rlm_sql (sql): Released connection (11)
(8)     [sql] = ok
(8)     [exec] = noop
(8)     policy remove_reply_message_if_eap {
(8)       if (&reply:EAP-Message && &reply:Reply-Message) {
(8)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
(8)       else {
(8)         [noop] = noop
(8)       } # else = noop
(8)     } # policy remove_reply_message_if_eap = noop
(8)     if (EAP-Key-Name && &reply:EAP-Session-Id) {
(8)     if (EAP-Key-Name && &reply:EAP-Session-Id)  -> FALSE
(8)   } # post-auth = ok
(8) Sent Access-Accept Id 120 from 192.168.1.188:1812 to 192.168.1.1:38272
length 20
(8) Finished request
Waking up in 0.5 seconds.
(7) Cleaning up request packet ID 119 with timestamp +611 due to
cleanup_delay was reached
Waking up in 4.4 seconds.
(9) Received Access-Request Id 147 from 192.168.1.1:38272 to
192.168.1.188:1812 length 216
(9)   User-Name = "testuser"
(9)   NAS-Identifier = "Test-4F-D-V16-37U-S6812"
(9)   Acct-Session-Id = "0000000106202307260000000108000026217"
(9)   User-Password = "testpass"
(9)   Calling-Station-Id = "192.168.1.188"
(9)   NAS-Port-Type = Virtual
(9)   H3C-NAS-Port-Name = "M-GigabitEthernet0/0/0"
(9)   Framed-IP-Address = 192.168.1.188
(9)   Service-Type = Login-User
(9)   NAS-IP-Address = 192.168.1.1
(9)   H3C-Product-ID = "H3C S6812-48X6C"
(9)   H3C-NAS-Startup-Timestamp = 1609459214
(9) # Executing section authorize from file
/usr/local/etc/raddb/sites-enabled/default
(9)   authorize {
(9)     policy filter_username {
(9)       if (&User-Name) {
(9)       if (&User-Name)  -> TRUE
(9)       if (&User-Name)  {
(9)         if (&User-Name =~ / /) {
(9)         if (&User-Name =~ / /)  -> FALSE
(9)         if (&User-Name =~ /@[^@]*@/ ) {
(9)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
(9)         if (&User-Name =~ /\.\./ ) {
(9)         if (&User-Name =~ /\.\./ )  -> FALSE
(9)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
(9)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   ->
FALSE
(9)         if (&User-Name =~ /\.$/)  {
(9)         if (&User-Name =~ /\.$/)   -> FALSE
(9)         if (&User-Name =~ /@\./)  {
(9)         if (&User-Name =~ /@\./)   -> FALSE
(9)       } # if (&User-Name)  = notfound
(9)     } # policy filter_username = notfound
(9)     [preprocess] = ok
(9)     [chap] = noop
(9)     [mschap] = noop
(9)     [digest] = noop
(9) suffix: Checking for suffix after "@"
(9) suffix: No '@' in User-Name = "testuser", looking up realm NULL
(9) suffix: No such realm "NULL"
(9)     [suffix] = noop
(9) eap: No EAP-Message, not doing EAP
(9)     [eap] = noop
(9)     [files] = noop
(9) sql: EXPAND %{User-Name}
(9) sql:    --> testuser
(9) sql: SQL-User-Name set to 'testuser'
rlm_sql (sql): Reserved connection (8)
(9) sql: EXPAND SELECT id, username, attribute, value, op FROM radcheck
WHERE username = '%{SQL-User-Name}' ORDER BY id
(9) sql:    --> SELECT id, username, attribute, value, op FROM radcheck
WHERE username = 'testuser' ORDER BY id
(9) sql: Executing select query: SELECT id, username, attribute, value, op
FROM radcheck WHERE username = 'testuser' ORDER BY id
(9) sql: User found in radcheck table
(9) sql: Conditional check items matched, merging assignment check items
(9) sql:   Cleartext-Password := "testpass"
(9) sql: EXPAND SELECT id, username, attribute, value, op FROM radreply
WHERE username = '%{SQL-User-Name}' ORDER BY id
(9) sql:    --> SELECT id, username, attribute, value, op FROM radreply
WHERE username = 'testuser' ORDER BY id
(9) sql: Executing select query: SELECT id, username, attribute, value, op
FROM radreply WHERE username = 'testuser' ORDER BY id
(9) sql: EXPAND SELECT groupname FROM radusergroup WHERE username =
'%{SQL-User-Name}' ORDER BY priority
(9) sql:    --> SELECT groupname FROM radusergroup WHERE username =
'testuser' ORDER BY priority
(9) sql: Executing select query: SELECT groupname FROM radusergroup WHERE
username = 'testuser' ORDER BY priority
(9) sql: User not found in any groups
rlm_sql (sql): Released connection (8)
Need more connections to reach 10 spares
rlm_sql (sql): Opening additional connection (14), 1 of 25 pending slots
used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
socket, server version 10.11.6-MariaDB, protocol version 10
(9)     [sql] = ok
(9)     [expiration] = noop
(9)     [logintime] = noop
(9)     [pap] = updated
(9)   } # authorize = updated
(9) Found Auth-Type = PAP
(9) # Executing group from file /usr/local/etc/raddb/sites-enabled/default
(9)   Auth-Type PAP {
(9) pap: Login attempt with password
(9) pap: Comparing with "known good" Cleartext-Password
(9) pap: User authenticated successfully
(9)     [pap] = ok
(9)   } # Auth-Type PAP = ok
(9) # Executing section post-auth from file
/usr/local/etc/raddb/sites-enabled/default
(9)   post-auth {
(9)     if (session-state:User-Name && reply:User-Name && request:User-Name
&& (reply:User-Name == request:User-Name)) {
(9)     if (session-state:User-Name && reply:User-Name && request:User-Name
&& (reply:User-Name == request:User-Name))  -> FALSE
(9)     update {
(9)       No attributes updated for RHS &session-state:
(9)     } # update = noop
(9) sql: EXPAND .query
(9) sql:    --> .query
(9) sql: Using query template 'query'
rlm_sql (sql): Reserved connection (10)
(9) sql: EXPAND %{User-Name}
(9) sql:    --> testuser
(9) sql: SQL-User-Name set to 'testuser'
(9) sql: EXPAND INSERT INTO radpostauth (username, pass, reply, authdate )
VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
'%{reply:Packet-Type}', '%S.%M' )
(9) sql:    --> INSERT INTO radpostauth (username, pass, reply, authdate )
VALUES ( 'testuser', 'testpass', 'Access-Accept', '2023-12-13
17:55:19.697824' )
(9) sql: Executing query: INSERT INTO radpostauth (username, pass, reply,
authdate ) VALUES ( 'testuser', 'testpass', 'Access-Accept', '2023-12-13
17:55:19.697824' )
(9) sql: SQL query returned: success
(9) sql: 1 record(s) updated
rlm_sql (sql): Released connection (10)
(9)     [sql] = ok
(9)     [exec] = noop
(9)     policy remove_reply_message_if_eap {
(9)       if (&reply:EAP-Message && &reply:Reply-Message) {
(9)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
(9)       else {
(9)         [noop] = noop
(9)       } # else = noop
(9)     } # policy remove_reply_message_if_eap = noop
(9)     if (EAP-Key-Name && &reply:EAP-Session-Id) {
(9)     if (EAP-Key-Name && &reply:EAP-Session-Id)  -> FALSE
(9)   } # post-auth = ok
(9) Sent Access-Accept Id 147 from 192.168.1.188:1812 to 192.168.1.1:38272
length 20
(9) Finished request
Waking up in 0.3 seconds.
(8) Cleaning up request packet ID 120 with timestamp +616 due to
cleanup_delay was reached
Waking up in 4.6 seconds.
(9) Cleaning up request packet ID 147 with timestamp +620 due to
cleanup_delay was reached
Ready to process requests

*The following is the switch:*
Test-4F-D-V16-37U-S6812 SSHS/6/SSHS_AUTH_SUCCESS: SSH user testuser from
192.168.1.188 port 60208 passed password authentication.
Test-4F-D-V16-37U-S6812 SSHS/6/SSHS_CONNECT: SSH user testuser (IP:
192.168.1.188) connected to the server successfully.
Test-4F-D-V16-37U-S6812 SSHS/6/SSHS_DISCONNECT: SSH user testuser (IP:
192.168.1.188) disconnected from the server.

*The following is the packet capture information:*
RADIUS Protocol
    Code: Access-Request (1)
    Packet identifier: 0x53 (83)
    Length: 216
    Authenticator: 99ac8a024f1b61591a1bfca82d9e06ac
    [The response to this request is in frame 798]
    Attribute Value Pairs
        AVP: t=User-Name(1) l=10 val=testuser
        AVP: t=NAS-Identifier(32) l=26 val=Test-4F-D-V16-37U-S6812
        AVP: t=Acct-Session-Id(44) l=39
val=0000000106202148490000000108000005546
        AVP: t=User-Password(2) l=18 val=Encrypted
        AVP: t=Calling-Station-Id(31) l=14 val=192.168.1.188
        AVP: t=NAS-Port-Type(61) l=6 val=Virtual(5)
        AVP: t=Vendor-Specific(26) l=30 vnd=H3C(25506)
            Type: 26
            Length: 30
            Vendor ID: H3C (25506)
            VSA: t=NAS-Port-Name(230) l=24 val=M-GigabitEthernet0/0/0
                Type: 230
                Length: 24
                NAS-Port-Name: M-GigabitEthernet0/0/0
        AVP: t=Framed-IP-Address(8) l=6 val=192.168.1.188
            Type: 8
            Length: 6
            Framed-IP-Address: 192.168.1.188
        AVP: t=Service-Type(6) l=6 val=Login(1)
            Type: 6
            Length: 6
            Service-Type: Login (1)
        AVP: t=NAS-IP-Address(4) l=6 val=192.168.1.1
            Type: 4
            Length: 6
            NAS-IP-Address: 192.168.1.1
        AVP: t=Vendor-Specific(26) l=23 vnd=H3C(25506)
            Type: 26
            Length: 23
            Vendor ID: H3C (25506)
            VSA: t=Product-ID(255) l=17 val=H3C S6812-48X6C
                Type: 255
                Length: 17
                Product-ID: H3C S6812-48X6C
        AVP: t=Vendor-Specific(26) l=12 vnd=H3C(25506)
            Type: 26
            Length: 12
            Vendor ID: H3C (25506)
            VSA: t=NAS-Startup-Timestamp(59) l=6 val=1609459214
                Type: 59
                Length: 6
                NAS-Startup-Timestamp: 1609459214

RADIUS Protocol
    Code: Access-Accept (2)
    Packet identifier: 0x53 (83)
    Length: 20
    Authenticator: aecb2072245637d04676171870209a93
    [This is a response to a request in frame 797]
    [Time from request: 0.005399897 seconds]




                                                            Alex

娶你苟命 <qunigouming at gmail.com> 于2023年12月6日周三 11:00写道:

> Hi,everyone!
> *   I'm having trouble with freeradius and don't know if I should ask
> "freeradius-users at lists.freeradius.org
> <freeradius-users at lists.freeradius.org>"? If this has caused any
> inconvenience to anyone, please accept my apology and please ignore this
> email.*
> *   The following is the debugging process tee debugfile I provide for
> freeradius sever to execute radiusd -X 2>&1 | (this includes valid
> authentication and invalid authentication processes, I will put them at the
> end of the email):*
>
>     FreeRADIUS Version 3.0.13
> Copyright (C) 1999-2017 The FreeRADIUS server project and contributors
> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
> PARTICULAR PURPOSE
> You may redistribute copies of FreeRADIUS under the terms of the
> GNU General Public License
> For more information about these matters, see the file named COPYRIGHT
> Starting - reading configuration files ...
> including dictionary file /usr/share/freeradius/dictionary
> including dictionary file /usr/share/freeradius/dictionary.dhcp
> including dictionary file /usr/share/freeradius/dictionary.vqp
> including dictionary file /etc/raddb/dictionary
> including configuration file /etc/raddb/radiusd.conf
> including configuration file /etc/raddb/proxy.conf
> including configuration file /etc/raddb/clients.conf
> including files in directory /etc/raddb/mods-enabled/
> including configuration file /etc/raddb/mods-enabled/always
> including configuration file /etc/raddb/mods-enabled/attr_filter
> including configuration file /etc/raddb/mods-enabled/cache_eap
> including configuration file /etc/raddb/mods-enabled/chap
> including configuration file /etc/raddb/mods-enabled/date
> including configuration file /etc/raddb/mods-enabled/detail
> including configuration file /etc/raddb/mods-enabled/detail.log
> including configuration file /etc/raddb/mods-enabled/dhcp
> including configuration file /etc/raddb/mods-enabled/digest
> including configuration file /etc/raddb/mods-enabled/dynamic_clients
> including configuration file /etc/raddb/mods-enabled/eap
> including configuration file /etc/raddb/mods-enabled/echo
> including configuration file /etc/raddb/mods-enabled/exec
> including configuration file /etc/raddb/mods-enabled/expiration
> including configuration file /etc/raddb/mods-enabled/expr
> including configuration file /etc/raddb/mods-enabled/files
> including configuration file /etc/raddb/mods-enabled/linelog
> including configuration file /etc/raddb/mods-enabled/logintime
> including configuration file /etc/raddb/mods-enabled/mschap
> including configuration file /etc/raddb/mods-enabled/ntlm_auth
> including configuration file /etc/raddb/mods-enabled/pap
> including configuration file /etc/raddb/mods-enabled/passwd
> including configuration file /etc/raddb/mods-enabled/preprocess
> including configuration file /etc/raddb/mods-enabled/radutmp
> including configuration file /etc/raddb/mods-enabled/realm
> including configuration file /etc/raddb/mods-enabled/replicate
> including configuration file /etc/raddb/mods-enabled/soh
> including configuration file /etc/raddb/mods-enabled/sradutmp
> including configuration file /etc/raddb/mods-enabled/unix
> including configuration file /etc/raddb/mods-enabled/unpack
> including configuration file /etc/raddb/mods-enabled/utf8
> including configuration file /etc/raddb/mods-enabled/sql
> including configuration file
> /etc/raddb/mods-config/sql/main/mysql/queries.conf
> including files in directory /etc/raddb/policy.d/
> including configuration file /etc/raddb/policy.d/accounting
> including configuration file /etc/raddb/policy.d/canonicalization
> including configuration file /etc/raddb/policy.d/control
> including configuration file /etc/raddb/policy.d/cui
> including configuration file /etc/raddb/policy.d/debug
> including configuration file /etc/raddb/policy.d/dhcp
> including configuration file /etc/raddb/policy.d/eap
> including configuration file /etc/raddb/policy.d/filter
> including configuration file /etc/raddb/policy.d/operator-name
> including files in directory /etc/raddb/sites-enabled/
> including configuration file /etc/raddb/sites-enabled/default
> including configuration file /etc/raddb/sites-enabled/inner-tunnel
> main {
>  security {
>         user = "radiusd"
>         group = "radiusd"
>         allow_core_dumps = no
>  }
>         name = "radiusd"
>         prefix = "/usr"
>         localstatedir = "/var"
>         logdir = "/var/log/radius"
>         run_dir = "/var/run/radiusd"
> }
> main {
>         name = "radiusd"
>         prefix = "/usr"
>         localstatedir = "/var"
>         sbindir = "/usr/sbin"
>         logdir = "/var/log/radius"
>         run_dir = "/var/run/radiusd"
>         libdir = "/usr/lib64/freeradius"
>         radacctdir = "/var/log/radius/radacct"
>         hostname_lookups = no
>         max_request_time = 30
>         cleanup_delay = 5
>         max_requests = 16384
>         pidfile = "/var/run/radiusd/radiusd.pid"
>         checkrad = "/usr/sbin/checkrad"
>         debug_level = 0
>         proxy_requests = yes
>  log {
>         stripped_names = no
>         auth = no
>         auth_badpass = no
>         auth_goodpass = no
>         colourise = yes
>         msg_denied = "You are already logged in - access denied"
>  }
>  resources {
>  }
>  security {
>         max_attributes = 200
>         reject_delay = 1.000000
>         status_server = yes
>  }
> }
> radiusd: #### Loading Realms and Home Servers ####
>  proxy server {
>         retry_delay = 5
>         retry_count = 3
>         default_fallback = no
>         dead_time = 120
>         wake_all_if_all_dead = no
>  }
>  home_server localhost {
>         ipaddr = 127.0.0.1
>         port = 1812
>         type = "auth"
>         secret = <<< secret >>>
>         response_window = 20.000000
>         response_timeouts = 1
>         max_outstanding = 65536
>         zombie_period = 40
>         status_check = "status-server"
>         ping_interval = 30
>         check_interval = 30
>         check_timeout = 4
>         num_answers_to_alive = 3
>         revive_interval = 120
>   limit {
>         max_connections = 16
>         max_requests = 0
>         lifetime = 0
>         idle_timeout = 0
>   }
>   coa {
>         irt = 2
>         mrt = 16
>         mrc = 5
>         mrd = 30
>   }
>  }
>  home_server_pool my_auth_failover {
>         type = fail-over
>         home_server = localhost
>  }
>  realm example.com {
>         auth_pool = my_auth_failover
>  }
>  realm LOCAL {
>  }
> radiusd: #### Loading Clients ####
>  client all_client {
>         ipaddr = 0.0.0.0/0
>         require_message_authenticator = no
>         secret = <<< secret >>>
>   limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>   }
>  }
> Debugger not attached
>  # Creating Auth-Type = mschap
>  # Creating Auth-Type = digest
>  # Creating Auth-Type = eap
>  # Creating Auth-Type = PAP
>  # Creating Auth-Type = CHAP
>  # Creating Auth-Type = MS-CHAP
> radiusd: #### Instantiating modules ####
>  modules {
>   # Loaded module rlm_always
>   # Loading module "reject" from file /etc/raddb/mods-enabled/always
>   always reject {
>         rcode = "reject"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "fail" from file /etc/raddb/mods-enabled/always
>   always fail {
>         rcode = "fail"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "ok" from file /etc/raddb/mods-enabled/always
>   always ok {
>         rcode = "ok"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "handled" from file /etc/raddb/mods-enabled/always
>   always handled {
>         rcode = "handled"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "invalid" from file /etc/raddb/mods-enabled/always
>   always invalid {
>         rcode = "invalid"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "userlock" from file /etc/raddb/mods-enabled/always
>   always userlock {
>         rcode = "userlock"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "notfound" from file /etc/raddb/mods-enabled/always
>   always notfound {
>         rcode = "notfound"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "noop" from file /etc/raddb/mods-enabled/always
>   always noop {
>         rcode = "noop"
>         simulcount = 0
>         mpp = no
>   }
>   # Loading module "updated" from file /etc/raddb/mods-enabled/always
>   always updated {
>         rcode = "updated"
>         simulcount = 0
>         mpp = no
>   }
>   # Loaded module rlm_attr_filter
>   # Loading module "attr_filter.post-proxy" from file
> /etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.post-proxy {
>         filename = "/etc/raddb/mods-config/attr_filter/post-proxy"
>         key = "%{Realm}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.pre-proxy" from file
> /etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.pre-proxy {
>         filename = "/etc/raddb/mods-config/attr_filter/pre-proxy"
>         key = "%{Realm}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.access_reject" from file
> /etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.access_reject {
>         filename = "/etc/raddb/mods-config/attr_filter/access_reject"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.access_challenge" from file
> /etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.access_challenge {
>         filename = "/etc/raddb/mods-config/attr_filter/access_challenge"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loading module "attr_filter.accounting_response" from file
> /etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.accounting_response {
>         filename = "/etc/raddb/mods-config/attr_filter/accounting_response"
>         key = "%{User-Name}"
>         relaxed = no
>   }
>   # Loaded module rlm_cache
>   # Loading module "cache_eap" from file /etc/raddb/mods-enabled/cache_eap
>   cache cache_eap {
>         driver = "rlm_cache_rbtree"
>         key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
>         ttl = 15
>         max_entries = 0
>         epoch = 0
>         add_stats = no
>   }
>   # Loaded module rlm_chap
>   # Loading module "chap" from file /etc/raddb/mods-enabled/chap
>   # Loaded module rlm_date
>   # Loading module "date" from file /etc/raddb/mods-enabled/date
>   date {
>         format = "%b %e %Y %H:%M:%S %Z"
>   }
>   # Loaded module rlm_detail
>   # Loading module "detail" from file /etc/raddb/mods-enabled/detail
>   detail {
>         filename =
> "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "auth_log" from file /etc/raddb/mods-enabled/detail.log
>   detail auth_log {
>         filename =
> "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "reply_log" from file /etc/raddb/mods-enabled/detail.log
>   detail reply_log {
>         filename =
> "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "pre_proxy_log" from file
> /etc/raddb/mods-enabled/detail.log
>   detail pre_proxy_log {
>         filename =
> "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loading module "post_proxy_log" from file
> /etc/raddb/mods-enabled/detail.log
>   detail post_proxy_log {
>         filename =
> "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
>         header = "%t"
>         permissions = 384
>         locking = no
>         escape_filenames = no
>         log_packet_header = no
>   }
>   # Loaded module rlm_dhcp
>   # Loading module "dhcp" from file /etc/raddb/mods-enabled/dhcp
>   # Loaded module rlm_digest
>   # Loading module "digest" from file /etc/raddb/mods-enabled/digest
>   # Loaded module rlm_dynamic_clients
>   # Loading module "dynamic_clients" from file
> /etc/raddb/mods-enabled/dynamic_clients
>   # Loaded module rlm_eap
>   # Loading module "eap" from file /etc/raddb/mods-enabled/eap
>   eap {
>         default_eap_type = "md5"
>         timer_expire = 60
>         ignore_unknown_eap_types = no
>         cisco_accounting_username_bug = no
>         max_sessions = 16384
>   }
>   # Loaded module rlm_exec
>   # Loading module "echo" from file /etc/raddb/mods-enabled/echo
>   exec echo {
>         wait = yes
>         program = "/bin/echo %{User-Name}"
>         input_pairs = "request"
>         output_pairs = "reply"
>         shell_escape = yes
>   }
>   # Loading module "exec" from file /etc/raddb/mods-enabled/exec
>   exec {
>         wait = no
>         input_pairs = "request"
>         shell_escape = yes
>         timeout = 10
>   }
>   # Loaded module rlm_expiration
>   # Loading module "expiration" from file
> /etc/raddb/mods-enabled/expiration
>   # Loaded module rlm_expr
>   # Loading module "expr" from file /etc/raddb/mods-enabled/expr
>   expr {
>         safe_characters =
> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
> /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
>   }
>   # Loaded module rlm_files
>   # Loading module "files" from file /etc/raddb/mods-enabled/files
>   files {
>         filename = "/etc/raddb/mods-config/files/authorize"
>         acctusersfile = "/etc/raddb/mods-config/files/accounting"
>         preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy"
>   }
>   # Loaded module rlm_linelog
>   # Loading module "linelog" from file /etc/raddb/mods-enabled/linelog
>   linelog {
>         filename = "/var/log/radius/linelog"
>         escape_filenames = no
>         syslog_severity = "info"
>         permissions = 384
>         format = "This is a log message for %{User-Name}"
>         reference = "messages.%{%{reply:Packet-Type}:-default}"
>   }
>   # Loading module "log_accounting" from file
> /etc/raddb/mods-enabled/linelog
>   linelog log_accounting {
>         filename = "/var/log/radius/linelog-accounting"
>         escape_filenames = no
>         syslog_severity = "info"
>         permissions = 384
>         format = ""
>         reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
>   }
>   # Loaded module rlm_logintime
>   # Loading module "logintime" from file /etc/raddb/mods-enabled/logintime
>   logintime {
>         minimum_timeout = 60
>   }
>   # Loaded module rlm_mschap
>   # Loading module "mschap" from file /etc/raddb/mods-enabled/mschap
>   mschap {
>         use_mppe = yes
>         require_encryption = no
>         require_strong = no
>         with_ntdomain_hack = yes
>    passchange {
>    }
>         allow_retry = yes
>         winbind_retry_with_normalised_username = no
>   }
>   # Loading module "ntlm_auth" from file /etc/raddb/mods-enabled/ntlm_auth
>   exec ntlm_auth {
>         wait = yes
>         program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN
> --username=%{mschap:User-Name} --password=%{User-Password}"
>         shell_escape = yes
>   }
>   # Loaded module rlm_pap
>   # Loading module "pap" from file /etc/raddb/mods-enabled/pap
>   pap {
>         normalise = yes
>   }
>   # Loaded module rlm_passwd
>   # Loading module "etc_passwd" from file /etc/raddb/mods-enabled/passwd
>   passwd etc_passwd {
>         filename = "/etc/passwd"
>         format = "*User-Name:Crypt-Password:"
>         delimiter = ":"
>         ignore_nislike = no
>         ignore_empty = yes
>         allow_multiple_keys = no
>         hash_size = 100
>   }
>   # Loaded module rlm_preprocess
>   # Loading module "preprocess" from file
> /etc/raddb/mods-enabled/preprocess
>   preprocess {
>         huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups"
>         hints = "/etc/raddb/mods-config/preprocess/hints"
>         with_ascend_hack = no
>         ascend_channels_per_line = 23
>         with_ntdomain_hack = no
>         with_specialix_jetstream_hack = no
>         with_cisco_vsa_hack = no
>         with_alvarion_vsa_hack = no
>   }
>   # Loaded module rlm_radutmp
>   # Loading module "radutmp" from file /etc/raddb/mods-enabled/radutmp
>   radutmp {
>         filename = "/var/log/radius/radutmp"
>         username = "%{User-Name}"
>         case_sensitive = yes
>         check_with_nas = yes
>         permissions = 384
>         caller_id = yes
>   }
>   # Loaded module rlm_realm
>   # Loading module "IPASS" from file /etc/raddb/mods-enabled/realm
>   realm IPASS {
>         format = "prefix"
>         delimiter = "/"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "suffix" from file /etc/raddb/mods-enabled/realm
>   realm suffix {
>         format = "suffix"
>         delimiter = "@"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "realmpercent" from file /etc/raddb/mods-enabled/realm
>   realm realmpercent {
>         format = "suffix"
>         delimiter = "%"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loading module "ntdomain" from file /etc/raddb/mods-enabled/realm
>   realm ntdomain {
>         format = "prefix"
>         delimiter = "\\"
>         ignore_default = no
>         ignore_null = no
>   }
>   # Loaded module rlm_replicate
>   # Loading module "replicate" from file /etc/raddb/mods-enabled/replicate
>   # Loaded module rlm_soh
>   # Loading module "soh" from file /etc/raddb/mods-enabled/soh
>   soh {
>         dhcp = yes
>   }
>   # Loading module "sradutmp" from file /etc/raddb/mods-enabled/sradutmp
>   radutmp sradutmp {
>         filename = "/var/log/radius/sradutmp"
>         username = "%{User-Name}"
>         case_sensitive = yes
>         check_with_nas = yes
>         permissions = 420
>         caller_id = no
>   }
>   # Loaded module rlm_unix
>   # Loading module "unix" from file /etc/raddb/mods-enabled/unix
>   unix {
>         radwtmp = "/var/log/radius/radwtmp"
>   }
> Creating attribute Unix-Group
>   # Loaded module rlm_unpack
>   # Loading module "unpack" from file /etc/raddb/mods-enabled/unpack
>   # Loaded module rlm_utf8
>   # Loading module "utf8" from file /etc/raddb/mods-enabled/utf8
>   # Loaded module rlm_sql
>   # Loading module "sql" from file /etc/raddb/mods-enabled/sql
>   sql {
>         driver = "rlm_sql_mysql"
>         server = "localhost"
>         port = 3306
>         login = "dbuser"
>         password = <<< secret >>>
>         radius_db = "radiusdb"
>         read_groups = yes
>         read_profiles = yes
>         read_clients = no
>         delete_stale_sessions = yes
>         sql_user_name = "%{User-Name}"
>         default_user_profile = ""
>         client_query = "SELECT id, nasname, shortname, type, secret,
> server FROM nas"
>         authorize_check_query = "SELECT id, username, attribute, value, op
> FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
>         authorize_reply_query = "SELECT id, username, attribute, value, op
> FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
>         authorize_group_check_query = "SELECT id, groupname, attribute,
> Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY i
> d"
>         authorize_group_reply_query = "SELECT id, groupname, attribute,
> value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY i
> d"
>         group_membership_query = "SELECT groupname FROM radusergroup WHERE
> username = '%{SQL-User-Name}' ORDER BY priority"
>         simul_count_query = "SELECT COUNT(*) FROM radacct WHERE username =
> '%{SQL-User-Name}' AND acctstoptime IS NULL"
>         simul_verify_query = "SELECT radacctid, acctsessionid, username,
> nasipaddress, nasportid, framedipaddress, callingstationid, framedproto
> col FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS
> NULL"
>         safe_characters =
> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
>    accounting {
>         reference = "%{tolower:type.%{Acct-Status-Type}.query}"
>     type {
>      accounting-on {
>         query = "UPDATE radacct SET acctstoptime =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime   =
> '%{integer:Event-Timestamp}' -
>  UNIX_TIMESTAMP(acctstarttime), acctterminatecause =
> '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND
> nasipaddress   = '%
> {NAS-IP-Address}' AND acctstarttime <=
> FROM_UNIXTIME(%{integer:Event-Timestamp})"
>      }
>      accounting-off {
>         query = "UPDATE radacct SET acctstoptime =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime   =
> '%{integer:Event-Timestamp}' -
>  UNIX_TIMESTAMP(acctstarttime), acctterminatecause =
> '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND
> nasipaddress   = '%
> {NAS-IP-Address}' AND acctstarttime <=
> FROM_UNIXTIME(%{integer:Event-Timestamp})"
>      }
>      start {
>         query = "INSERT INTO radacct (acctsessionid,
>  acctuniqueid,           username, realm,
>  nasipaddress,
>         nasportid, nasporttype,         acctstarttime,
>  acctupdatetime, acctstoptime,           acctsessiontime,
>  acctauthentic, c
> onnectinfo_start,       connectinfo_stop,       acctinputoctets,
> acctoutputoctets,      calledstationid,        callingstationid,
> acctterminatec
> ause,   servicetype,            framedprotocol, framedipaddress) VALUES
> ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}',
> '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}',
> '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp}),
> FROM_UNIXTIME(
> %{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}',
> '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}',
> '%{Calling-Station-Id}', '
> ', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}')"
>      }
>      interim-update {
>         query = "UPDATE radacct SET acctupdatetime  =
> (@acctupdatetime_old:=acctupdatetime), acctupdatetime  =
> FROM_UNIXTIME(%{integer:Event-Tim
> estamp}), acctinterval    = %{integer:Event-Timestamp} -
> UNIX_TIMESTAMP(@acctupdatetime_old), framedipaddress =
> '%{Framed-IP-Address}', acctsess
> iontime = %{%{Acct-Session-Time}:-NULL}, acctinputoctets =
> '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}',
> acctoutputoctet
> s = '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}'
> WHERE AcctUniqueId = '%{Acct-Unique-Session-Id}'"
>      }
>      stop {
>         query = "UPDATE radacct SET acctstoptime        =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime    =
> %{%{Acct-Session-Time}
> :-NULL}, acctinputoctets        = '%{%{Acct-Input-Gigawords}:-0}' << 32 |
> '%{%{Acct-Input-Octets}:-0}', acctoutputoctets = '%{%{Acct-Output-Giga
> words}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', acctterminatecause =
> '%{Acct-Terminate-Cause}', connectinfo_stop = '%{Connect-Info}' WHERE Ac
> ctUniqueId = '%{Acct-Unique-Session-Id}'"
>      }
>     }
>    }
>    post-auth {
>         reference = ".query"
>         query = "INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
>  '%{reply:Packet-Type}', '%S')"
>    }
>   }
> rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and
> linked
> Creating attribute SQL-Group
>   instantiate {
>   }
>   # Instantiating module "reject" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "fail" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "ok" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "handled" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "invalid" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "userlock" from file
> /etc/raddb/mods-enabled/always
>   # Instantiating module "notfound" from file
> /etc/raddb/mods-enabled/always
>   # Instantiating module "noop" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "updated" from file /etc/raddb/mods-enabled/always
>   # Instantiating module "attr_filter.post-proxy" from file
> /etc/raddb/mods-enabled/attr_filter
> reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy
>   # Instantiating module "attr_filter.pre-proxy" from file
> /etc/raddb/mods-enabled/attr_filter
> reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy
>   # Instantiating module "attr_filter.access_reject" from file
> /etc/raddb/mods-enabled/attr_filter
> reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject
> [/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item
> "FreeRADIUS-Response-Delay"    found in filter list for realm "DEFAULT".
> [/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item
> "FreeRADIUS-Response-Delay-USec"       found in filter list for realm
> "DEFAULT"
> .
>   # Instantiating module "attr_filter.access_challenge" from file
> /etc/raddb/mods-enabled/attr_filter
> reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge
>   # Instantiating module "attr_filter.accounting_response" from file
> /etc/raddb/mods-enabled/attr_filter
> reading pairlist file
> /etc/raddb/mods-config/attr_filter/accounting_response
>   # Instantiating module "cache_eap" from file
> /etc/raddb/mods-enabled/cache_eap
> rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree)
> loaded and linked
>   # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail
>   # Instantiating module "auth_log" from file
> /etc/raddb/mods-enabled/detail.log
> rlm_detail (auth_log): 'User-Password' suppressed, will not appear in
> detail output
>   # Instantiating module "reply_log" from file
> /etc/raddb/mods-enabled/detail.log
>   # Instantiating module "pre_proxy_log" from file
> /etc/raddb/mods-enabled/detail.log
>   # Instantiating module "post_proxy_log" from file
> /etc/raddb/mods-enabled/detail.log
>   # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap
>    # Linked to sub-module rlm_eap_md5
>    # Linked to sub-module rlm_eap_leap
>    # Linked to sub-module rlm_eap_gtc
>    gtc {
>         challenge = "Password: "
>         auth_type = "PAP"
>    }
>    # Linked to sub-module rlm_eap_tls
>    tls {
>         tls = "tls-common"
>    }
>    tls-config tls-common {
>         verify_depth = 0
>         ca_path = "/etc/raddb/certs"
>         pem_file_type = yes
>         private_key_file = "/etc/raddb/certs/server.pem"
>         certificate_file = "/etc/raddb/certs/server.pem"
>         ca_file = "/etc/raddb/certs/ca.pem"
>         private_key_password = <<< secret >>>
>         dh_file = "/etc/raddb/certs/dh"
>         fragment_size = 1024
>         include_length = yes
>         auto_chain = yes
>         check_crl = no
>         check_all_crl = no
>         cipher_list = "DEFAULT"
>         cipher_server_preference = no
>         ecdh_curve = "prime256v1"
>     cache {
>         enable = no
>         lifetime = 24
>         max_entries = 255
>     }
>     verify {
>         skip_if_ocsp_ok = no
>     }
>     ocsp {
>         enable = no
>         override_cert_url = yes
>         url = "http://127.0.0.1/ocsp/"
>         use_nonce = yes
>         timeout = 0
>         softfail = no
>     }
>    }
>    # Linked to sub-module rlm_eap_ttls
>    ttls {
>         tls = "tls-common"
>         default_eap_type = "md5"
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         virtual_server = "inner-tunnel"
>         include_length = yes
>         require_client_cert = no
>    }
> tls: Using cached TLS configuration from previous invocation
>    # Linked to sub-module rlm_eap_peap
>    peap {
>         tls = "tls-common"
>         default_eap_type = "mschapv2"
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         proxy_tunneled_request_as_eap = yes
>         virtual_server = "inner-tunnel"
>         soh = no
>         require_client_cert = no
>    }
> tls: Using cached TLS configuration from previous invocation
>    # Linked to sub-module rlm_eap_mschapv2
>    mschapv2 {
>         with_ntdomain_hack = no
>         send_error = no
>    }
>   # Instantiating module "expiration" from file
> /etc/raddb/mods-enabled/expiration
>   # Instantiating module "files" from file /etc/raddb/mods-enabled/files
> reading pairlist file /etc/raddb/mods-config/files/authorize
> reading pairlist file /etc/raddb/mods-config/files/accounting
> reading pairlist file /etc/raddb/mods-config/files/pre-proxy
>   # Instantiating module "linelog" from file
> /etc/raddb/mods-enabled/linelog
>   # Instantiating module "log_accounting" from file
> /etc/raddb/mods-enabled/linelog
>   # Instantiating module "logintime" from file
> /etc/raddb/mods-enabled/logintime
>   # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap
> rlm_mschap (mschap): using internal authentication
>   # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap
>   # Instantiating module "etc_passwd" from file
> /etc/raddb/mods-enabled/passwd
> rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
>   # Instantiating module "preprocess" from file
> /etc/raddb/mods-enabled/preprocess
> reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups
> reading pairlist file /etc/raddb/mods-config/preprocess/hints
>   # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm
>   # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm
>   # Instantiating module "realmpercent" from file
> /etc/raddb/mods-enabled/realm
>   # Instantiating module "ntdomain" from file /etc/raddb/mods-enabled/realm
>   # Instantiating module "sql" from file /etc/raddb/mods-enabled/sql
> rlm_sql_mysql: libmysql version: 10.1.48-MariaDB
>    mysql {
>     tls {
>     }
>         warnings = "auto"
>    }
> rlm_sql (sql): Attempting to connect to database "radiusdb"
> rlm_sql (sql): Initialising connection pool
>    pool {
>         start = 5
>         min = 3
>         max = 32
>         spare = 10
>         uses = 0
>         lifetime = 0
>         cleanup_interval = 30
>         idle_timeout = 60
>         retry_delay = 30
>         spread = no
>    }
> rlm_sql (sql): Opening additional connection (0), 1 of 32 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
> rlm_sql (sql): Opening additional connection (1), 1 of 31 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
> rlm_sql (sql): Opening additional connection (2), 1 of 30 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
> rlm_sql (sql): Opening additional connection (3), 1 of 29 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
> rlm_sql (sql): Opening additional connection (4), 1 of 28 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
>  } # modules
> radiusd: #### Loading Virtual Servers ####
> server { # from file /etc/raddb/radiusd.conf
> } # server
> server default { # from file /etc/raddb/sites-enabled/default
>  # Loading authenticate {...}
>  # Loading authorize {...}
> Ignoring "ldap" (see raddb/mods-available/README.rst)
>  # Loading preacct {...}
>  # Loading accounting {...}
>  # Loading post-proxy {...}
>  # Loading post-auth {...}
> } # server default
> server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel
>  # Loading authenticate {...}
>  # Loading authorize {...}
>  # Loading session {...}
>  # Loading post-proxy {...}
>  # Loading post-auth {...}
>  # Skipping contents of 'if' as it is always 'false' --
> /etc/raddb/sites-enabled/inner-tunnel:330
> } # server inner-tunnel
> radiusd: #### Opening IP addresses and Ports ####
> listen {
>         type = "auth"
>         ipaddr = *
>         port = 0
>    limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>    }
> }
> listen {
>         type = "acct"
>         ipaddr = *
>         port = 0
>    limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>    }
> }
> listen {
>         type = "auth"
>         ipv6addr = ::
>         port = 0
>    limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>    }
> }
> listen {
>         type = "acct"
>         ipv6addr = ::
>         port = 0
>    limit {
>         max_connections = 16
>         lifetime = 0
>         idle_timeout = 30
>    }
> }
> listen {
>         type = "auth"
>         ipaddr = 127.0.0.1
>         port = 18120
> }
> Listening on auth address * port 1812 bound to server default
> Listening on acct address * port 1813 bound to server default
> Listening on auth address :: port 1812 bound to server default
> Listening on acct address :: port 1813 bound to server default
> Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
> Listening on proxy address * port 34346
> Listening on proxy address :: port 45544
> Ready to process requests
>
>
> *The following will be the debugging information of the certification
> process of the switch:*
>
> (0) Received Access-Request Id 228 from 192.168.1.243:38272 to
> 192.168.2.118:1812 length 215
> (0)   User-Name = "netnoc"
> (0)   NAS-Identifier = "4F-37U-S6812"
> (0)   Acct-Session-Id = "0000000106121519040000000108000026168"
> (0)   User-Password = "123456"
> (0)   Calling-Station-Id = "192.168.2.1"
> (0)   NAS-Port-Type = Virtual
> (0)   Attr-26.25506.230 = 0x4d2d4769676162697445746865726e6574302f302f30
> (0)   Framed-IP-Address = 192.168.2.1
> (0)   Service-Type = Login-User
> (0)   NAS-IP-Address = 192.168.1.243
> (0)   H3C-Product-ID = "H3C S6812-48X6C"
> (0)   H3C-NAS-Startup-Timestamp = 1609459214
> (0) # Executing section authorize from file
> /etc/raddb/sites-enabled/default
> (0)   authorize {
> (0)     policy filter_username {
> (0)       if (&User-Name) {
> (0)       if (&User-Name)  -> TRUE
> (0)       if (&User-Name)  {
> (0)         if (&User-Name =~ / /) {
> (0)         if (&User-Name =~ / /)  -> FALSE
> (0)         if (&User-Name =~ /@[^@]*@/ ) {
> (0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
> (0)         if (&User-Name =~ /\.\./ ) {
> (0)         if (&User-Name =~ /\.\./ )  -> FALSE
> (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
> (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
> -> FALSE
> (0)         if (&User-Name =~ /\.$/)  {
> (0)         if (&User-Name =~ /\.$/)   -> FALSE
> (0)         if (&User-Name =~ /@\./)  {
> (0)         if (&User-Name =~ /@\./)   -> FALSE
> (0)       } # if (&User-Name)  = notfound
> (0)     } # policy filter_username = notfound
> (0)     [preprocess] = ok
> (0)     [chap] = noop
> (0)     [mschap] = noop
> (0)     [digest] = noop
> (0) suffix: Checking for suffix after "@"
> (0) suffix: No '@' in User-Name = "netnoc", looking up realm NULL
> (0) suffix: No such realm "NULL"
> (0)     [suffix] = noop
> (0) eap: No EAP-Message, not doing EAP
> (0)     [eap] = noop
> (0)     [files] = noop
> (0) sql: EXPAND %{User-Name}
> (0) sql:    --> netnoc
> (0) sql: SQL-User-Name set to 'netnoc'
> rlm_sql (sql): Reserved connection (0)
> (0) sql: EXPAND SELECT id, username, attribute, value, op FROM radcheck
> WHERE username = '%{SQL-User-Name}' ORDER BY id
> (0) sql:    --> SELECT id, username, attribute, value, op FROM radcheck
> WHERE username = 'netnoc' ORDER BY id
> (0) sql: Executing select query: SELECT id, username, attribute, value, op
> FROM radcheck WHERE username = 'netnoc' ORDER BY id
> (0) sql: User found in radcheck table
> (0) sql: Conditional check items matched, merging assignment check items
> (0) sql:   MD5-Password :=
> 0x6466346638383237653136313136306566383961303439343861363962323139
> (0) sql: EXPAND SELECT id, username, attribute, value, op FROM radreply
> WHERE username = '%{SQL-User-Name}' ORDER BY id
> (0) sql:    --> SELECT id, username, attribute, value, op FROM radreply
> WHERE username = 'netnoc' ORDER BY id
> (0) sql: Executing select query: SELECT id, username, attribute, value, op
> FROM radreply WHERE username = 'netnoc' ORDER BY id
> (0) sql: EXPAND SELECT groupname FROM radusergroup WHERE username =
> '%{SQL-User-Name}' ORDER BY priority
> (0) sql:    --> SELECT groupname FROM radusergroup WHERE username =
> 'netnoc' ORDER BY priority
> (0) sql: Executing select query: SELECT groupname FROM radusergroup WHERE
> username = 'netnoc' ORDER BY priority
> (0) sql: User not found in any groups
> rlm_sql (sql): Released connection (0)
> Need 5 more connections to reach 10 spares
> rlm_sql (sql): Opening additional connection (5), 1 of 27 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
> (0)     [sql] = ok
> (0)     [expiration] = noop
> (0)     [logintime] = noop
> (0) pap: Normalizing MD5-Password from hex encoding, 32 bytes -> 16 bytes
> (0)     [pap] = updated
> (0)   } # authorize = updated
> (0) Found Auth-Type = PAP
> (0) # Executing group from file /etc/raddb/sites-enabled/default
> (0)   Auth-Type PAP {
> (0) pap: Login attempt with password
> (0) pap: Comparing with "known-good" MD5-Password
> (0) pap: User authenticated successfully
> (0)     [pap] = ok
> (0)   } # Auth-Type PAP = ok
> (0) # Executing section post-auth from file
> /etc/raddb/sites-enabled/default
> (0)   post-auth {
> (0)     update {
> (0)       No attributes updated
> (0)     } # update = noop
> (0) sql: EXPAND .query
> (0) sql:    --> .query
> (0) sql: Using query template 'query'
> rlm_sql (sql): Reserved connection (1)
> (0) sql: EXPAND %{User-Name}
> (0) sql:    --> netnoc
> (0) sql: SQL-User-Name set to 'netnoc'
> (0) sql: EXPAND INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
> '%{reply:Packet-Type}', '%S')
> (0) sql:    --> INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( 'netnoc', '123456', 'Access-Accept', '2023-12-05 10:
> 07:15.051206')
> (0) sql: Executing query: INSERT INTO radpostauth (username, pass, reply,
> authdate) VALUES ( 'netnoc', '123456', 'Access-Accept', '2023
> -12-05 10:07:15.051206')
> (0) sql: SQL query returned: success
> (0) sql: 1 record(s) updated
> rlm_sql (sql): Released connection (1)
> (0)     [sql] = ok
> (0)     [exec] = noop
> (0)     policy remove_reply_message_if_eap {
> (0)       if (&reply:EAP-Message && &reply:Reply-Message) {
> (0)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
> (0)       else {
> (0)         [noop] = noop
> (0)       } # else = noop
> (0)     } # policy remove_reply_message_if_eap = noop
> (0)   } # post-auth = ok
> (0) Sent Access-Accept Id 228 from 192.168.2.118:1812 to
> 192.168.1.243:38272 length 0
> (0) Finished request
> Waking up in 4.9 seconds.
> (0) Cleaning up request packet ID 228 with timestamp +5
> Ready to process requests
> (1) Received Access-Request Id 175 from 192.168.1.244:63378 to
> 192.168.2.118:1812 length 170
> (1)   User-Name = "netnoc"
> (1)   User-Password = "123456"
> (1)   Service-Type = Administrative-User
> (1)   Framed-Protocol = X.75-Synchronous
> (1)   Framed-IP-Address = 192.168.2.1
> (1)   NAS-Identifier = "4F-CE6857-ASW244"
> (1)   NAS-Port-Type = Virtual
> (1)   NAS-IP-Address = 192.168.1.244
> (1)   Huawei-Startup-Stamp = 1701770673
> (1)   Huawei-Version = "Huawei VRP Software Version"
> (1)   Huawei-Product-ID = "VRP"
> (1)   Message-Authenticator = 0x83f55529c0423e10fb1e141aa00a5fff
> (1) # Executing section authorize from file
> /etc/raddb/sites-enabled/default
> (1)   authorize {
> (1)     policy filter_username {
> (1)       if (&User-Name) {
> (1)       if (&User-Name)  -> TRUE
> (1)       if (&User-Name)  {
> (1)         if (&User-Name =~ / /) {
> (1)         if (&User-Name =~ / /)  -> FALSE
> (1)         if (&User-Name =~ /@[^@]*@/ ) {
> (1)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
> (1)         if (&User-Name =~ /\.\./ ) {
> (1)         if (&User-Name =~ /\.\./ )  -> FALSE
> (1)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
> (1)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
> -> FALSE
> (1)         if (&User-Name =~ /\.$/)  {
> (1)         if (&User-Name =~ /\.$/)   -> FALSE
> (1)         if (&User-Name =~ /@\./)  {
> (1)         if (&User-Name =~ /@\./)   -> FALSE
> (1)       } # if (&User-Name)  = notfound
> (1)     } # policy filter_username = notfound
> (1)     [preprocess] = ok
> (1)     [chap] = noop
> (1)     [mschap] = noop
> (1)     [digest] = noop
> (1) suffix: Checking for suffix after "@"
> (1) suffix: No '@' in User-Name = "netnoc", looking up realm NULL
> (1) suffix: No such realm "NULL"
> (1)     [suffix] = noop
> (1) eap: No EAP-Message, not doing EAP
> (1)     [eap] = noop
> (1)     [files] = noop
> (1) sql: EXPAND %{User-Name}
> (1) sql:    --> netnoc
> (1) sql: SQL-User-Name set to 'netnoc'
> rlm_sql (sql): Reserved connection (2)
> (1) sql: EXPAND SELECT id, username, attribute, value, op FROM radcheck
> WHERE username = '%{SQL-User-Name}' ORDER BY id
> (1) sql:    --> SELECT id, username, attribute, value, op FROM radcheck
> WHERE username = 'netnoc' ORDER BY id
> (1) sql: Executing select query: SELECT id, username, attribute, value, op
> FROM radcheck WHERE username = 'netnoc' ORDER BY id
> (1) sql: User found in radcheck table
> (1) sql: Conditional check items matched, merging assignment check items
> (1) sql:   MD5-Password :=
> 0x6466346638383237653136313136306566383961303439343861363962323139
> (1) sql: EXPAND SELECT id, username, attribute, value, op FROM radreply
> WHERE username = '%{SQL-User-Name}' ORDER BY id
> (1) sql:    --> SELECT id, username, attribute, value, op FROM radreply
> WHERE username = 'netnoc' ORDER BY id
> (1) sql: Executing select query: SELECT id, username, attribute, value, op
> FROM radreply WHERE username = 'netnoc' ORDER BY id
> (1) sql: EXPAND SELECT groupname FROM radusergroup WHERE username =
> '%{SQL-User-Name}' ORDER BY priority
> (1) sql:    --> SELECT groupname FROM radusergroup WHERE username =
> 'netnoc' ORDER BY priority
> (1) sql: Executing select query: SELECT groupname FROM radusergroup WHERE
> username = 'netnoc' ORDER BY priority
> (1) sql: User not found in any groups
> rlm_sql (sql): Released connection (2)
> Need 4 more connections to reach 10 spares
> rlm_sql (sql): Opening additional connection (6), 1 of 26 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radiusdb' on Localhost via UNIX
> socket, server version 11.2.2-MariaDB-log, protocol version 10
> (1)     [sql] = ok
> (1)     [expiration] = noop
> (1)     [logintime] = noop
> (1) pap: Normalizing MD5-Password from hex encoding, 32 bytes -> 16 bytes
> (1)     [pap] = updated
> (1)   } # authorize = updated
> (1) Found Auth-Type = PAP
> (1) # Executing group from file /etc/raddb/sites-enabled/default
> (1)   Auth-Type PAP {
> (1) pap: Login attempt with password
> (1) pap: Comparing with "known-good" MD5-Password
> (1) pap: User authenticated successfully
> (1)     [pap] = ok
> (1)   } # Auth-Type PAP = ok
> (1) # Executing section post-auth from file
> /etc/raddb/sites-enabled/default
> (1)   post-auth {
> (1)     update {
> (1)       No attributes updated
> (1)     } # update = noop
> (1) sql: EXPAND .query
> (1) sql:    --> .query
> (1) sql: Using query template 'query'
> rlm_sql (sql): Reserved connection (3)
> (1) sql: EXPAND %{User-Name}
> (1) sql:    --> netnoc
> (1) sql: SQL-User-Name set to 'netnoc'
> (1) sql: EXPAND INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
> '%{reply:Packet-Type}', '%S')
> (1) sql:    --> INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( 'netnoc', '123456', 'Access-Accept', '2023-12-05 10:
> 07:21.420568')
> (1) sql: Executing query: INSERT INTO radpostauth (username, pass, reply,
> authdate) VALUES ( 'netnoc', '123456', 'Access-Accept', '2023
> -12-05 10:07:21.420568')
> (1) sql: SQL query returned: success
> (1) sql: 1 record(s) updated
> rlm_sql (sql): Released connection (3)
> (1)     [sql] = ok
> (1)     [exec] = noop
> (1)     policy remove_reply_message_if_eap {
> (1)       if (&reply:EAP-Message && &reply:Reply-Message) {
> (1)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
> (1)       else {
> (1)         [noop] = noop
> (1)       } # else = noop
> (1)     } # policy remove_reply_message_if_eap = noop
> (1)   } # post-auth = ok
> (1) Sent Access-Accept Id 175 from 192.168.2.118:1812 to
> 192.168.1.244:63378 length 0
> (1) Finished request
> Waking up in 4.9 seconds
>
>     *What is puzzling is that the user "netnoc" exists on my mysql, but
> when using H3C network supplier products, it will prompt that the user does
> not exist. I have repeatedly confirmed that there is no problem with the
> switch configuration file. This problem will not exist when testing with
> Cisco ACS.*
>
> *The following is the mysql account information:*
>
> MariaDB [radiusdb]> SELECT * FROM radcheck;
>
> +----+----------+--------------------+----+----------------------------------+
> | id | username | attribute          | op | value
>    |
>
> +----+----------+--------------------+----+----------------------------------+
> |  1 | netnoc  | MD5-Password       | := | df4f8827e161sdfg56a04948a69b219
> |
>
>
> *The following is my network configuration file using H3C S6812-48X6C. I
> tried to use both freeradius and system domains but failed, which is very
> frustrating.*
>
> local-user usermgmt
> service-type ssh terminal
> authorization-attribute level 3
> password cipher sjkak25u98sdk
> quit
>
> ssh server enable
> ssh user usermgmt service-type all authentication-type password
>
> dot1x
> dot1x authentication-method pap
> domain default enable freeradius(system)
>
> radius scheme freeradius
>  primary authentication 192.168.2.118 key simple demo_radius_secret
>  user-name-format without-domain
> quit
> radius scheme system
>  user-name-format without-domain
> quit
>
> domain freeradius
>  authentication login radius-scheme freeradius local
> quit
> domain system
>  authentication login radius-scheme freeradius local
> quit
>
> user-interface vty 0 4
>  acl 2000 inbound
>  authentication-mode scheme
>  protocol inbound ssh
>
>  * I don’t know if providing the above information will be helpful or
> troublesome to you. If so, I'm so sorry! I look forward to having you reply
> to my email again if I need to provide more information. At the same time,
> I also look forward to your help me solve this problem! Thanks everyone!*
>
>
> *
>
>
>                                                                  alex007*
>


More information about the Freeradius-Users mailing list