EAP-PWD combined with MAC address

Dario Barbon dbarbon at olicom.eu
Wed Mar 20 10:50:48 UTC 2024


Hi all, I need to configure my client's FreeRadius to allow connection 
to the WiFi network only to specific smartphones.
I can establish EAP-PWD connection but the MAC address list of 
authorized devices isn't checked so connection works for every device.
Here the debug log; could someone point me to what is wrong?
(Please note that the use of EAP-PWD is mandatory)
Thanks,
Dario Barbon

    FreeRADIUS Version 3.0.16
    Copyright (C) 1999-2017 The FreeRADIUS server project and contributors
    There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
    PARTICULAR PURPOSE
    You may redistribute copies of FreeRADIUS under the terms of the
    GNU General Public License
    For more information about these matters, see the file named COPYRIGHT
    Starting - reading configuration files ...
    including dictionary file /usr/share/freeradius/dictionary
    including dictionary file /usr/share/freeradius/dictionary.dhcp
    including dictionary file /usr/share/freeradius/dictionary.vqp
    including dictionary file /etc/freeradius/3.0/dictionary
    including configuration file /etc/freeradius/3.0/radiusd.conf
    including configuration file /etc/freeradius/3.0/clients.conf
    including files in directory /etc/freeradius/3.0/mods-enabled/
    including configuration file /etc/freeradius/3.0/mods-enabled/chap
    including configuration file /etc/freeradius/3.0/mods-enabled/logintime
    including configuration file /etc/freeradius/3.0/mods-enabled/always
    including configuration file /etc/freeradius/3.0/mods-enabled/echo
    including configuration file /etc/freeradius/3.0/mods-enabled/linelog
    including configuration file
    /etc/freeradius/3.0/mods-enabled/dynamic_clients
    including configuration file /etc/freeradius/3.0/mods-enabled/utf8
    including configuration file /etc/freeradius/3.0/mods-enabled/digest
    including configuration file /etc/freeradius/3.0/mods-enabled/unix
    including configuration file /etc/freeradius/3.0/mods-enabled/files
    including configuration file /etc/freeradius/3.0/mods-enabled/exec
    including configuration file /etc/freeradius/3.0/mods-enabled/preprocess
    including configuration file /etc/freeradius/3.0/mods-enabled/replicate
    including configuration file /etc/freeradius/3.0/mods-enabled/eap
    including configuration file /etc/freeradius/3.0/mods-enabled/passwd
    including configuration file /etc/freeradius/3.0/mods-enabled/detail.log
    including configuration file /etc/freeradius/3.0/mods-enabled/pap
    including configuration file /etc/freeradius/3.0/mods-enabled/unpack
    including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp
    including configuration file /etc/freeradius/3.0/mods-enabled/detail
    including configuration file /etc/freeradius/3.0/mods-enabled/ntlm_auth
    including configuration file /etc/freeradius/3.0/mods-enabled/mschap
    including configuration file /etc/freeradius/3.0/mods-enabled/soh
    including configuration file /etc/freeradius/3.0/mods-enabled/expr
    including configuration file
    /etc/freeradius/3.0/mods-enabled/attr_filter
    including configuration file /etc/freeradius/3.0/mods-enabled/expiration
    including configuration file /etc/freeradius/3.0/mods-enabled/cache_eap
    including configuration file /etc/freeradius/3.0/mods-enabled/radutmp
    including configuration file /etc/freeradius/3.0/mods-enabled/realm
    including files in directory /etc/freeradius/3.0/policy.d/
    including configuration file /etc/freeradius/3.0/policy.d/accounting
    including configuration file /etc/freeradius/3.0/policy.d/control
    including configuration file /etc/freeradius/3.0/policy.d/operator-name
    including configuration file
    /etc/freeradius/3.0/policy.d/canonicalization
    including configuration file /etc/freeradius/3.0/policy.d/abfab-tr
    including configuration file /etc/freeradius/3.0/policy.d/eap
    including configuration file /etc/freeradius/3.0/policy.d/debug
    including configuration file /etc/freeradius/3.0/policy.d/cui
    including configuration file
    /etc/freeradius/3.0/policy.d/moonshot-targeted-ids
    including configuration file /etc/freeradius/3.0/policy.d/dhcp
    including configuration file /etc/freeradius/3.0/policy.d/filter
    including files in directory /etc/freeradius/3.0/sites-enabled/
    including configuration file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    including configuration file
    /etc/freeradius/3.0/sites-enabled/inner-tunnel
    main {
      security {
          user = "operatore"
          group = "operatore"
          allow_core_dumps = no
      }
         name = "freeradius"
         prefix = "/usr"
         localstatedir = "/var"
         logdir = "/var/log/freeradius"
         run_dir = "/var/run/freeradius"
    }
    main {
         name = "freeradius"
         prefix = "/usr"
         localstatedir = "/var"
         sbindir = "/usr/sbin"
         logdir = "/var/log/freeradius"
         run_dir = "/var/run/freeradius"
         libdir = "/usr/lib/freeradius"
         radacctdir = "/var/log/freeradius/radacct"
         hostname_lookups = no
         max_request_time = 30
         cleanup_delay = 5
         max_requests = 16384
         pidfile = "/var/run/freeradius/freeradius.pid"
         checkrad = "/usr/sbin/checkrad"
         debug_level = 0
         proxy_requests = no
      log {
          stripped_names = no
          auth = no
          auth_badpass = no
          auth_goodpass = no
          colourise = yes
          msg_denied = "You are already logged in - access denied"
      }
      resources {
      }
      security {
          max_attributes = 200
          reject_delay = 1.000000
          status_server = yes
      }
    }
    radiusd: #### Loading Realms and Home Servers ####
    radiusd: #### Loading Clients ####
      client localhost {
          ipaddr = 127.0.0.1
          require_message_authenticator = no
          secret = <<< secret >>>
          nas_type = "other"
          proto = "*"
       limit {
           max_connections = 16
           lifetime = 0
           idle_timeout = 30
       }
      }
      client localhost_ipv6 {
          ipv6addr = ::1
          require_message_authenticator = no
          secret = <<< secret >>>
       limit {
           max_connections = 16
           lifetime = 0
           idle_timeout = 30
       }
      }
      client TLC_TAG-MGT {
          ipaddr = 172.31.190.2
          require_message_authenticator = yes
          secret = <<< secret >>>
       limit {
           max_connections = 16
           lifetime = 0
           idle_timeout = 30
       }
      }
    Debugger not attached
      # Creating Auth-Type = eap
      # Creating Auth-Type = MS-CHAP
      # Creating Auth-Type = mschap
      # Creating Auth-Type = PAP
      # Creating Auth-Type = CHAP
    radiusd: #### Instantiating modules ####
      modules {
       # Loaded module rlm_chap
       # Loading module "chap" from file
    /etc/freeradius/3.0/mods-enabled/chap
       # Loaded module rlm_logintime
       # Loading module "logintime" from file
    /etc/freeradius/3.0/mods-enabled/logintime
       logintime {
           minimum_timeout = 60
       }
       # Loaded module rlm_always
       # Loading module "reject" from file
    /etc/freeradius/3.0/mods-enabled/always
       always reject {
           rcode = "reject"
           simulcount = 0
           mpp = no
       }
       # Loading module "fail" from file
    /etc/freeradius/3.0/mods-enabled/always
       always fail {
           rcode = "fail"
           simulcount = 0
           mpp = no
       }
       # Loading module "ok" from file
    /etc/freeradius/3.0/mods-enabled/always
       always ok {
           rcode = "ok"
           simulcount = 0
           mpp = no
       }
       # Loading module "handled" from file
    /etc/freeradius/3.0/mods-enabled/always
       always handled {
           rcode = "handled"
           simulcount = 0
           mpp = no
       }
       # Loading module "invalid" from file
    /etc/freeradius/3.0/mods-enabled/always
       always invalid {
           rcode = "invalid"
           simulcount = 0
           mpp = no
       }
       # Loading module "userlock" from file
    /etc/freeradius/3.0/mods-enabled/always
       always userlock {
           rcode = "userlock"
           simulcount = 0
           mpp = no
       }
       # Loading module "notfound" from file
    /etc/freeradius/3.0/mods-enabled/always
       always notfound {
           rcode = "notfound"
           simulcount = 0
           mpp = no
       }
       # Loading module "noop" from file
    /etc/freeradius/3.0/mods-enabled/always
       always noop {
           rcode = "noop"
           simulcount = 0
           mpp = no
       }
       # Loading module "updated" from file
    /etc/freeradius/3.0/mods-enabled/always
       always updated {
           rcode = "updated"
           simulcount = 0
           mpp = no
       }
       # Loaded module rlm_exec
       # Loading module "echo" from file
    /etc/freeradius/3.0/mods-enabled/echo
       exec echo {
           wait = yes
           program = "/bin/echo %{User-Name}"
           input_pairs = "request"
           output_pairs = "reply"
           shell_escape = yes
       }
       # Loaded module rlm_linelog
       # Loading module "linelog" from file
    /etc/freeradius/3.0/mods-enabled/linelog
       linelog {
           filename = "/var/log/freeradius/linelog"
           escape_filenames = no
           syslog_severity = "info"
           permissions = 384
           format = "This is a log message for %{User-Name}"
           reference = "messages.%{%{reply:Packet-Type}:-default}"
       }
       # Loading module "log_accounting" from file
    /etc/freeradius/3.0/mods-enabled/linelog
       linelog log_accounting {
           filename = "/var/log/freeradius/linelog-accounting"
           escape_filenames = no
           syslog_severity = "info"
           permissions = 384
           format = ""
           reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
       }
       # Loaded module rlm_dynamic_clients
       # Loading module "dynamic_clients" from file
    /etc/freeradius/3.0/mods-enabled/dynamic_clients
       # Loaded module rlm_utf8
       # Loading module "utf8" from file
    /etc/freeradius/3.0/mods-enabled/utf8
       # Loaded module rlm_digest
       # Loading module "digest" from file
    /etc/freeradius/3.0/mods-enabled/digest
       # Loaded module rlm_unix
       # Loading module "unix" from file
    /etc/freeradius/3.0/mods-enabled/unix
       unix {
           radwtmp = "/var/log/freeradius/radwtmp"
       }
    Creating attribute Unix-Group
       # Loaded module rlm_files
       # Loading module "files" from file
    /etc/freeradius/3.0/mods-enabled/files
       files {
           filename = "/etc/freeradius/3.0/mods-config/files/authorize"
           acctusersfile =
    "/etc/freeradius/3.0/mods-config/files/accounting"
           preproxy_usersfile =
    "/etc/freeradius/3.0/mods-config/files/pre-proxy"
       }
       # Loading module "authorized_macs" from file
    /etc/freeradius/3.0/mods-enabled/files
       files authorized_macs {
           usersfile = "/etc/freeradius/3.0/authorized_macs"
           key = "%{Calling-Station-ID}"
       }
       # Loading module "exec" from file
    /etc/freeradius/3.0/mods-enabled/exec
       exec {
           wait = no
           input_pairs = "request"
           shell_escape = yes
           timeout = 10
       }
       # Loaded module rlm_preprocess
       # Loading module "preprocess" from file
    /etc/freeradius/3.0/mods-enabled/preprocess
       preprocess {
           huntgroups =
    "/etc/freeradius/3.0/mods-config/preprocess/huntgroups"
           hints = "/etc/freeradius/3.0/mods-config/preprocess/hints"
           with_ascend_hack = no
           ascend_channels_per_line = 23
           with_ntdomain_hack = no
           with_specialix_jetstream_hack = no
           with_cisco_vsa_hack = no
           with_alvarion_vsa_hack = no
       }
       # Loaded module rlm_replicate
       # Loading module "replicate" from file
    /etc/freeradius/3.0/mods-enabled/replicate
       # Loaded module rlm_eap
       # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap
       eap {
           default_eap_type = "tls"
           timer_expire = 60
           ignore_unknown_eap_types = no
           cisco_accounting_username_bug = no
           max_sessions = 4096
       }
       # Loaded module rlm_passwd
       # Loading module "etc_passwd" from file
    /etc/freeradius/3.0/mods-enabled/passwd
       passwd etc_passwd {
           filename = "/etc/passwd"
           format = "*User-Name:Crypt-Password:"
           delimiter = ":"
           ignore_nislike = no
           ignore_empty = yes
           allow_multiple_keys = no
           hash_size = 100
       }
       # Loaded module rlm_detail
       # Loading module "auth_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       detail auth_log {
           filename =
    "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
           header = "%t"
           permissions = 384
           locking = no
           escape_filenames = no
           log_packet_header = no
       }
       # Loading module "reply_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       detail reply_log {
           filename =
    "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
           header = "%t"
           permissions = 384
           locking = no
           escape_filenames = no
           log_packet_header = no
       }
       # Loading module "pre_proxy_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       detail pre_proxy_log {
           filename =
    "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
           header = "%t"
           permissions = 384
           locking = no
           escape_filenames = no
           log_packet_header = no
       }
       # Loading module "post_proxy_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       detail post_proxy_log {
           filename =
    "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
           header = "%t"
           permissions = 384
           locking = no
           escape_filenames = no
           log_packet_header = no
       }
       # Loaded module rlm_pap
       # Loading module "pap" from file /etc/freeradius/3.0/mods-enabled/pap
       pap {
           normalise = yes
       }
       # Loaded module rlm_unpack
       # Loading module "unpack" from file
    /etc/freeradius/3.0/mods-enabled/unpack
       # Loaded module rlm_radutmp
       # Loading module "sradutmp" from file
    /etc/freeradius/3.0/mods-enabled/sradutmp
       radutmp sradutmp {
           filename = "/var/log/freeradius/sradutmp"
           username = "%{User-Name}"
           case_sensitive = yes
           check_with_nas = yes
           permissions = 420
           caller_id = no
       }
       # Loading module "detail" from file
    /etc/freeradius/3.0/mods-enabled/detail
       detail {
           filename =
    "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
           header = "%t"
           permissions = 384
           locking = no
           escape_filenames = no
           log_packet_header = no
       }
       # Loading module "ntlm_auth" from file
    /etc/freeradius/3.0/mods-enabled/ntlm_auth
       exec ntlm_auth {
           wait = yes
           program = "/path/to/ntlm_auth --request-nt-key
    --domain=MYDOMAIN --username=%{mschap:User-Name}
    --password=%{User-Password}"
           shell_escape = yes
       }
       # Loaded module rlm_mschap
       # Loading module "mschap" from file
    /etc/freeradius/3.0/mods-enabled/mschap
       mschap {
           use_mppe = yes
           require_encryption = yes
           require_strong = yes
           with_ntdomain_hack = yes
        passchange {
        }
           allow_retry = yes
           winbind_retry_with_normalised_username = no
       }
       # Loaded module rlm_soh
       # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh
       soh {
           dhcp = yes
       }
       # Loaded module rlm_expr
       # Loading module "expr" from file
    /etc/freeradius/3.0/mods-enabled/expr
       expr {
           safe_characters =
    "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
    /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
       }
       # Loaded module rlm_attr_filter
       # Loading module "attr_filter.post-proxy" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
       attr_filter attr_filter.post-proxy {
           filename =
    "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy"
           key = "%{Realm}"
           relaxed = no
       }
       # Loading module "attr_filter.pre-proxy" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
       attr_filter attr_filter.pre-proxy {
           filename =
    "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy"
           key = "%{Realm}"
           relaxed = no
       }
       # Loading module "attr_filter.access_reject" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
       attr_filter attr_filter.access_reject {
           filename =
    "/etc/freeradius/3.0/mods-config/attr_filter/access_reject"
           key = "%{User-Name}"
           relaxed = no
       }
       # Loading module "attr_filter.access_challenge" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
       attr_filter attr_filter.access_challenge {
           filename =
    "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge"
           key = "%{User-Name}"
           relaxed = no
       }
       # Loading module "attr_filter.accounting_response" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
       attr_filter attr_filter.accounting_response {
           filename =
    "/etc/freeradius/3.0/mods-config/attr_filter/accounting_response"
           key = "%{User-Name}"
           relaxed = no
       }
       # Loaded module rlm_expiration
       # Loading module "expiration" from file
    /etc/freeradius/3.0/mods-enabled/expiration
       # Loaded module rlm_cache
       # Loading module "cache_eap" from file
    /etc/freeradius/3.0/mods-enabled/cache_eap
       cache cache_eap {
           driver = "rlm_cache_rbtree"
           key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
           ttl = 15
           max_entries = 0
           epoch = 0
           add_stats = no
       }
       # Loading module "radutmp" from file
    /etc/freeradius/3.0/mods-enabled/radutmp
       radutmp {
           filename = "/var/log/freeradius/radutmp"
           username = "%{User-Name}"
           case_sensitive = yes
           check_with_nas = yes
           permissions = 384
           caller_id = yes
       }
       # Loaded module rlm_realm
       # Loading module "IPASS" from file
    /etc/freeradius/3.0/mods-enabled/realm
       realm IPASS {
           format = "prefix"
           delimiter = "/"
           ignore_default = no
           ignore_null = no
       }
       # Loading module "suffix" from file
    /etc/freeradius/3.0/mods-enabled/realm
       realm suffix {
           format = "suffix"
           delimiter = "@"
           ignore_default = no
           ignore_null = no
       }
       # Loading module "realmpercent" from file
    /etc/freeradius/3.0/mods-enabled/realm
       realm realmpercent {
           format = "suffix"
           delimiter = "%"
           ignore_default = no
           ignore_null = no
       }
       # Loading module "ntdomain" from file
    /etc/freeradius/3.0/mods-enabled/realm
       realm ntdomain {
           format = "prefix"
           delimiter = "\\"
           ignore_default = no
           ignore_null = no
       }
       instantiate {
       }
       # Instantiating module "logintime" from file
    /etc/freeradius/3.0/mods-enabled/logintime
       # Instantiating module "reject" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "fail" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "ok" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "handled" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "invalid" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "userlock" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "notfound" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "noop" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "updated" from file
    /etc/freeradius/3.0/mods-enabled/always
       # Instantiating module "linelog" from file
    /etc/freeradius/3.0/mods-enabled/linelog
       # Instantiating module "log_accounting" from file
    /etc/freeradius/3.0/mods-enabled/linelog
       # Instantiating module "files" from file
    /etc/freeradius/3.0/mods-enabled/files
    reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize
    reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting
    reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy
       # Instantiating module "authorized_macs" from file
    /etc/freeradius/3.0/mods-enabled/files
    reading pairlist file /etc/freeradius/3.0/authorized_macs
       # Instantiating module "preprocess" from file
    /etc/freeradius/3.0/mods-enabled/preprocess
    reading pairlist file
    /etc/freeradius/3.0/mods-config/preprocess/huntgroups
    reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints
       # Instantiating module "eap" from file
    /etc/freeradius/3.0/mods-enabled/eap
        # Linked to sub-module rlm_eap_tls
        tls {
        }
    TLS section "tls" missing, trying to use legacy configuration
        tls {
            verify_depth = 0
            ca_path = "/etc/freeradius/3.0/certs"
            pem_file_type = yes
            private_key_file = "/etc/freeradius/3.0/certs/server.key"
            certificate_file = "/etc/freeradius/3.0/certs/server.pem"
            ca_file = "/etc/freeradius/3.0/certs/ca.pem"
            private_key_password = <<< secret >>>
            dh_file = "/etc/freeradius/3.0/certs/dh"
            random_file = "/dev/urandom"
            fragment_size = 1024
            include_length = yes
            auto_chain = yes
            check_crl = no
            check_all_crl = no
            cipher_list = "HIGH"
            ecdh_curve = "prime256v1"
            tls_max_version = ""
            tls_min_version = "1.0"
         cache {
             enable = no
             lifetime = 24
             max_entries = 255
         }
         verify {
             skip_if_ocsp_ok = no
             tmpdir = "/tmp/radiusd"
             client = "/usr/bin/openssl verify -CAfile
    /etc/freeradius/3.0/certs/ca.pem %{TLS-Client-Cert-Filename}"
         }
         ocsp {
             enable = no
             override_cert_url = yes
             url = "http://127.0.0.1/ocsp/"
             use_nonce = yes
             timeout = 0
             softfail = no
         }
        }
        # Linked to sub-module rlm_eap_pwd
        pwd {
            group = 19
            fragment_size = 1020
            server_id = "tagworksrv at olicom.eu"
            virtual_server = "inner-tunnel"
        }
        # Linked to sub-module rlm_eap_ttls
        ttls {
            default_eap_type = "md5"
            copy_request_to_tunnel = no
            use_tunneled_reply = no
            virtual_server = "inner-tunnel"
            include_length = yes
            require_client_cert = no
        }
    TLS section "tls" missing, trying to use legacy configuration
    tls: Using cached TLS configuration from previous invocation
       # Instantiating module "etc_passwd" from file
    /etc/freeradius/3.0/mods-enabled/passwd
    rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
       # Instantiating module "auth_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
    rlm_detail (auth_log): 'User-Password' suppressed, will not appear
    in detail output
       # Instantiating module "reply_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       # Instantiating module "pre_proxy_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       # Instantiating module "post_proxy_log" from file
    /etc/freeradius/3.0/mods-enabled/detail.log
       # Instantiating module "pap" from file
    /etc/freeradius/3.0/mods-enabled/pap
       # Instantiating module "detail" from file
    /etc/freeradius/3.0/mods-enabled/detail
       # Instantiating module "mschap" from file
    /etc/freeradius/3.0/mods-enabled/mschap
    rlm_mschap (mschap): using internal authentication
       # Instantiating module "attr_filter.post-proxy" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
    reading pairlist file
    /etc/freeradius/3.0/mods-config/attr_filter/post-proxy
       # Instantiating module "attr_filter.pre-proxy" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
    reading pairlist file
    /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy
       # Instantiating module "attr_filter.access_reject" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
    reading pairlist file
    /etc/freeradius/3.0/mods-config/attr_filter/access_reject
    [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check
    item "FreeRADIUS-Response-Delay"     found in filter list for realm
    "DEFAULT".
    [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check
    item "FreeRADIUS-Response-Delay-USec"     found in filter list for
    realm "DEFAULT".
       # Instantiating module "attr_filter.access_challenge" from file
    /etc/freeradius/3.0/mods-enabled/attr_filter
    reading pairlist file
    /etc/freeradius/3.0/mods-config/attr_filter/access_challenge
       # Instantiating module "attr_filter.accounting_response" from
    file /etc/freeradius/3.0/mods-enabled/attr_filter
    reading pairlist file
    /etc/freeradius/3.0/mods-config/attr_filter/accounting_response
       # Instantiating module "expiration" from file
    /etc/freeradius/3.0/mods-enabled/expiration
       # Instantiating module "cache_eap" from file
    /etc/freeradius/3.0/mods-enabled/cache_eap
    rlm_cache (cache_eap): Driver rlm_cache_rbtree (module
    rlm_cache_rbtree) loaded and linked
       # Instantiating module "IPASS" from file
    /etc/freeradius/3.0/mods-enabled/realm
       # Instantiating module "suffix" from file
    /etc/freeradius/3.0/mods-enabled/realm
       # Instantiating module "realmpercent" from file
    /etc/freeradius/3.0/mods-enabled/realm
       # Instantiating module "ntdomain" from file
    /etc/freeradius/3.0/mods-enabled/realm
      } # modules
    radiusd: #### Loading Virtual Servers ####
    server { # from file /etc/freeradius/3.0/sites-enabled/tlcamb-tag
      # Loading authenticate {...}
      # Loading authorize {...}
      # Loading preacct {...}
      # Loading accounting {...}
      # Loading session {...}
      # Loading post-auth {...}
    } # server
    server inner-tunnel { # from file
    /etc/freeradius/3.0/sites-enabled/inner-tunnel
      # Loading authenticate {...}
      # Loading authorize {...}
    Ignoring "sql" (see raddb/mods-available/README.rst)
    Ignoring "ldap" (see raddb/mods-available/README.rst)
      # Loading session {...}
      # Loading post-auth {...}
      # Skipping contents of 'if' as it is always 'false' --
    /etc/freeradius/3.0/sites-enabled/inner-tunnel:346
    } # server inner-tunnel
    radiusd: #### Opening IP addresses and Ports ####
    listen {
           type = "auth"
           ipaddr = *
           port = 1812
    }
    listen {
           type = "auth"
           ipaddr = 127.0.0.1
           port = 18120
    }
    Listening on auth address * port 1812
    Listening on auth address 127.0.0.1 port 18120 bound to server
    inner-tunnel
    Ready to process requests
    (0) Received Access-Request Id 122 from 172.31.190.2:32771 to
    172.31.189.84:1812 length 272
    (0)   User-Name = "sistemi"
    (0)   Chargeable-User-Identity = 0x00
    (0)   Location-Capable = Civic-Location
    (0)   Calling-Station-Id = "7c-6c-f0-49-67-4b"
    (0)   Called-Station-Id = "04-5f-b9-81-69-80:PIT_Tag"
    (0)   NAS-Port = 1
    (0)   Cisco-AVPair = "audit-session-id=ac1fc7020000019e65faad38"
    (0)   Acct-Session-Id = "65faad38/7c:6c:f0:49:67:4b/428"
    (0)   NAS-IP-Address = 172.31.190.2
    (0)   NAS-Identifier = "Cisco_b8:24:65"
    (0)   Airespace-Wlan-Id = 2
    (0)   Service-Type = Framed-User
    (0)   Framed-MTU = 1300
    (0)   NAS-Port-Type = Wireless-802.11
    (0)   Tunnel-Type:0 = VLAN
    (0)   Tunnel-Medium-Type:0 = IEEE-802
    (0)   Tunnel-Private-Group-Id:0 = "190"
    (0)   EAP-Message = 0x0201000c0173697374656d69
    (0)   Message-Authenticator = 0x6fc9d7514fcecd58ea88e1c412a0e42c
    (0) # Executing section authorize from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (0)   authorize {
    (0)     [preprocess] = ok
    (0) eap: Peer sent EAP Response (code 2) ID 1 length 12
    (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit
    the rest of authorize
    (0)     [eap] = ok
    (0)   } # authorize = ok
    (0) Found Auth-Type = eap
    (0) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (0)   authenticate {
    (0) eap: Peer sent packet with method EAP Identity (1)
    (0) eap: Calling submodule eap_tls to process data
    (0) eap_tls: Initiating new EAP-TLS session
    (0) eap_tls: Setting verify mode to require certificate from client
    (0) eap_tls: [eaptls start] = request
    (0) eap: Sending EAP Request (code 1) ID 2 length 6
    (0) eap: EAP session adding &reply:State = 0xcfd7d9aecfd5d4f1
    (0)     [eap] = handled
    (0)   } # authenticate = handled
    (0) Using Post-Auth-Type Challenge
    (0) Post-Auth-Type sub-section not found.  Ignoring.
    (0) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (0) Sent Access-Challenge Id 122 from 172.31.189.84:1812 to
    172.31.190.2:32771 length 0
    (0)   EAP-Message = 0x010200060d20
    (0)   Message-Authenticator = 0x00000000000000000000000000000000
    (0)   State = 0xcfd7d9aecfd5d4f1bff975c345294431
    (0) Finished request
    Waking up in 4.9 seconds.
    (1) Received Access-Request Id 123 from 172.31.190.2:32771 to
    172.31.189.84:1812 length 284
    (1)   User-Name = "sistemi"
    (1)   Chargeable-User-Identity = 0x00
    (1)   Location-Capable = Civic-Location
    (1)   Calling-Station-Id = "7c-6c-f0-49-67-4b"
    (1)   Called-Station-Id = "04-5f-b9-81-69-80:PIT_Tag"
    (1)   NAS-Port = 1
    (1)   Cisco-AVPair = "audit-session-id=ac1fc7020000019e65faad38"
    (1)   Acct-Session-Id = "65faad38/7c:6c:f0:49:67:4b/428"
    (1)   NAS-IP-Address = 172.31.190.2
    (1)   NAS-Identifier = "Cisco_b8:24:65"
    (1)   Airespace-Wlan-Id = 2
    (1)   Service-Type = Framed-User
    (1)   Framed-MTU = 1300
    (1)   NAS-Port-Type = Wireless-802.11
    (1)   Tunnel-Type:0 = VLAN
    (1)   Tunnel-Medium-Type:0 = IEEE-802
    (1)   Tunnel-Private-Group-Id:0 = "190"
    (1)   EAP-Message = 0x020200060334
    (1)   State = 0xcfd7d9aecfd5d4f1bff975c345294431
    (1)   Message-Authenticator = 0x96a59c189f3842614fec256710d78881
    (1) session-state: No cached attributes
    (1) # Executing section authorize from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (1)   authorize {
    (1)     [preprocess] = ok
    (1) eap: Peer sent EAP Response (code 2) ID 2 length 6
    (1) eap: No EAP Start, assuming it's an on-going EAP conversation
    (1)     [eap] = updated
    (1)     [expiration] = noop
    (1)     [logintime] = noop
    (1)   } # authorize = updated
    (1) Found Auth-Type = eap
    (1) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (1)   authenticate {
    (1) eap: Expiring EAP session with state 0xcfd7d9aecfd5d4f1
    (1) eap: Finished EAP session with state 0xcfd7d9aecfd5d4f1
    (1) eap: Previous EAP request found for state 0xcfd7d9aecfd5d4f1,
    released from the list
    (1) eap: Peer sent packet with method EAP NAK (3)
    (1) eap: Found mutually acceptable type PWD (52)
    (1) eap: Calling submodule eap_pwd to process data
    (1) eap: Sending EAP Request (code 1) ID 3 length 35
    (1) eap: EAP session adding &reply:State = 0xcfd7d9aeced4edf1
    (1)     [eap] = handled
    (1)   } # authenticate = handled
    (1) Using Post-Auth-Type Challenge
    (1) Post-Auth-Type sub-section not found.  Ignoring.
    (1) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (1) Sent Access-Challenge Id 123 from 172.31.189.84:1812 to
    172.31.190.2:32771 length 0
    (1)   EAP-Message =
    0x01030023340100130101ff9e236f00746167776f726b737276406f6c69636f6d2e6575
    (1)   Message-Authenticator = 0x00000000000000000000000000000000
    (1)   State = 0xcfd7d9aeced4edf1bff975c345294431
    (1) Finished request
    Waking up in 4.9 seconds.
    (2) Received Access-Request Id 124 from 172.31.190.2:32771 to
    172.31.189.84:1812 length 300
    (2)   User-Name = "sistemi"
    (2)   Chargeable-User-Identity = 0x00
    (2)   Location-Capable = Civic-Location
    (2)   Calling-Station-Id = "7c-6c-f0-49-67-4b"
    (2)   Called-Station-Id = "04-5f-b9-81-69-80:PIT_Tag"
    (2)   NAS-Port = 1
    (2)   Cisco-AVPair = "audit-session-id=ac1fc7020000019e65faad38"
    (2)   Acct-Session-Id = "65faad38/7c:6c:f0:49:67:4b/428"
    (2)   NAS-IP-Address = 172.31.190.2
    (2)   NAS-Identifier = "Cisco_b8:24:65"
    (2)   Airespace-Wlan-Id = 2
    (2)   Service-Type = Framed-User
    (2)   Framed-MTU = 1300
    (2)   NAS-Port-Type = Wireless-802.11
    (2)   Tunnel-Type:0 = VLAN
    (2)   Tunnel-Medium-Type:0 = IEEE-802
    (2)   Tunnel-Private-Group-Id:0 = "190"
    (2)   EAP-Message = 0x02030016340100130101ff9e236f0073697374656d69
    (2)   State = 0xcfd7d9aeced4edf1bff975c345294431
    (2)   Message-Authenticator = 0x88ded477576ecf4f4c824c903e1e8b89
    (2) session-state: No cached attributes
    (2) # Executing section authorize from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (2)   authorize {
    (2)     [preprocess] = ok
    (2) eap: Peer sent EAP Response (code 2) ID 3 length 22
    (2) eap: No EAP Start, assuming it's an on-going EAP conversation
    (2)     [eap] = updated
    (2)     [expiration] = noop
    (2)     [logintime] = noop
    (2)   } # authorize = updated
    (2) Found Auth-Type = eap
    (2) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (2)   authenticate {
    (2) eap: Expiring EAP session with state 0xcfd7d9aeced4edf1
    (2) eap: Finished EAP session with state 0xcfd7d9aeced4edf1
    (2) eap: Previous EAP request found for state 0xcfd7d9aeced4edf1,
    released from the list
    (2) eap: Peer sent packet with method EAP PWD (52)
    (2) eap: Calling submodule eap_pwd to process data
    (2) eap_pwd: Sending tunneled request
    (2) eap_pwd:   User-Name = "sistemi"
    (2) eap_pwd: server inner-tunnel {
    (2) # Executing section authorize from file
    /etc/freeradius/3.0/sites-enabled/inner-tunnel
    (2)   authorize {
    (2)     policy filter_username {
    (2)       if (&User-Name) {
    (2)       if (&User-Name)  -> TRUE
    (2)       if (&User-Name)  {
    (2)         if (&User-Name =~ / /) {
    (2)         if (&User-Name =~ / /)  -> FALSE
    (2)         if (&User-Name =~ /@[^@]*@/ ) {
    (2)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
    (2)         if (&User-Name =~ /\.\./ ) {
    (2)         if (&User-Name =~ /\.\./ )  -> FALSE
    (2)         if ((&User-Name =~ /@/) && (&User-Name !~
    /@(.+)\.(.+)$/))  {
    (2)         if ((&User-Name =~ /@/) && (&User-Name !~
    /@(.+)\.(.+)$/))   -> FALSE
    (2)         if (&User-Name =~ /\.$/)  {
    (2)         if (&User-Name =~ /\.$/)   -> FALSE
    (2)         if (&User-Name =~ /@\./)  {
    (2)         if (&User-Name =~ /@\./)   -> FALSE
    (2)       } # if (&User-Name)  = notfound
    (2)     } # policy filter_username = notfound
    (2)     [chap] = noop
    (2)     [mschap] = noop
    (2) suffix: Checking for suffix after "@"
    (2) suffix: No '@' in User-Name = "sistemi", looking up realm NULL
    (2) suffix: No such realm "NULL"
    (2)     [suffix] = noop
    (2)     update control {
    (2)       &Proxy-To-Realm := LOCAL
    (2)     } # update control = noop
    (2) eap: No EAP-Message, not doing EAP
    (2)     [eap] = noop
    (2) files: users: Matched entry sistemi at line 87
    (2) files: EXPAND Hello, %{User-Name}
    (2) files:    --> Hello, sistemi
    (2)     [files] = ok
    (2)     [expiration] = noop
    (2)     [logintime] = noop
    (2) pap: No User-Password attribute in the request.  Cannot do PAP
    (2)     [pap] = noop
    (2)     policy rewrite_calling_station_id {
    (2)       if (&Calling-Station-Id && (&Calling-Station-Id =~
    /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
    {
    (2)       if (&Calling-Station-Id && (&Calling-Station-Id =~
    /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
    -> FALSE
    (2)       else {
    (2)         [noop] = noop
    (2)       } # else = noop
    (2)     } # policy rewrite_calling_station_id = noop
    (2) authorized_macs: EXPAND %{Calling-Station-ID}
    (2) authorized_macs:    -->
    (2)     [authorized_macs] = noop
    (2)     if (!ok) {
    (2)     if (!ok)  -> TRUE
    (2)     if (!ok)  {
    (2)       [reject] = reject
    (2)     } # if (!ok)  = reject
    (2)   } # authorize = reject
    (2) eap_pwd: } # server inner-tunnel
    (2) eap_pwd: Got tunneled reply code 0
    (2) eap_pwd:   Reply-Message = "Hello, sistemi"
    (2) eap: Sending EAP Request (code 1) ID 4 length 102
    (2) eap: EAP session adding &reply:State = 0xcfd7d9aecdd3edf1
    (2)     [eap] = handled
    (2)   } # authenticate = handled
    (2) Using Post-Auth-Type Challenge
    (2) Post-Auth-Type sub-section not found.  Ignoring.
    (2) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (2) Sent Access-Challenge Id 124 from 172.31.189.84:1812 to
    172.31.190.2:32771 length 0
    (2)   EAP-Message =
    0x01040066340268736a3483f430ba74f2bf4f547d6e15bd538f4600e58f02c15281971c0f5753c1c9e774964cd3167586ff9b9c2f5fd4ec4979dc45f5c90637c66ee529bdb74904d179491ff94fdd83b2ea4e4ef1e58417e9d837c4d957b3c6c4f23fd3fb1a97
    (2)   Message-Authenticator = 0x00000000000000000000000000000000
    (2)   State = 0xcfd7d9aecdd3edf1bff975c345294431
    (2) Finished request
    Waking up in 4.9 seconds.
    (3) Received Access-Request Id 125 from 172.31.190.2:32771 to
    172.31.189.84:1812 length 380
    (3)   User-Name = "sistemi"
    (3)   Chargeable-User-Identity = 0x00
    (3)   Location-Capable = Civic-Location
    (3)   Calling-Station-Id = "7c-6c-f0-49-67-4b"
    (3)   Called-Station-Id = "04-5f-b9-81-69-80:PIT_Tag"
    (3)   NAS-Port = 1
    (3)   Cisco-AVPair = "audit-session-id=ac1fc7020000019e65faad38"
    (3)   Acct-Session-Id = "65faad38/7c:6c:f0:49:67:4b/428"
    (3)   NAS-IP-Address = 172.31.190.2
    (3)   NAS-Identifier = "Cisco_b8:24:65"
    (3)   Airespace-Wlan-Id = 2
    (3)   Service-Type = Framed-User
    (3)   Framed-MTU = 1300
    (3)   NAS-Port-Type = Wireless-802.11
    (3)   Tunnel-Type:0 = VLAN
    (3)   Tunnel-Medium-Type:0 = IEEE-802
    (3)   Tunnel-Private-Group-Id:0 = "190"
    (3)   EAP-Message =
    0x0204006634022188d7feb9ab8290496108b88d4016197a46566b5ed2a3d1eaad72951942c5fcd73d6db0db7f36c3e37bed661217b5e8370aa40f3d5e001fe64b05e8088a45980b9ca30de56b3d9754ab88767166abbd0a2eedd2f2249cae7f43fda160e9d96d
    (3)   State = 0xcfd7d9aecdd3edf1bff975c345294431
    (3)   Message-Authenticator = 0xb7b9ded509fb3083d7cebf1b06c18064
    (3) session-state: No cached attributes
    (3) # Executing section authorize from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (3)   authorize {
    (3)     [preprocess] = ok
    (3) eap: Peer sent EAP Response (code 2) ID 4 length 102
    (3) eap: No EAP Start, assuming it's an on-going EAP conversation
    (3)     [eap] = updated
    (3)     [expiration] = noop
    (3)     [logintime] = noop
    (3)   } # authorize = updated
    (3) Found Auth-Type = eap
    (3) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (3)   authenticate {
    (3) eap: Expiring EAP session with state 0xcfd7d9aecdd3edf1
    (3) eap: Finished EAP session with state 0xcfd7d9aecdd3edf1
    (3) eap: Previous EAP request found for state 0xcfd7d9aecdd3edf1,
    released from the list
    (3) eap: Peer sent packet with method EAP PWD (52)
    (3) eap: Calling submodule eap_pwd to process data
    (3) eap: Sending EAP Request (code 1) ID 5 length 38
    (3) eap: EAP session adding &reply:State = 0xcfd7d9aeccd2edf1
    (3)     [eap] = handled
    (3)   } # authenticate = handled
    (3) Using Post-Auth-Type Challenge
    (3) Post-Auth-Type sub-section not found.  Ignoring.
    (3) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (3) Sent Access-Challenge Id 125 from 172.31.189.84:1812 to
    172.31.190.2:32771 length 0
    (3)   EAP-Message =
    0x010500263403285a5091e92f61fe8231564979f1bc06311f8d612634e3693639f4113c1fa072
    (3)   Message-Authenticator = 0x00000000000000000000000000000000
    (3)   State = 0xcfd7d9aeccd2edf1bff975c345294431
    (3) Finished request
    Waking up in 4.9 seconds.
    (4) Received Access-Request Id 126 from 172.31.190.2:32771 to
    172.31.189.84:1812 length 316
    (4)   User-Name = "sistemi"
    (4)   Chargeable-User-Identity = 0x00
    (4)   Location-Capable = Civic-Location
    (4)   Calling-Station-Id = "7c-6c-f0-49-67-4b"
    (4)   Called-Station-Id = "04-5f-b9-81-69-80:PIT_Tag"
    (4)   NAS-Port = 1
    (4)   Cisco-AVPair = "audit-session-id=ac1fc7020000019e65faad38"
    (4)   Acct-Session-Id = "65faad38/7c:6c:f0:49:67:4b/428"
    (4)   NAS-IP-Address = 172.31.190.2
    (4)   NAS-Identifier = "Cisco_b8:24:65"
    (4)   Airespace-Wlan-Id = 2
    (4)   Service-Type = Framed-User
    (4)   Framed-MTU = 1300
    (4)   NAS-Port-Type = Wireless-802.11
    (4)   Tunnel-Type:0 = VLAN
    (4)   Tunnel-Medium-Type:0 = IEEE-802
    (4)   Tunnel-Private-Group-Id:0 = "190"
    (4)   EAP-Message =
    0x020500263403cac7b037c22d9a51fbcfbc583b42af0aa38b8a8c783f2e4c59e83fe018e01ba4
    (4)   State = 0xcfd7d9aeccd2edf1bff975c345294431
    (4)   Message-Authenticator = 0xbeea4abd571f34567595e590ac1dffbb
    (4) session-state: No cached attributes
    (4) # Executing section authorize from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (4)   authorize {
    (4)     [preprocess] = ok
    (4) eap: Peer sent EAP Response (code 2) ID 5 length 38
    (4) eap: No EAP Start, assuming it's an on-going EAP conversation
    (4)     [eap] = updated
    (4)     [expiration] = noop
    (4)     [logintime] = noop
    (4)   } # authorize = updated
    (4) Found Auth-Type = eap
    (4) # Executing group from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (4)   authenticate {
    (4) eap: Expiring EAP session with state 0xcfd7d9aeccd2edf1
    (4) eap: Finished EAP session with state 0xcfd7d9aeccd2edf1
    (4) eap: Previous EAP request found for state 0xcfd7d9aeccd2edf1,
    released from the list
    (4) eap: Peer sent packet with method EAP PWD (52)
    (4) eap: Calling submodule eap_pwd to process data
    (4) eap: Sending EAP Success (code 3) ID 5 length 4
    (4) eap: Freeing handler
    (4)     [eap] = ok
    (4)   } # authenticate = ok
    (4) # Executing section post-auth from file
    /etc/freeradius/3.0/sites-enabled/tlcamb-tag
    (4) Sent Access-Accept Id 126 from 172.31.189.84:1812 to
    172.31.190.2:32771 length 0
    (4)   MS-MPPE-Recv-Key =
    0x30388328c55a3aa7e7e75ceba290d4707626816006ef196e3ef87128fc06b896
    (4)   MS-MPPE-Send-Key =
    0x12c21408c1645a553357b43dd88de9cd29268cf1f3fdc6583a028427c22df080
    (4)   EAP-Message = 0x03050004
    (4)   Message-Authenticator = 0x00000000000000000000000000000000
    (4)   User-Name = "sistemi"
    (4) Finished request
    Waking up in 4.9 seconds.
    (0) Cleaning up request packet ID 122 with timestamp +29
    (1) Cleaning up request packet ID 123 with timestamp +29
    (2) Cleaning up request packet ID 124 with timestamp +29
    (3) Cleaning up request packet ID 125 with timestamp +29
    (4) Cleaning up request packet ID 126 with timestamp +29
    Ready to process requests





More information about the Freeradius-Users mailing list