hi folks,
I'm trying to use radclient to test some chap confs, but I fail everytime.
I use freeRADIUS 0.7 with a simple users entry:
DEFAULT
Auth-Type := CHAP, User-Password="123456"
the secret is ok, because using PAP, all is ok.
This is the file that radclient uses:
User-Name=3292817400
CHAP-Password="123456"
Framed-IP-Address = 172.16.3.33
Called-Station-Id="9000"
Calling-Station-Id="3282817400"
Cisco-Multilink-ID=5
and this is the request from radclient:
Sending Access-Request of id 162 to 127.0.0.1:1812
User-Name = "3292817400"
CHAP-Password = 0xa21b25d7865183e11c1439588137110550
Framed-IP-Address = 172.16.3.33
Called-Station-Id = "9000"
Calling-Station-Id = "3282817400"
Cisco-Multilink-ID = 5
rad_recv: Access-Reject packet from host 127.0.0.1:1812, id=162, length=20
$
and this is the radiusd response:
rad_recv: Access-Request packet from host 127.0.0.1:33079, id=162, length=87
User-Name = "3292817400"
CHAP-Password = 0xa21b25d7865183e11c1439588137110550
Framed-IP-Address = 172.16.3.33
Called-Station-Id = "9000"
Calling-Station-Id = "3282817400"
Cisco-Multilink-ID = 5
modcall: entering group authorize
modcall[authorize]: module "preprocess" returns ok
rlm_chap: Adding Auth-Type = CHAP
modcall[authorize]: module "chap" returns ok
modcall[authorize]: module "mschap" returns notfound
users: Matched DEFAULT at 57
modcall[authorize]: module "files" returns ok
modcall: group authorize returns ok
rad_check_password: Found Auth-Type CHAP
auth: type "CHAP"
modcall: entering group authtype
rlm_chap: login attempt by "3292817400" with CHAP password �?%�?Q?�??9X?7??P
rlm_chap: Using clear text password 123456 for user 3292817400
authentication.
rlm_chap: Pasword check failed
modcall[authenticate]: module "chap" returns reject
modcall: group authtype returns reject
auth: Failed to validate the user.
Login incorrect (rlm_chap: Wrong user password):
[3292817400/<CHAP-Password>] (from client localhost port 0 cli 3282817400)
Sending Access-Reject of id 162 to 127.0.0.1:33079
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 162 with timestamp 3d6e5a68
Nothing to do. Sleeping until we see a request.
It seems that the password is not properly
decoded.....+-�w��˛���m��˛���m�zm�����y��v+���?�+-����m�