Hi,

I'm trying to run WindowsXP client with PEAP - MSCHAP-V2 auth and the
authentication fails

I got two possible points of error, but I cannot guess where is my problem:

(1)
rlm_eap_peap: Had sent TLV failure, rejecting
(2)
modcall[authenticate]: module "eap" returns reject for request 7

modcall: group authenticate returns reject for request 7

auth: Failed to validate the user.

What is TLV ?
What is doing request 7 and why does it fail ?

Any ideas ?

Details below:

My WindowsXP client settings are :

Connection properties ->
    Authentication : Enable IEEE 802.1x ...
    EAP type PEAP
Properties ->
        Select Auth. Method: EAP-MSCHAP-v2

The users file:

user3   User-Password == "cisco"

the radiusd.conf
                peap {
                       default_eap_type = mschapv2
                }
                mschapv2 {
                }




The complete log:
# /usr/local/sbin/radiusd -X

Starting - reading configuration files ...

reread_config: reading radiusd.conf

Config: including file: /usr/local/etc/raddb/proxy.conf

Config: including file: /usr/local/etc/raddb/clients.conf

Config: including file: /usr/local/etc/raddb/snmp.conf

Config: including file: /usr/local/etc/raddb/sql.conf

main: prefix = "/usr/local"

main: localstatedir = "/usr/local/var"

main: logdir = "/usr/local/var/log/radius"

main: libdir = "/usr/local/lib"

main: radacctdir = "/usr/local/var/log/radius/radacct"

main: hostname_lookups = no

main: max_request_time = 30

main: cleanup_delay = 5

main: max_requests = 1024

main: delete_blocked_requests = 0

main: port = 0

main: allow_core_dumps = no

main: log_stripped_names = no

main: log_file = "/usr/local/var/log/radius/radius.log"

main: log_auth = no

main: log_auth_badpass = no

main: log_auth_goodpass = no

main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"

main: bind_address = 212.39.64.183 IP address [212.39.64.183]

main: user = "(null)"

main: group = "(null)"

main: usercollide = no

main: lower_user = "no"

main: lower_pass = "no"

main: nospace_user = "no"

main: nospace_pass = "no"

main: checkrad = "/usr/local/sbin/checkrad"

main: proxy_requests = yes

proxy: retry_delay = 5

proxy: retry_count = 3

proxy: synchronous = no

proxy: default_fallback = yes

proxy: dead_time = 120

proxy: post_proxy_authorize = yes

proxy: wake_all_if_all_dead = no

security: max_attributes = 200

security: reject_delay = 1

security: status_server = no

main: debug_level = 0

read_config_files: reading dictionary

read_config_files: reading naslist

Using deprecated naslist file. Support for this will go away soon.

read_config_files: reading clients

Using deprecated clients file. Support for this will go away soon.

read_config_files: reading realms

Using deprecated realms file. Support for this will go away soon.

radiusd: entering modules setup

Module: Library search path is /usr/local/lib

Module: Loaded expr

Module: Instantiated expr (expr)

Module: Loaded eap

eap: default_eap_type = "tls"

eap: timer_expire = 60

eap: ignore_unknown_eap_types = no

rlm_eap: Loaded and initialized type md5

rlm_eap: Loaded and initialized type leap

tls: rsa_key_exchange = no

tls: dh_key_exchange = yes

tls: rsa_key_length = 512

tls: dh_key_length = 512

tls: verify_depth = 0

tls: CA_path = "(null)"

tls: pem_file_type = yes

tls: private_key_file = "/root/CA/btc.pem"

tls: certificate_file = "/root/CA/btc.pem"

tls: CA_file = "/root/CA/root.pem"

tls: private_key_password = "whatever"

tls: dh_file = "/root/CA/DH"

tls: random_file = "/root/CA/random"

tls: fragment_size = 1024

tls: include_length = yes

tls: check_crl = no

rlm_eap: Loaded and initialized type tls

peap: default_eap_type = "mschapv2"

peap: copy_request_to_tunnel = no

peap: use_tunneled_reply = no

peap: proxy_tunneled_request_as_eap = yes

rlm_eap: Loaded and initialized type peap

rlm_eap: Loaded and initialized type mschapv2

Module: Instantiated eap (eap)

Module: Loaded preprocess

preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups"

preprocess: hints = "/usr/local/etc/raddb/hints"

preprocess: with_ascend_hack = no

preprocess: ascend_channels_per_line = 23

preprocess: with_ntdomain_hack = no

preprocess: with_specialix_jetstream_hack = no

preprocess: with_cisco_vsa_hack = yes

Module: Instantiated preprocess (preprocess)

Module: Loaded realm

realm: format = "suffix"

realm: delimiter = "@"

Module: Instantiated realm (suffix)

Module: Loaded files

files: usersfile = "/usr/local/etc/raddb/users"

files: acctusersfile = "/usr/local/etc/raddb/acct_users"

files: preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"

files: compat = "no"

Module: Instantiated files (files)

Module: Loaded Acct-Unique-Session-Id

acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port-Id"

Module: Instantiated acct_unique (acct_unique)

Module: Loaded detail

detail: detailfile =
"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"

detail: detailperm = 384

detail: dirperm = 493

detail: locking = no

Module: Instantiated detail (detail)

Module: Loaded radutmp

radutmp: filename = "/usr/local/var/log/radius/radutmp"

radutmp: username = "%{User-Name}"

radutmp: case_sensitive = yes

radutmp: check_with_nas = yes

radutmp: perm = 384

radutmp: callerid = yes

Module: Instantiated radutmp (radutmp)

Listening on IP address 212.39.64.183, ports 1812/udp and 1813/udp, with
proxy on 1814/udp.

Ready to process requests.



















rad_recv: Access-Request packet from host 192.168.4.5:21647, id=5,
length=123

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x476d997ec6d12a17f63c22831e6c86e5

EAP-Message = 0x0202000a017573657233

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 0

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 0

rlm_eap: EAP packet type response id 2 length 10

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 0

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 0

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 0

modcall: group authorize returns updated for request 0

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 0

rlm_eap: EAP Identity

rlm_eap: processing type tls

rlm_eap_tls: Requiring client certificate

rlm_eap_tls: Initiate

rlm_eap_tls: Start returned 1

modcall[authenticate]: module "eap" returns handled for request 0

modcall: group authenticate returns handled for request 0

Sending Access-Challenge of id 5 to 192.168.4.5:21647

EAP-Message = 0x010300060d20

Message-Authenticator = 0x00000000000000000000000000000000

State = 0xb9d0fb3f7c536f9d415817e67a62936e

Finished request 0

Going to the next request

--- Walking the entire request list ---

Waking up in 6 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=6,
length=137

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0xb621f4d66da55f4f3c08a8355ae4146c

EAP-Message = 0x020300060319

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0xb9d0fb3f7c536f9d415817e67a62936e

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 1

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 1

rlm_eap: EAP packet type response id 3 length 6

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 1

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 1

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 1

modcall: group authorize returns updated for request 1

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 1

rlm_eap: Request found, released from the list

rlm_eap: EAP NAK

rlm_eap: EAP-NAK asked for EAP-Type/peap

rlm_eap: processing type tls

rlm_eap_tls: Initiate

rlm_eap_tls: Start returned 1

modcall[authenticate]: module "eap" returns handled for request 1

modcall: group authenticate returns handled for request 1

Sending Access-Challenge of id 6 to 192.168.4.5:21647

EAP-Message = 0x010400061920

Message-Authenticator = 0x00000000000000000000000000000000

State = 0x082bdaff439a8d1f6862bba00dd34e80

Finished request 1

Going to the next request

Waking up in 6 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=7,
length=243

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x2194c19c6e1b4dc3495b6478f1628005

EAP-Message =
0x0204007019800000006616030100610100005d0301403f4b477fa7603792a860fd7c3a821f
020dd8870591d771f105ae33430573112082eb980a98e6b54cdff5d9f9623e70dc86897694ba
7c4085b8caa93623517609001600040005000a000900640062000300060013001200630100

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0x082bdaff439a8d1f6862bba00dd34e80

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 2

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 2

rlm_eap: EAP packet type response id 4 length 112

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 2

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 2

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 2

modcall: group authorize returns updated for request 2

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 2

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

rlm_eap_tls: Length Included

eaptls_verify returned 11

(other): before/accept initialization

TLS_accept: before/accept initialization

rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello

TLS_accept: SSLv3 read client hello A

rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello

TLS_accept: SSLv3 write server hello A

rlm_eap_tls: >>> TLS 1.0 Handshake [length 0528], Certificate

TLS_accept: SSLv3 write certificate A

rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone

TLS_accept: SSLv3 write server done A

TLS_accept: SSLv3 flush data

TLS_accept:error in SSLv3 read client certificate A

In SSL Handshake Phase

In SSL Accept mode

eaptls_process returned 13

rlm_eap_peap: EAPTLS_HANDLED

modcall[authenticate]: module "eap" returns handled for request 2

modcall: group authenticate returns handled for request 2

Sending Access-Challenge of id 7 to 192.168.4.5:21647

EAP-Message =
0x0105040a19c000000585160301004a020000460301403ecc93fe4f48ffc8c6bfb63bdc6ce4
7b1ceabadf4b1c73f6f45bf413aea03320a1976531920e7e6f5398637fc229c454ef92ad92fc
1c2a79a52f27dead545f1300040016030105280b000524000521000237308202333082019ca0
03020102020101300d06092a864886f70d0101040500305a310b300906035504061302424731
11300f0603550408130842756c6761726961310e300c06035504071305536f66696131143012
060355040a130b4254432d4e6574204c746431123010060355040313095465737420726f6f74
301e170d3034303232363036323331385a170d30353032323530

EAP-Message =
0x36323331385a304c310b30090603550406130242473111300f0603550408130842756c6761
72696131143012060355040a130b4254432d4e6574204c7464311430120603550403130b5465
73742073657276657230819f300d06092a864886f70d010101050003818d0030818902818100
a0f9305354e743efd80a1690617a7649a1bb867ea2b9c8e6cb51ae64f174942027448a07d516
0af62effc9a851b56df1500a84c74411e81c770ff7470c0577cfea49d72d3b64bec40f4df1ca
996263981ceb93e89f50888acfdfd5e14d4e36a0f764e1e38656cdce6f53e31482554d83345e
ad28793d605e8e28bb165d8c06ab0203010001a3173015301306

EAP-Message =
0x03551d25040c300a06082b06010505070301300d06092a864886f70d010104050003818100
81ae6e37a9a1ecfcfd01588ee9759bc7ba5e54c80e18e389161e0f833fc04010d65b7a7a0d0d
07955c033f82e097612e982e31e6959bb2ece0a892956d0ee433fb1664078b5e44a9c4b4520c
9c24eb42ee02312f7566c5f654033fc34159e1da01d51cab41fac164aabea262400f3f997363
89b496b5c87a898650f26cdab0c10002e4308202e030820249a003020102020100300d06092a
864886f70d0101040500305a310b30090603550406130242473111300f060355040813084275
6c6761726961310e300c06035504071305536f66696131143012

EAP-Message =
0x060355040a130b4254432d4e6574204c746431123010060355040313095465737420726f6f
74301e170d3034303232363036323235345a170d3034303332373036323235345a305a310b30
090603550406130242473111300f0603550408130842756c6761726961310e300c0603550407
1305536f66696131143012060355040a130b4254432d4e6574204c7464311230100603550403
13095465737420726f6f7430819f300d06092a864886f70d010101050003818d003081890281
8100c24b998c32de45e65c843fba5319f9d5a2dc0c9a67aaa9f88d9e7875f852b8c137fa202e
de9f433da6fc553a186e5b76a224ece88c0b97853b2a49abff06

EAP-Message = 0x8916f06daba8545c3c6bc258beaa186f60282c005ca3

Message-Authenticator = 0x00000000000000000000000000000000

State = 0x8596d69d94c7e24b2fc92cdc45d48512

Finished request 2

Going to the next request

Waking up in 6 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=8,
length=137

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x9991413e793cb6b2f9fe5210f3aedf80

EAP-Message = 0x020500061900

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0x8596d69d94c7e24b2fc92cdc45d48512

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 3

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 3

rlm_eap: EAP packet type response id 5 length 6

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 3

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 3

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 3

modcall: group authorize returns updated for request 3

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 3

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

rlm_eap_tls: Received EAP-TLS ACK message

rlm_eap_tls: ack handshake fragment handler

eaptls_verify returned 1

eaptls_process returned 13

rlm_eap_peap: EAPTLS_HANDLED

modcall[authenticate]: module "eap" returns handled for request 3

modcall: group authenticate returns handled for request 3

Sending Access-Challenge of id 8 to 192.168.4.5:21647

EAP-Message =
0x0106018b19008ee3bf3e228fe71ac9dbf321233ab3d7509ff08dcf780ba584da369ee432a7
278145754b9c103b5f6bda45e50203010001a381b53081b2301d0603551d0e0416041464fffc
e3d6ed4cd1133b21583cedb43124db389a3081820603551d23047b3079801464fffce3d6ed4c
d1133b21583cedb43124db389aa15ea45c305a310b30090603550406130242473111300f0603
550408130842756c6761726961310e300c06035504071305536f66696131143012060355040a
130b4254432d4e6574204c746431123010060355040313095465737420726f6f74820100300c
0603551d13040530030101ff300d06092a864886f70d01010405

EAP-Message =
0x00038181000b093984feb4be3b27683827711965b6a3d6e425d14ea6efc12c23400adf1904
5aa13d08140a46f5087d4116cd455f9d0a456e2b57d498b0bc22dc22870b49ab6a2543a2250e
d5fa2aaae83f0d7e840f24d529b1a55afb7367ada04669a36598d2852de51dc15afad9cef097
d8c6f8e4020a62bda55eca32afa4497cd4439d0a16030100040e000000

Message-Authenticator = 0x00000000000000000000000000000000

State = 0x2b85a6fcee6e40ea90165f32fe705a5d

Finished request 3

Going to the next request

Waking up in 6 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=9,
length=323

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x1f841bfb9660c1154bdd94eee082a87e

EAP-Message =
0x020600c01980000000b616030100861000008200801edd88d1fb051b322a35e96b50ea25ce
ed8e3d11f61a549850da0c4275732bede8f908658574f73a65a6091e08e5add32e035773adca
cfa80d3655ef60d1bc74a7cf69c7a94c4b86713e98e57a946f3d9f7ba3dbf42a6c0deb8a22d0
55f17859a1febdea3dfb83a25cb90b4e7cf4117df7bc429e8f0f8350e3e86b15b9d664dc1403
0100010116030100204300ae031e59680aad6e7a9d7240ecda84544bb147320a6a2144151543
e79bd5

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0x2b85a6fcee6e40ea90165f32fe705a5d

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 4

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 4

rlm_eap: EAP packet type response id 6 length 192

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 4

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 4

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 4

modcall: group authorize returns updated for request 4

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 4

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

rlm_eap_tls: Length Included

eaptls_verify returned 11

rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange

TLS_accept: SSLv3 read client key exchange A

rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]

rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished

TLS_accept: SSLv3 read finished A

rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]

TLS_accept: SSLv3 write change cipher spec A

rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished

TLS_accept: SSLv3 write finished A

TLS_accept: SSLv3 flush data

(other): SSL negotiation finished successfully

SSL Connection Established

eaptls_process returned 13

rlm_eap_peap: EAPTLS_HANDLED

modcall[authenticate]: module "eap" returns handled for request 4

modcall: group authenticate returns handled for request 4

Sending Access-Challenge of id 9 to 192.168.4.5:21647

EAP-Message =
0x0107003119001403010001011603010020e4a75b500c121be98e25342464df74a5564ede9c
876a4844e2efeba9a45598a4

Message-Authenticator = 0x00000000000000000000000000000000

State = 0xc5f3cb24601f8eb64b30edc4d37d055b

Finished request 4

Going to the next request

Waking up in 6 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=10,
length=137

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x7a98aed2ed291285ddaf542a68de1c1e

EAP-Message = 0x020700061900

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0xc5f3cb24601f8eb64b30edc4d37d055b

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 5

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 5

rlm_eap: EAP packet type response id 7 length 6

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 5

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 5

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 5

modcall: group authorize returns updated for request 5

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 5

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

rlm_eap_tls: Received EAP-TLS ACK message

rlm_eap_tls: ack handshake is finished

eaptls_verify returned 3

eaptls_process returned 3

rlm_eap_peap: EAPTLS_SUCCESS

modcall[authenticate]: module "eap" returns handled for request 5

modcall: group authenticate returns handled for request 5

Sending Access-Challenge of id 10 to 192.168.4.5:21647

EAP-Message =
0x0108002019001703010015c7e4157b2dd95d0246089a89b1d6270a387575b9fa

Message-Authenticator = 0x00000000000000000000000000000000

State = 0xefa14a22269ac85fa30c8fe55fa3fd0e

Finished request 5

Going to the next request

Waking up in 6 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=11,
length=164

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0xc19232910ad58be599fc4952433a0974

EAP-Message =
0x020800211900170301001629da56ad4847737620d405365d634098198164eaed71

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0xefa14a22269ac85fa30c8fe55fa3fd0e

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 6

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 6

rlm_eap: EAP packet type response id 8 length 33

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 6

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 6

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 6

modcall: group authorize returns updated for request 6

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 6

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

eaptls_verify returned 7

rlm_eap_tls: Done initial handshake

eaptls_process returned 7

rlm_eap_peap: EAPTLS_OK

rlm_eap_peap: Session established. Decoding tunneled attributes.

rlm_eap_peap: Identity - user3

rlm_eap_peap: Tunneled data is valid.

PEAP: Got tunneled EAP-Message

EAP-Message = 0x0208000a017573657233

PEAP: Got tunneled identity of user3

PEAP: Setting default EAP type for tunneled EAP session.

PEAP: Sending tunneled request

EAP-Message = 0x0208000a017573657233

FreeRADIUS-Proxied-To = 127.0.0.1

User-Name = "user3"

modcall: entering group authorize for request 6

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 6

rlm_eap: EAP packet type response id 8 length 10

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 6

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 6

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 6

modcall: group authorize returns updated for request 6

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 6

rlm_eap: EAP Identity

rlm_eap: processing type mschapv2

rlm_eap_mschapv2: Issuing Challenge

modcall[authenticate]: module "eap" returns handled for request 6

modcall: group authenticate returns handled for request 6

PEAP: Got tunneled reply RADIUS code 11

EAP-Message =
0x0109001f1a0109001a10125301c5c5749728c3bb01b857b84dc17573657233

Message-Authenticator = 0x00000000000000000000000000000000

State = 0x002a0de0cc1fe7889e42d4b17f1000a6

PEAP: Got tunneled Access-Challenge

modcall[authenticate]: module "eap" returns handled for request 6

modcall: group authenticate returns handled for request 6

Sending Access-Challenge of id 11 to 192.168.4.5:21647

EAP-Message =
0x010900361900170301002bc996fc763affc5f6f644acb4431f2fcb049f9895a4569d3e6a16
fc6e8ddbabef02d505533fad1f72508dc9

Message-Authenticator = 0x00000000000000000000000000000000

State = 0x4c3a94695e2875dbbf38c02f26977748

Finished request 6

Going to the next request

--- Walking the entire request list ---

Waking up in 5 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=12,
length=218

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x5e9788adcbacbee007ace6e74ccb1601

EAP-Message =
0x020900571900170301004ca0b3f59472d9053e677cde46993501e43856b78a4d41970677e0
edc289bc59cdfe302c6e0b11f32620102687a866750ac5a598fd0a71f2c2293bd286ba67087b
636f5c0693dd64fc6e97d332

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0x4c3a94695e2875dbbf38c02f26977748

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 7

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 7

rlm_eap: EAP packet type response id 9 length 87

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 7

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 7

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 7

modcall: group authorize returns updated for request 7

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 7

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

eaptls_verify returned 7

rlm_eap_tls: Done initial handshake

eaptls_process returned 7

rlm_eap_peap: EAPTLS_OK

rlm_eap_peap: Session established. Decoding tunneled attributes.

rlm_eap_peap: EAP type mschapv2

rlm_eap_peap: Tunneled data is valid.

PEAP: Got tunneled EAP-Message

EAP-Message =
0x020900401a0209003b31e45891dcf8d1b7f285ca3ee6d209cfd30000000000000000c2ce74
37fdf0be00dfb9a108766513e48c77943f5373eeba007573657233

PEAP: Adding old state with 00 2a

PEAP: Sending tunneled request

EAP-Message =
0x020900401a0209003b31e45891dcf8d1b7f285ca3ee6d209cfd30000000000000000c2ce74
37fdf0be00dfb9a108766513e48c77943f5373eeba007573657233

FreeRADIUS-Proxied-To = 127.0.0.1

User-Name = "user3"

State = 0x002a0de0cc1fe7889e42d4b17f1000a6

modcall: entering group authorize for request 7

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 7

rlm_eap: EAP packet type response id 9 length 64

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 7

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 7

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 7

modcall: group authorize returns updated for request 7

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 7

rlm_eap: Request found, released from the list

rlm_eap: EAP/mschapv2

rlm_eap: processing type mschapv2

rlm_eap: Freeing handler

modcall[authenticate]: module "eap" returns reject for request 7

modcall: group authenticate returns reject for request 7

auth: Failed to validate the user.

PEAP: Got tunneled reply RADIUS code 3

EAP-Message = 0x04090004

Message-Authenticator = 0x00000000000000000000000000000000

PEAP: Tunneled authentication was rejected.

rlm_eap_peap: FAILURE

modcall[authenticate]: module "eap" returns handled for request 7

modcall: group authenticate returns handled for request 7

Sending Access-Challenge of id 12 to 192.168.4.5:21647

EAP-Message =
0x010a00261900170301001bc89d5a5287583d6c7c548514d20f8d60f4b1086bc821712701d7
c0

Message-Authenticator = 0x00000000000000000000000000000000

State = 0x4fe42031a4a55b47bc1e4ff6cf7f0c3b

Finished request 7

Going to the next request

Waking up in 5 seconds...

rad_recv: Access-Request packet from host 192.168.4.5:21647, id=13,
length=169

User-Name = "user3"

Framed-MTU = 1400

Called-Station-Id = "0002.8a0e.33c0"

Calling-Station-Id = "0090.9660.5c87"

Message-Authenticator = 0x96f6eb4d0898401e43ff45941ba5af47

EAP-Message =
0x020a00261900170301001bbec0ec30a316dd43281ea9bfd85024b422af7d01ef74ba93a6e9
2d

NAS-Port-Type = Wireless-802.11

NAS-Port = 376

State = 0x4fe42031a4a55b47bc1e4ff6cf7f0c3b

Service-Type = Framed-User

NAS-IP-Address = 192.168.4.5

NAS-Identifier = "ap"

modcall: entering group authorize for request 8

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

Invalid operator for item Suffix: reverting to '=='

modcall[authorize]: module "preprocess" returns ok for request 8

rlm_eap: EAP packet type response id 10 length 38

rlm_eap: No EAP Start, assuming it's an on-going EAP conversation

modcall[authorize]: module "eap" returns updated for request 8

rlm_realm: No '@' in User-Name = "user3", looking up realm NULL

rlm_realm: No such realm "NULL"

modcall[authorize]: module "suffix" returns noop for request 8

users: Matched user3 at 93

modcall[authorize]: module "files" returns ok for request 8

modcall: group authorize returns updated for request 8

rad_check_password: Found Auth-Type EAP

auth: type "EAP"

modcall: entering group authenticate for request 8

rlm_eap: Request found, released from the list

rlm_eap: EAP/peap

rlm_eap: processing type peap

rlm_eap_peap: Authenticate

rlm_eap_tls: processing TLS

eaptls_verify returned 7

rlm_eap_tls: Done initial handshake

eaptls_process returned 7

rlm_eap_peap: EAPTLS_OK

rlm_eap_peap: Session established. Decoding tunneled attributes.

rlm_eap_peap: Received EAP-TLV response.

rlm_eap_peap: Tunneled data is valid.

rlm_eap_peap: Had sent TLV failure, rejecting.

rlm_eap: Handler failed in EAP/peap

rlm_eap: Failed in EAP select

modcall[authenticate]: module "eap" returns invalid for request 8

modcall: group authenticate returns invalid for request 8

auth: Failed to validate the user.

Delaying request 8 for 1 seconds

Finished request 8

Going to the next request




- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to