Hi,
I have successfully authenticated a linux client (xsupplicant) with an ap running hostapd that talks to a radius server ( FreeRADIUS 0.9.3 debian/unstable) with eap-tls.
I have also successfully authenticated an win XP client, but after some 30 seconds the win XP client seems to send a new request and the radius server accepts, then the radius server starts to clean up requests and the win XP client drops its connection and I need to "Connect" the client again.
When I see this message the win XP client drops the connection:
Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 12 ID 98 with timestamp 40b31cc9 Cleaning up request 13 ID 99 with timestamp 40b31cc9 Cleaning up request 14 ID 100 with timestamp 40b31cc9 Cleaning up request 15 ID 101 with timestamp 40b31cc9 Cleaning up request 16 ID 102 with timestamp 40b31cc9 Cleaning up request 17 ID 103 with timestamp 40b31cc9
How can my linux client work perfectly, but the win XP client not? (well almost not)
/Regards Ulf
The win XP client has the latest WPA-patch from Mircosoft. I have attached the radius log and the radiusd.conf file.
Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /etc/freeradius/proxy.conf
Config: including file: /etc/freeradius/clients.conf
Config: including file: /etc/freeradius/snmp.conf
Config: including file: /etc/freeradius/sql.conf
main: prefix = "/usr"
main: localstatedir = "/var"
main: logdir = "/var/log/freeradius"
main: libdir = "/usr/lib/freeradius"
main: radacctdir = "/var/log/freeradius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = no
main: log_file = "/var/log/freeradius/radius.log"
main: log_auth = yes
main: log_auth_badpass = yes
main: log_auth_goodpass = yes
main: pidfile = "/var/run/freeradius/freeradius.pid"
main: user = "freerad"
main: group = "freerad"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/sbin/checkrad"
main: proxy_requests = yes
proxy: retry_delay = 5
proxy: retry_count = 3
proxy: synchronous = no
proxy: default_fallback = yes
proxy: dead_time = 120
proxy: post_proxy_authorize = yes
proxy: wake_all_if_all_dead = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
read_config_files: reading realms
Using deprecated realms file. Support for this will go away soon.
radiusd: entering modules setup
Module: Library search path is /usr/lib/freeradius
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = no
mschap: require_strong = no
mschap: passwd = "(null)"
mschap: authtype = "MS-CHAP"
Module: Instantiated mschap (mschap)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "/etc/shadow"
unix: group = "(null)"
unix: radwtmp = "/var/log/freeradius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "tls"
eap: timer_expire = 60
rlm_eap: Loaded and initialized the type md5
rlm_eap: Loaded and initialized the type leap
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/etc/1x/server/server.pem"
tls: certificate_file = "/etc/1x/server/server.pem"
tls: CA_file = "/etc/1x/server/root.pem"
tls: private_key_password = "whatever"
tls: dh_file = "/etc/1x/DH"
tls: random_file = "/etc/1x/random"
tls: fragment_size = 1024
tls: include_length = yes
rlm_eap_tls: conf N ctx stored
rlm_eap: Loaded and initialized the type tls
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/etc/freeradius/huntgroups"
preprocess: hints = "/etc/freeradius/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/etc/freeradius/users"
files: acctusersfile = "/etc/freeradius/acct_users"
files: preproxy_usersfile = "/etc/freeradius/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
NAS-Port-Id"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile = "/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/var/log/freeradius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on IP address *, ports 1812/udp and 1813/udp, with proxy on 1814/udp.
Ready to process requests.
rad_recv: Access-Request packet from host 10.11.10.11:1026, id=86, length=150
User-Name = "username"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Called-Station-Id = "11-22-33-44-55-66:test"
Calling-Station-Id = "AA-BB-CC-DD-EE-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0200000b016b6566666f36
Message-Authenticator = 0x943edcc4732aa542d3381f002a7567c6
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
rlm_eap: EAP packet type notification id 0 length 11
rlm_eap: EAP Start not found
modcall[authorize]: module "eap" returns updated for request 0
rlm_realm: No '@' in User-Name = "username", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
users: Matched DEFAULT at 153
users: Matched username at 228
modcall[authorize]: module "files" returns ok for request 0
modcall[authorize]: module "mschap" returns noop for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 0
rlm_eap: EAP packet type notification id 0 length 11
rlm_eap: EAP Start not found
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns ok for request 0
modcall: group authenticate returns ok for request 0
Login OK: [username/<no User-Password attribute>] (from client AP port 1 cli
AA-BB-CC-DD-EE-FF)
Sending Access-Challenge of id 86 to 10.11.10.11:1026
EAP-Message = 0x010100060d20
Message-Authenticator = 0x00000000000000000000000000000000
State =
0xd12a5ac9ae1c21cb347970e9fdc7aac6ba1cb34022646a60755838a9239379e23735b95d
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.11.10.11:1026, id=87, length=289
User-Name = "username"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Called-Station-Id = "11-22-33-44-55-66:test"
Calling-Station-Id = "AA-BB-CC-DD-EE-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x020100700d800000006616030100610100005d030140b31cbc3fabdae2afed328f4a87b98699dfa5018ae818d8b76bbe798dc21290203539fb0e66b32aa66f9621fd655618fb0412ad7e564c90f6d84e872b39c2049d001600040005000a000900640062000300060013001200630100
State =
0xd12a5ac9ae1c21cb347970e9fdc7aac6ba1cb34022646a60755838a9239379e23735b95d
Message-Authenticator = 0x6c4257773e64d688a990b1cbc8da26bb
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
rlm_eap: EAP packet type notification id 1 length 112
rlm_eap: EAP Start not found
modcall[authorize]: module "eap" returns updated for request 1
rlm_realm: No '@' in User-Name = "username", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
users: Matched DEFAULT at 153
users: Matched username at 228
modcall[authorize]: module "files" returns ok for request 1
modcall[authorize]: module "mschap" returns noop for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 1
rlm_eap: EAP packet type notification id 1 length 112
rlm_eap: EAP Start not found
rlm_eap: Request found, released from the list
rlm_eap: EAP_TYPE - tls
rlm_eap: processing type tls
rlm_eap_tls: Authenticate
rlm_eap_tls: Length Included
undefined: before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 070e], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 00cb], CertificateRequest
TLS_accept: SSLv3 write certificate request A
TLS_accept: SSLv3 flush data
TLS_accept:error in SSLv3 read client certificate A
rlm_eap_tls: SSL_read Error
Error code is ..... 2
SSL Error ..... 2
modcall[authenticate]: module "eap" returns ok for request 1
modcall: group authenticate returns ok for request 1
Login OK: [username/<no User-Password attribute>] (from client AP port 1 cli
AA-BB-CC-DD-EE-FF)
Sending Access-Challenge of id 87 to 10.11.10.11:1026
EAP-Message =
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
EAP-Message =
0x697665311e301c0603550403131546756e6e79626f6e6520576972656c6573732043413121301f06092a864886f70d0109011612726d636b617940767567616d65732e636f6d301e170d3034303432323134313730345a170d3035303432323134313730345a3081ab310b3009060355040613024354311430120603550408130b436f6e6e65637469637574310f300d0603550407130643616e746f6e3120301e060355040a1317566976656e646920556e6976657273616c2047616d6573311e301c060355040b131546756e6e79626f6e6520496e7465726163746976653110300e06035504031307736572766572323121301f06092a864886f70d
EAP-Message =
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
EAP-Message =
0xa6082140881048c9e315d72481d649d8a778cf1fec0c58253872df14d9e5576fa4d14fd38bc154d62fa591ec8d1873a5ffd40f9035e183526cfe90c82e1ca7d16af068c34d6e97b9c75c01e79062284b1be05989715255473a8a50c945d05226505c146b1694abde00040a308204063082036fa003020102020100300d06092a864886f70d01010405003081b9310b3009060355040613024354311430120603550408130b436f6e6e65637469637574310f300d0603550407130643616e746f6e3120301e060355040a1317566976656e646920556e6976657273616c2047616d6573311e301c060355040b131546756e6e79626f6e6520496e746572
EAP-Message = 0x616374697665311e301c0603550403131546756e6e79
Message-Authenticator = 0x00000000000000000000000000000000
State =
0x6bfd381f6387e45e9ec24489d8871c49ba1cb340d1a43a026825dda2eb759fd681e893ec
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.11.10.11:1026, id=88, length=183
User-Name = "username"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Called-Station-Id = "11-22-33-44-55-66:test"
Calling-Station-Id = "AA-BB-CC-DD-EE-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020200060d00
State =
0x6bfd381f6387e45e9ec24489d8871c49ba1cb340d1a43a026825dda2eb759fd681e893ec
Message-Authenticator = 0x34487632620182209c7fdaf235e58945
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
modcall[authorize]: module "chap" returns noop for request 2
rlm_eap: EAP packet type notification id 2 length 6
rlm_eap: EAP Start not found
modcall[authorize]: module "eap" returns updated for request 2
rlm_realm: No '@' in User-Name = "username", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 2
users: Matched DEFAULT at 153
users: Matched username at 228
modcall[authorize]: module "files" returns ok for request 2
modcall[authorize]: module "mschap" returns noop for request 2
modcall: group authorize returns updated for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 2
rlm_eap: EAP packet type notification id 2 length 6
rlm_eap: EAP Start not found
rlm_eap: Request found, released from the list
rlm_eap: EAP_TYPE - tls
rlm_eap: processing type tls
rlm_eap_tls: Authenticate
rlm_eap_tls: Received EAP-TLS ACK message
modcall[authenticate]: module "eap" returns ok for request 2
modcall: group authenticate returns ok for request 2
Login OK: [username/<no User-Password attribute>] (from client AP port 1 cli
AA-BB-CC-DD-EE-FF)
Sending Access-Challenge of id 88 to 10.11.10.11:1026
EAP-Message =
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
EAP-Message =
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
EAP-Message =
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
EAP-Message =
0x4a6703abfb0680631f4c46f91f1054cdb30e75f4e2bb753828e4fb9d074ef4419eb28cc71b6c5c6df8ebefd787947098b0e902c283cc466b2bf26a88294e1e4e743ecba37b4434cb3dfc94756344c0372fab6e66a62f78203dcc4062f46c37735fbb27c80282b2264375ebc5ac9bd9093aa3023ac016030100cb0d0000c302010200be00bc3081b9310b3009060355040613024354311430120603550408130b436f6e6e65637469637574310f300d0603550407130643616e746f6e3120301e060355040a1317566976656e646920556e6976657273616c2047616d6573311e301c060355040b131546756e6e79626f6e6520496e7465726163746976
EAP-Message = 0x65311e301c0603550403131546756e6e79626f6e6520
Message-Authenticator = 0x00000000000000000000000000000000
State =
0xa22efe3e818aebfeccd0b2f4fa92a5e8ba1cb340ed7d1c18f017850f3c7827f65823463a
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.11.10.11:1026, id=89, length=183
User-Name = "username"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Called-Station-Id = "11-22-33-44-55-66:test"
Calling-Station-Id = "AA-BB-CC-DD-EE-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020300060d00
State =
0xa22efe3e818aebfeccd0b2f4fa92a5e8ba1cb340ed7d1c18f017850f3c7827f65823463a
Message-Authenticator = 0x82bab654dcf57fd1b85aead01bffdfea
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
modcall[authorize]: module "chap" returns noop for request 3
rlm_eap: EAP packet type notification id 3 length 6
rlm_eap: EAP Start not found
modcall[authorize]: module "eap" returns updated for request 3
rlm_realm: No '@' in User-Name = "username", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 3
users: Matched DEFAULT at 153
users: Matched username at 228
modcall[authorize]: module "files" returns ok for request 3
modcall[authorize]: module "mschap" returns noop for request 3
modcall: group authorize returns updated for request 3
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 3
rlm_eap: EAP packet type notification id 3 length 6
rlm_eap: EAP Start not found
rlm_eap: Request found, released from the list
rlm_eap: EAP_TYPE - tls
rlm_eap: processing type tls
rlm_eap_tls: Authenticate
rlm_eap_tls: Received EAP-TLS ACK message
modcall[authenticate]: module "eap" returns ok for request 3
modcall: group authenticate returns ok for request 3
Login OK: [username/<no User-Password attribute>] (from client AP port 1 cli
AA-BB-CC-DD-EE-FF)
Sending Access-Challenge of id 89 to 10.11.10.11:1026
EAP-Message =
0x0104003c0d8000000832576972656c6573732043413121301f06092a864886f70d0109011612726d636b617940767567616d65732e636f6d0e000000
Message-Authenticator = 0x00000000000000000000000000000000
State =
0x2ed30d41053be8e6f98caf4ef6d4c47dba1cb34087d5b67c5ea24555ee1e8e3936415a24
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.11.10.11:1026, id=90, length=1279
User-Name = "username"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Called-Station-Id = "11-22-33-44-55-66:test"
Calling-Station-Id = "AA-BB-CC-DD-EE-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x020404460d800000043c160301040c0b0002fc0002f90002f6308202f23082025ba003020102020107300d06092a864886f70d01010405003081b9310b3009060355040613024354311430120603550408130b436f6e6e65637469637574310f300d0603550407130643616e746f6e3120301e060355040a1317566976656e646920556e6976657273616c2047616d6573311e301c060355040b131546756e6e79626f6e6520496e746572616374697665311e301c0603550403131546756e6e79626f6e6520576972656c6573732043413121301f06092a864886f70d0109011612726d636b617940767567616d65732e636f6d301e170d3034303432
EAP-Message =
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
EAP-Message =
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
EAP-Message =
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
EAP-Message =
0xa27420fdaca148dbae2f87bb3fc7dab6220b31989242fba3793b8c40c3a4bc0e8a687d4fa572a11403010001011603010020d3d29c618230fccb90b7c7095c8bff5ae63d0bfee4b530bcf163e4bafa387bbd
State =
0x2ed30d41053be8e6f98caf4ef6d4c47dba1cb34087d5b67c5ea24555ee1e8e3936415a24
Message-Authenticator = 0x9b3d4edad6a0fb5082f2107127402d55
modcall: entering group authorize for request 4
modcall[authorize]: module "preprocess" returns ok for request 4
modcall[authorize]: module "chap" returns noop for request 4
rlm_eap: EAP packet type notification id 4 length 1094
rlm_eap: EAP Start not found
modcall[authorize]: module "eap" returns updated for request 4
rlm_realm: No '@' in User-Name = "username", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 4
users: Matched DEFAULT at 153
users: Matched username at 228
modcall[authorize]: module "files" returns ok for request 4
modcall[authorize]: module "mschap" returns noop for request 4
modcall: group authorize returns updated for request 4
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 4
rlm_eap: EAP packet type notification id 4 length 1094
rlm_eap: EAP Start not found
rlm_eap: Request found, released from the list
rlm_eap: EAP_TYPE - tls
rlm_eap: processing type tls
rlm_eap_tls: Authenticate
rlm_eap_tls: Length Included
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0300], Certificate
chain-depth=1,
error=0
--> User-Name = username
--> BUF-Name = Funnybone Wireless CA
--> subject = /C=CT/ST=Connecticut/L=Canton/O=Vivendi Universal Games/OU=Funnybone
Interactive/CN=Funnybone Wireless CA/[EMAIL PROTECTED]
--> issuer = /C=CT/ST=Connecticut/L=Canton/O=Vivendi Universal Games/OU=Funnybone
Interactive/CN=Funnybone Wireless CA/[EMAIL PROTECTED]
--> verify return:1
chain-depth=0,
error=0
--> User-Name = username
--> BUF-Name = username
--> subject = /C=CT/ST=Connecticut/L=Canton/O=Vivendi Universal Games/OU=Funnybone
Interactive/CN=username/[EMAIL PROTECTED]
--> issuer = /C=CT/ST=Connecticut/L=Canton/O=Vivendi Universal Games/OU=Funnybone
Interactive/CN=Funnybone Wireless CA/[EMAIL PROTECTED]
--> verify return:1
TLS_accept: SSLv3 read client certificate A
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], CertificateVerify
TLS_accept: SSLv3 read certificate verify A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
undefined: SSL negotiation finished successfully
rlm_eap_tls: SSL_read Error
Error code is ..... 2
SSL Error ..... 2
modcall[authenticate]: module "eap" returns ok for request 4
modcall: group authenticate returns ok for request 4
Login OK: [username/<no User-Password attribute>] (from client AP port 1 cli
AA-BB-CC-DD-EE-FF)
Sending Access-Challenge of id 90 to 10.11.10.11:1026
EAP-Message =
0x010500350d800000002b14030100010116030100203d0039d91b03e35b16adeccc098eabeb0a8c46d59f4ec0db1fae7d27749fbc26
Message-Authenticator = 0x00000000000000000000000000000000
State =
0x61e2c044dacb14698b41db45e33640efba1cb340c77d048eff637f31bf0c4998d39e5229
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.11.10.11:1026, id=91, length=183
User-Name = "username"
NAS-IP-Address = 127.0.0.1
NAS-Port = 1
Called-Station-Id = "11-22-33-44-55-66:test"
Calling-Station-Id = "AA-BB-CC-DD-EE-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020500060d00
State =
0x61e2c044dacb14698b41db45e33640efba1cb340c77d048eff637f31bf0c4998d39e5229
Message-Authenticator = 0x3dd408bebc9e0a06401802d8c7e58131
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
modcall[authorize]: module "chap" returns noop for request 5
rlm_eap: EAP packet type notification id 5 length 6
rlm_eap: EAP Start not found
modcall[authorize]: module "eap" returns updated for request 5
rlm_realm: No '@' in User-Name = "username", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 5
users: Matched DEFAULT at 153
users: Matched username at 228
modcall[authorize]: module "files" returns ok for request 5
modcall[authorize]: module "mschap" returns noop for request 5
modcall: group authorize returns updated for request 5
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 5
rlm_eap: EAP packet type notification id 5 length 6
rlm_eap: EAP Start not found
rlm_eap: Request found, released from the list
rlm_eap: EAP_TYPE - tls
rlm_eap: processing type tls
rlm_eap_tls: Authenticate
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns ok for request 5
modcall: group authenticate returns ok for request 5
Login OK: [username/<no User-Password attribute>] (from client AP port 1 cli
AA-BB-CC-DD-EE-FF)
Sending Access-Accept of id 91 to 10.11.10.11:1026
MS-MPPE-Recv-Key =
0xe900c6ee26d0f2b3c365db97916e2f577131543b0337eeb318477cfc61e4f1af
MS-MPPE-Send-Key =
0x20e213625226083e4c9a50105a97460e0b3b84b658c3e79f06d2f1250a59f0a0
EAP-Message = 0x03050004
Message-Authenticator = 0x00000000000000000000000000000000
Finished request 5
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 86 with timestamp 40b31cba
Cleaning up request 1 ID 87 with timestamp 40b31cba
Cleaning up request 2 ID 88 with timestamp 40b31cba
Cleaning up request 3 ID 89 with timestamp 40b31cba
Cleaning up request 4 ID 90 with timestamp 40b31cba
Cleaning up request 5 ID 91 with timestamp 40b31cba
Nothing to do. Sleeping until we see a request.
prefix = /usr
exec_prefix = /usr
sysconfdir = /etc
localstatedir = /var
sbindir = ${exec_prefix}/sbin
logdir = /var/log/freeradius
raddbdir = /etc/freeradius
radacctdir = ${logdir}/radacct
confdir = ${raddbdir}
run_dir = ${localstatedir}/run/freeradius
log_file = ${logdir}/radius.log
libdir = /usr/lib/freeradius
pidfile = ${run_dir}/freeradius.pid
user = freerad
group = freerad
max_request_time = 30
delete_blocked_requests = no
cleanup_delay = 5
max_requests = 1024
bind_address = *
port = 0
hostname_lookups = no
allow_core_dumps = no
regular_expressions = yes
extended_expressions = yes
log_stripped_names = no
log_auth = yes
log_auth_badpass = yes
log_auth_goodpass = yes
usercollide = no
lower_user = no
lower_pass = no
nospace_user = no
nospace_pass = no
checkrad = ${sbindir}/checkrad
security {
max_attributes = 200
reject_delay = 1
status_server = no
}
proxy_requests = yes
$INCLUDE ${confdir}/proxy.conf
$INCLUDE ${confdir}/clients.conf
snmp = no
$INCLUDE ${confdir}/snmp.conf
thread pool {
start_servers = 5
max_servers = 32
min_spare_servers = 3
max_spare_servers = 10
max_requests_per_server = 0
}
modules {
pap {
encryption_scheme = crypt
}
chap {
authtype = CHAP
}
pam {
pam_auth = radiusd
}
unix {
cache = no
cache_reload = 600
shadow = /etc/shadow
radwtmp = ${logdir}/radwtmp
}
eap {
default_eap_type = tls
timer_expire = 60
md5 {
}
leap {
}
tls {
private_key_password = whatever
private_key_file = /etc/1x/server/server.pem
certificate_file = /etc/1x/server/server.pem
CA_file = /etc/1x/server/root.pem
dh_file = /etc/1x/DH
random_file = /etc/1x/random
fragment_size = 1024
include_length = yes
}
}
mschap {
authtype = MS-CHAP
}
ldap {
server = "ldap.your.domain"
basedn = "o=My Org,c=UA"
filter = "(uid=%{Stripped-User-Name:-%{User-Name}})"
start_tls = no
access_attr = "dialupAccess"
dictionary_mapping = ${raddbdir}/ldap.attrmap
ldap_connections_number = 5
timeout = 4
timelimit = 3
net_timeout = 1
}
realm realmslash {
format = prefix
delimiter = "/"
}
realm suffix {
format = suffix
delimiter = "@"
}
realm realmpercent {
format = suffix
delimiter = "%"
}
preprocess {
huntgroups = ${confdir}/huntgroups
hints = ${confdir}/hints
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
}
files {
usersfile = ${confdir}/users
acctusersfile = ${confdir}/acct_users
compat = no
}
detail {
detailfile = ${radacctdir}/%{Client-IP-Address}/detail-%Y%m%d
detailperm = 0600
}
acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
NAS-Port-Id"
}
$INCLUDE ${confdir}/sql.conf
radutmp {
filename = ${logdir}/radutmp
username = %{User-Name}
case_sensitive = yes
check_with_nas = yes
perm = 0600
callerid = "yes"
}
radutmp sradutmp {
filename = ${logdir}/sradutmp
perm = 0644
callerid = "no"
}
attr_filter {
attrsfile = ${confdir}/attrs
}
counter daily {
filename = ${raddbdir}/db.daily
key = User-Name
count-attribute = Acct-Session-Time
reset = daily
counter-name = Daily-Session-Time
check-name = Max-Daily-Session
allowed-servicetype = Framed-User
cache-size = 5000
}
always fail {
rcode = fail
}
always reject {
rcode = reject
}
always ok {
rcode = ok
simulcount = 0
mpp = no
}
expr {
}
digest {
}
exec {
wait = yes
input_pairs = request
}
exec echo {
wait = yes
program = "/bin/echo %{User-Name}"
input_pairs = request
output_pairs = reply
}
ippool main_pool {
range-start = 192.168.1.1
range-stop = 192.168.3.254
netmask = 255.255.255.0
cache-size = 800
session-db = ${raddbdir}/db.ippool
ip-index = ${raddbdir}/db.ipindex
override = no
}
}
instantiate {
expr
}
authorize {
preprocess
chap
eap
suffix
files
mschap
}
authenticate {
Auth-Type PAP {
pap
}
Auth-Type CHAP {
chap
}
Auth-Type MS-CHAP {
mschap
}
unix
eap
}
preacct {
preprocess
suffix
files
}
accounting {
acct_unique
detail
radutmp
}
session {
radutmp
}
post-auth {
}
pre-proxy {
}
post-proxy {
eap
}

