sorry for starting a sidetrack, but you implicitly indicate that you compiled CVS pre 1.0.2 successfully under Solaris, especially the libltdl directory.
Well, we tried several pre-1.0.2 and I think several others, too and it seems many got into the same trouble with libltdl. I think some people would be highly interested to learn what you did to compile it successfully, including libltdl. Checked your output: If I remember correctly the 1.0.1 failed at decoding the tunnel; this seems is entirely related to the NT password itself. > rlm_mschap: NT Domain delimeter found, should we have enabled with_ntdomain_hack? > rlm_mschap: Told to do MS-CHAPv2 for EI2F-ENDL1\Tech_Support with NT-Password > rlm_mschap: FAILED: MS-CHAP2-Response is incorrect --with_ntdomain_hack necessary ? Matthias Rumitz TC Unix / Netzwerke ADIVA Computertechnologie GmbH Norsk-Data-Str. 1 D-61352 Bad Homburg v.d.H. Fon: +49(0) 61 72 / 48 61 - 0 Fax: +49(0) 61 72 / 48 61 - 700 Web: http://www.adiva.de eMail: [EMAIL PROTECTED] Diese E-Mail Nachricht enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben, informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. This e-mail message may contain confidential and/or privileged information. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and destroy this e-mail. ----- Originalnachricht ----- Von: [EMAIL PROTECTED] Datum: Dienstag, Februar 1, 2005 2:52 pm Betreff: CVS 1.0.2 PEAP MSCHAPv2
--- Begin Message ---We have been unsuccessful in integrating a wireless environment utilizing a Windows XP SP2 supplicant, a Cisco 1100 AP, and a freeradius server running on Solaris 2.8. Specifically, we have been testing the developmental version 1.0.2 after using the CVS snapshot suggested by Alan. This version was being tested because of initial Windows NT password issues experienced during the rlm_mschap module execution. The security environment we are using is PEAP/MSCHAPv2 using the root certificate that comes with the freeRadius software. The specific error in MSCHAPv2 has to do with the Windows NT password and is identical to the error we received when using 1.0.1. Alan stated there are known issues using the 1.0.1 release on a Solaris platform. The expectation of running the developmental 1.0.2 build was to correct the errors we experienced. Is there any way we can assist debugging this error efficiently? In addition, has anyone determined specifically which module receives the NT_Password from the supplicant before it is packaged in the VALUE_PAIR structure? We have been spending time trying to determine the problem and any further assistance would be helpful. Here is a log output of the latest run. Thanks Chris Starting - reading configuration files ... reread_config: reading radiusd.conf Config: including file: /usr/local/etc/raddb/proxy.conf Config: including file: /usr/local/etc/raddb/clients.conf Config: including file: /usr/local/etc/raddb/snmp.conf Config: including file: /usr/local/etc/raddb/eap.conf Config: including file: /usr/local/etc/raddb/sql.conf main: prefix = "/usr/local" main: localstatedir = "/usr/local/var" main: logdir = "/usr/local/var/log/radius" main: libdir = "/usr/local/lib" main: radacctdir = "/usr/local/var/log/radius/radacct" main: hostname_lookups = no main: max_request_time = 30 main: cleanup_delay = 5 main: max_requests = 1024 main: delete_blocked_requests = 0 main: port = 0 main: allow_core_dumps = no main: log_stripped_names = no main: log_file = "/usr/local/var/log/radius/radius.log" main: log_auth = no main: log_auth_badpass = no main: log_auth_goodpass = no main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid" main: user = "(null)" main: group = "(null)" main: usercollide = no main: lower_user = "no" main: lower_pass = "no" main: nospace_user = "no" main: nospace_pass = "no" main: checkrad = "/usr/local/sbin/checkrad" main: proxy_requests = no proxy: retry_delay = 5 proxy: retry_count = 3 proxy: synchronous = no proxy: default_fallback = yes proxy: dead_time = 120 proxy: post_proxy_authorize = yes proxy: wake_all_if_all_dead = no security: max_attributes = 200 security: reject_delay = 1 security: status_server = no main: debug_level = 0 read_config_files: reading dictionary read_config_files: reading naslist Using deprecated naslist file. Support for this will go away soon. read_config_files: reading clients read_config_files: reading realms radiusd: entering modules setup Module: Library search path is /usr/local/lib Module: Loaded exec exec: wait = yes exec: program = "(null)" exec: input_pairs = "request" exec: output_pairs = "(null)" exec: packet_type = "(null)" rlm_exec: Wait=yes but no output defined. Did you mean output=none? Module: Instantiated exec (exec) Module: Loaded expr Module: Instantiated expr (expr) Module: Loaded PAP pap: encryption_scheme = "crypt" Module: Instantiated pap (pap) Module: Loaded CHAP Module: Instantiated chap (chap) Module: Loaded MS-CHAP mschap: use_mppe = yes mschap: require_encryption = no mschap: require_strong = no mschap: with_ntdomain_hack = no mschap: passwd = "(null)" mschap: authtype = "MS-CHAP" mschap: ntlm_auth = "(null)" Module: Instantiated mschap (mschap) Module: Loaded System unix: cache = no unix: passwd = "(null)" unix: shadow = "(null)" unix: group = "(null)" unix: radwtmp = "/usr/local/var/log/radius/radwtmp" unix: usegroup = no unix: cache_reload = 600 Module: Instantiated unix (unix) Module: Loaded eap eap: default_eap_type = "peap" eap: timer_expire = 60 eap: ignore_unknown_eap_types = no eap: cisco_accounting_username_bug = no rlm_eap: Loaded and initialized type md5 rlm_eap: Loaded and initialized type leap gtc: challenge = "Password: " gtc: auth_type = "PAP" rlm_eap: Loaded and initialized type gtc tls: rsa_key_exchange = no tls: dh_key_exchange = yes tls: rsa_key_length = 512 tls: dh_key_length = 512 tls: verify_depth = 0 tls: CA_path = "(null)" tls: pem_file_type = yes tls: private_key_file = "/usr/local/etc/raddb/certs/cert-srv.pem" tls: certificate_file = "/usr/local/etc/raddb/certs/cert-srv.pem" tls: CA_file = "/usr/local/etc/raddb/certs/demoCA/cacert.pem" tls: private_key_password = "whatever" tls: dh_file = "/usr/local/etc/raddb/certs/dh" tls: random_file = "/usr/local/etc/raddb/certs/random" tls: fragment_size = 1024 tls: include_length = yes tls: check_crl = yes tls: check_cert_cn = "%{User-Name}" rlm_eap: Loaded and initialized type tls peap: default_eap_type = "mschapv2" peap: copy_request_to_tunnel = no peap: use_tunneled_reply = no peap: proxy_tunneled_request_as_eap = yes rlm_eap: Loaded and initialized type peap mschapv2: with_ntdomain_hack = no rlm_eap: Loaded and initialized type mschapv2 Module: Instantiated eap (eap) Module: Loaded preprocess preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups" preprocess: hints = "/usr/local/etc/raddb/hints" preprocess: with_ascend_hack = no preprocess: ascend_channels_per_line = 23 preprocess: with_ntdomain_hack = no preprocess: with_specialix_jetstream_hack = no preprocess: with_cisco_vsa_hack = no Module: Instantiated preprocess (preprocess) Module: Loaded detail detail: detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (auth_log) Module: Loaded realm realm: format = "suffix" realm: delimiter = "@" realm: ignore_default = no realm: ignore_null = no Module: Instantiated realm (suffix) Module: Loaded files files: usersfile = "/usr/local/etc/raddb/users" files: acctusersfile = "/usr/local/etc/raddb/acct_users" files: preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users" files: compat = "no" Module: Instantiated files (files) Module: Loaded Acct-Unique-Session-Id acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" Module: Instantiated acct_unique (acct_unique) detail: detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (detail) Module: Loaded radutmp radutmp: filename = "/usr/local/var/log/radius/radutmp" radutmp: username = "%{User-Name}" radutmp: case_sensitive = yes radutmp: check_with_nas = yes radutmp: perm = 384 radutmp: callerid = yes Module: Instantiated radutmp (radutmp) Listening on authentication *:1812 Listening on accounting *:1813 Ready to process requests. rad_recv: Access-Request packet from host 12.1.10.16:21654, id=141, length=170 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x4f1cd52f88e41340fbf99f3b81eff15a EAP-Message = 0x0201001c01454932462d454e444c315c546563685f537570706f7274 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 modcall[authorize]: module "mschap" returns noop for request 0 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 rlm_eap: EAP packet type response id 1 length 28 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 0 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 0 modcall: group authorize returns updated for request 0 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 0 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 0 modcall: group authenticate returns handled for request 0 Sending Access-Challenge of id 141 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x010200061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb05f77dc5b1e696c3f63fbf922cd512e Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=142, length=240 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x677a270ef14aca4c5abea0f07592ebb3 EAP-Message = 0x0202005019800000004616030100410100003d03014161979dd4a57f971a46a5bda7d9edb44cfc459900814162881fe3ca3c5b25b200001600040005000a000900640062000300060013001200630100 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0xb05f77dc5b1e696c3f63fbf922cd512e Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 1 modcall[authorize]: module "chap" returns noop for request 1 modcall[authorize]: module "mschap" returns noop for request 1 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1 rlm_eap: EAP packet type response id 2 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 1 modcall: group authorize returns updated for request 1 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0694], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone TLS_accept: SSLv3 write server done A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 1 modcall: group authenticate returns handled for request 1 Sending Access-Challenge of id 142 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x0103040a19c0000006f1160301004a0200004603014161dd25da51b74a720c605b349d2034c532701415f99daaafe96eb204ff230020f01bceadf4bd18d1ce36474eb6732c3d1c413cd1a19cc8748acfb5145a99637300040016030106940b00069000068d0002cd308202c930820232a003020102020102300d06092a864886f70d010104050030819f310b30090603550406130243413111300f0603550408130850726f76696e63653112301006035504071309536f6d65204369747931153013060355040a130c4f7267616e697a6174696f6e31123010060355040b13096c6f63616c686f7374311b301906035504031312436c69656e74206365 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x779afa3dd55c24fa54ac292d77205d1c2477ed30d59f57caf9bd21ff2a8d16cc0911c50e4f295763fcb60efa3c3d2d0e43850f6e6fbe284902f6e83503650003ba308203b63082031fa003020102020100300d06092a864886f70d010104050030819f310b30090603550406130243413111300f0603550408130850726f76696e63653112301006035504071309536f6d65204369747931153013060355040a130c4f7267616e697a6174696f6e31123010060355040b13096c6f63616c686f7374311b301906035504031312436c69656e742063657274696669636174653121301f06092a864886f70d0109011612636c69656e74406578616d706c EAP-Message = 0x652e636f6d301e170d3034303132353133323630375a Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe963215ba29dbd326e60667f315bbadd Finished request 1 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=143, length=166 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x3567c6bef51bb3c8c9f25f2c992f0b1e EAP-Message = 0x020300061900 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0xe963215ba29dbd326e60667f315bbadd Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 2 modcall[authorize]: module "preprocess" returns ok for request 2 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 2 modcall[authorize]: module "chap" returns noop for request 2 modcall[authorize]: module "mschap" returns noop for request 2 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 2 rlm_eap: EAP packet type response id 3 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 2 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 2 modcall: group authorize returns updated for request 2 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 2 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 2 modcall: group authenticate returns handled for request 2 Sending Access-Challenge of id 143 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x060355040b13096c6f63616c686f7374311b301906035504031312436c69656e742063657274696669636174653121301f06092a864886f70d0109011612636c69656e74406578616d706c652e636f6d820100300c0603551d13040530030101ff300d06092a864886f70d01010405000381810033c00b66b1e579ef73a06798252dab8d5e5511fc00fd276d80d12f834777c6743fdc2743fca1507704e4bc0979e4f60ac3ad9ee83e6f347369229d1f77229ba2e982359da563024a00163dba6d6c986c0bad28af85132ff8f0d76501bf1b7c2dff658ce1e62c01997b6e64e3e8d4373354ce9912847651539063b85bbc5485c516030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x75e05d99601e8d6fbd6e082495be7422 Finished request 2 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=144, length=352 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x2d7474f9be215e67c19c0aceea5beb28 EAP-Message = 0x020400c01980000000b616030100861000008200806eda92fe9e1e5f40763bd6439e09b0c9ef984338b057a340c6d852715a746e7a293fe34f6f0a768d5195f8f74cfeeb31b2c85a0e8a41b04b78d5ad5b01c9100812b01927a7b821656407075270cafd770fac93255c7d062200a0b3cc5b2f5c9cf43085d0d41fed3dc35b8a60884f57252cf28e4cd6228595d767a82337068fde1403010001011603010020298cd03169fd50e2b166aea4f3169c7e92c7c8fdac8e3d411700df0848303485 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0x75e05d99601e8d6fbd6e082495be7422 Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 3 modcall[authorize]: module "preprocess" returns ok for request 3 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 3 modcall[authorize]: module "chap" returns noop for request 3 modcall[authorize]: module "mschap" returns noop for request 3 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 3 rlm_eap: EAP packet type response id 4 length 192 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 3 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 3 modcall: group authorize returns updated for request 3 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 3 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange TLS_accept: SSLv3 read client key exchange A rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001] rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 read finished A rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001] TLS_accept: SSLv3 write change cipher spec A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 write finished A TLS_accept: SSLv3 flush data (other): SSL negotiation finished successfully SSL Connection Established eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 3 modcall: group authenticate returns handled for request 3 Sending Access-Challenge of id 144 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x01050031190014030100010116030100200bc50e117d7f194e12cf43578c39d539ce5979addfccffe7a3328e9823f53125 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x0f668c90d84f9cdc11216ca225d21440 Finished request 3 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 0 ID 141 with timestamp 4161dd25 Cleaning up request 1 ID 142 with timestamp 4161dd25 Cleaning up request 2 ID 143 with timestamp 4161dd25 Cleaning up request 3 ID 144 with timestamp 4161dd25 Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 12.1.10.16:21654, id=145, length=166 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x6e80b9e746b37ec631d6158671a36e7c EAP-Message = 0x020500061900 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0x0f668c90d84f9cdc11216ca225d21440 Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 4 modcall[authorize]: module "preprocess" returns ok for request 4 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 4 modcall[authorize]: module "chap" returns noop for request 4 modcall[authorize]: module "mschap" returns noop for request 4 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 4 rlm_eap: EAP packet type response id 5 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 4 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 4 modcall: group authorize returns updated for request 4 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 4 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap_peap: EAPTLS_SUCCESS modcall[authenticate]: module "eap" returns handled for request 4 modcall: group authenticate returns handled for request 4 Sending Access-Challenge of id 145 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x01060020190017030100154d880c6197eb52711209f9a70d118d33b96d988b47 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x46b2c6e1a5865835a156910c3682b33f Finished request 4 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=146, length=211 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x11cc07755afb4352ae87e1083c514d3b EAP-Message = 0x020600331900170301002865d1fc04bffb948d849f1ab65a2a79a89c2bf36ee7ea0fa01cf9ca1cd4416dbe7970526afe06cb87 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0x46b2c6e1a5865835a156910c3682b33f Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 5 modcall[authorize]: module "preprocess" returns ok for request 5 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 5 modcall[authorize]: module "chap" returns noop for request 5 modcall[authorize]: module "mschap" returns noop for request 5 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 5 rlm_eap: EAP packet type response id 6 length 51 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 5 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 5 modcall: group authorize returns updated for request 5 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 5 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Identity - EI2F-ENDL1\Tech_Support rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled EAP-Message EAP-Message = 0x0206001c01454932462d454e444c315c546563685f537570706f7274 PEAP: Got tunneled identity of EI2F-ENDL1\Tech_Support PEAP: Setting default EAP type for tunneled EAP session. PEAP: Setting User-Name to EI2F-ENDL1\Tech_Support PEAP: Sending tunneled request EAP-Message = 0x0206001c01454932462d454e444c315c546563685f537570706f7274 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "EI2F-ENDL1\\Tech_Support" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 5 modcall[authorize]: module "preprocess" returns ok for request 5 radius_xlat: '/usr/local/var/log/radius/radacct/127.0.0.1 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/127.0.0.1/auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 5 modcall[authorize]: module "chap" returns noop for request 5 modcall[authorize]: module "mschap" returns noop for request 5 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 5 rlm_eap: EAP packet type response id 6 length 28 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 5 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 5 modcall: group authorize returns updated for request 5 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 5 rlm_eap: EAP Identity rlm_eap: processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge modcall[authenticate]: module "eap" returns handled for request 5 modcall: group authenticate returns handled for request 5 PEAP: Got tunneled reply RADIUS code 11 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x010700311a0107002c10ed71a464b623d3aee1d7c6cba9db8fdd454932462d454e444c315c546563685f537570706f7274 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xdd7b7e6a3584a80abf65ecf41b894306 PEAP: Processing from tunneled session code 201f80 11 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x010700311a0107002c10ed71a464b623d3aee1d7c6cba9db8fdd454932462d454e444c315c546563685f537570706f7274 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xdd7b7e6a3584a80abf65ecf41b894306 PEAP: Got tunneled Access-Challenge modcall[authenticate]: module "eap" returns handled for request 5 modcall: group authenticate returns handled for request 5 Sending Access-Challenge of id 146 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x010700481900170301003d871298ece4d4485b782291cb6d1a3c5a3f59b0f0df24bdfc154f8b6aab4fd3ef2fc2ae2c4a0dcae8d393b595afde3d69161c0aa16ed1f3eeb2ce009fcd Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe151bb487cc9c9d7c21b12e166171139 Finished request 5 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=147, length=254 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0x4f7dba68e8f058a005cf972865d45e47 EAP-Message = 0x0207005e19001703010053790a4cd2e399b68976e6162ae756841a58ae67610af7f77c781b9a529429e998652d883ecddf8ff19efa70d0e7fe786a2dff4823a0f98a303b30dc30172b1abf82b5bb3bcf431de3a4ef379e9e8cd06097d42b NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0xe151bb487cc9c9d7c21b12e166171139 Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 6 modcall[authorize]: module "preprocess" returns ok for request 6 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 6 modcall[authorize]: module "chap" returns noop for request 6 modcall[authorize]: module "mschap" returns noop for request 6 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 6 rlm_eap: EAP packet type response id 7 length 94 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 6 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 6 modcall: group authorize returns updated for request 6 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 6 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: EAP type mschapv2 rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled EAP-Message EAP-Message = 0x020700471a0207004231a6acc6a8981884df72795e19426bf6750000000000000000af149e03eb6616b77f4afadd3c8daee77b8545ca6d4c988100546563685f537570706f7274 PEAP: Setting User-Name to EI2F-ENDL1\Tech_Support PEAP: Adding old state with dd 7b PEAP: Sending tunneled request EAP-Message = 0x020700471a0207004231a6acc6a8981884df72795e19426bf6750000000000000000af149e03eb6616b77f4afadd3c8daee77b8545ca6d4c988100546563685f537570706f7274 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "EI2F-ENDL1\\Tech_Support" State = 0xdd7b7e6a3584a80abf65ecf41b894306 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 6 modcall[authorize]: module "preprocess" returns ok for request 6 radius_xlat: '/usr/local/var/log/radius/radacct/127.0.0.1 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/127.0.0.1/auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 6 modcall[authorize]: module "chap" returns noop for request 6 modcall[authorize]: module "mschap" returns noop for request 6 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 6 rlm_eap: EAP packet type response id 7 length 71 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 6 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 6 modcall: group authorize returns updated for request 6 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 6 rlm_eap: Request found, released from the list rlm_eap: EAP/mschapv2 rlm_eap: processing type mschapv2 Processing the authenticate section of radiusd.conf modcall: entering group Auth-Type for request 6 rlm_mschap: NT Domain delimeter found, should we have enabled with_ntdomain_hack? rlm_mschap: Told to do MS-CHAPv2 for EI2F-ENDL1\Tech_Support with NT-Password rlm_mschap: FAILED: MS-CHAP2-Response is incorrect modcall[authenticate]: module "mschap" returns reject for request 6 modcall: group Auth-Type returns reject for request 6 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns reject for request 6 modcall: group authenticate returns reject for request 6 auth: Failed to validate the user. PEAP: Got tunneled reply RADIUS code 3 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" MS-CHAP-Error = "\007E=691 R=1" EAP-Message = 0x04070004 Message-Authenticator = 0x00000000000000000000000000000000 PEAP: Processing from tunneled session code 1f0390 3 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" MS-CHAP-Error = "\007E=691 R=1" EAP-Message = 0x04070004 Message-Authenticator = 0x00000000000000000000000000000000 PEAP: Tunneled authentication was rejected. rlm_eap_peap: FAILURE modcall[authenticate]: module "eap" returns handled for request 6 modcall: group authenticate returns handled for request 6 Sending Access-Challenge of id 147 to 12.1.10.16:21654 Framed-IP-Address = 12.1.10.20 Framed-IP-Netmask = 255.255.255.0 Framed-MTU = 1500 Reply-Message = "Hello, %u" EAP-Message = 0x010800261900170301001bfadb3611f6021742df97f92b6bbd60a730dd2cd8c3a21f688d717c Message-Authenticator = 0x00000000000000000000000000000000 State = 0x0fb603950a4e7f5db2a503c7529ec91c Finished request 6 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=148, length=198 User-Name = "EI2F-ENDL1\\Tech_Support" Framed-MTU = 1400 Called-Station-Id = "0011.5c81.b2e0" Calling-Station-Id = "000f.f736.3068" Message-Authenticator = 0xfc8eec8125cceae758b72a1ad094ca48 EAP-Message = 0x020800261900170301001b886c09e6ce520033beef4f0d83941ee2ac15521986148ba6942113 NAS-Port-Type = Wireless-802.11 NAS-Port = 462 State = 0x0fb603950a4e7f5db2a503c7529ec91c Service-Type = Framed-User NAS-IP-Address = 12.1.10.16 NAS-Identifier = "EI2F_ENDL_AP1" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 7 modcall[authorize]: module "preprocess" returns ok for request 7 radius_xlat: '/usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004' rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/12.1.10.16 /auth-detail-20041004 modcall[authorize]: module "auth_log" returns ok for request 7 modcall[authorize]: module "chap" returns noop for request 7 modcall[authorize]: module "mschap" returns noop for request 7 rlm_realm: No '@' in User-Name = "EI2F-ENDL1\Tech_Support", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 7 rlm_eap: EAP packet type response id 8 length 38 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 7 users: Matched entry EI2F-ENDL1\Tech_Support at line 94 modcall[authorize]: module "files" returns ok for request 7 modcall: group authorize returns updated for request 7 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 7 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Received EAP-TLV response. rlm_eap_peap: Tunneled data is valid. rlm_eap_peap: Had sent TLV failure, rejecting. rlm_eap: Handler failed in EAP/peap rlm_eap: Failed in EAP select modcall[authenticate]: module "eap" returns invalid for request 7 modcall: group authenticate returns invalid for request 7 auth: Failed to validate the user. Delaying request 7 for 1 seconds Finished request 7 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 12.1.10.16:21654, id=148, length=198 Sending Access-Reject of id 148 to 12.1.10.16:21654 EAP-Message = 0x04080004 Message-Authenticator = 0x00000000000000000000000000000000 Reply-Message = "Hello, %u" --- Walking the entire request list --- Waking up in 1 seconds... --- Walking the entire request list --- Cleaning up request 4 ID 145 with timestamp 4161dd3c Cleaning up request 5 ID 146 with timestamp 4161dd3c Cleaning up request 6 ID 147 with timestamp 4161dd3c Cleaning up request 7 ID 148 with timestamp 4161dd3c Nothing to do. Sleeping until we see a request. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
--- End Message ---

