--- Thai Duong <[EMAIL PROTECTED]> wrote: > > Attachment is the debug log of freeradius, please > take > a look at it. It's been two weeks and I still can > not > make this work. Deadline is comming, please help. > > Regards, > > Thai Duong.
Sorry forgot to attach the debug log. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Starting - reading configuration files ... reread_config: reading radiusd.conf Config: including file: /usr/local/freeradius/etc/raddb/proxy.conf Config: including file: /usr/local/freeradius/etc/raddb/clients.conf Config: including file: /usr/local/freeradius/etc/raddb/snmp.conf Config: including file: /usr/local/freeradius/etc/raddb/eap.conf Config: including file: /usr/local/freeradius/etc/raddb/sql.conf main: prefix = "/usr/local/freeradius" main: localstatedir = "/usr/local/freeradius/var" main: logdir = "/usr/local/freeradius/var/log/radius" main: libdir = "/usr/local/freeradius/lib" main: radacctdir = "/usr/local/freeradius/var/log/radius/radacct" main: hostname_lookups = no main: max_request_time = 30 main: cleanup_delay = 5 main: max_requests = 1024 main: delete_blocked_requests = 0 main: port = 0 main: allow_core_dumps = no main: log_stripped_names = no main: log_file = "/usr/local/freeradius/var/log/radius/radius.log" main: log_auth = no main: log_auth_badpass = no main: log_auth_goodpass = no main: pidfile = "/usr/local/freeradius/var/run/radiusd/radiusd.pid" main: user = "radiusd" main: group = "radiusd" main: usercollide = no main: lower_user = "no" main: lower_pass = "no" main: nospace_user = "no" main: nospace_pass = "no" main: checkrad = "/usr/local/freeradius/sbin/checkrad" main: proxy_requests = yes proxy: retry_delay = 5 proxy: retry_count = 3 proxy: synchronous = no proxy: default_fallback = yes proxy: dead_time = 120 proxy: post_proxy_authorize = no proxy: wake_all_if_all_dead = no security: max_attributes = 200 security: reject_delay = 1 security: status_server = no main: debug_level = 0 read_config_files: reading dictionary read_config_files: reading naslist Using deprecated naslist file. Support for this will go away soon. read_config_files: reading clients read_config_files: reading realms radiusd: entering modules setup Module: Library search path is /usr/local/freeradius/lib Module: Loaded exec exec: wait = yes exec: program = "(null)" exec: input_pairs = "request" exec: output_pairs = "(null)" exec: packet_type = "(null)" rlm_exec: Wait=yes but no output defined. Did you mean output=none? Module: Instantiated exec (exec) Module: Loaded expr Module: Instantiated expr (expr) Module: Loaded PAP pap: encryption_scheme = "crypt" Module: Instantiated pap (pap) Module: Loaded CHAP Module: Instantiated chap (chap) Module: Loaded MS-CHAP mschap: use_mppe = yes mschap: require_encryption = no mschap: require_strong = no mschap: with_ntdomain_hack = no mschap: passwd = "(null)" mschap: ntlm_auth = "(null)" Module: Instantiated mschap (mschap) Module: Loaded System unix: cache = no unix: passwd = "(null)" unix: shadow = "(null)" unix: group = "(null)" unix: radwtmp = "/usr/local/freeradius/var/log/radius/radwtmp" unix: usegroup = no unix: cache_reload = 600 Module: Instantiated unix (unix) Module: Loaded eap eap: default_eap_type = "tls" eap: timer_expire = 60 eap: ignore_unknown_eap_types = no eap: cisco_accounting_username_bug = no rlm_eap: Loaded and initialized type md5 rlm_eap: Loaded and initialized type leap gtc: challenge = "Password: " gtc: auth_type = "PAP" rlm_eap: Loaded and initialized type gtc tls: rsa_key_exchange = no tls: dh_key_exchange = yes tls: rsa_key_length = 512 tls: dh_key_length = 512 tls: verify_depth = 0 tls: CA_path = "(null)" tls: pem_file_type = yes tls: private_key_file = "/usr/local/freeradius/etc/raddb/certs/server_keycert.pem" tls: certificate_file = "/usr/local/freeradius/etc/raddb/certs/server_keycert.pem" tls: CA_file = "/usr/local/freeradius/etc/raddb/certs/cacert.pem" tls: private_key_password = "" tls: dh_file = "/usr/local/freeradius/etc/raddb/certs/dh" tls: random_file = "/usr/local/freeradius/etc/raddb/certs/random" tls: fragment_size = 1024 tls: include_length = yes tls: check_crl = no tls: check_cert_cn = "(null)" tls: cipher_list = "(null)" tls: check_cert_issuer = "(null)" rlm_eap_tls: Loading the certificate file as a chain rlm_eap: Loaded and initialized type tls mschapv2: with_ntdomain_hack = no rlm_eap: Loaded and initialized type mschapv2 Module: Instantiated eap (eap) Module: Loaded preprocess preprocess: huntgroups = "/usr/local/freeradius/etc/raddb/huntgroups" preprocess: hints = "/usr/local/freeradius/etc/raddb/hints" preprocess: with_ascend_hack = no preprocess: ascend_channels_per_line = 23 preprocess: with_ntdomain_hack = no preprocess: with_specialix_jetstream_hack = no preprocess: with_cisco_vsa_hack = no Module: Instantiated preprocess (preprocess) Module: Loaded realm realm: format = "suffix" realm: delimiter = "@" realm: ignore_default = no realm: ignore_null = no Module: Instantiated realm (suffix) Module: Loaded files files: usersfile = "/usr/local/freeradius/etc/raddb/users" files: acctusersfile = "/usr/local/freeradius/etc/raddb/acct_users" files: preproxy_usersfile = "/usr/local/freeradius/etc/raddb/preproxy_users" files: compat = "no" Module: Instantiated files (files) Module: Loaded Acct-Unique-Session-Id acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" Module: Instantiated acct_unique (acct_unique) Module: Loaded detail detail: detailfile = "/usr/local/freeradius/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (detail) Module: Loaded radutmp radutmp: filename = "/usr/local/freeradius/var/log/radius/radutmp" radutmp: username = "%{User-Name}" radutmp: case_sensitive = yes radutmp: check_with_nas = yes radutmp: perm = 384 radutmp: callerid = yes Module: Instantiated radutmp (radutmp) Listening on authentication *:1812 Listening on accounting *:1813 Ready to process requests. rad_recv: Access-Request packet from host 192.168.22.23:1812, id=22, length=125 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User EAP-Message = 0x0201000b0174686169646e Message-Authenticator = 0x7ea6047556fd8395c193b26b9f2ec5a4 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 modcall[authorize]: module "mschap" returns noop for request 0 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 rlm_eap: EAP packet type response id 1 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 0 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 0 modcall: leaving group authorize (returns updated) for request 0 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 0 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 0 modcall: leaving group authenticate (returns handled) for request 0 Sending Access-Challenge of id 22 to 192.168.22.23 port 1812 EAP-Message = 0x010200060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x1f1cd2bdf911cd199be24edc4e9259c6 Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.22.23:1812, id=23, length=212 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User State = 0x1f1cd2bdf911cd199be24edc4e9259c6 EAP-Message = 0x020200500d800000004616030100410100003d030144c9d881d19c4f06355bda97e78700f70a33ed3b5ad9484f85abcc7ceba4d42b00001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0x9633c50f6b0f4e5834e69ef3efa9e09b Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 modcall[authorize]: module "chap" returns noop for request 1 modcall[authorize]: module "mschap" returns noop for request 1 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1 rlm_eap: EAP packet type response id 2 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 1 modcall: leaving group authorize (returns updated) for request 1 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 1 modcall: leaving group authenticate (returns handled) for request 1 Sending Access-Challenge of id 23 to 192.168.22.23 port 1812 EAP-Message = 0x0103040a0dc000000681160301004a02000046030144c9d87f33b5254c0188a885f69f48e9390948a9442cb0efebc8018ba96959ff2093a7118a486b0755b4d6882c96557b318168180c02efd50fd55b1e5f8df464b900040016030105a80b0005a40005a100027930820275308201dea003020102020101300d06092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036 EAP-Message = 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 EAP-Message = 0x0421c4b19a0f7c41527e729ed9217aed1cd09117706422137a8069fdee2d53eefd2c3ac3a65f0e01debae8e597ddd8e10928b42ca85f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038181009e6539d4984673323e2c6a286c3b530a10f06ad5bd8c72ba0aff8cb6dab44ed662fffd2112e1107e83b775d2f931e49393db55b239acb0b313bd08f0a19a931dddea454c3db255e0749641e0d5a8a18e1a5f5743fa9daf5ef6f047252193764f26b23abe868f993f128b4559683e8c63c43f87a9631bbc039bf7d34672f5390b0003223082031e30820287a003020102020100300d06 EAP-Message = 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 EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x9cf93a122aaf4a18dc1e17b0244f1440 Finished request 1 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 0 ID 22 with timestamp 44c9d87f Cleaning up request 1 ID 23 with timestamp 44c9d87f Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 192.168.22.23:1812, id=24, length=125 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User EAP-Message = 0x0270000b0174686169646e Message-Authenticator = 0x0b80631c70aaf5cdfeb01380c52f1aff Processing the authorize section of radiusd.conf modcall: entering group authorize for request 2 modcall[authorize]: module "preprocess" returns ok for request 2 modcall[authorize]: module "chap" returns noop for request 2 modcall[authorize]: module "mschap" returns noop for request 2 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 2 rlm_eap: EAP packet type response id 112 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 2 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 2 modcall: leaving group authorize (returns updated) for request 2 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 2 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 2 modcall: leaving group authenticate (returns handled) for request 2 Sending Access-Challenge of id 24 to 192.168.22.23 port 1812 EAP-Message = 0x017100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x06c880e4231805f5abb5e09699e82204 Finished request 2 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.22.23:1812, id=25, length=212 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User State = 0x06c880e4231805f5abb5e09699e82204 EAP-Message = 0x027100500d800000004616030100410100003d030144c9d89fe1289dfc1d08d36d75a7d49fa663205f5900d54b3cee529c5f16506000001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0xf2ec603a328d72533a8f8107120ebe6d Processing the authorize section of radiusd.conf modcall: entering group authorize for request 3 modcall[authorize]: module "preprocess" returns ok for request 3 modcall[authorize]: module "chap" returns noop for request 3 modcall[authorize]: module "mschap" returns noop for request 3 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 3 rlm_eap: EAP packet type response id 113 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 3 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 3 modcall: leaving group authorize (returns updated) for request 3 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 3 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 3 modcall: leaving group authenticate (returns handled) for request 3 Sending Access-Challenge of id 25 to 192.168.22.23 port 1812 EAP-Message = 0x0172040a0dc000000681160301004a02000046030144c9d89d718971c690a1aec5c66c20ab3e86bd96a6830d24c2aad80e55472cfc20026e5e180824b01aaf690f5095a053fe46452d9175bfcc68a0b56263e688cf8a00040016030105a80b0005a40005a100027930820275308201dea003020102020101300d06092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036 EAP-Message = 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 EAP-Message = 0x0421c4b19a0f7c41527e729ed9217aed1cd09117706422137a8069fdee2d53eefd2c3ac3a65f0e01debae8e597ddd8e10928b42ca85f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038181009e6539d4984673323e2c6a286c3b530a10f06ad5bd8c72ba0aff8cb6dab44ed662fffd2112e1107e83b775d2f931e49393db55b239acb0b313bd08f0a19a931dddea454c3db255e0749641e0d5a8a18e1a5f5743fa9daf5ef6f047252193764f26b23abe868f993f128b4559683e8c63c43f87a9631bbc039bf7d34672f5390b0003223082031e30820287a003020102020100300d06 EAP-Message = 0x092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036303732373130333230305a170d3039303732363130333230305a306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b060355040313144541422052 EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xc9b129a40c646f4f1d58551fdb669fb9 Finished request 3 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 2 ID 24 with timestamp 44c9d89d Cleaning up request 3 ID 25 with timestamp 44c9d89d Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 192.168.22.23:1812, id=26, length=125 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User EAP-Message = 0x0270000b0174686169646e Message-Authenticator = 0x28e5f7c947a0574335b29e17a7a1f5bc Processing the authorize section of radiusd.conf modcall: entering group authorize for request 4 modcall[authorize]: module "preprocess" returns ok for request 4 modcall[authorize]: module "chap" returns noop for request 4 modcall[authorize]: module "mschap" returns noop for request 4 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 4 rlm_eap: EAP packet type response id 112 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 4 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 4 modcall: leaving group authorize (returns updated) for request 4 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 4 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 4 modcall: leaving group authenticate (returns handled) for request 4 Sending Access-Challenge of id 26 to 192.168.22.23 port 1812 EAP-Message = 0x017100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xed1585374a61c5bd1a8f6212fd1ad124 Finished request 4 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.22.23:1812, id=27, length=212 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User State = 0xed1585374a61c5bd1a8f6212fd1ad124 EAP-Message = 0x027100500d800000004616030100410100003d030144c9d8f999bfeafa18430460c45d0df345868ec3c52aaba26648508167861f7e00001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0x1b9e64830ce66bc10b3721ee2afccc1f Processing the authorize section of radiusd.conf modcall: entering group authorize for request 5 modcall[authorize]: module "preprocess" returns ok for request 5 modcall[authorize]: module "chap" returns noop for request 5 modcall[authorize]: module "mschap" returns noop for request 5 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 5 rlm_eap: EAP packet type response id 113 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 5 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 5 modcall: leaving group authorize (returns updated) for request 5 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 5 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 5 modcall: leaving group authenticate (returns handled) for request 5 Sending Access-Challenge of id 27 to 192.168.22.23 port 1812 EAP-Message = 0x0172040a0dc000000681160301004a02000046030144c9d8f7fed4b85a1a71eb427bd70e5175b43a2bb19818ba66f4267d6da0e74820bc4ef01ac1e879f2d63d19bdf90b33b7dd5d7fe7763d181e7ff077d43d20ef5500040016030105a80b0005a40005a100027930820275308201dea003020102020101300d06092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036 EAP-Message = 0x303732373130333235325a170d3037303732373130333235325a307a310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b3129302706035504031320454142205261646975732041757468656e7469636174696f6e2053657276657230819f300d06092a864886f70d010101050003818d0030818902818100ae8d6bd26af2aa539323b29920dff7b5c5cab859f71cf7bff5c046a1bf55616acf98684aa41162fd8760c267db3e91a4a3dfb93d071e53378ddf1aac3560c4e7dd46f56d6a50cab6d03d EAP-Message = 0x0421c4b19a0f7c41527e729ed9217aed1cd09117706422137a8069fdee2d53eefd2c3ac3a65f0e01debae8e597ddd8e10928b42ca85f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038181009e6539d4984673323e2c6a286c3b530a10f06ad5bd8c72ba0aff8cb6dab44ed662fffd2112e1107e83b775d2f931e49393db55b239acb0b313bd08f0a19a931dddea454c3db255e0749641e0d5a8a18e1a5f5743fa9daf5ef6f047252193764f26b23abe868f993f128b4559683e8c63c43f87a9631bbc039bf7d34672f5390b0003223082031e30820287a003020102020100300d06 EAP-Message = 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 EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4187de03b76ae6354a772343fa07d9a3 Finished request 5 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 4 ID 26 with timestamp 44c9d8f7 Cleaning up request 5 ID 27 with timestamp 44c9d8f7 Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 192.168.22.23:1812, id=28, length=125 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User EAP-Message = 0x0270000b0174686169646e Message-Authenticator = 0x465bca58aa44d04eadfcbcf0560db9e1 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 6 modcall[authorize]: module "preprocess" returns ok for request 6 modcall[authorize]: module "chap" returns noop for request 6 modcall[authorize]: module "mschap" returns noop for request 6 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 6 rlm_eap: EAP packet type response id 112 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 6 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 6 modcall: leaving group authorize (returns updated) for request 6 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 6 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 6 modcall: leaving group authenticate (returns handled) for request 6 Sending Access-Challenge of id 28 to 192.168.22.23 port 1812 EAP-Message = 0x017100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x3196c1fc5460c3638fcec7d66d6a9cb3 Finished request 6 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.22.23:1812, id=29, length=212 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User State = 0x3196c1fc5460c3638fcec7d66d6a9cb3 EAP-Message = 0x027100500d800000004616030100410100003d030144c9d917972ab313a8d224abebb039cc7306a117352dbee66d98b7d656c6a90200001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0x03c226bd3866a9da752d6c41f3c0d183 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 7 modcall[authorize]: module "preprocess" returns ok for request 7 modcall[authorize]: module "chap" returns noop for request 7 modcall[authorize]: module "mschap" returns noop for request 7 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 7 rlm_eap: EAP packet type response id 113 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 7 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 7 modcall: leaving group authorize (returns updated) for request 7 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 7 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 7 modcall: leaving group authenticate (returns handled) for request 7 Sending Access-Challenge of id 29 to 192.168.22.23 port 1812 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x0421c4b19a0f7c41527e729ed9217aed1cd09117706422137a8069fdee2d53eefd2c3ac3a65f0e01debae8e597ddd8e10928b42ca85f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038181009e6539d4984673323e2c6a286c3b530a10f06ad5bd8c72ba0aff8cb6dab44ed662fffd2112e1107e83b775d2f931e49393db55b239acb0b313bd08f0a19a931dddea454c3db255e0749641e0d5a8a18e1a5f5743fa9daf5ef6f047252193764f26b23abe868f993f128b4559683e8c63c43f87a9631bbc039bf7d34672f5390b0003223082031e30820287a003020102020100300d06 EAP-Message = 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 EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x5aa27ccc0ca3ea57e41aabaf3b408804 Finished request 7 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 6 ID 28 with timestamp 44c9d915 Cleaning up request 7 ID 29 with timestamp 44c9d915 Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 192.168.22.23:1812, id=30, length=125 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User EAP-Message = 0x0270000b0174686169646e Message-Authenticator = 0xabfb2755513821cc17c5e556ccb7bcb7 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 8 modcall[authorize]: module "preprocess" returns ok for request 8 modcall[authorize]: module "chap" returns noop for request 8 modcall[authorize]: module "mschap" returns noop for request 8 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 8 rlm_eap: EAP packet type response id 112 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 8 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 8 modcall: leaving group authorize (returns updated) for request 8 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 8 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 8 modcall: leaving group authenticate (returns handled) for request 8 Sending Access-Challenge of id 30 to 192.168.22.23 port 1812 EAP-Message = 0x017100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x17662175a53f3d99f3d59171f5f40cf2 Finished request 8 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.22.23:1812, id=31, length=212 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User State = 0x17662175a53f3d99f3d59171f5f40cf2 EAP-Message = 0x027100500d800000004616030100410100003d030144c9d97113a424286ba502ead756b2da705151daa8d4a8a55a966f58c5ae64f600001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0xc06ea791f72e6991cc061c6369dae4bc Processing the authorize section of radiusd.conf modcall: entering group authorize for request 9 modcall[authorize]: module "preprocess" returns ok for request 9 modcall[authorize]: module "chap" returns noop for request 9 modcall[authorize]: module "mschap" returns noop for request 9 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 9 rlm_eap: EAP packet type response id 113 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 9 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 9 modcall: leaving group authorize (returns updated) for request 9 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 9 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 9 modcall: leaving group authenticate (returns handled) for request 9 Sending Access-Challenge of id 31 to 192.168.22.23 port 1812 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x0421c4b19a0f7c41527e729ed9217aed1cd09117706422137a8069fdee2d53eefd2c3ac3a65f0e01debae8e597ddd8e10928b42ca85f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038181009e6539d4984673323e2c6a286c3b530a10f06ad5bd8c72ba0aff8cb6dab44ed662fffd2112e1107e83b775d2f931e49393db55b239acb0b313bd08f0a19a931dddea454c3db255e0749641e0d5a8a18e1a5f5743fa9daf5ef6f047252193764f26b23abe868f993f128b4559683e8c63c43f87a9631bbc039bf7d34672f5390b0003223082031e30820287a003020102020100300d06 EAP-Message = 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 EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x09ab8427cd1bf95017c9d350fc829e04 Finished request 9 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 8 ID 30 with timestamp 44c9d96f Cleaning up request 9 ID 31 with timestamp 44c9d96f Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 192.168.22.23:1812, id=32, length=125 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User EAP-Message = 0x0270000b0174686169646e Message-Authenticator = 0xbef15c8186c4df80e267485141539763 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 10 modcall[authorize]: module "preprocess" returns ok for request 10 modcall[authorize]: module "chap" returns noop for request 10 modcall[authorize]: module "mschap" returns noop for request 10 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 10 rlm_eap: EAP packet type response id 112 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 10 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 10 modcall: leaving group authorize (returns updated) for request 10 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 10 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 10 modcall: leaving group authenticate (returns handled) for request 10 Sending Access-Challenge of id 32 to 192.168.22.23 port 1812 EAP-Message = 0x017100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x698927ab80b45e57dc9c201970e41bd8 Finished request 10 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.22.23:1812, id=33, length=212 NAS-IP-Address = 192.168.22.23 NAS-Port = 50002 Cisco-NAS-Port = "FastEthernet0/2" NAS-Port-Type = Ethernet User-Name = "thaidn" Calling-Station-Id = "00-08-0D-E6-8C-F6" Service-Type = Framed-User State = 0x698927ab80b45e57dc9c201970e41bd8 EAP-Message = 0x027100500d800000004616030100410100003d030144c9d98f0e3b5a206e12079abc1615b5096520ff43d5d33379091fa7ed131f4e00001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0xdc8c131aed164166b552d596f0ba7f56 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 11 modcall[authorize]: module "preprocess" returns ok for request 11 modcall[authorize]: module "chap" returns noop for request 11 modcall[authorize]: module "mschap" returns noop for request 11 rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 11 rlm_eap: EAP packet type response id 113 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 11 users: Matched entry thaidn at line 151 modcall[authorize]: module "files" returns ok for request 11 modcall: leaving group authorize (returns updated) for request 11 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 11 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 11 modcall: leaving group authenticate (returns handled) for request 11 Sending Access-Challenge of id 33 to 192.168.22.23 port 1812 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036303732373130333230305a170d3039303732363130333230305a306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b060355040313144541422052 EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xc35a320557c7c1d1f1268954eb963edb Finished request 11 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 10 ID 32 with timestamp 44c9d98d Cleaning up request 11 ID 33 with timestamp 44c9d98d Nothing to do. Sleeping until we see a request.
- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html