--- Thai Duong <[EMAIL PROTECTED]> wrote:

> 
> Attachment is the debug log of freeradius, please
> take
> a look at it. It's been two weeks and I still can
> not
> make this work. Deadline is comming, please help.
> 
> Regards,
> 
> Thai Duong.

Sorry forgot to attach the debug log.

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/freeradius/etc/raddb/proxy.conf
Config:   including file: /usr/local/freeradius/etc/raddb/clients.conf
Config:   including file: /usr/local/freeradius/etc/raddb/snmp.conf
Config:   including file: /usr/local/freeradius/etc/raddb/eap.conf
Config:   including file: /usr/local/freeradius/etc/raddb/sql.conf
 main: prefix = "/usr/local/freeradius"
 main: localstatedir = "/usr/local/freeradius/var"
 main: logdir = "/usr/local/freeradius/var/log/radius"
 main: libdir = "/usr/local/freeradius/lib"
 main: radacctdir = "/usr/local/freeradius/var/log/radius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = "/usr/local/freeradius/var/log/radius/radius.log"
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = "/usr/local/freeradius/var/run/radiusd/radiusd.pid"
 main: user = "radiusd"
 main: group = "radiusd"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/local/freeradius/sbin/checkrad"
 main: proxy_requests = yes
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = no
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/local/freeradius/lib
Module: Loaded exec 
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec) 
Module: Loaded expr 
Module: Instantiated expr (expr) 
Module: Loaded PAP 
 pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap) 
Module: Loaded CHAP 
Module: Instantiated chap (chap) 
Module: Loaded MS-CHAP 
 mschap: use_mppe = yes
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: with_ntdomain_hack = no
 mschap: passwd = "(null)"
 mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap) 
Module: Loaded System 
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "(null)"
 unix: group = "(null)"
 unix: radwtmp = "/usr/local/freeradius/var/log/radius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix) 
Module: Loaded eap 
 eap: default_eap_type = "tls"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
 gtc: challenge = "Password: "
 gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/usr/local/freeradius/etc/raddb/certs/server_keycert.pem"
 tls: certificate_file = "/usr/local/freeradius/etc/raddb/certs/server_keycert.pem"
 tls: CA_file = "/usr/local/freeradius/etc/raddb/certs/cacert.pem"
 tls: private_key_password = ""
 tls: dh_file = "/usr/local/freeradius/etc/raddb/certs/dh"
 tls: random_file = "/usr/local/freeradius/etc/raddb/certs/random"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
 tls: cipher_list = "(null)"
 tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap) 
Module: Loaded preprocess 
 preprocess: huntgroups = "/usr/local/freeradius/etc/raddb/huntgroups"
 preprocess: hints = "/usr/local/freeradius/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess) 
Module: Loaded realm 
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix) 
Module: Loaded files 
 files: usersfile = "/usr/local/freeradius/etc/raddb/users"
 files: acctusersfile = "/usr/local/freeradius/etc/raddb/acct_users"
 files: preproxy_usersfile = "/usr/local/freeradius/etc/raddb/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files) 
Module: Loaded Acct-Unique-Session-Id 
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique) 
Module: Loaded detail 
 detail: detailfile = "/usr/local/freeradius/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail) 
Module: Loaded radutmp 
 radutmp: filename = "/usr/local/freeradius/var/log/radius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp) 
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=22, length=125
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	EAP-Message = 0x0201000b0174686169646e
	Message-Authenticator = 0x7ea6047556fd8395c193b26b9f2ec5a4
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "chap" returns noop for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
  rlm_eap: EAP packet type response id 1 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 22 to 192.168.22.23 port 1812
	EAP-Message = 0x010200060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x1f1cd2bdf911cd199be24edc4e9259c6
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=23, length=212
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	State = 0x1f1cd2bdf911cd199be24edc4e9259c6
	EAP-Message = 0x020200500d800000004616030100410100003d030144c9d881d19c4f06355bda97e78700f70a33ed3b5ad9484f85abcc7ceba4d42b00001600040005000a000900640062000300060013001200630100
	Message-Authenticator = 0x9633c50f6b0f4e5834e69ef3efa9e09b
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "chap" returns noop for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
  rlm_eap: EAP packet type response id 2 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 23 to 192.168.22.23 port 1812
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036303732373130333230305a170d3039303732363130333230305a306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b060355040313144541422052
	EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x9cf93a122aaf4a18dc1e17b0244f1440
Finished request 1
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 22 with timestamp 44c9d87f
Cleaning up request 1 ID 23 with timestamp 44c9d87f
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=24, length=125
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	EAP-Message = 0x0270000b0174686169646e
	Message-Authenticator = 0x0b80631c70aaf5cdfeb01380c52f1aff
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "chap" returns noop for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
  rlm_eap: EAP packet type response id 112 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 24 to 192.168.22.23 port 1812
	EAP-Message = 0x017100060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x06c880e4231805f5abb5e09699e82204
Finished request 2
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=25, length=212
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	State = 0x06c880e4231805f5abb5e09699e82204
	EAP-Message = 0x027100500d800000004616030100410100003d030144c9d89fe1289dfc1d08d36d75a7d49fa663205f5900d54b3cee529c5f16506000001600040005000a000900640062000300060013001200630100
	Message-Authenticator = 0xf2ec603a328d72533a8f8107120ebe6d
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "chap" returns noop for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
  rlm_eap: EAP packet type response id 113 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 25 to 192.168.22.23 port 1812
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xc9b129a40c646f4f1d58551fdb669fb9
Finished request 3
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 2 ID 24 with timestamp 44c9d89d
Cleaning up request 3 ID 25 with timestamp 44c9d89d
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=26, length=125
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	EAP-Message = 0x0270000b0174686169646e
	Message-Authenticator = 0x28e5f7c947a0574335b29e17a7a1f5bc
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "chap" returns noop for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
  rlm_eap: EAP packet type response id 112 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 26 to 192.168.22.23 port 1812
	EAP-Message = 0x017100060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xed1585374a61c5bd1a8f6212fd1ad124
Finished request 4
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=27, length=212
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	State = 0xed1585374a61c5bd1a8f6212fd1ad124
	EAP-Message = 0x027100500d800000004616030100410100003d030144c9d8f999bfeafa18430460c45d0df345868ec3c52aaba26648508167861f7e00001600040005000a000900640062000300060013001200630100
	Message-Authenticator = 0x1b9e64830ce66bc10b3721ee2afccc1f
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "chap" returns noop for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 113 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 27 to 192.168.22.23 port 1812
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x0421c4b19a0f7c41527e729ed9217aed1cd09117706422137a8069fdee2d53eefd2c3ac3a65f0e01debae8e597ddd8e10928b42ca85f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038181009e6539d4984673323e2c6a286c3b530a10f06ad5bd8c72ba0aff8cb6dab44ed662fffd2112e1107e83b775d2f931e49393db55b239acb0b313bd08f0a19a931dddea454c3db255e0749641e0d5a8a18e1a5f5743fa9daf5ef6f047252193764f26b23abe868f993f128b4559683e8c63c43f87a9631bbc039bf7d34672f5390b0003223082031e30820287a003020102020100300d06
	EAP-Message = 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
	EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4187de03b76ae6354a772343fa07d9a3
Finished request 5
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 4 ID 26 with timestamp 44c9d8f7
Cleaning up request 5 ID 27 with timestamp 44c9d8f7
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=28, length=125
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	EAP-Message = 0x0270000b0174686169646e
	Message-Authenticator = 0x465bca58aa44d04eadfcbcf0560db9e1
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "chap" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 112 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 28 to 192.168.22.23 port 1812
	EAP-Message = 0x017100060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x3196c1fc5460c3638fcec7d66d6a9cb3
Finished request 6
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=29, length=212
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	State = 0x3196c1fc5460c3638fcec7d66d6a9cb3
	EAP-Message = 0x027100500d800000004616030100410100003d030144c9d917972ab313a8d224abebb039cc7306a117352dbee66d98b7d656c6a90200001600040005000a000900640062000300060013001200630100
	Message-Authenticator = 0x03c226bd3866a9da752d6c41f3c0d183
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 113 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challenge of id 29 to 192.168.22.23 port 1812
	EAP-Message = 0x0172040a0dc000000681160301004a02000046030144c9d91546d43ecaa9acf171bca347ed1fa6f1d38c58d7fec81c820fa0ed7d7c203d7c8f5b9601d718d2e994132d1f3e13c36e40c3c57f5ef0c258c41371adffa800040016030105a80b0005a40005a100027930820275308201dea003020102020101300d06092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036303732373130333230305a170d3039303732363130333230305a306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b060355040313144541422052
	EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x5aa27ccc0ca3ea57e41aabaf3b408804
Finished request 7
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 6 ID 28 with timestamp 44c9d915
Cleaning up request 7 ID 29 with timestamp 44c9d915
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=30, length=125
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	EAP-Message = 0x0270000b0174686169646e
	Message-Authenticator = 0xabfb2755513821cc17c5e556ccb7bcb7
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "chap" returns noop for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
  rlm_eap: EAP packet type response id 112 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 8
modcall: leaving group authenticate (returns handled) for request 8
Sending Access-Challenge of id 30 to 192.168.22.23 port 1812
	EAP-Message = 0x017100060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x17662175a53f3d99f3d59171f5f40cf2
Finished request 8
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=31, length=212
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	State = 0x17662175a53f3d99f3d59171f5f40cf2
	EAP-Message = 0x027100500d800000004616030100410100003d030144c9d97113a424286ba502ead756b2da705151daa8d4a8a55a966f58c5ae64f600001600040005000a000900640062000300060013001200630100
	Message-Authenticator = 0xc06ea791f72e6991cc061c6369dae4bc
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
  modcall[authorize]: module "preprocess" returns ok for request 9
  modcall[authorize]: module "chap" returns noop for request 9
  modcall[authorize]: module "mschap" returns noop for request 9
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 9
  rlm_eap: EAP packet type response id 113 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 9
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 9
modcall: leaving group authorize (returns updated) for request 9
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 9
modcall: leaving group authenticate (returns handled) for request 9
Sending Access-Challenge of id 31 to 192.168.22.23 port 1812
	EAP-Message = 0x0172040a0dc000000681160301004a02000046030144c9d96f21489dfc094d873ff8098aeaa65e189c3809529b16ebf1b6ea7f6d7e207798642a20f6237cf8cbf96fb72e1637d66a5f0ddfb2a6abe9988f8d60fc496300040016030105a80b0005a40005a100027930820275308201dea003020102020101300d06092a864886f70d0101050500306e310b300906035504061302564e3119301706035504081310486f20436869204d696e68204369747931253023060355040a131c4561737465726e204173696120436f6d6d65726963616c2042616e6b311d301b0603550403131445414220526f6f74204365727469666963617465301e170d3036
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x09ab8427cd1bf95017c9d350fc829e04
Finished request 9
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 8 ID 30 with timestamp 44c9d96f
Cleaning up request 9 ID 31 with timestamp 44c9d96f
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=32, length=125
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	EAP-Message = 0x0270000b0174686169646e
	Message-Authenticator = 0xbef15c8186c4df80e267485141539763
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 10
  modcall[authorize]: module "preprocess" returns ok for request 10
  modcall[authorize]: module "chap" returns noop for request 10
  modcall[authorize]: module "mschap" returns noop for request 10
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 10
  rlm_eap: EAP packet type response id 112 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 10
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 10
modcall: leaving group authorize (returns updated) for request 10
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 10
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 10
modcall: leaving group authenticate (returns handled) for request 10
Sending Access-Challenge of id 32 to 192.168.22.23 port 1812
	EAP-Message = 0x017100060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x698927ab80b45e57dc9c201970e41bd8
Finished request 10
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.22.23:1812, id=33, length=212
	NAS-IP-Address = 192.168.22.23
	NAS-Port = 50002
	Cisco-NAS-Port = "FastEthernet0/2"
	NAS-Port-Type = Ethernet
	User-Name = "thaidn"
	Calling-Station-Id = "00-08-0D-E6-8C-F6"
	Service-Type = Framed-User
	State = 0x698927ab80b45e57dc9c201970e41bd8
	EAP-Message = 0x027100500d800000004616030100410100003d030144c9d98f0e3b5a206e12079abc1615b5096520ff43d5d33379091fa7ed131f4e00001600040005000a000900640062000300060013001200630100
	Message-Authenticator = 0xdc8c131aed164166b552d596f0ba7f56
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 11
  modcall[authorize]: module "preprocess" returns ok for request 11
  modcall[authorize]: module "chap" returns noop for request 11
  modcall[authorize]: module "mschap" returns noop for request 11
    rlm_realm: No '@' in User-Name = "thaidn", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 11
  rlm_eap: EAP packet type response id 113 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 11
    users: Matched entry thaidn at line 151
  modcall[authorize]: module "files" returns ok for request 11
modcall: leaving group authorize (returns updated) for request 11
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 11
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05a8], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0080], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 11
modcall: leaving group authenticate (returns handled) for request 11
Sending Access-Challenge of id 33 to 192.168.22.23 port 1812
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x6f6f7420436572746966696361746530819f300d0609
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xc35a320557c7c1d1f1268954eb963edb
Finished request 11
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 10 ID 32 with timestamp 44c9d98d
Cleaning up request 11 ID 33 with timestamp 44c9d98d
Nothing to do.  Sleeping until we see a request.
- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to