Hm, well, sort of, as you get:

>   rlm_eap_peap: Session established.  Decoding tunneled attributes.
>   rlm_eap_peap: Received EAP-TLV response.
>   rlm_eap_peap: Tunneled data is valid.
>   rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected
> earlier in this session.

Probably wrong password. One cannot really be sure as you left out
those "earlier in this session" parts of the _full_ debug output.


Same password works when binding to LDAP server from different client
applications, sucha as GQ. So I'm pretty sure that password is
correct.

I'm not sure that how will RADIUS server know to check password
against LDAP server while EAP is in place?
- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to