@Alan DeKok
> I'll bet that if you posted the final Access-Accept from 1.1.7 and from 
> 2.0.1, that they would be *different*.  If you make them the same, I'll also 
> bet that the NAS will accept the user.
You were right (you win the bet), I accidentally commented out an entry in the
"default"-file, which setting were included in radiusd.conf in previous version
of freeradius

> Stop fighting with the certificates.  You're wasting your time, and confusing
> yourself.  Start looking at the contents of the Access-Accept, which is the
> only thing that really matters.
With that hint I was able to get Windows and Linux Laptops working again using
EAP-TLS and freeradius 2.0.1. I also managed to get a WM2003 and a WM6 PDA
connecting using EAP-PEAP.
For using EAP-TLS with the Windows Mobile devices I still have to solve one
problem, which I think would be no problem for you, the problem with the
username of the devices.

If I disable the option "check_cert_cn = %{User-Name}" in eap.conf I get a
working configuration, but finally it should work also with that Option enabled.
 The problem of the Windows Mobile devices is, that they always submit as
username "DOMAIN\user". If you leave the DOMAINNAME blank still "\user" is used.
Since the radiusd.conf hints say, that I should NOT use the option
"with_ntdomain_hack" (and when I tested it still didn't work for me) I wanted to
 use the "Realm module".
But at the moment I didn't fully understand how realms work, although I did read
the Posting on this mailinglist (from 2004) and the manpage.
I Know that I will have to use the realm module

# 'domain\user'
realm ntdomain {
        format = prefix
        delimiter = "\\"
}

therefore, but what else do I have to configure when I want to use a "blank"
domain? First I tried with a domain called "bla" which is configured in 
proxy.conf:

realm bla {
       authhost        = LOCAL
       accthost        = LOCAL
}

The attached logfile shows, that the username is stripped correctly, but
obviously the stripped username in not passed correctly to the eap module. Can
anyone tell me, what else I have to configure? My goal is simply to strip the
"empty" domain from the username, so that eap-tls work with the option
"check_cert_cn = %{User-Name}" enabled in eap.conf

In short:
How do I specify an empty domain (realm "" {authhost = LOCAL, accthost = LOCAL}
doesn't work)?

What else do I have to configure, when the realm ntdomain is set in radiusd.conf
 (I have also set ntdomain in "authorize" and "preacct" section)

Best regards and thanks in advance

Stefan Puch

PS: When I've got a working configuration for the Windows Mobile devices, I'm
going to write a little HOWTO like the one "EAP/TLS Setup for FreeRADIUS and
Windows XP Supplicant" just for Mobile PDA's


FreeRADIUS Version 2.0.1, for host i586-mandriva-linux-gnu, built on Jan 24 
2008 at 21:20:10
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License. 
Starting - reading configuration files ...
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including configuration file /etc/raddb/snmp.conf
including configuration file /etc/raddb/eap.conf
including configuration file /etc/raddb/policy.conf
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/default
including dictionary file /etc/raddb/dictionary
main {
        prefix = "/usr"
        localstatedir = "/var"
        logdir = "/var/log/radius"
        libdir = "/usr/lib/freeradius"
        radacctdir = "/var/log/radius/radacct"
        hostname_lookups = no
        max_request_time = 30
        cleanup_delay = 5
        max_requests = 1024
        allow_core_dumps = no
        pidfile = "/var/run/radiusd/radiusd.pid"
        user = "radius"
        group = "radius"
        checkrad = "/usr/sbin/checkrad"
        debug_level = 0
        proxy_requests = yes
 security {
        max_attributes = 200
        reject_delay = 1
        status_server = no
 }
}
 client 127.0.0.1 {
        require_message_authenticator = no
        secret = "test"
        shortname = "localhost"
 }
 client 192.168.0.8 {
        require_message_authenticator = no
        secret = "test"
        shortname = "AP-Tower"
 }
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
        retry_delay = 5
        retry_count = 3
        default_fallback = no
        dead_time = 120
        wake_all_if_all_dead = no
 }
 home_server localhost {
        ipaddr = 127.0.0.1
        port = 1812
        type = "auth"
        secret = "testing123"
        response_window = 20
        max_outstanding = 65536
        zombie_period = 40
        status_check = "status-server"
        ping_check = "none"
        ping_interval = 30
        check_interval = 30
        num_answers_to_alive = 3
        num_pings_to_alive = 3
        revive_interval = 120
        status_check_timeout = 4
 }
 home_server_pool my_auth_failover {
        type = fail-over
        home_server = localhost
 }
 realm example.com {
        auth_pool = my_auth_failover
 }
 realm bla {
        authhost = LOCAL
        accthost = LOCAL
 }
 realm LOCAL {
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating exec
  exec {
        wait = yes
        input_pairs = "request"
        shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating expr
 Module: Linked to module rlm_expiration
 Module: Instantiating expiration
  expiration {
        reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating logintime
  logintime {
        reply-message = "You are calling outside your allowed timespan  "
        minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_eap
 Module: Instantiating eap
  eap {
        default_eap_type = "tls"
        timer_expire = 60
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = no
  }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
        rsa_key_exchange = no
        dh_key_exchange = yes
        rsa_key_length = 512
        dh_key_length = 512
        verify_depth = 0
        pem_file_type = yes
        private_key_file = "/etc/pki/tls/private/server.pem"
        certificate_file = "/etc/pki/tls/private/server.pem"
        CA_file = "/etc/pki/tls/certs/ca.pem"
        private_key_password = "whatever"
        dh_file = "/etc/raddb/certs/dh"
        random_file = "/etc/raddb/certs/random"
        fragment_size = 1024
        include_length = yes
        check_crl = no
        check_cert_cn = "%{User-Name}"
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating preprocess
  preprocess {
        huntgroups = "/etc/raddb/huntgroups"
        hints = "/etc/raddb/hints"
        with_ascend_hack = no
        ascend_channels_per_line = 23
        with_ntdomain_hack = no
        with_specialix_jetstream_hack = no
        with_cisco_vsa_hack = no
        with_alvarion_vsa_hack = no
  }
 Module: Linked to module rlm_detail
 Module: Instantiating auth_log
  detail auth_log {
        detailfile = 
"/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
        header = "%t"
        detailperm = 384
        dirperm = 493
        locking = no
        log_packet_header = no
  }
 Module: Linked to module rlm_realm
 Module: Instantiating ntdomain
  realm ntdomain {
        format = "prefix"
        delimiter = "\"
        ignore_default = no
        ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating files
  files {
        usersfile = "/etc/raddb/users"
        compat = "no"
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating acct_unique
  acct_unique {
        key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, 
NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Instantiating detail
  detail {
        detailfile = 
"/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
        header = "%t"
        detailperm = 384
        dirperm = 493
        locking = no
        log_packet_header = no
  }
 Module: Linked to module rlm_radutmp
 Module: Instantiating radutmp
  radutmp {
        filename = "/var/log/radius/radutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        perm = 384
        callerid = yes
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Instantiating reply_log
  detail reply_log {
        detailfile = 
"/var/log/radius/radacct/%{Client-IP-Address}/reply-detail-%Y%m%d"
        header = "%t"
        detailperm = 384
        dirperm = 493
        locking = no
        log_packet_header = no
  }
 }
}
radiusd: #### Opening IP addresses and Ports ####
listen {
        type = "auth"
        ipaddr = *
        port = 0
}
listen {
        type = "acct"
        ipaddr = *
        port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=143, 
length=203
        Message-Authenticator = 0x6a9456153eae379a334abd83a66943de
        Service-Type = Framed-User
        User-Name = "[EMAIL PROTECTED]"
        Framed-MTU = 1488
        Called-Station-Id = "000FB5BA4F59:Flugplatz"
        Calling-Station-Id = "00127946D8F2"
        NAS-Identifier = "AP-Tower"
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0200001901626c615c75736572406578616d706c652e636f6d
        NAS-IP-Address = 192.168.0.8
        NAS-Port = 2
        NAS-Port-Id = "STA port # 2"
+- entering group authorize
++[preprocess] returns ok
        expand: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
-> /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
expands to /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
        expand: %t -> Tue Feb  5 22:55:02 2008
++[auth_log] returns ok
    rlm_realm: Looking up realm "bla" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "bla"
    rlm_realm: Adding Stripped-User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Proxying request from user [EMAIL PROTECTED] to realm bla
    rlm_realm: Adding Realm = "bla"
    rlm_realm: Authentication realm is LOCAL.
++[ntdomain] returns noop
  rlm_eap: EAP packet type response id 0 length 25
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 226
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 143 to 192.168.0.8 port 1128
        EAP-Message = 0x010100060d20
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd855ce66d854c3db82f4be0093fad79e
Finished request 0.
Going to the next request
Waking up in 0.9 seconds. 
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=144, 
length=270
        Message-Authenticator = 0xc3e9820d65ceacf0da25985d0491a9dc
        Service-Type = Framed-User
        User-Name = "[EMAIL PROTECTED]"
        Framed-MTU = 1488
        State = 0xd855ce66d854c3db82f4be0093fad79e
        Called-Station-Id = "000FB5BA4F59:Flugplatz"
        Calling-Station-Id = "00127946D8F2"
        NAS-Identifier = "AP-Tower"
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 
0x0201004a0d8000000040160301003b010000370301a7e723f972662a0dd9f47bf100b53967eacf0169d5d1cbf872f42a65f2a3113200001000040005000a000900640062000300060100
        NAS-IP-Address = 192.168.0.8
        NAS-Port = 2
        NAS-Port-Id = "STA port # 2"
+- entering group authorize
++[preprocess] returns ok
        expand: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
-> /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
expands to /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
        expand: %t -> Tue Feb  5 22:55:02 2008
++[auth_log] returns ok
    rlm_realm: Looking up realm "bla" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "bla"
    rlm_realm: Adding Stripped-User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Proxying request from user [EMAIL PROTECTED] to realm bla
    rlm_realm: Adding Realm = "bla"
    rlm_realm: Authentication realm is LOCAL.
++[ntdomain] returns noop
  rlm_eap: EAP packet type response id 1 length 74
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 226
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
  TLS Length 64
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 003b], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 075b], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 00a6], CertificateRequest  
    TLS_accept: SSLv3 write certificate request A 
    TLS_accept: SSLv3 flush data 
    TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 144 to 192.168.0.8 port 1128
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0x070301300d06092a864886f70d010104050003820101009c0a02fee42eef2b4470120ef49920c5ba74597993b054a639c7934ed86883f98ac77748ecc490f9ce22eac7df58b64a6ce0d7a880e883610393f168f8aa9b1da7265fe73402d6715663a959281014e3eaa827c30a73c9226e9fc47d0380a156afcb456c78176330c44a0c2de71441d9f26f73121524fd913d3eda66f4335117c35f963019bc30dd2991ae9a6f87d3f797f3ff3be21736d1c1a033f8eff0f08a6c77838171c53e694b0b077451ccff66deae511d1e89d9f51c96d67302bba8f569a9bcfa7a2b5c147294ae1bf3a104a0de7f7c5b2903e19140b5e3a2012f71bee6c5e7694a8a
        EAP-Message = 0x274e032acd43a5bca611d725
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd855ce66d957c3db82f4be0093fad79e
Finished request 1.
Going to the next request
Waking up in 0.8 seconds. 
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=145, 
length=202
        Message-Authenticator = 0x9ad3446768f6a2edfaac1bf4bc2fb1c0
        Service-Type = Framed-User
        User-Name = "[EMAIL PROTECTED]"
        Framed-MTU = 1488
        State = 0xd855ce66d957c3db82f4be0093fad79e
        Called-Station-Id = "000FB5BA4F59:Flugplatz"
        Calling-Station-Id = "00127946D8F2"
        NAS-Identifier = "AP-Tower"
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020200060d00
        NAS-IP-Address = 192.168.0.8
        NAS-Port = 2
        NAS-Port-Id = "STA port # 2"
+- entering group authorize
++[preprocess] returns ok
        expand: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
-> /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
expands to /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
        expand: %t -> Tue Feb  5 22:55:03 2008
++[auth_log] returns ok
    rlm_realm: Looking up realm "bla" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "bla"
    rlm_realm: Adding Stripped-User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Proxying request from user [EMAIL PROTECTED] to realm bla
    rlm_realm: Adding Realm = "bla"
    rlm_realm: Authentication realm is LOCAL.
++[ntdomain] returns noop
  rlm_eap: EAP packet type response id 2 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 226
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 145 to 192.168.0.8 port 1128
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0xa5c646bc7fa4ed896a60c1942735277d4a9d6d18505c5e53b20655eb76077701b0bf7072a055172b622ad8304d6eaa13ea3c16b6da96fc2ea827b808a9ca383513979115156b2b01610dc2f2802b618d91f95ca1672fd131eda6aa5a5cf442bb6ad97b19717208dd4197bbe219b551fc3af61b331a4de9f03720139913754ad2a7d0781a374b3633a24944fefe3aaef1e3be7d6fd5d59b3a1a28c13917636c50fd47371fee39d607f0d52e0752614f0dd1565e97d042ec689cec47fe6149df970e70d35bac9785fc846df05816030100a60d00009e0301024000980096308193310b3009060355040613024652310f300d060355040813065261646975
        EAP-Message = 0x733112301006035504071309
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd855ce66da56c3db82f4be0093fad79e
Finished request 2.
Going to the next request
Waking up in 0.7 seconds. 
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=146, 
length=202
        Message-Authenticator = 0x0835adbae1c68d7427e1db3683525dcb
        Service-Type = Framed-User
        User-Name = "[EMAIL PROTECTED]"
        Framed-MTU = 1488
        State = 0xd855ce66da56c3db82f4be0093fad79e
        Called-Station-Id = "000FB5BA4F59:Flugplatz"
        Calling-Station-Id = "00127946D8F2"
        NAS-Identifier = "AP-Tower"
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020300060d00
        NAS-IP-Address = 192.168.0.8
        NAS-Port = 2
        NAS-Port-Id = "STA port # 2"
+- entering group authorize
++[preprocess] returns ok
        expand: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
-> /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
expands to /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
        expand: %t -> Tue Feb  5 22:55:03 2008
++[auth_log] returns ok
    rlm_realm: Looking up realm "bla" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "bla"
    rlm_realm: Adding Stripped-User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Proxying request from user [EMAIL PROTECTED] to realm bla
    rlm_realm: Adding Realm = "bla"
    rlm_realm: Authentication realm is LOCAL.
++[ntdomain] returns noop
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 226
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 146 to 192.168.0.8 port 1128
        EAP-Message = 
0x010400780d800000085a536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f726974790e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd855ce66db51c3db82f4be0093fad79e
Finished request 3.
Going to the next request
Waking up in 0.6 seconds. 
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=147, 
length=1702
        Message-Authenticator = 0x30b4960c3f45725d88c1be80642953a8
        Service-Type = Framed-User
        User-Name = "[EMAIL PROTECTED]"
        Framed-MTU = 1488
        State = 0xd855ce66db51c3db82f4be0093fad79e
        Called-Station-Id = "000FB5BA4F59:Flugplatz"
        Calling-Station-Id = "00127946D8F2"
        NAS-Identifier = "AP-Tower"
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 
0x020405d80dc0000005e116030105b10b0003a100039e00039b308203973082027fa003020102020106300d06092a864886f70d0101040500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3038303133313231323235315a170d3039303133303231323235315a3071310b3009060355040613024652
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0x0ee9a8a0d152fe9edc973681c0fa148c0cbd2c6a2715302fcba3134535799733ead78d716ae7364cf5fe143fae73ea8f85e9138550dba12ec5e161a6628d93315cfa37547b72a06367555e44c99a0cda5e9ba91f1c6578754ede32a9669296fd337d5bd0ee8b5cfab0af80e22cbb56b72c6ab82031788de8e70295f62e33e68ce1e15af30c23df21b0b0b0becacdd0ace66d03c2b6885cf7005da481239422896fb58f0ac32e90792412d5eefeef9040de8ca4992be275c0e6436adfc93616ad57e46c66d3a64b70990a068ef62392140301000101160301002068d801790f68bf809a2e1f0bf5
        NAS-IP-Address = 192.168.0.8
        NAS-Port = 2
        NAS-Port-Id = "STA port # 2"
+- entering group authorize
++[preprocess] returns ok
        expand: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
-> /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
expands to /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
        expand: %t -> Tue Feb  5 22:55:03 2008
++[auth_log] returns ok
    rlm_realm: Looking up realm "bla" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "bla"
    rlm_realm: Adding Stripped-User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Proxying request from user [EMAIL PROTECTED] to realm bla
    rlm_realm: Adding Realm = "bla"
    rlm_realm: Authentication realm is LOCAL.
++[ntdomain] returns noop
  rlm_eap: EAP packet type response id 4 length 253
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 226
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
  TLS Length 1505
rlm_eap_tls:  Received EAP-TLS First Fragment of the message
  eaptls_verify returned 9 
  eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 147 to 192.168.0.8 port 1128
        EAP-Message = 0x010500060d00
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd855ce66dc50c3db82f4be0093fad79e
Finished request 4.
Going to the next request
Waking up in 0.3 seconds. 
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=148, 
length=221
        Message-Authenticator = 0x7d627a7897faed5ff31c3dd65eb009b5
        Service-Type = Framed-User
        User-Name = "[EMAIL PROTECTED]"
        Framed-MTU = 1488
        State = 0xd855ce66dc50c3db82f4be0093fad79e
        Called-Station-Id = "000FB5BA4F59:Flugplatz"
        Calling-Station-Id = "00127946D8F2"
        NAS-Identifier = "AP-Tower"
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020500190d00112d679a5282e10a85aafb50657bc8b89651c0
        NAS-IP-Address = 192.168.0.8
        NAS-Port = 2
        NAS-Port-Id = "STA port # 2"
+- entering group authorize
++[preprocess] returns ok
        expand: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
-> /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d 
expands to /var/log/radius/radacct/192.168.0.8/auth-detail-20080205
        expand: %t -> Tue Feb  5 22:55:03 2008
++[auth_log] returns ok
    rlm_realm: Looking up realm "bla" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "bla"
    rlm_realm: Adding Stripped-User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Proxying request from user [EMAIL PROTECTED] to realm bla
    rlm_realm: Adding Realm = "bla"
    rlm_realm: Authentication realm is LOCAL.
++[ntdomain] returns noop
  rlm_eap: EAP packet type response id 5 length 25
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 226
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 03a5], Certificate  
chain-depth=1, 
error=0
--> User-Name = [EMAIL PROTECTED]
--> BUF-Name = Example Certificate Authority
--> subject = /C=FR/ST=Radius/L=Somewhere/O=Example Inc./[EMAIL 
PROTECTED]/CN=Example Certificate Authority
--> issuer  = /C=FR/ST=Radius/L=Somewhere/O=Example Inc./[EMAIL 
PROTECTED]/CN=Example Certificate Authority
--> verify return:1
        expand: %{User-Name} -> [EMAIL PROTECTED]
    rlm_eap_tls: checking certificate CN ([EMAIL PROTECTED]) with xlat'ed value 
([EMAIL PROTECTED])
rlm_eap_tls: Certificate CN ([EMAIL PROTECTED]) does not match specified value 
([EMAIL PROTECTED])!
chain-depth=0, 
error=0
--> User-Name = [EMAIL PROTECTED]
--> BUF-Name = [EMAIL PROTECTED]
--> subject = /C=FR/ST=Radius/O=Example Inc./[EMAIL PROTECTED]/[EMAIL PROTECTED]
--> issuer  = /C=FR/ST=Radius/L=Somewhere/O=Example Inc./[EMAIL 
PROTECTED]/CN=Example Certificate Authority
--> verify return:0
  rlm_eap_tls: >>> TLS 1.0 Alert [length 0002], fatal certificate_unknown  
TLS Alert write:fatal:certificate unknown 
    TLS_accept:error in SSLv3 read client certificate B 
rlm_eap: SSL error error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no 
certificate returned
rlm_eap_tls: SSL_read failed in a system call (-1), TLS session fails.
  eaptls_process returned 13 
  rlm_eap: Freeing handler
++[eap] returns reject
auth: Failed to validate the user.
Login incorrect: [EMAIL PROTECTED]/<via Auth-Type = EAP>] (from client AP-Tower 
port 2 cli 00127946D8F2)
  Found Post-Auth-Type Reject
+- entering group REJECT
++- group REJECT returns noop
Delaying reject of request 5 for 1 seconds
Going to the next request
Waking up in 0.3 seconds. 
Waking up in 0.1 seconds. 
Waking up in 0.1 seconds. 
Waking up in 0.2 seconds. 
rad_recv: Access-Request packet from host 192.168.0.8 port 1128, id=148, 
length=221
Waiting to send Access-Reject to client AP-Tower port 1128 - ID: 148
Sending delayed reject for request 5
Sending Access-Reject of id 148 to 192.168.0.8 port 1128
        EAP-Message = 0x04050004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.3 seconds. 
Cleaning up request 0 ID 143 with timestamp +25
Waking up in 0.1 seconds. 
Cleaning up request 1 ID 144 with timestamp +25
Cleaning up request 2 ID 145 with timestamp +26
Waking up in 0.1 seconds. 
Cleaning up request 3 ID 146 with timestamp +26
Waking up in 0.2 seconds. 
Cleaning up request 4 ID 147 with timestamp +26
Waking up in 1.0 seconds. 
Cleaning up request 5 ID 148 with timestamp +26
Ready to process requests.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to