Hello all,
Given the log I attached, may someone tell me what's the problem
authenticating my client(using ttls with mschapv2)?
Towards the end of the log I get this:
eaptls_verify returned 11
rlm_eap_tls: >>> Unknown TLS version [length 0002]
TLS Alert write:fatal:protocol version
TLS_accept:error in SSLv3 read client certificate A
rlm_eap_tls: SSL_read failed in a system call (-1), TLS session fails.
This may be significant enough for someone experienced to figure out
what's the problem.
Thank you!
Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /usr/local/etc/raddb/proxy.conf
Config: including file: /usr/local/etc/raddb/clients.conf
Config: including file: /usr/local/etc/raddb/snmp.conf
Config: including file: /usr/local/etc/raddb/eap.conf
Config: including file: /usr/local/etc/raddb/sql.conf
main: prefix = "/usr/local"
main: localstatedir = "/usr/local/var"
main: logdir = "/usr/local/var/log/radius"
main: libdir = "/usr/local/lib"
main: radacctdir = "/usr/local/var/log/radius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = no
main: log_file = "/usr/local/var/log/radius/radius.log"
main: log_auth = no
main: log_auth_badpass = no
main: log_auth_goodpass = no
main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/local/sbin/checkrad"
main: proxy_requests = yes
proxy: retry_delay = 5
proxy: retry_count = 3
proxy: synchronous = no
proxy: default_fallback = yes
proxy: dead_time = 120
proxy: post_proxy_authorize = yes
proxy: wake_all_if_all_dead = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
read_config_files: reading realms
radiusd: entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = no
mschap: require_strong = no
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: authtype = "MS-CHAP"
mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/usr/local/var/log/radius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "ttls"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
gtc: challenge = "Password: "
gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/usr/local/etc/raddb/certs/server-key.pem"
tls: certificate_file = "/usr/local/etc/raddb/certs/server.pem"
tls: CA_file = "/usr/local/etc/raddb/certs/demoCA/ca-cert.pem"
tls: private_key_password = "asb#1234"
tls: dh_file = "/usr/local/etc/raddb/certs/dh"
tls: random_file = "/usr/local/etc/raddb/certs/random"
tls: fragment_size = 255
tls: include_length = yes
tls: check_crl = no
tls: check_cert_cn = "(null)"
rlm_eap: Loaded and initialized type tls
ttls: default_eap_type = "mschapv2"
ttls: copy_request_to_tunnel = no
ttls: use_tunneled_reply = yes
rlm_eap: Loaded and initialized type ttls
mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
rlm_eap: Loaded and initialized type sim
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups"
preprocess: hints = "/usr/local/etc/raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/usr/local/etc/raddb/users"
files: acctusersfile = "/usr/local/etc/raddb/acct_users"
files: preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/usr/local/var/log/radius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Listening on proxy *:1814
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=1, length=127
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0x0183fae186898f5bca218b028be226c4
EAP-Message = 0x023c001601616e6f6e796d6f7573406173622e636f6d
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 60 length 22
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
modcall[authorize]: module "files" returns notfound for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 1 to 192.168.73.152:33136
EAP-Message = 0x013d00061520
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x926127fb8a1055c8eba2cf634a8617bc
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=2, length=235
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0xbb4d83a377a62615ba1b7e11ff7fc5b7
EAP-Message = 0x023d007015800000006616030100610100005d030147f0dec43ccadfbc8d9f4914053993450a6f36fdf0df25634edfe0d9762d0c9400003600390038003500160013000a00330032002f0007006600050004006300620061001500120009006500640060001400110008000600030100
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0x926127fb8a1055c8eba2cf634a8617bc
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 61 length 112
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
modcall[authorize]: module "files" returns notfound for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 046a], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 010d], ServerKeyExchange
TLS_accept: SSLv3 write key exchange A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 2 to 192.168.73.152:33136
EAP-Message = 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
EAP-Message = 0x33313138313434335a305131
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x1e878efb2b4a17889407c5c3e9c6dd50
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=3, length=129
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0x6e6757d9b28e961b4ce65aa604d11c39
EAP-Message = 0x023e00061500
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0x1e878efb2b4a17889407c5c3e9c6dd50
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
modcall[authorize]: module "chap" returns noop for request 2
modcall[authorize]: module "mschap" returns noop for request 2
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 2
rlm_eap: EAP packet type response id 62 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 2
modcall[authorize]: module "files" returns notfound for request 2
modcall: group authorize returns updated for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 3 to 192.168.73.152:33136
EAP-Message = 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
EAP-Message = 0x0d06092a864886f70d010104
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xa08652b7559ad944bc4b67a1ead7dfa6
Finished request 2
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=4, length=129
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0xff22df9f91622bdc34f064f3c287b1f1
EAP-Message = 0x023f00061500
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0xa08652b7559ad944bc4b67a1ead7dfa6
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
modcall[authorize]: module "chap" returns noop for request 3
modcall[authorize]: module "mschap" returns noop for request 3
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 3
rlm_eap: EAP packet type response id 63 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 3
modcall[authorize]: module "files" returns notfound for request 3
modcall: group authorize returns updated for request 3
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 4 to 192.168.73.152:33136
EAP-Message = 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
EAP-Message = 0x4d4158310f300d0603550403
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x550c97589517b99f2594d4cb0c648753
Finished request 3
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=5, length=129
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0x5e348618ea0a6588f1165ad488932dd2
EAP-Message = 0x024000061500
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0x550c97589517b99f2594d4cb0c648753
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
modcall[authorize]: module "preprocess" returns ok for request 4
modcall[authorize]: module "chap" returns noop for request 4
modcall[authorize]: module "mschap" returns noop for request 4
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 4
rlm_eap: EAP packet type response id 64 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 4
modcall[authorize]: module "files" returns notfound for request 4
modcall: group authorize returns updated for request 4
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 5 to 192.168.73.152:33136
EAP-Message = 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
EAP-Message = 0xf826c0cd6f485b9667d8e679
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x68efbe6f1225aafd965edbbeaaf2a90e
Finished request 4
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=6, length=129
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0x1eb637b0a9f7314e794bb25bcbc4655c
EAP-Message = 0x024100061500
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0x68efbe6f1225aafd965edbbeaaf2a90e
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
modcall[authorize]: module "chap" returns noop for request 5
modcall[authorize]: module "mschap" returns noop for request 5
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 5
rlm_eap: EAP packet type response id 65 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 5
modcall[authorize]: module "files" returns notfound for request 5
modcall: group authorize returns updated for request 5
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 6 to 192.168.73.152:33136
EAP-Message = 0x0142010915c0000005d9bc577438eefd87743d27254bfd37b497b52f4594d138e842abfd73bf76056e03cbe568395d1f61ee91210203010001300d06092a864886f70d0101040500038181009d3f0c63a2c40e5cc595dc7a139b4354075294e108bc0692e8ba090f2d2f725d6e8cfa57087fad5d05022579a6a26d2698de1e20907775c427aa7ded1fe3f591ea18a3db3688717ab25fb56e2c75170b54fccfb134708a044aa6661180bc4a6abc5054c7786ca7021fc4d89172ca7eb28d19f3c2064986a3a36e359cfea29ac6160301010d0c0001090040ddbe40a44987b7a1a0ee13b17ae444df43f2006b89991366bf2ea5f44da06caf96b284371bca
EAP-Message = 0xcda5a95caaad5c4d9ebfcebd
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x01927522d54867738ad174a0ea000f53
Finished request 5
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=7, length=129
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0xb89e5fd2c91629edac0113f7259c5682
EAP-Message = 0x024200061500
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0x01927522d54867738ad174a0ea000f53
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
modcall[authorize]: module "preprocess" returns ok for request 6
modcall[authorize]: module "chap" returns noop for request 6
modcall[authorize]: module "mschap" returns noop for request 6
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 6
rlm_eap: EAP packet type response id 66 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 6
modcall[authorize]: module "files" returns notfound for request 6
modcall: group authorize returns updated for request 6
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 7 to 192.168.73.152:33136
EAP-Message = 0x014300e81580000005d9b8631e454ce6b52c40b959cdf43f0001050040ad6d0b91b425d28112dd96ee0c5a1ca3cb55d715a217a1710d2b8e01c374e3dd2d09320fbed41eef9bcbb9eaef27947b8419d8c2f9a9793773f836c3341f18c5008061e7f0f67b3f46399c06f762e10ed73534660c4f79cb9fef6c0f2ccd25ea3507a04d3069e15dca61508f69119652143d266529e3056d0a64380276aadddbb0b112595bc75053ff90302fec8dba3097c83407312f55a3fe363c5d077a8ee576e6f4e05ce5112621d1c0b7988f5a41c5d2246709c067709a4a76edc41ed9f05e6816030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x0934136025c84cca305a84755e4516e3
Finished request 6
Going to the next request
--- Walking the entire request list ---
Waking up in 4 seconds...
rad_recv: Access-Request packet from host 192.168.73.152:33136, id=8, length=170
Calling-Station-Id = "00-0A-3B-F1-10-6A"
Message-Authenticator = 0xeaae9fc38e45ddcfda64473ba1656314
EAP-Message = 0x0243002f15800000002515631e002021e08c7a6883b1ef078a2531a5b21b5bf8faa93f55e0b163c0112424d60ddeb1
Framed-MTU = 3795
User-Name = "[EMAIL PROTECTED]"
NAS-IP-Address = 192.168.73.152
State = 0x0934136025c84cca305a84755e4516e3
WiMAX-Attr-46 = 0x00313131363636
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
modcall[authorize]: module "preprocess" returns ok for request 7
modcall[authorize]: module "chap" returns noop for request 7
modcall[authorize]: module "mschap" returns noop for request 7
rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
rlm_realm: Found realm "asb.com"
rlm_realm: Adding Stripped-User-Name = "anonymous"
rlm_realm: Proxying request from user anonymous to realm asb.com
rlm_realm: Adding Realm = "asb.com"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "suffix" returns noop for request 7
rlm_eap: EAP packet type response id 67 length 47
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 7
modcall[authorize]: module "files" returns notfound for request 7
modcall: group authorize returns updated for request 7
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: >>> Unknown TLS version [length 0002]
TLS Alert write:fatal:protocol version
TLS_accept:error in SSLv3 read client certificate A
rlm_eap_tls: SSL_read failed in a system call (-1), TLS session fails.
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 7
modcall: group authenticate returns handled for request 7
Sending Access-Challenge of id 8 to 192.168.73.152:33136
EAP-Message = 0x0144001115800000000715631e00020246
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x99b9dfb7a9212915f1992cac54144b07
Finished request 7
Going to the next request
--- Walking the entire request list ---
Waking up in 3 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 1 with timestamp 47f0ded1
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 1 ID 2 with timestamp 47f0ded2
Cleaning up request 2 ID 3 with timestamp 47f0ded2
Cleaning up request 3 ID 4 with timestamp 47f0ded2
Cleaning up request 4 ID 5 with timestamp 47f0ded2
Cleaning up request 5 ID 6 with timestamp 47f0ded2
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 6 ID 7 with timestamp 47f0ded3
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 7 ID 8 with timestamp 47f0ded4
Nothing to do. Sleeping until we see a request.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html