Could someone please take a look at the attached log file and give me a hint about how to solve the problem. Please ignore the lines beggining with ***********;I used them to debug something else previously.

Thank you.
Cristian
Starting FreeRADIUS:FreeRADIUS Version 2.0.0, for host i686-pc-linux-gnu, built 
on Apr  7 2008 at 15:56:51
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License. 
Starting - reading configuration files ...
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/radiusd.conf
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/proxy.conf
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/clients.conf
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/snmp.conf
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/eap.conf
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/sql.conf
including configuration file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/sql/mysql/dialup.conf
including dictionary file 
/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/dictionary
main {
        prefix = "/udir/novac/FREERADIUS_WIMAX_INSTALLED/"
        localstatedir = "/udir/novac/FREERADIUS_WIMAX_INSTALLED//var"
        logdir = "/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/log/radius"
        libdir = "/udir/novac/FREERADIUS_WIMAX_INSTALLED//lib"
        radacctdir = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/log/radius/radacct"
        hostname_lookups = no
        max_request_time = 30
        cleanup_delay = 5
        max_requests = 1024
        allow_core_dumps = no
        pidfile = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/run/radiusd/radiusd.pid"
        checkrad = "/udir/novac/FREERADIUS_WIMAX_INSTALLED//sbin/checkrad"
        debug_level = 0
        proxy_requests = yes
 security {
        max_attributes = 200
        reject_delay = 1
        status_server = no
 }
        log_auth = yes
        log_auth_badpass = yes
        log_auth_goodpass = yes
        log_stripped_names = no
        log_file = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/log/radius/radius.log"
}
 client 127.0.0.1 {
        require_message_authenticator = no
        secret = "testing123"
        shortname = "localhost"
        nastype = "other"
 }
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
        retry_delay = 5
        retry_count = 3
        default_fallback = yes
        dead_time = 120
        wake_all_if_all_dead = no
 }
 realm asb.com {
        authhost = LOCAL
        accthost = LOCAL
 }
 realm LOCAL {
        authhost = LOCAL
        accthost = LOCAL
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating exec
  exec {
        wait = yes
        input_pairs = "request"
        shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating expr
 }
radiusd: #### Loading Virtual Servers ####
server {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating pap
  pap {
        encryption_scheme = "crypt"
        auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating chap
 Module: Linked to module rlm_mschap
 Module: Instantiating mschap
  mschap {
        use_mppe = yes
        require_encryption = no
        require_strong = no
        with_ntdomain_hack = no
  }
 Module: Linked to module rlm_unix
 Module: Instantiating unix
  unix {
        radwtmp = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/log/radius/radwtmp"
  }
 Module: Linked to module rlm_eap
 Module: Instantiating eap
  eap {
        default_eap_type = "ttls"
        timer_expire = 60
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = no
  }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
        rsa_key_exchange = no
        dh_key_exchange = yes
        rsa_key_length = 512
        dh_key_length = 512
        verify_depth = 0
        pem_file_type = yes
        private_key_file = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//etc/raddb/certs/NEW/server-key.pem"
        certificate_file = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//etc/raddb/certs/NEW/server.pem"
        CA_file = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//etc/raddb/certs/NEW/ca-cert.pem"
        private_key_password = "asb#1234"
        dh_file = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//etc/raddb/certs/NEW/dh"
        random_file = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//etc/raddb/certs/NEW/random"
        fragment_size = 1024
        include_length = yes
        check_crl = yes
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
        default_eap_type = "mschapv2"
        copy_request_to_tunnel = yes
        use_tunneled_reply = yes
   }
 Module: Linked to sub-module rlm_eap_sim
 Module: Instantiating eap-sim
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
        with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating preprocess
  preprocess {
        huntgroups = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/huntgroups"
        hints = "/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/hints"
        with_ascend_hack = no
        ascend_channels_per_line = 23
        with_ntdomain_hack = no
        with_specialix_jetstream_hack = no
        with_cisco_vsa_hack = no
        with_alvarion_vsa_hack = no
  }
 Module: Linked to module rlm_realm
 Module: Instantiating suffix
  realm suffix {
        format = "suffix"
        delimiter = "@"
        ignore_default = no
        ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating files
  files {
        usersfile = "/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/users"
        acctusersfile = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/acct_users"
        preproxy_usersfile = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED/etc/raddb/preproxy_users"
        compat = "no"
  }
************************************** cp after=000000100104a501

*********************subattr_name=PacketDataFlowID

*********************subattr_value=0083

************************************* da->attr=1 

*********************subattr_name=ServiceDataFlowID

*********************subattr_value=0083

************************************* da->attr=2 

*********************subattr_name=Direction

*********************subattr_value=03

************************************* da->attr=4 

*********************subattr_name=ActivationTrigger

*********************subattr_value=04

************************************* da->attr=5 

*********************subattr_name=TransportType

*********************subattr_value=01

************************************* da->attr=6 

*********************subattr_name=UplinkQosID

*********************subattr_value=83

************************************* da->attr=7 

*********************subattr_name=DownlinkQoSID

*********************subattr_value=84

************************************* da->attr=8 
************************************** cp 
after=000104008302040083040303050304060301070383080384

*********************subattr_name=QoSID

*********************subattr_value=83

************************************* da->attr=1 

*********************subattr_name=ScheduleType

*********************subattr_value=02

************************************* da->attr=4 

*********************subattr_name=MaximumSustainedTrafficRate

*********************subattr_value=000F4000

************************************* da->attr=6 

*********************subattr_name=MediaFlowType

*********************subattr_value=02

************************************* da->attr=12 
************************************** cp after=800103830403020606000F40000c0302

*********************subattr_name=QoSID

*********************subattr_value=84

************************************* da->attr=1 

*********************subattr_name=ScheduleType

*********************subattr_value=02

************************************* da->attr=4 

*********************subattr_name=MaximumSustainedTrafficRate

*********************subattr_value=001F4000

************************************* da->attr=6 

*********************subattr_name=MediaFlowType

*********************subattr_value=02

************************************* da->attr=12 
************************************** cp after=000103840403020606001F40000c0302
************************************** cp 
after=0001041111040303050304060301070311
************************************** cp 
after=000103110403060706000fa0000906000000140a06000000140c03010d040014
************************************** cp 
after=0001041111040303050304060301070312
************************************** cp 
after=000103120403060706002ee3e80906000000140a06000000140c03010d040014
************************************** cp 
after=800104008302040083040303050304060301070383080384
************************************** cp 
after=0001041111040303050304060301070312
************************************** cp after=800103830403020606000F40000c0302
************************************** cp after=800103840403020606001F40000c0302
************************************** cp 
after=000103120403060706002ee3e80906000000140a06000000140c03010d040014
************************************** cp 
after=0001041112040303050304060301070313080314
************************************** cp 
after=800103130403050503030606000fa00007060007d00009060000000a0a06000000140c03800d040014
************************************** cp 
after=000103140403050503030606002ee3e80706000fa00009060000000a0a06000000140c0380

*********************subattr_name=PacketDataFlowID

*********************subattr_value=1112

************************************* da->attr=1 

*********************subattr_name=Direction

*********************subattr_value=03

************************************* da->attr=4 

*********************subattr_name=ActivationTrigger

*********************subattr_value=04

************************************* da->attr=5 

*********************subattr_name=TransportType

*********************subattr_value=01

************************************* da->attr=6 

*********************subattr_name=UplinkQosID

*********************subattr_value=13

************************************* da->attr=7 

*********************subattr_name=DownlinkQoSID

*********************subattr_value=14

************************************* da->attr=8 
************************************** cp 
after=8001041112040303050304060301070313080314

*********************subattr_name=PacketDataFlowID

*********************subattr_value=0083

************************************* da->attr=1 

*********************subattr_name=ServiceDataFlowID

*********************subattr_value=0083

************************************* da->attr=2 

*********************subattr_name=Direction

*********************subattr_value=03

************************************* da->attr=4 

*********************subattr_name=ActivationTrigger

*********************subattr_value=04

************************************* da->attr=5 

*********************subattr_name=TransportType

*********************subattr_value=01

************************************* da->attr=6 

*********************subattr_name=UplinkQosID

*********************subattr_value=83

************************************* da->attr=7 

*********************subattr_name=DownlinkQoSID

*********************subattr_value=84

************************************* da->attr=8 
************************************** cp 
after=000104008302040083040303050304060301070383080384

*********************subattr_name=QoSID

*********************subattr_value=13

************************************* da->attr=1 

*********************subattr_name=ScheduleType

*********************subattr_value=05

************************************* da->attr=4 

*********************subattr_name=TrafficPriority

*********************subattr_value=03

************************************* da->attr=5 

*********************subattr_name=MaximumSustainedTrafficRate

*********************subattr_value=000fa000

************************************* da->attr=6 

*********************subattr_name=MinimumReservedTrafficRate

*********************subattr_value=0007d000

************************************* da->attr=7 

*********************subattr_name=ToleratedJitter

*********************subattr_value=0000000a

************************************* da->attr=9 

*********************subattr_name=MaximumLatency

*********************subattr_value=00000014

************************************* da->attr=10 

*********************subattr_name=MediaFlowType

*********************subattr_value=80

************************************* da->attr=12 

*********************subattr_name=UnsolicitedGrantInterval

*********************subattr_value=0014

************************************* da->attr=13 
************************************** cp 
after=800103130403050503030606000fa00007060007d00009060000000a0a06000000140c03800d040014

*********************subattr_name=QoSID

*********************subattr_value=14

************************************* da->attr=1 

*********************subattr_name=ScheduleType

*********************subattr_value=05

************************************* da->attr=4 

*********************subattr_name=TrafficPriority

*********************subattr_value=03

************************************* da->attr=5 

*********************subattr_name=MaximumSustainedTrafficRate

*********************subattr_value=002ee3e8

************************************* da->attr=6 

*********************subattr_name=MinimumReservedTrafficRate

*********************subattr_value=000fa000

************************************* da->attr=7 

*********************subattr_name=ToleratedJitter

*********************subattr_value=0000000a

************************************* da->attr=9 

*********************subattr_name=MaximumLatency

*********************subattr_value=00000014

************************************* da->attr=10 

*********************subattr_name=MediaFlowType

*********************subattr_value=80

************************************* da->attr=12 
************************************** cp 
after=800103140403050503030606002ee3e80706000fa00009060000000a0a06000000140c0380

*********************subattr_name=QoSID

*********************subattr_value=83

************************************* da->attr=1 

*********************subattr_name=ScheduleType

*********************subattr_value=02

************************************* da->attr=4 

*********************subattr_name=MaximumSustainedTrafficRate

*********************subattr_value=000F4000

************************************* da->attr=6 

*********************subattr_name=MediaFlowType

*********************subattr_value=02

************************************* da->attr=12 
************************************** cp after=800103830403020606000F40000c0302

*********************subattr_name=QoSID

*********************subattr_value=84

************************************* da->attr=1 

*********************subattr_name=ScheduleType

*********************subattr_value=02

************************************* da->attr=4 

*********************subattr_name=MaximumSustainedTrafficRate

*********************subattr_value=001F4000

************************************* da->attr=6 

*********************subattr_name=MediaFlowType

*********************subattr_value=02

************************************* da->attr=12 
************************************** cp after=000103840403020606001F40000c0302
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=0001041111040303050304060301070312
************************************** cp 
after=800103130403050503030606000fa00007060007d00009060000000a0a06000000140c03800d040014
************************************** cp 
after=800103140403050503030606002ee3e80706000fa00009060000000a0a06000000140c0380
************************************** cp 
after=000103120403060706002ee3e80906000000140a06000000140c03010d040014
************************************** cp 
after=8001041111040303050304060301070312
************************************** cp 
after=0001041112040303050304060301070313080314
************************************** cp 
after=800103120403060706000fa0000906000000140a06000000140c03010d040014
************************************** cp 
after=800103130403050503030606000fa00007060007d00009060000000a0a06000000140c03800d040014
************************************** cp 
after=000103140403050503030606002ee3e80706000fa00009060000000a0a06000000140c0380
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=0001041111040303050304060301070312
************************************** cp 
after=800103130403050503030606000fa00007060007d00009060000000a0a06000000140c03800d040014
************************************** cp 
after=800103140403050503030606002ee3e80706000fa00009060000000a0a06000000140c0380
************************************** cp 
after=000103120403060706002ee3e80906000000140a06000000140c03010d040014
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=0001041111040303050304060301070311
************************************** cp 
after=800103130403050503030606000fa00007060007d00009060000000a0a06000000140c03800d040014
************************************** cp 
after=800103140403050503030606002ee3e80706000fa00009060000000a0a06000000140c0380
************************************** cp 
after=000103110403060706000fa0000906000000140a06000000140c03010d040014
************************************** cp 
after=0001041112040303050304060301070313080314
************************************** cp 
after=8001031304030305030107060003e8000c0382
************************************** cp 
after=0001031404030305030107060007d0000c0382
************************************** cp 
after=0001041112040303050304060301070313080314
************************************** cp 
after=8001031304030305030106060007d00007060007d0000c0382
***************** Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating acct_unique
  acct_unique {
        key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, 
NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating detail
  detail {
        detailfile = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
        header = "%t"
        detailperm = 384
        dirperm = 493
        locking = no
        log_packet_header = no
  }
 Module: Linked to module rlm_radutmp
 Module: Instantiating radutmp
  radutmp {
        filename = 
"/udir/novac/FREERADIUS_WIMAX_INSTALLED//var/log/radius/radutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        perm = 384
        callerid = yes
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 }
}
radiusd: #### Opening IP addresses and Ports ####
        bind_address = *
WARNING: The directive 'bind_adress' is deprecated, and will be removed in 
future versions of FreeRADIUS. Please edit the configuration files to use the 
directive 'listen'.
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Ready to process requests.
********************* cp 
after=000103140403030503010606000fa0000706000fa0000c0382
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=0001041111040303050304060301070312
************************************** cp 
after=8001031304030305030106060007d00007060007d0000c0382
************************************** cp 
after=800103140403030503010606000fa0000706000fa0000c0382
************************************** cp 
after=000103120403060706002ee3e80906000000140a06000000140c03010d040014
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=000104008302040083040303050304060301070383080384
************************************** cp 
after=8001031304030305030106060007d00007060007d0000c0382
************************************** cp 
after=800103140403030503010606000fa0000706000fa0000c0382
************************************** cp after=800103830403020606000F40000c0302
************************************** cp after=000103840403020606001F40000c0302
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=0001041111040303050304060301070311
************************************** cp 
after=8001031304030305030106060007d00007060007d0000c0382
************************************** cp 
after=800103140403030503010606000fa0000706000fa0000c0382
************************************** cp 
after=000103110403060706000fa0000906000000140a06000000140c03010d040014
************************************** cp 
after=0001041112040303050304060301070313080314
************************************** cp 
after=800103130403040503020606000FA00007060007d0000a06000000640c03810f040032
************************************** cp 
after=000103140403040503020606001f40000706000fa0000a06000000640c0381
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=000104008302040083040303050304060301070383080384
************************************** cp 
after=800103130403040503020606000FA00007060007d0000a06000000640c03810f040032
************************************** cp 
after=800103140403040503020606001f40000706000fa0000a06000000640c0381
************************************** cp after=800103830403020606000F40000c0302
************************************** cp after=000103840403020606001F40000c0302
************************************** cp 
after=8001041112040303050304060301070313080314
************************************** cp 
after=0001041111040303050304060301070311
************************************** cp 
after=800103130403040503020606000FA00007060007d0000a06000000640c03810f040032
************************************** cp 
after=800103140403040503020606001f40000706000fa0000a06000000640c0381
************************************** cp 
after=800103140403030503010606000fa0000706000fa0000c0382
************************************** cp 
after=000103110403060706000fa0000906000000140a06000000140c03010d040014
rad_recv: Access-Request packet from host 127.0.0.1 port 32776, id=24, 
length=166
        QoSID = 0x616e6f6e796d6f7573406173622e636f6d
        ScheduleType = 0x7f000001
        TrafficPriority = 0x00000000
        Called-Station-Id = "00-00-00-00-00-00:"
        Calling-Station-Id = "00-13-49-C3-C5-30"
        MediaFlowType = 0x00000578
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 0Mbps 802.11"
        EAP-Message = 0x0206001601616e6f6e796d6f7573406173622e636f6d
        Message-Authenticator = 0xf3763cb9e2245f701f5e645477aabcaf
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "asb.com"
    rlm_realm: Adding Stripped-User-Name = "anonymous"
    rlm_realm: Proxying request from user anonymous to realm asb.com
    rlm_realm: Adding Realm = "asb.com"
    rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
  rlm_eap: EAP packet type response id 6 length 22
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
    users: Matched entry DEFAULT at line 367
++[files] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
************************************** cp after=00
++[eap] returns handled
Sending Access-Challenge of id 24 to 127.0.0.1 port 32776
        EAP-Message = 0x010700061520
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd99b9956d99c8c9338d70856535d0709
Finished request 0.
Going to the next request
Waking up in 0.9 seconds. 
rad_recv: Access-Request packet from host 127.0.0.1 port 32776, id=25, 
length=270
        QoSID = 0x616e6f6e796d6f7573406173622e636f6d
        ScheduleType = 0x7f000001
        TrafficPriority = 0x00000000
        Called-Station-Id = "00-00-00-00-00-00:"
        Calling-Station-Id = "00-13-49-C3-C5-30"
        MediaFlowType = 0x00000578
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 0Mbps 802.11"
        EAP-Message = 
0x0207006c150016030100610100005d030147fe1bbab68ca66dcea8ffe3050798e1c791305d5ae8f844fdbc6e511d8f397b00003600390038003500160013000a00330032002f0007006600050004006300620061001500120009006500640060001400110008000600030100
        State = 0xd99b9956d99c8c9338d70856535d0709
        Message-Authenticator = 0x5bb8fdd1fbfce657f4bbe925da19f5d8
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "asb.com"
    rlm_realm: Adding Stripped-User-Name = "anonymous"
    rlm_realm: Proxying request from user anonymous to realm asb.com
    rlm_realm: Adding Realm = "asb.com"
    rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
  rlm_eap: EAP packet type response id 7 length 108
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
    users: Matched entry DEFAULT at line 367
++[files] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0438], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 010d], ServerKeyExchange  
    TLS_accept: SSLv3 write key exchange A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
    TLS_accept: SSLv3 write server done A 
    TLS_accept: SSLv3 flush data 
    TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
************************************** cp after=00
++[eap] returns handled
Sending Access-Challenge of id 25 to 127.0.0.1 port 32776
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 0x2d816730040ada827c0d0203
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd99b9956d8938c9338d70856535d0709
Finished request 1.
Going to the next request
Waking up in 0.4 seconds. 
rad_recv: Access-Request packet from host 127.0.0.1 port 32776, id=26, 
length=168
        QoSID = 0x616e6f6e796d6f7573406173622e636f6d
        ScheduleType = 0x7f000001
        TrafficPriority = 0x00000000
        Called-Station-Id = "00-00-00-00-00-00:"
        Calling-Station-Id = "00-13-49-C3-C5-30"
        MediaFlowType = 0x00000578
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 0Mbps 802.11"
        EAP-Message = 0x020800061500
        State = 0xd99b9956d8938c9338d70856535d0709
        Message-Authenticator = 0xc4dcb0d4e3790f0746b2ec8c71a5e87b
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "asb.com"
    rlm_realm: Adding Stripped-User-Name = "anonymous"
    rlm_realm: Proxying request from user anonymous to realm asb.com
    rlm_realm: Adding Realm = "asb.com"
    rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
  rlm_eap: EAP packet type response id 8 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
    users: Matched entry DEFAULT at line 367
++[files] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
************************************** cp after=00
++[eap] returns handled
Sending Access-Challenge of id 26 to 127.0.0.1 port 32776
        EAP-Message = 
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
        EAP-Message = 
0x1e0f0118e8484519c0c5217adc8de0ad1c4a20370cbb0bb1cc0244dd354d745a6f396a0c9393cdb00a94538430cc727025f0c6008049828458e7b9472e0ab564e98b260c10dfe4e722b7825489fbd0502af8c05938ebe39d9cb1d351806ee994e83bb0e32b2992e4ace4770094caab3902c27b6a46a4d635919a384ac3623f83d24d33744fd760579d2eea4b3a413daacc60fde5514c671391956bc15e901cb0e39d12aa23ab2c7036ba7ca1f3ab7be97edcb0787916030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd99b9956db928c9338d70856535d0709
Finished request 2.
Going to the next request
Waking up in 0.5 seconds. 
rad_recv: Access-Request packet from host 127.0.0.1 port 32776, id=27, 
length=302
        QoSID = 0x616e6f6e796d6f7573406173622e636f6d
        ScheduleType = 0x7f000001
        TrafficPriority = 0x00000000
        Called-Station-Id = "00-00-00-00-00-00:"
        Calling-Station-Id = "00-13-49-C3-C5-30"
        MediaFlowType = 0x00000578
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 0Mbps 802.11"
        EAP-Message = 
0x0209008c1500160301004610000042004055b5552282f3e2b403cb95ebafe1775d9745c1e28caffe410d0c9ddcb53215c48fb9fe4089571488886d206d0b6d1477f96e41f60ce4c571db632263859d5ac21403010001011603010030d9d62590005656c6a68b85a81bf3372ce074b399ad3cd901e6c01c8843cad950a8331ac521da18d1a058cab3db826059
        State = 0xd99b9956db928c9338d70856535d0709
        Message-Authenticator = 0xe8bb979b6e4487cddab43e461cd5c3f1
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "asb.com"
    rlm_realm: Adding Stripped-User-Name = "anonymous"
    rlm_realm: Proxying request from user anonymous to realm asb.com
    rlm_realm: Adding Realm = "asb.com"
    rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
  rlm_eap: EAP packet type response id 9 length 140
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
    users: Matched entry DEFAULT at line 367
++[files] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange  
    TLS_accept: SSLv3 read client key exchange A 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 read finished A 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
    TLS_accept: SSLv3 write change cipher spec A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 write finished A 
    TLS_accept: SSLv3 flush data 
    (other): SSL negotiation finished successfully 
SSL Connection Established 
  eaptls_process returned 13 
************************************** cp after=00
++[eap] returns handled
Sending Access-Challenge of id 27 to 127.0.0.1 port 32776
        EAP-Message = 
0x010a004515800000003b1403010001011603010030ceb5957b02c100e31eafcd91a62160c6e280c309e3a1801a96b773674452e84573dbd2282b5a76864615e85fded34ad8
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd99b9956da918c9338d70856535d0709
Finished request 3.
Going to the next request
Waking up in 0.2 seconds. 
Waking up in 0.3 seconds. 
rad_recv: Access-Request packet from host 127.0.0.1 port 32776, id=28, 
length=354
        QoSID = 0x616e6f6e796d6f7573406173622e636f6d
        ScheduleType = 0x7f000001
        TrafficPriority = 0x00000000
        Called-Station-Id = "00-00-00-00-00-00:"
        Calling-Station-Id = "00-13-49-C3-C5-30"
        MediaFlowType = 0x00000578
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 0Mbps 802.11"
        EAP-Message = 
0x020a00c01500170301002075b9ecb64bd478294e53d8974b9ab6b2aba82994aba94cca4813de38d98024551703010090a547448c7e85c24c6646e4267961917e069b4bda8568ea3889ba39dd3d44c68c3f60d9f216eb82411fe73d0285efbf28f250ee44c8ad9234f044ef3bbaecf04b813f66919dac8330989a6ced5fcfaac5f64958daf0cae184eef6a8574ac94d92b974e64f7448d93536ec41cb47520c7570bcd4958c9307fff13264755078051c890d65009dbf1c3c53306ec07db630b6
        State = 0xd99b9956da918c9338d70856535d0709
        Message-Authenticator = 0x6c4cd222e98a1db76a3b564e93301450
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "asb.com"
    rlm_realm: Adding Stripped-User-Name = "anonymous"
    rlm_realm: Proxying request from user anonymous to realm asb.com
    rlm_realm: Adding Realm = "asb.com"
    rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
  rlm_eap: EAP packet type response id 10 length 192
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
    users: Matched entry DEFAULT at line 367
++[files] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_ttls: Session established.  Proceeding to decode tunneled attributes.
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
  rlm_mschap: Found MS-CHAP attributes.  Setting 'Auth-Type  = mschap'
++[mschap] returns ok
    rlm_realm: Looking up realm "asb.com" for User-Name = "[EMAIL PROTECTED]"
    rlm_realm: Found realm "asb.com"
    rlm_realm: Adding Stripped-User-Name = "ERTVR_BE"
    rlm_realm: Proxying request from user ERTVR_BE to realm asb.com
    rlm_realm: Adding Realm = "asb.com"
    rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
  rlm_eap: No EAP-Message, not doing EAP
++[eap] returns noop
WARNING: Found User-Password == "...".
WARNING: Are you sure you don't mean Cleartext-Password?
WARNING: See "man rlm_pap" for more information.
    users: Matched entry ERTVR_BE at line 146
++[files] returns ok
  rad_check_password:  Found Auth-Type mschap
auth: type "MSCHAP"
+- entering group MS-CHAP
  rlm_mschap: No Cleartext-Password configured.  Cannot create LM-Password.
  rlm_mschap: No Cleartext-Password configured.  Cannot create NT-Password.
  rlm_mschap: Told to do MS-CHAPv2 for [EMAIL PROTECTED] with NT-Password
  rlm_mschap: FAILED: No NT/LM-Password.  Cannot perform authentication.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
auth: Failed to validate the user.
Login incorrect: [EMAIL PROTECTED]/<via Auth-Type = mschap>] (from client 
localhost port 0 cli 00-13-49-C3-C5-30)
  TTLS: Got tunneled Access-Reject
 rlm_eap: Handler failed in EAP/ttls
  rlm_eap: Failed in EAP select
++[eap] returns invalid
auth: Failed to validate the user.
Login incorrect: [EMAIL PROTECTED]/<via Auth-Type = EAP>] (from client 
localhost port 0 cli 00-13-49-C3-C5-30)
Delaying reject of request 4 for 1 seconds
Going to the next request
Waking up in 0.2 seconds. 
Waking up in 0.3 seconds. 
Waking up in 0.3 seconds. 
Sending delayed reject for request 4
Sending Access-Reject of id 28 to 127.0.0.1 port 32776
        EAP-Message = 0x040a0004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 2.3 seconds. 
Cleaning up request 0 ID 24 with timestamp +6
Waking up in 0.5 seconds. 
Cleaning up request 1 ID 25 with timestamp +6
Waking up in 0.3 seconds. 
Cleaning up request 2 ID 26 with timestamp +6
Waking up in 0.3 seconds. 
Cleaning up request 3 ID 27 with timestamp +7
Waking up in 1.3 seconds. 
Cleaning up request 4 ID 28 with timestamp +7
Ready to process requests.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to