If I select EAP-TTLS + use only my certificate for auth will cause segmentation 
fault. Others seems OK.
   
  Debug info:
  rad_recv: Access-Request packet from host 192.168.200.57:32785, id=95, 
length=325 
        User-Name = "bbb" 
        NAS-IP-Address = 192.168.200.57 
        NAS-Identifier = "auth_test" 
        NAS-Port = 0 
        Called-Station-Id = "00-19-77-02-E6-90:auth-wpa2-tkip-8021x" 
        Calling-Station-Id = "00-1D-7E-03-2B-CF" 
        Framed-MTU = 1500 
        NAS-Port-Type = Wireless-802.11 
        Connect-Info = "CONNECT 11Mbps 802.11b" 
        EAP-Message = 
0x0215009015800000008616030100461000004200400d423029041904e4b654b0384c78b56d7490853af607b909c2f54fc376bebac512ebfb7663e9ee2fc7320d175037da31f09e90ad986d539d519d6ef6c39f577914030100010116030100302027f914730434165f520dc31734211631a5c96402b0ddabaf4d815209d07bb6c0f2817ed3a2233822587288715beab6
 
        State = 0x4f6739def5f0e9f45fd60479253cc3cd 
        Message-Authenticator = 0xe06aac6aeeefc91f7920fd60b05ea9ab 
  Processing the authorize section of radiusd.conf 
modcall: entering group authorize for request 9 
  modcall[authorize]: module "preprocess" returns ok for request 9 
  modcall[authorize]: module "chap" returns noop for request 9 
  modcall[authorize]: module "mschap" returns noop for request 9 
    rlm_realm: No '@' in User-Name = "bbb", looking up realm NULL 
    rlm_realm: No such realm "NULL" 
  modcall[authorize]: module "suffix" returns noop for request 9 
  rlm_eap: EAP packet type response id 21 length 144 
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation 
  modcall[authorize]: module "eap" returns updated for request 9 
rlm_ldap: - authorize 
rlm_ldap: performing user authorization for bbb 
radius_xlat:  '(uid=bbb)' 
radius_xlat:  'ou=radius,dc=bestgo,dc=aero' 
rlm_ldap: ldap_get_conn: Checking Id: 0 
rlm_ldap: ldap_get_conn: Got Id: 0 
rlm_ldap: performing search in ou=radius,dc=bestgo,dc=aero, with filter 
(uid=bbb) 
rlm_ldap: checking if remote access for bbb is allowed by uid 
rlm_ldap: No default NMAS login sequence 
rlm_ldap: looking for check items in directory... 
rlm_ldap: Adding userPassword as User-Password == "1234" 
rlm_ldap: looking for reply items in directory... 
rlm_ldap: Adding radiusTunnelPrivateGroupId as Tunnel-Private-Group-Id:0 = "1" 
rlm_ldap: Adding radiusTunnelMediumType as Tunnel-Medium-Type:0 = IPv4 
rlm_ldap: Adding radiusTunnelType as Tunnel-Type:0 = GRE 
rlm_ldap: user bbb authorized to use remote access 
rlm_ldap: ldap_release_conn: Release Id: 0 
  modcall[authorize]: module "ldap" returns ok for request 9 
rlm_pap: Found existing Auth-Type, not changing it. 
  modcall[authorize]: module "pap" returns noop for request 9 
modcall: leaving group authorize (returns updated) for request 9 
  rad_check_password:  Found Auth-Type EAP 
auth: type "EAP" 
  Processing the authenticate section of radiusd.conf 
modcall: entering group authenticate for request 9 
  rlm_eap: Request found, released from the list 
  rlm_eap: EAP/ttls 
  rlm_eap: processing type ttls 
  rlm_eap_ttls: Authenticate 
  rlm_eap_tls: processing TLS 
rlm_eap_tls:  Length Included 
  eaptls_verify returned 11  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange   
    TLS_accept: SSLv3 read client key exchange A  
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]   
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished   
    TLS_accept: SSLv3 read finished A  
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]   
    TLS_accept: SSLv3 write change cipher spec A  
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished   
    TLS_accept: SSLv3 write finished A  
    TLS_accept: SSLv3 flush data  
    (other): SSL negotiation finished successfully  
SSL Connection Established  
  eaptls_process returned 13  
  modcall[authenticate]: module "eap" returns handled for request 9 
modcall: leaving group authenticate (returns handled) for request 9 
Sending Access-Challenge of id 95 to 192.168.200.57 port 32785 
        Tunnel-Private-Group-Id:0 = "1" 
        Tunnel-Medium-Type:0 = IPv4 
        Tunnel-Type:0 = GRE 
        EAP-Message = 
0x0116004515800000003b1403010001011603010030b081e94e6f9087f3c237216ab3fd9d65fc8311b18e37e66208369fb451d373695f16b167d85e80c870295da3d2f21cf4
 
        Message-Authenticator = 0x00000000000000000000000000000000 
        State = 0x10aabdcc7ef9ba295475b0706b6e070c 
Finished request 9 
Going to the next request 
Waking up in 6 seconds... 
rad_recv: Access-Request packet from host 192.168.200.57:32785, id=96, 
length=187 
        User-Name = "bbb" 
        NAS-IP-Address = 192.168.200.57 
        NAS-Identifier = "auth_test" 
        NAS-Port = 0 
        Called-Station-Id = "00-19-77-02-E6-90:auth-wpa2-tkip-8021x" 
        Calling-Station-Id = "00-1D-7E-03-2B-CF" 
        Framed-MTU = 1500 
        NAS-Port-Type = Wireless-802.11 
        Connect-Info = "CONNECT 11Mbps 802.11b" 
        EAP-Message = 0x021600061500 
        State = 0x10aabdcc7ef9ba295475b0706b6e070c 
        Message-Authenticator = 0xa07cb0441d0e9d898030c912f9ae54d3 
  Processing the authorize section of radiusd.conf 
modcall: entering group authorize for request 10 
  modcall[authorize]: module "preprocess" returns ok for request 10 
  modcall[authorize]: module "chap" returns noop for request 10 
  modcall[authorize]: module "mschap" returns noop for request 10 
    rlm_realm: No '@' in User-Name = "bbb", looking up realm NULL 
    rlm_realm: No such realm "NULL" 
  modcall[authorize]: module "suffix" returns noop for request 10 
  rlm_eap: EAP packet type response id 22 length 6 
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation 
  modcall[authorize]: module "eap" returns updated for request 10 
rlm_ldap: - authorize 
rlm_ldap: performing user authorization for bbb 
radius_xlat:  '(uid=bbb)' 
radius_xlat:  'ou=radius,dc=bestgo,dc=aero' 
rlm_ldap: ldap_get_conn: Checking Id: 0 
rlm_ldap: ldap_get_conn: Got Id: 0 
rlm_ldap: performing search in ou=radius,dc=bestgo,dc=aero, with filter 
(uid=bbb) 
rlm_ldap: checking if remote access for bbb is allowed by uid 
rlm_ldap: No default NMAS login sequence 
rlm_ldap: looking for check items in directory... 
rlm_ldap: Adding userPassword as User-Password == "1234" 
rlm_ldap: looking for reply items in directory... 
rlm_ldap: Adding radiusTunnelPrivateGroupId as Tunnel-Private-Group-Id:0 = "1" 
rlm_ldap: Adding radiusTunnelMediumType as Tunnel-Medium-Type:0 = IPv4 
rlm_ldap: Adding radiusTunnelType as Tunnel-Type:0 = GRE 
rlm_ldap: user bbb authorized to use remote access 
rlm_ldap: ldap_release_conn: Release Id: 0 
  modcall[authorize]: module "ldap" returns ok for request 10 
rlm_pap: Found existing Auth-Type, not changing it. 
  modcall[authorize]: module "pap" returns noop for request 10 
modcall: leaving group authorize (returns updated) for request 10 
  rad_check_password:  Found Auth-Type EAP 
auth: type "EAP" 
  Processing the authenticate section of radiusd.conf 
modcall: entering group authenticate for request 10 
  rlm_eap: Request found, released from the list 
  rlm_eap: EAP/ttls 
  rlm_eap: processing type ttls 
  rlm_eap_ttls: Authenticate 
  rlm_eap_tls: processing TLS 
rlm_eap_tls: Received EAP-TLS ACK message 
  rlm_eap_tls: ack handshake is finished 
  eaptls_verify returned 3  
  eaptls_process returned 3
Segmentation fault
   
  John

       
---------------------------------
 雅虎邮箱,您的终生邮箱!
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to