Dear All,

I was trying to authenticate MSCHAPV2 with /etc/smbpasswd & am getting following error while doing radiusd -X .Can any body help me out .


[EMAIL PROTECTED] rlm_smb]# radiusd -X
FreeRADIUS Version 2.0.4, for host i686-pc-linux-gnu, built on May 25 2008 at 02:35:37
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License.
Starting - reading configuration files ...
including configuration file /usr/local/etc/raddb/radiusd.conf
including configuration file /usr/local/etc/raddb/proxy.conf
including configuration file /usr/local/etc/raddb/clients.conf
including configuration file /usr/local/etc/raddb/snmp.conf
including configuration file /usr/local/etc/raddb/eap.conf
including configuration file /usr/local/etc/raddb/sql.conf
including configuration file /usr/local/etc/raddb/sql/mysql/dialup.conf
including configuration file /usr/local/etc/raddb/sql/mysql/counter.conf
including configuration file /usr/local/etc/raddb/policy.conf
including files in directory /usr/local/etc/raddb/sites-enabled/
including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel
including configuration file /usr/local/etc/raddb/sites-enabled/default
including dictionary file /usr/local/etc/raddb/dictionary
main {
       prefix = "/usr/local"
       localstatedir = "/usr/local/var"
       logdir = "/usr/local/var/log/radius"
       libdir = "/usr/local/lib"
       radacctdir = "/usr/local/var/log/radius/radacct"
       hostname_lookups = no
       max_request_time = 30
       cleanup_delay = 5
       max_requests = 1024
       allow_core_dumps = no
       pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
       checkrad = "/usr/local/sbin/checkrad"
       debug_level = 0
       proxy_requests = yes
security {
       max_attributes = 200
       reject_delay = 1
       status_server = yes
}
}
client localhost {
       ipaddr = 127.0.0.1
       require_message_authenticator = no
       secret = "testing123"
       nastype = "other"
}
client 192.168.7.0/24 {
       require_message_authenticator = no
       secret = "testing123"
       shortname = "corp"
}
client 196.1.109.0/16 {
       require_message_authenticator = no
       secret = "testing123"
       shortname = "private-network-2"
}
radiusd: #### Loading Realms and Home Servers ####
proxy server {
       retry_delay = 5
       retry_count = 3
       default_fallback = no
       dead_time = 120
       wake_all_if_all_dead = no
}
home_server localhost {
       ipaddr = 127.0.0.1
       port = 1812
       type = "auth"
       secret = "testing123"
       response_window = 20
       max_outstanding = 65536
       zombie_period = 40
       status_check = "status-server"
       ping_check = "none"
       ping_interval = 30
       check_interval = 30
       num_answers_to_alive = 3
       num_pings_to_alive = 3
       revive_interval = 120
       status_check_timeout = 4
}
home_server_pool my_auth_failover {
       type = fail-over
       home_server = localhost
}
realm example.com {
       auth_pool = my_auth_failover
}
realm LOCAL {
}
radiusd: #### Instantiating modules ####
instantiate {
Module: Linked to module rlm_exec
Module: Instantiating exec
 exec {
       wait = yes
       input_pairs = "request"
       shell_escape = yes
 }
Module: Linked to module rlm_expr
Module: Instantiating expr
Module: Linked to module rlm_expiration
Module: Instantiating expiration
 expiration {
       reply-message = "Password Has Expired  "
 }
Module: Linked to module rlm_logintime
Module: Instantiating logintime
 logintime {
       reply-message = "You are calling outside your allowed timespan  "
       minimum-timeout = 60
 }
}
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Linked to module rlm_pap
Module: Instantiating pap
 pap {
       encryption_scheme = "auto"
       auto_header = no
 }
Module: Linked to module rlm_chap
Module: Instantiating chap
Module: Linked to module rlm_mschap
Module: Instantiating mschap
 mschap {
       use_mppe = yes
       require_encryption = yes
       require_strong = yes
       with_ntdomain_hack = yes
ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{Stripped-User-Name:-%{User-Name:-None}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
 }
Module: Linked to module rlm_unix
Module: Instantiating unix
 unix {
       radwtmp = "/usr/local/var/log/radius/radwtmp"
 }
Module: Linked to module rlm_eap
Module: Instantiating eap
 eap {
       default_eap_type = "peap"
       timer_expire = 60
       ignore_unknown_eap_types = no
       cisco_accounting_username_bug = no
 }
Module: Linked to sub-module rlm_eap_md5
Module: Instantiating eap-md5
Module: Linked to sub-module rlm_eap_leap
Module: Instantiating eap-leap
Module: Linked to sub-module rlm_eap_gtc
Module: Instantiating eap-gtc
  gtc {
       challenge = "Password: "
       auth_type = "PAP"
  }
Module: Linked to sub-module rlm_eap_tls
Module: Instantiating eap-tls
  tls {
       rsa_key_exchange = no
       dh_key_exchange = yes
       rsa_key_length = 512
       dh_key_length = 512
       verify_depth = 0
       pem_file_type = yes
       private_key_file = "/usr/local/etc/raddb/certs/server.pem"
       certificate_file = "/usr/local/etc/raddb/certs/server.pem"
       CA_file = "/usr/local/etc/raddb/certs/ca.pem"
       private_key_password = "whatever"
       dh_file = "/usr/local/etc/raddb/certs/dh"
       random_file = "/usr/local/etc/raddb/certs/random"
       fragment_size = 1024
       include_length = yes
       check_crl = no
  }
Module: Linked to sub-module rlm_eap_ttls
Module: Instantiating eap-ttls
  ttls {
       default_eap_type = "mschapv2"
       copy_request_to_tunnel = no
       use_tunneled_reply = no
       virtual_server = "inner-tunnel"
  }
Module: Linked to sub-module rlm_eap_peap
Module: Instantiating eap-peap
  peap {
       default_eap_type = "mschapv2"
       copy_request_to_tunnel = no
       use_tunneled_reply = no
       proxy_tunneled_request_as_eap = yes
       virtual_server = "inner-tunnel"
  }
Module: Linked to sub-module rlm_eap_mschapv2
Module: Instantiating eap-mschapv2
  mschapv2 {
       with_ntdomain_hack = no
  }
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_realm
Module: Instantiating suffix
 realm suffix {
       format = "suffix"
       delimiter = "@"
       ignore_default = no
       ignore_null = no
 }
Module: Linked to module rlm_files
Module: Instantiating files
 files {
       usersfile = "/usr/local/etc/raddb/users"
       acctusersfile = "/usr/local/etc/raddb/acct_users"
       preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
       compat = "no"
 }
Module: Checking session {...} for more modules to load
Module: Linked to module rlm_radutmp
Module: Instantiating radutmp
 radutmp {
       filename = "/usr/local/var/log/radius/radutmp"
       username = "%{User-Name}"
       case_sensitive = yes
       check_with_nas = yes
       perm = 384
       callerid = yes
 }
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
Module: Linked to module rlm_attr_filter
Module: Instantiating attr_filter.access_reject
 attr_filter attr_filter.access_reject {
       attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
       key = "%{User-Name}"
 }
}
}
server {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_preprocess
Module: Instantiating preprocess
 preprocess {
       huntgroups = "/usr/local/etc/raddb/huntgroups"
       hints = "/usr/local/etc/raddb/hints"
       with_ascend_hack = no
       ascend_channels_per_line = 23
       with_ntdomain_hack = no
       with_specialix_jetstream_hack = no
       with_cisco_vsa_hack = no
       with_alvarion_vsa_hack = no
 }
Module: Linked to module rlm_detail
Module: Instantiating auth_log
 detail auth_log {
detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
       header = "%t"
       detailperm = 384
       dirperm = 493
       locking = no
       log_packet_header = no
 }
Module: Checking preacct {...} for more modules to load
Module: Linked to module rlm_acct_unique
Module: Instantiating acct_unique
 acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
 }
Module: Checking accounting {...} for more modules to load
Module: Instantiating detail
 detail {
detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
       header = "%t"
       detailperm = 384
       dirperm = 493
       locking = no
       log_packet_header = no
 }
Module: Instantiating attr_filter.accounting_response
 attr_filter attr_filter.accounting_response {
       attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
       key = "%{User-Name}"
 }
Module: Checking session {...} for more modules to load
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
Module: Instantiating reply_log
 detail reply_log {
detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/reply-detail-%Y%m%d"
       header = "%t"
       detailperm = 384
       dirperm = 493
       locking = no
       log_packet_header = no
 }
}
}
radiusd: #### Opening IP addresses and Ports ####
listen {
       type = "auth"
       ipaddr = *
       port = 0
}
listen {
       type = "acct"
       ipaddr = *
       port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on proxy address * port 1814
Ready to process requests.
       User-Name = "ajay"
       User-Password = "ajay"
       NAS-IP-Address = 127.0.0.1
       NAS-Port = 7
+- entering group authorize
++[preprocess] returns ok
expand: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /usr/local/var/log/radius/radacct/127.0.0.1/auth-detail-20080605 rlm_detail: /usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /usr/local/var/log/radius/radacct/127.0.0.1/auth-detail-20080605
       expand: %t -> Thu Jun  5 05:24:03 2008
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
   rlm_realm: No '@' in User-Name = "ajay", looking up realm NULL
   rlm_realm: No such realm "NULL"
++[suffix] returns noop
 rlm_eap: No EAP-Message, not doing EAP
++[eap] returns noop
++[unix] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns updated
 rad_check_password:  Found Auth-Type
auth: type "PAP"
+- entering group PAP
rlm_pap: login attempt with password "ajay"
rlm_pap: Using CRYPT encryption.
rlm_pap: Passwords don't match
++[pap] returns reject
auth: Failed to validate the user.
Login incorrect (rlm_pap: CRYPT password check failed): [ajay/ajay] (from client localhost port 7)
 Found Post-Auth-Type Reject
WARNING: Unknown value specified for Post-Auth-Type. Cannot perform requested action.
Delaying reject of request 0 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 0
Waking up in 4.9 seconds.
Cleaning up request 0 ID 197 with timestamp +19
Ready to process requests.


Regards.

VIJAY


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to