Hello

I want to use an existing LDAP database for authentication of WIFI users
using EAP-PEAP. I am already using LDAP as a backend for samba, so I
have NT and LM hashes stored. The problem is I am still getting errors:

  rlm_mschap: Found LM-Password
  rlm_mschap: Found NT-Password
  rlm_mschap: Told to do MS-CHAPv2 for lolo with NT-Password
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 6
modcall: leaving group MS-CHAP (returns reject) for request 6
  rlm_eap: Freeing handler


I have generated NT and LM hashes for test user lolo like this:

# smbencrypt hoho
LM Hash                             NT Hash
--------------------------------    --------------------------------
E7B56BC6A10F5E88AAD3B435B51404EE    C32F64F9BD0708A6A055812D83B085E2


I have tried ntdomain hack on and off without any result...

 From radiusd.conf:
                #  Note that NT-Passwords MUST be stored as a 32-digit hex
                #  string, and MUST start off with "0x", such as:
                #
                #       0x000102030405060708090a0b0c0d0e0f
                #
                #  Without the leading "0x", NT-Passwords will not work.
                #  This goes for NT-Passwords stored in SQL, too.

I have tried this, but I cannot set LDAP attributes to anything like
that, as I understand from samba ldap scheme.
attributetype ( 1.3.6.1.4.1.7165.2.1.24 NAME 'sambaLMPassword'
        DESC 'LanManager Password'
        EQUALITY caseIgnoreIA5Match
        SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE )

attributetype ( 1.3.6.1.4.1.7165.2.1.25 NAME 'sambaNTPassword'
        DESC 'MD4 hash of the unicode password'
        EQUALITY caseIgnoreIA5Match
        SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE )


Do I have to add other attributes, or is it possible to add "0x" via
some freeradius configuration?


I have added complete output as an attachment for your convenience.




Thanks in advance...
Juraj

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/freeradius/clients.conf
Config:   including file: /etc/freeradius/snmp.conf
Config:   including file: /etc/freeradius/eap.conf
Config:   including file: /etc/freeradius/sql.conf
 main: prefix = "/usr"
 main: localstatedir = "/var"
 main: logdir = "/var/log/freeradius"
 main: libdir = "/usr/lib/freeradius"
 main: radacctdir = "/var/log/freeradius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = "/var/log/freeradius/radius.log"
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = "/var/run/freeradius/freeradius.pid"
 main: user = "freerad"
 main: group = "freerad"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/sbin/checkrad"
 main: proxy_requests = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/lib/freeradius
Module: Loaded exec 
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec) 
Module: Loaded expr 
Module: Instantiated expr (expr) 
Module: Loaded MS-CHAP 
 mschap: use_mppe = no
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: with_ntdomain_hack = yes
 mschap: passwd = "(null)"
 mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap) 
Module: Loaded LDAP 
 ldap: server = "localhost"
 ldap: port = 389
 ldap: net_timeout = 1
 ldap: timeout = 4
 ldap: timelimit = 3
 ldap: identity = "uid=manager,ou=accounts,dc=testing,dc=sk"
 ldap: tls_mode = no
 ldap: start_tls = no
 ldap: tls_cacertfile = "(null)"
 ldap: tls_cacertdir = "(null)"
 ldap: tls_certfile = "(null)"
 ldap: tls_keyfile = "(null)"
 ldap: tls_randfile = "(null)"
 ldap: tls_require_cert = "allow"
 ldap: password = "hoho"
 ldap: basedn = "dc=testing,dc=sk"
 ldap: filter = "(uid=%u)"
 ldap: base_filter = "(objectclass=sambaSamAccount)"
 ldap: default_profile = "(null)"
 ldap: profile_attribute = "(null)"
 ldap: password_header = "(null)"
 ldap: password_attribute = "(null)"
 ldap: access_attr = "(null)"
 ldap: groupname_attribute = "cn"
 ldap: groupmembership_filter = 
"(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
 ldap: groupmembership_attribute = "(null)"
 ldap: dictionary_mapping = "/etc/freeradius/ldap.attrmap"
 ldap: ldap_debug = 0
 ldap: ldap_connections_number = 5
 ldap: compare_check_items = no
 ldap: access_attr_used_for_allow = yes
 ldap: do_xlat = yes
 ldap: edir_account_policy_check = yes
 ldap: set_auth_type = yes
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap
rlm_ldap: reading ldap<->radius mappings from file /etc/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
rlm_ldap: LDAP sambaLMPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP sambaNTPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP acctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address
rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
rlm_ldap: LDAP radiusClass mapped to RADIUS Class
rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS Framed-AppleTalk-Link
rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS 
Framed-AppleTalk-Network
rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS Framed-AppleTalk-Zone
rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message
conns: 0x8143b30
Module: Instantiated ldap (ldap) 
Module: Loaded eap 
 eap: default_eap_type = "peap"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
 gtc: challenge = "Password: "
 gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/etc/freeradius/certs/crt.pem"
 tls: certificate_file = "/etc/freeradius/certs/crt.pem"
 tls: CA_file = "/etc/freeradius/certs/ca.pem"
 tls: private_key_password = "(null)"
 tls: dh_file = "/etc/freeradius/certs/dh"
 tls: random_file = "/etc/freeradius/certs/random"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
 tls: cipher_list = "(null)"
 tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = no
 peap: use_tunneled_reply = no
 peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap) 
Module: Loaded preprocess 
 preprocess: huntgroups = "/etc/freeradius/huntgroups"
 preprocess: hints = "/etc/freeradius/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = yes
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
 preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess) 
Module: Loaded files 
 files: usersfile = "/etc/freeradius/users"
 files: acctusersfile = "/etc/freeradius/acct_users"
 files: preproxy_usersfile = "/etc/freeradius/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files) 
Module: Loaded Acct-Unique-Session-Id 
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, 
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique) 
Module: Loaded realm 
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix) 
Module: Loaded detail 
 detail: detailfile = 
"/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail) 
Module: Loaded System 
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "/etc/shadow"
 unix: group = "(null)"
 unix: radwtmp = "/var/log/freeradius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix) 
Module: Loaded radutmp 
 radutmp: filename = "/var/log/freeradius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp) 
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.




































































rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=121
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x02000009016c6f6c6f
        Message-Authenticator = 0x8a34d789cb2a1f8fa9bbf7a983a9b1b4
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
  rlm_eap: EAP packet type response id 0 length 9
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 0
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to localhost:389, authentication 0
rlm_ldap: bind as uid=manager,ou=accounts,dc=testing,dc=sk/hoho to localhost:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 0x010100061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x6a0adc2acdb86142933a3bb4add13e04
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=210
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0x6a0adc2acdb86142933a3bb4add13e04
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 
0x0201005019800000004616030100410100003d0301485fa74b9246694ca897541068b3eadf53fb7d700d8fb1e927ffe19bb80041a100001600040005000a000900640062000300060013001200630100
        Message-Authenticator = 0x3d65cee79491e6bf1d721f58dd64eec2
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
  rlm_eap: EAP packet type response id 1 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 1
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 06de], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
    TLS_accept: SSLv3 write server done A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 0x0102020900bf14476493d21f34300d06092a864886f7
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xfdc1c1cde03a155db044fa59add5b8bf
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=136
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xfdc1c1cde03a155db044fa59add5b8bf
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020200061900
        Message-Authenticator = 0x346d96ff515b4a7a06982bcd91e01b3f
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
  rlm_eap: EAP packet type response id 2 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 2
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0x5818531a7a2d39d9084d855c9dcbf86fcf8650507a8fe183f9252628a9bafcacb16be1ee6fd30a388ae72acb0d2900297950c3e20a47fb7cca042a69f414aa4b1816030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xae968455e5720ca7da392bda06d9f55b
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=322
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xae968455e5720ca7da392bda06d9f55b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 
0x020300c01980000000b616030100861000008200805fd4aad85c735732f34e64c70a2589cbfcd58e4af26f6008167c5f08321d243cb79610bdf83149198ff40be17520f320a895f0eb77a2ee92fb8aa351ba50bfc2372f1a8a8a5df673531d4052b6cc9e8689b07eaad8f3478dfedcc0be61bd7db0edb3cd292ba750974aa792ab4ea87c9cf378caf278e6d08b092cf9d90658b9ee1403010001011603010020e7a6da4013775d928478d49d02c1c718e969a9a19046a46d34fc3fcc5bfe5e64
        Message-Authenticator = 0xdb00b1aec34d5bb60a0cb2f871ed680d
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
  rlm_eap: EAP packet type response id 3 length 192
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 3
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
    TLS_accept: SSLv3 read client key exchange A 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 read finished A 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
    TLS_accept: SSLv3 write change cipher spec A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 write finished A 
    TLS_accept: SSLv3 flush data 
    (other): SSL negotiation finished successfully 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
SSL Connection Established 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 
0x010400311900140301000101160301002081dd6fa342d02fecdf8ecd8c60ea369408d303918aa488de0520493486b2e706
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe952aabe2222ed0d84ac572718c449ee
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=136
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xe952aabe2222ed0d84ac572718c449ee
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020400061900
        Message-Authenticator = 0xf0a87d638db2248c77a459faf5ee561e
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 4
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3 
  eaptls_process returned 3 
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 
0x0105002019001703010015321f02523fd309139621700d45a268f50a3938c431
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xb53579b10c9b11d91cd204a8d53f507c
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=162
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xb53579b10c9b11d91cd204a8d53f507c
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 
0x02050020190017030100152a5d1a5cf8572cd02f150927a9a36e2ab3d96c0468
        Message-Authenticator = 0x050a22428ab9547fa02dd7dfb05fc186
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
  rlm_eap: EAP packet type response id 5 length 32
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 5
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - lolo
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 0x02050009016c6f6c6f
  PEAP: Got tunneled identity of lolo
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to lolo
  PEAP: Sending tunneled request
        EAP-Message = 0x02050009016c6f6c6f
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "lolo"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
  rlm_eap: EAP packet type response id 5 length 9
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 5
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
  PEAP: Got tunneled reply RADIUS code 11
        EAP-Message = 
0x0106001e1a01060019101cf5cb2bda1329ef21761e15dbe71a4c6c6f6c6f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf25ab07f3e8383d1c1a2841a813462c7
  PEAP: Processing from tunneled session code 0x81826c8 11
        EAP-Message = 
0x0106001e1a01060019101cf5cb2bda1329ef21761e15dbe71a4c6c6f6c6f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf25ab07f3e8383d1c1a2841a813462c7
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 
0x010600351900170301002a738d385e9dbfd237a1a58a392bb60db3c319cb141bb6749bb795c76013d270e0ae40b32f68de2fa133cf
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x1203a6d1bd4cc2a59fe19e2e031418bb
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=216
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0x1203a6d1bd4cc2a59fe19e2e031418bb
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 
0x020600561900170301004b8d4ffbc98e89a3ab0e3ae6249d7ad4cb8bbb90829712c9c6bfdaa4f1428fbf6be3132b4c3b7918ef2360b4b5664a848803b6afcc4ef943931e5d2f416eab036a8ca80879de3987ef1e5cf7
        Message-Authenticator = 0x1e2fac525d5478ff5ad095588c0b5d2a
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
  rlm_eap: EAP packet type response id 6 length 86
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 6
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 
0x0206003f1a0206003a3139cf6286a0aac740fc8468a7d84a3c6e00000000000000009eb2070d7d00d04774d0fc35604e5f535c1387aa7bbfc3a3006c6f6c6f
  PEAP: Setting User-Name to lolo
  PEAP: Adding old state with f2 5a
  PEAP: Sending tunneled request
        EAP-Message = 
0x0206003f1a0206003a3139cf6286a0aac740fc8468a7d84a3c6e00000000000000009eb2070d7d00d04774d0fc35604e5f535c1387aa7bbfc3a3006c6f6c6f
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "lolo"
        State = 0xf25ab07f3e8383d1c1a2841a813462c7
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
  rlm_eap: EAP packet type response id 6 length 63
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 6
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 6
  rlm_mschap: Found LM-Password
  rlm_mschap: Found NT-Password
  rlm_mschap: Told to do MS-CHAPv2 for lolo with NT-Password
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 6
modcall: leaving group MS-CHAP (returns reject) for request 6
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 6
modcall: leaving group authenticate (returns reject) for request 6
auth: Failed to validate the user.
  PEAP: Got tunneled reply RADIUS code 3
        MS-CHAP-Error = "\006E=691 R=1"
        EAP-Message = 0x04060004
        Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Processing from tunneled session code 0x8182708 3
        MS-CHAP-Error = "\006E=691 R=1"
        EAP-Message = 0x04060004
        Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 0 to 192.168.1.1 port 2048
        EAP-Message = 
0x010700261900170301001b896bc9057816688fdf9d9412cb0277bdb72c744c671a1509337361
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe251e2258090dcea27f12e13f96d3f24
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.1:2048, id=0, length=168
        User-Name = "lolo"
        NAS-IP-Address = 192.168.1.1
        Called-Station-Id = "001731e75a28"
        Calling-Station-Id = "0012f072663d"
        NAS-Identifier = "001731e75a28"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xe251e2258090dcea27f12e13f96d3f24
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 
0x020700261900170301001b331e49138a0033983e6a9de431cdb9407bfd6ad215ea22454d22c5
        Message-Authenticator = 0xf8ba384f81221b23050be0469f50166c
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
  rlm_eap: EAP packet type response id 7 length 38
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 152
  modcall[authorize]: module "files" returns ok for request 7
rlm_ldap: - authorize
rlm_ldap: performing user authorization for lolo
radius_xlat:  '(uid=lolo)'
radius_xlat:  'dc=testing,dc=sk'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=testing,dc=sk, with filter (uid=lolo)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
35839254E3956535CC205CE6223DF0B8 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
EF4B8C4F3BA6EA26104F64A3BCB3B38F & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user lolo authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected earlier in 
this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 7
modcall: leaving group authenticate (returns invalid) for request 7
auth: Failed to validate the user.
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 0 to 192.168.1.1 port 2048
        EAP-Message = 0x04070004
        Message-Authenticator = 0x00000000000000000000000000000000
Cleaning up request 7 ID 0 with timestamp 485fc28b
Nothing to do.  Sleeping until we see a request.


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to