FreeRADIUS Version 2.0.5, for host arm-none-linux-gnueabi, built on Nov 1 2010 at 21:20:17 Copyright (C) 1999-2008 The FreeRADIUS server project and contributors. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License v2. Starting - reading configuration files ... including configuration file /opt/etc/raddb/radiusd.conf including configuration file /opt/etc/raddb/proxy.conf including configuration file /opt/etc/raddb/clients.conf including configuration file /opt/etc/raddb/snmp.conf including configuration file /opt/etc/raddb/eap.conf including configuration file /opt/etc/raddb/sql.conf including configuration file /opt/etc/raddb/sql/mysql/dialup.conf including dictionary file /opt/etc/raddb/dictionary main { prefix = "/opt" localstatedir = "/opt/var" logdir = "/var/spool/radius/log" libdir = "/opt/lib" radacctdir = "/var/spool/radius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 allow_core_dumps = no pidfile = "/var/run/radiusd.pid" checkrad = "/opt/sbin/checkrad" debug_level = 0 proxy_requests = yes log_auth = no log_auth_badpass = no log_auth_goodpass = no log_stripped_names = no } client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "testing123" nastype = "other" } client 10.1.1.16 { require_message_authenticator = no secret = "Duracell_2011" shortname = "ap" } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = "testing123" response_window = 20 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_check = "none" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 120 status_check_timeout = 4 } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } radiusd: #### Instantiating modules #### instantiate { Module: Linked to module rlm_exec Module: Instantiating exec exec { wait = yes input_pairs = "request" shell_escape = yes } Module: Linked to module rlm_expr Module: Instantiating expr } radiusd: #### Loading Virtual Servers #### server { modules { Module: Checking authenticate {...} for more modules to load Module: Linked to module rlm_pap Module: Instantiating pap pap { encryption_scheme = "crypt" auto_header = no } Module: Linked to module rlm_chap Module: Instantiating chap Module: Linked to module rlm_mschap Module: Instantiating mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = no } Module: Linked to module rlm_unix Module: Instantiating unix unix { radwtmp = "/var/spool/radius/log/radwtmp" } Module: Linked to module rlm_eap Module: Instantiating eap eap { default_eap_type = "md5" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no } Module: Linked to sub-module rlm_eap_md5 Module: Instantiating eap-md5 Module: Linked to sub-module rlm_eap_leap Module: Instantiating eap-leap Module: Linked to sub-module rlm_eap_gtc Module: Instantiating eap-gtc gtc { challenge = "Password: " auth_type = "PAP" } Module: Linked to sub-module rlm_eap_tls Module: Instantiating eap-tls tls { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 pem_file_type = yes private_key_file = "/opt/etc/raddb/certs/server.pem" certificate_file = "/opt/etc/raddb/certs/server.pem" CA_file = "/opt/etc/raddb/certs/ca.pem" private_key_password = "whatever" dh_file = "/opt/etc/raddb/certs/dh" random_file = "/opt/etc/raddb/certs/random" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" make_cert_command = "/opt/etc/raddb/certs/bootstrap" } Module: Linked to sub-module rlm_eap_ttls Module: Instantiating eap-ttls ttls { default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" } Module: Linked to sub-module rlm_eap_peap Module: Instantiating eap-peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = no proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" } Module: Linked to sub-module rlm_eap_mschapv2 Module: Instantiating eap-mschapv2 mschapv2 { with_ntdomain_hack = no } Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_preprocess Module: Instantiating preprocess preprocess { huntgroups = "/opt/etc/raddb/huntgroups" hints = "/opt/etc/raddb/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } Module: Linked to module rlm_realm Module: Instantiating suffix realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } Module: Linked to module rlm_files Module: Instantiating files files { usersfile = "/opt/etc/raddb/users" acctusersfile = "/opt/etc/raddb/acct_users" compat = "no" } Module: Checking preacct {...} for more modules to load Module: Linked to module rlm_acct_unique Module: Instantiating acct_unique acct_unique { key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" } Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_detail Module: Instantiating detail detail { detailfile = "/var/spool/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } Module: Linked to module rlm_radutmp Module: Instantiating radutmp radutmp { filename = "/var/spool/radius/log/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes perm = 384 callerid = yes } Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load } } radiusd: #### Opening IP addresses and Ports #### bind_address = * WARNING: The directive 'bind_adress' is deprecated, and will be removed in future versions of FreeRADIUS. Please edit the configuration files to use the directive 'listen'. Listening on authentication address * port 1812 Listening on accounting address * port 1813 Listening on proxy address * port 1814 Ready to process requests. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=87, length=154 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x0200000801726164 Message-Authenticator = 0x1087dc5740885c6590a01827f122e1d8 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 0 length 8 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: EAP Identity rlm_eap: processing type md5 rlm_eap_md5: Issuing Challenge ++[eap] returns handled Sending Access-Challenge of id 87 to 10.1.1.16 port 32804 EAP-Message = 0x010100160410a3240e60998e6bd77490cd2d4b42e4a3 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xaef5e8edaef4ecd0a9cd8f73e0ae8342 Finished request 0. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=88, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020100060319 State = 0xaef5e8edaef4ecd0a9cd8f73e0ae8342 Message-Authenticator = 0x4b2c9ad0d9033fbf5e6c63741cb31ddc +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 1 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP NAK rlm_eap: EAP-NAK asked for EAP-Type/peap rlm_eap: processing type tls rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 ++[eap] returns handled Sending Access-Challenge of id 88 to 10.1.1.16 port 32804 EAP-Message = 0x010200061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xaef5e8edaff7f1d0a9cd8f73e0ae8342 Finished request 1. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=89, length=300 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x0202008819800000007e16030100790100007503014e1432e3bc8f094eb497220a0cbdf08841f9d059e1a1b56b3c3f48f090e7b09400003ac00ac009c007c008c013c014c011c012c004c005c002c003c00ec00fc00cc00d002f000500040035000a0009000300080033003900160015001401000012000a00080006001700180019000b00020100 State = 0xaef5e8edaff7f1d0a9cd8f73e0ae8342 Message-Authenticator = 0x2a318c3b893506804d5ae863ecf19c0e +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 2 length 136 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS TLS Length 126 rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0079], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone TLS_accept: SSLv3 write server done A TLS_accept: SSLv3 flush data TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 89 to 10.1.1.16 port 32804 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x3c2fd53994b8fa2c1414a8240e5a0c3dc194ab12a3fd520cf56384f9a20dacc0d044f3bf8eac061b73aa60fb27e64a29f4aeed0f547d4da05dee6e82b3a7b489e69e7416b0c6eea55dd10b003c0fa0269344e32bea1d74debc6ff21fbe68512d896406a1220675f919a89864d2c93114b8d768d3a55f88910ee7c2acf3993619f7a3e8e7baab3c6055c7d661f0db88dd993efed4f34ddbab0a3be60074d5058af776a578eb518bf79a2ec727a6c43d1b49f5e31e0fc75aca274f9638a3483f23d294d9fb595b16d90fdc3b2de71acfb2b31a38de50c523f2cda7ec7efe615791d4e70203010001a317301530130603551d25040c300a06082b06010505 EAP-Message = 0x070301300d06092a864886f70d0101040500038201010056b109adcce87e86e0c41835412d25e02b9cadf71e23e9c503e4fef36df07ce0113f56e7d9131f4b01fb0211271ce7074fb5736a8c547e50e753fcf430c81ec914d7cc781b4e9de1cd473594eaa7f1640108cf59d4192d673b376d37b898833f44ec4ff6a6fa18307b888b98ad99d178b34f1992218a467dde86190a927786fa252d8e7f84354deaaea2aeb0799d7225b682820b0088d899afa154ce6d4f3a32ebffc630b4d589753e135677c876fe4d2b0941fbf0f85e919bf8f8d1d2c09a67f3d1a5f5f2c9c2be282f6848388e70c3aca9860c59ffce635221a83a6668732f39618f3f5bcb EAP-Message = 0x34bdde03bb29a5615b86e787 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xaef5e8edacf6f1d0a9cd8f73e0ae8342 Finished request 2. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=90, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020300061900 State = 0xaef5e8edacf6f1d0a9cd8f73e0ae8342 Message-Authenticator = 0xccc553078f6bfdd0601b44c4464c6ae5 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 3 length 6 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 90 to 10.1.1.16 port 32804 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0xefec79a4c5d0f05b Message-Authenticator = 0x00000000000000000000000000000000 State = 0xaef5e8edadf1f1d0a9cd8f73e0ae8342 Finished request 3. Going to the next request Waking up in 4.8 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=91, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020400061900 State = 0xaef5e8edadf1f1d0a9cd8f73e0ae8342 Message-Authenticator = 0x0b20fed2a08c6a58e08ab7d7c9d834c9 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 4 length 6 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 91 to 10.1.1.16 port 32804 EAP-Message = 0x010500d51900025be2fb3a688ec796b002df75e4a41bb639e3f292811d6ad6d0884595539b52fd80f921310380f4093c33fc1f1d92f2ded459e0d762638f4d39e30d999dc5dc53dc2f5479e687a0e5edb29fa6fce14b628cc578074bd5d478744be3cc8cfd41fbed3304cbfb54d2be124933b6a4762a0f82b233534421248bf39f8064e858df4d41300c18267c111bf512e67d94a54a3a1b5d19d8ce9387ca6dc739d169d8067a5aee263e95b769cef95565e7115770718bf7ee3863e6f6372d95555d1cc2f6abb3a5468b5516030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xaef5e8edaaf0f1d0a9cd8f73e0ae8342 Finished request 4. Going to the next request Waking up in 4.8 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=92, length=502 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 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 EAP-Message = 0x21a0cd5a3ee4fe5adcb4d9174b2e631ef968599c53f0d5fe14030100010116030100304dc773d35940303349d4c8ef95a9182dfc2dc9bedeb7b0cfe875234654ca9a3fe0043dba5daa96a09f7cc79814850975 State = 0xaef5e8edaaf0f1d0a9cd8f73e0ae8342 Message-Authenticator = 0x0ebc3df915d094afadcb434d20424797 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 5 length 253 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS TLS Length 326 rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange TLS_accept: SSLv3 read client key exchange A rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001] rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 read finished A rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001] TLS_accept: SSLv3 write change cipher spec A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 write finished A TLS_accept: SSLv3 flush data (other): SSL negotiation finished successfully SSL Connection Established eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 92 to 10.1.1.16 port 32804 EAP-Message = 0x01060041190014030100010116030100303d5840b81ffe08a17b1940cdcac5094c2db5f94be2b5aff29ef7538e4c9fe70a815749823fee6d4865f4536374a3aa95 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xaef5e8edabf3f1d0a9cd8f73e0ae8342 Finished request 5. Going to the next request Waking up in 4.7 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=93, length=154 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x0200000801726164 Message-Authenticator = 0xd6d5466947e806ef3344949e31f3e752 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 0 length 8 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: EAP Identity rlm_eap: processing type md5 rlm_eap_md5: Issuing Challenge ++[eap] returns handled Sending Access-Challenge of id 93 to 10.1.1.16 port 32804 EAP-Message = 0x010100160410f4c14245d82a634dc2fa0b7d41b85fd5 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c7550bc3f4cebdfee59b861533 Finished request 6. Going to the next request Waking up in 2.5 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=94, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020100060319 State = 0x550ac7c7550bc3f4cebdfee59b861533 Message-Authenticator = 0xaf31facabdaa858f25484f65b36d4bcb +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 1 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP NAK rlm_eap: EAP-NAK asked for EAP-Type/peap rlm_eap: processing type tls rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 ++[eap] returns handled Sending Access-Challenge of id 94 to 10.1.1.16 port 32804 EAP-Message = 0x010200061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c75408def4cebdfee59b861533 Finished request 7. Going to the next request Waking up in 2.5 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=95, length=300 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x0202008819800000007e16030100790100007503014e1432e519f166d7d7c0bd198e327bf22efa6535445f168320d7c677e7cb948500003ac00ac009c007c008c013c014c011c012c004c005c002c003c00ec00fc00cc00d002f000500040035000a0009000300080033003900160015001401000012000a00080006001700180019000b00020100 State = 0x550ac7c75408def4cebdfee59b861533 Message-Authenticator = 0x72aedbff06e34cec62bcdff51096874c +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 2 length 136 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS TLS Length 126 rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0079], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone TLS_accept: SSLv3 write server done A TLS_accept: SSLv3 flush data TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 95 to 10.1.1.16 port 32804 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x3c2fd53994b8fa2c1414a8240e5a0c3dc194ab12a3fd520cf56384f9a20dacc0d044f3bf8eac061b73aa60fb27e64a29f4aeed0f547d4da05dee6e82b3a7b489e69e7416b0c6eea55dd10b003c0fa0269344e32bea1d74debc6ff21fbe68512d896406a1220675f919a89864d2c93114b8d768d3a55f88910ee7c2acf3993619f7a3e8e7baab3c6055c7d661f0db88dd993efed4f34ddbab0a3be60074d5058af776a578eb518bf79a2ec727a6c43d1b49f5e31e0fc75aca274f9638a3483f23d294d9fb595b16d90fdc3b2de71acfb2b31a38de50c523f2cda7ec7efe615791d4e70203010001a317301530130603551d25040c300a06082b06010505 EAP-Message = 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 EAP-Message = 0x34bdde03bb29a5615b86e787 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c75709def4cebdfee59b861533 Finished request 8. Going to the next request Waking up in 2.5 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=96, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020300061900 State = 0x550ac7c75709def4cebdfee59b861533 Message-Authenticator = 0x919f375f9b54721bf2de9cc74a77c47d +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 3 length 6 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 96 to 10.1.1.16 port 32804 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0xefec79a4c5d0f05b Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c7560edef4cebdfee59b861533 Finished request 9. Going to the next request Waking up in 2.4 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=97, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020400061900 State = 0x550ac7c7560edef4cebdfee59b861533 Message-Authenticator = 0x8cc3379b80e164103b75563737982a1b +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 4 length 6 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 97 to 10.1.1.16 port 32804 EAP-Message = 0x010500d51900025be2fb3a688ec796b002df75e4a41bb639e3f292811d6ad6d0884595539b52fd80f921310380f4093c33fc1f1d92f2ded459e0d762638f4d39e30d999dc5dc53dc2f5479e687a0e5edb29fa6fce14b628cc578074bd5d478744be3cc8cfd41fbed3304cbfb54d2be124933b6a4762a0f82b233534421248bf39f8064e858df4d41300c18267c111bf512e67d94a54a3a1b5d19d8ce9387ca6dc739d169d8067a5aee263e95b769cef95565e7115770718bf7ee3863e6f6372d95555d1cc2f6abb3a5468b5516030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c7510fdef4cebdfee59b861533 Finished request 10. Going to the next request Waking up in 2.4 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=98, length=502 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 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 EAP-Message = 0xf3e0b419e0d5fa8d96b1c7f3f4e5301afc3753426356372e1403010001011603010030667e57dfececda9bc0620b64ff04a69cfce9ea73f230757e80bf0595a672c670f1d12c6f9ab06dd71710b8e9fbc00ae7 State = 0x550ac7c7510fdef4cebdfee59b861533 Message-Authenticator = 0x08708a4f1e5100257c42dfc50da21f5e +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 5 length 253 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS TLS Length 326 rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange TLS_accept: SSLv3 read client key exchange A rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001] rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 read finished A rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001] TLS_accept: SSLv3 write change cipher spec A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 write finished A TLS_accept: SSLv3 flush data (other): SSL negotiation finished successfully SSL Connection Established eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 98 to 10.1.1.16 port 32804 EAP-Message = 0x010600411900140301000101160301003090879670b1734abc26757df83b34e4f0cf07f309fdf2d479b866580465013e98f528e2fb87ec678d69e340b7bdf297e2 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c7500cdef4cebdfee59b861533 Finished request 11. Going to the next request Waking up in 2.3 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=99, length=170 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x020600061900 State = 0x550ac7c7500cdef4cebdfee59b861533 Message-Authenticator = 0x91ae0e835516ed64008e7644949f07e4 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 6 length 6 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap_peap: EAPTLS_SUCCESS ++[eap] returns handled Sending Access-Challenge of id 99 to 10.1.1.16 port 32804 EAP-Message = 0x0107002b190017030100204e7332d47cfffd7c0370465bf8e308dcb905d325a60dcc4ec7a08576a3da75c6 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c7530ddef4cebdfee59b861533 Finished request 12. Going to the next request Waking up in 2.2 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=100, length=207 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x0207002b19001703010020d96052a2f628abbab9fc3cd52d9518bd65112dd452bbf6689f59d65c1d91628b State = 0x550ac7c7530ddef4cebdfee59b861533 Message-Authenticator = 0x5298d29c49af6f8c466c5d4d7813ccd9 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 7 length 43 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Identity - rad PEAP: Got tunneled identity of rad PEAP: Setting default EAP type for tunneled EAP session. PEAP: Setting User-Name to rad auth: No authenticate method (Auth-Type) configuration found for the request: Rejecting the user auth: Failed to validate the user. PEAP: Tunneled authentication was rejected. rlm_eap_peap: FAILURE ++[eap] returns handled Sending Access-Challenge of id 100 to 10.1.1.16 port 32804 EAP-Message = 0x0108002b19001703010020b6b426e260a99a3d26df73304c161f3f296dd48a6167b03ad316e182bf221073 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x550ac7c75202def4cebdfee59b861533 Finished request 13. Going to the next request Waking up in 2.2 seconds. rad_recv: Access-Request packet from host 10.1.1.16 port 32804, id=101, length=207 User-Name = "rad" NAS-IP-Address = 10.1.1.16 NAS-Identifier = "hello" NAS-Port = 0 Called-Station-Id = "E0-46-9A-38-CB-B0:Kaptalia" Calling-Station-Id = "24-AB-81-79-AE-5E" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11g" EAP-Message = 0x0208002b1900170301002055b2b981682de744d2f325170e43d0845f9123af4ed407d87d94b0381b127745 State = 0x550ac7c75202def4cebdfee59b861533 Message-Authenticator = 0xa8e287939a0e1ea72bd0483dc155c761 +- entering group authorize ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop rlm_realm: No '@' in User-Name = "rad", looking up realm NULL rlm_realm: No such realm "NULL" ++[suffix] returns noop rlm_eap: EAP packet type response id 8 length 43 rlm_eap: Continuing tunnel setup. ++[eap] returns ok users: Matched entry rad at line 204 ++[files] returns ok rad_check_password: Found Auth-Type EAP auth: type "EAP" +- entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Received EAP-TLV response. rlm_eap_peap: Had sent TLV failure. User was rejected earlier in this session. rlm_eap: Handler failed in EAP/peap rlm_eap: Failed in EAP select ++[eap] returns invalid auth: Failed to validate the user. Sending Access-Reject of id 101 to 10.1.1.16 port 32804 EAP-Message = 0x04080004 Message-Authenticator = 0x00000000000000000000000000000000 Finished request 14. Going to the next request Waking up in 2.2 seconds. Cleaning up request 0 ID 87 with timestamp +12 Cleaning up request 1 ID 88 with timestamp +12 Cleaning up request 2 ID 89 with timestamp +12 Cleaning up request 3 ID 90 with timestamp +12 Cleaning up request 4 ID 91 with timestamp +12 Waking up in 0.1 seconds. Cleaning up request 5 ID 92 with timestamp +12 Waking up in 2.1 seconds. Cleaning up request 6 ID 93 with timestamp +14 Cleaning up request 7 ID 94 with timestamp +14 Cleaning up request 8 ID 95 with timestamp +14 Cleaning up request 9 ID 96 with timestamp +14 Cleaning up request 10 ID 97 with timestamp +14 Waking up in 0.1 seconds. Cleaning up request 11 ID 98 with timestamp +14 Cleaning up request 12 ID 99 with timestamp +15 Cleaning up request 13 ID 100 with timestamp +15 Cleaning up request 14 ID 101 with timestamp +15 Ready to process requests.