Hi all,

I've been having some problems with EAP/TLS (and
subsequently with TTLS and PEAP).
I've been working with the two How-to's from /doc (by
the way thanks guys).

I think i have configured everything properly (openssl
certs and stuff) but i still can't get freeradius to
authenticate EAP users properly.

I'm attaching the stuff i get from the
server(debugging mode)

Thanks in advance!

__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free web site building tool. Try it!
http://webhosting.yahoo.com/ps/sb/
Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/etc/raddb/proxy.conf
Config:   including file: /usr/local/etc/raddb/clients.conf
Config:   including file: /usr/local/etc/raddb/snmp.conf
Config:   including file: /usr/local/etc/raddb/sql.conf
 main: prefix = "/usr/local"
 main: localstatedir = "/usr/local/var"
 main: logdir = "/usr/local/var/log/radius"
 main: libdir = "/usr/local/lib"
 main: radacctdir = "/usr/local/var/log/radius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = "/usr/local/var/log/radius/radius.log"
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
 main: bind_address = 195.251.248.176 IP address [195.251.248.176]
 main: user = "(null)"
 main: group = "(null)"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/local/sbin/checkrad"
 main: proxy_requests = yes
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = yes
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
Using deprecated clients file.  Support for this will go away soon.
read_config_files:  reading realms
Using deprecated realms file.  Support for this will go away soon.
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded expr 
Module: Instantiated expr (expr) 
Module: Loaded PAP 
 pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap) 
Module: Loaded CHAP 
Module: Instantiated chap (chap) 
Module: Loaded MS-CHAP 
 mschap: use_mppe = yes
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: passwd = "(null)"
 mschap: authtype = "MS-CHAP"
Module: Instantiated mschap (mschap) 
Module: Loaded eap 
 eap: default_eap_type = "tls"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/home/gela/keys/cert-srv.pem"
 tls: certificate_file = "/home/gela/keys/cert-srv.pem"
 tls: CA_file = "/home/gela/keys/root.pem"
 tls: private_key_password = "whatever"
 tls: dh_file = "/home/gela/keys/dh1024.pem"
 tls: random_file = "/home/gela/keys/random.pem"
 tls: fragment_size = 4096
 tls: include_length = yes
 tls: check_crl = no
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = no
 peap: use_tunneled_reply = no
rlm_eap: Loaded and initialized type peap
 ttls: default_eap_type = "md5"
 ttls: copy_request_to_tunnel = no
 ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
Module: Instantiated eap (eap) 
Module: Loaded preprocess 
 preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups"
 preprocess: hints = "/usr/local/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = yes
Module: Instantiated preprocess (preprocess) 
Module: Loaded realm 
 realm: format = "suffix"
 realm: delimiter = "@"
Module: Instantiated realm (suffix) 
Module: Loaded SQL 
 sql: driver = "rlm_sql_mysql"
 sql: server = "localhost"
 sql: port = ""
 sql: login = "gela"
 sql: password = "lesgeo"
 sql: radius_db = "radius"
 sql: acct_table = "radacct"
 sql: acct_table2 = "radacct"
 sql: authcheck_table = "radcheck"
 sql: authreply_table = "radreply"
 sql: groupcheck_table = "radgroupcheck"
 sql: groupreply_table = "radgroupreply"
 sql: usergroup_table = "usergroup"
 sql: nas_table = "nas"
 sql: dict_table = "dictionary"
 sql: sqltrace = no
 sql: sqltracefile = "/usr/local/var/log/radius/sqltrace.sql"
 sql: deletestalesessions = yes
 sql: num_sql_socks = 5
 sql: sql_user_name = "%{User-Name}"
 sql: default_user_profile = ""
 sql: query_on_not_found = no
 sql: authorize_check_query = "SELECT id,UserName,Attribute,Value,op FROM radcheck 
WHERE Username = '%{SQL-User-Name}' ORDER BY id"
 sql: authorize_reply_query = "SELECT id,UserName,Attribute,Value,op FROM radreply 
WHERE Username = '%{SQL-User-Name}' ORDER BY id"
 sql: authorize_group_check_query = "SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = '%{SQL-User-Name}' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id"
 sql: authorize_group_reply_query = "SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = '%{SQL-User-Name}' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id"
 sql: accounting_onoff_query = "UPDATE radacct SET AcctStopTime='%S', 
AcctSessionTime=unix_timestamp('%S') - unix_timestamp(AcctStartTime), 
AcctTerminateCause='%{Acct-Terminate-Cause}', AcctStopDelay = %{Acct-Delay-Time} WHERE 
AcctSessionTime=0 AND AcctStopTime=0 AND NASIPAddress= '%{NAS-IP-Address}' AND 
AcctStartTime <= '%S'"
 sql: accounting_update_query = "UPDATE radacct SET FramedIPAddress = 
'%{Framed-IP-Address}' WHERE AcctSessionId = '%{Acct-Session-Id}' AND UserName = 
'%{SQL-User-Name}' AND NASIPAddress= '%{NAS-IP-Address}' AND AcctStopTime = 0"
 sql: accounting_start_query = "INSERT into radacct (RadAcctId, AcctSessionId, 
AcctUniqueId, UserName, Realm, NASIPAddress, NASPortId, NASPortType, AcctStartTime, 
AcctStopTime, AcctSessionTime, AcctAuthentic, ConnectInfo_start, ConnectInfo_stop, 
AcctInputOctets, AcctOutputOctets, CalledStationId, CallingStationId, 
AcctTerminateCause, ServiceType, FramedProtocol, FramedIPAddress, AcctStartDelay, 
AcctStopDelay) values('', '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', 
'%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', 
'%{NAS-Port-Type}', '%S', '0', '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', 
'0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', 
'%{Framed-Protocol}', '%{Framed-IP-Address}', '%{Acct-Delay-Time}', '0')"
 sql: accounting_start_query_alt = "UPDATE radacct SET AcctStartTime = '%S', 
AcctStartDelay = '%{Acct-Delay-Time}', ConnectInfo_start = '%{Connect-Info}' WHERE 
AcctSessionId = '%{Acct-Session-Id}' AND UserName = '%{SQL-User-Name}' AND 
NASIPAddress = '%{NAS-IP-Address}' AND AcctStopTime = 0"
 sql: accounting_stop_query = "UPDATE radacct SET AcctStopTime = '%S', AcctSessionTime 
= '%{Acct-Session-Time}', AcctInputOctets = '%{Acct-Input-Octets}', AcctOutputOctets = 
'%{Acct-Output-Octets}', AcctTerminateCause = '%{Acct-Terminate-Cause}', AcctStopDelay 
= '%{Acct-Delay-Time}', ConnectInfo_stop = '%{Connect-Info}' WHERE AcctSessionId = 
'%{Acct-Session-Id}' AND UserName = '%{SQL-User-Name}' AND NASIPAddress = 
'%{NAS-IP-Address}' AND AcctStopTime = 0"
 sql: accounting_stop_query_alt = "INSERT into radacct (RadAcctId, AcctSessionId, 
AcctUniqueId, UserName, Realm, NASIPAddress, NASPortId, NASPortType, AcctStartTime, 
AcctStopTime, AcctSessionTime, AcctAuthentic, ConnectInfo_start, ConnectInfo_stop, 
AcctInputOctets, AcctOutputOctets, CalledStationId, CallingStationId, 
AcctTerminateCause, ServiceType, FramedProtocol, FramedIPAddress, AcctStartDelay, 
AcctStopDelay) values('', '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', 
'%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', 
'%{NAS-Port-Type}', DATE_SUB('%S',INTERVAL (%{Acct-Session-Time:-0} + 
%{Acct-Delay-Time:-0}) SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', 
'%{Connect-Info}', '%{Acct-Input-Octets}', '%{Acct-Output-Octets}', 
'%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Acct-Terminate-Cause}', 
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', 
'%{Acct-Delay-Time}')"
 sql: group_membership_query = "SELECT GroupName FROM usergroup WHERE 
UserName='%{SQL-User-Name}'"
 sql: connect_failure_retry_delay = 60
 sql: simul_count_query = ""
 sql: simul_verify_query = "SELECT RadAcctId, AcctSessionId, UserName, NASIPAddress, 
NASPortId, FramedIPAddress, CallingStationId, FramedProtocol FROM radacct WHERE 
UserName='%{SQL-User-Name}' AND AcctStopTime = 0"
 sql: postauth_table = "radpostauth"
 sql: postauth_query = ""
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
rlm_sql (sql): Attempting to connect to [EMAIL PROTECTED]:/radius
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
rlm_sql_mysql: Starting connect to MySQL server for #0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
rlm_sql_mysql: Starting connect to MySQL server for #1
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
rlm_sql_mysql: Starting connect to MySQL server for #2
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
rlm_sql_mysql: Starting connect to MySQL server for #3
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
rlm_sql_mysql: Starting connect to MySQL server for #4
rlm_sql (sql): Connected new DB handle, #4
Module: Instantiated sql (sql) 
Module: Loaded Acct-Unique-Session-Id 
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, 
NAS-Port-Id"
Module: Instantiated acct_unique (acct_unique) 
Module: Loaded detail 
 detail: detailfile = 
"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail) 
Module: Loaded System 
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "(null)"
 unix: group = "(null)"
 unix: radwtmp = "/usr/local/var/log/radius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix) 
Module: Loaded radutmp 
 radutmp: filename = "/usr/local/var/log/radius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp) 
Listening on IP address 195.251.248.176, ports 1812/udp and 1813/udp, with proxy on 
1814/udp.
Ready to process requests.
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=160, length=124
        User-Name = "tester4"
        Framed-MTU = 1400
        Called-Station-Id = "000d.29ac.db5d"
        Calling-Station-Id = "0010.7a49.0176"
        Message-Authenticator = 0x743ae4bf2b1d69489ad02054e2c8bdae
        EAP-Message = 0x0201000c0174657374657234
        NAS-Port-Type = Virtual
        NAS-Port = 509
        NAS-IP-Address = 195.251.248.240
        NAS-Identifier = "zea15"
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "chap" returns noop for request 0
  rlm_eap: EAP packet type response id 1 length 12
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    rlm_realm: No '@' in User-Name = "tester4", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
radius_xlat:  'tester4'
rlm_sql (sql): sql_set_user escaped user --> 'tester4'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radcheck WHERE Username = 
'tester4' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 4
radius_xlat:  'SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radreply WHERE Username = 
'tester4' ORDER BY id'
radius_xlat:  'SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'
rlm_sql (sql): Released sql socket id: 4
  modcall[authorize]: module "sql" returns ok for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
modcall: group authorize returns updated for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 160 to 195.251.248.240:1645
        EAP-Message = 0x010200060d20
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xb7f8e59d943a534696cf2b6ad395b8ea
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 160 with timestamp 4016ae55
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=161, length=124
        User-Name = "tester4"
        Framed-MTU = 1400
        Called-Station-Id = "000d.29ac.db5d"
        Calling-Station-Id = "0010.7a49.0176"
        Message-Authenticator = 0x616effd1e2f0389b8d62ba2b6a0fd3ac
        EAP-Message = 0x0201000c0174657374657234
        NAS-Port-Type = Virtual
        NAS-Port = 510
        NAS-IP-Address = 195.251.248.240
        NAS-Identifier = "zea15"
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "chap" returns noop for request 1
  rlm_eap: EAP packet type response id 1 length 12
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    rlm_realm: No '@' in User-Name = "tester4", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
radius_xlat:  'tester4'
rlm_sql (sql): sql_set_user escaped user --> 'tester4'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radcheck WHERE Username = 
'tester4' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 3
radius_xlat:  'SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radreply WHERE Username = 
'tester4' ORDER BY id'
radius_xlat:  'SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'
rlm_sql (sql): Released sql socket id: 3
  modcall[authorize]: module "sql" returns ok for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
modcall: group authorize returns updated for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 1
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 161 to 195.251.248.240:1645
        EAP-Message = 0x010200060d20
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xb2ad28127845ec9fe4df445e4d00b567
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=162, length=210
        User-Name = "tester4"
        Framed-MTU = 1400
        Called-Station-Id = "000d.29ac.db5d"
        Calling-Station-Id = "0010.7a49.0176"
        Message-Authenticator = 0xa3f7a95dd13d2564a7808eedda1a1c4d
        EAP-Message = 
0x020200500d800000004616030100410100003d030140167640663c7e3c51cea2cc3778a955b99510bb9db14efb512a58c3175d338700001600040005000a000900640062000300060013001200630100
        NAS-Port-Type = Virtual
        NAS-Port = 510
        State = 0xb2ad28127845ec9fe4df445e4d00b567
        NAS-IP-Address = 195.251.248.240
        NAS-Identifier = "zea15"
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "chap" returns noop for request 2
  rlm_eap: EAP packet type response id 2 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    rlm_realm: No '@' in User-Name = "tester4", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
radius_xlat:  'tester4'
rlm_sql (sql): sql_set_user escaped user --> 'tester4'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radcheck WHERE Username = 
'tester4' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 2
radius_xlat:  'SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radreply WHERE Username = 
'tester4' ORDER BY id'
radius_xlat:  'SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'
rlm_sql (sql): Released sql socket id: 2
  modcall[authorize]: module "sql" returns ok for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
modcall: group authorize returns updated for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
undefined: before/accept initialization 
TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05f6], Certificate  
TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0069], CertificateRequest  
TLS_accept: SSLv3 write certificate request A 
TLS_accept: SSLv3 flush data 
TLS_accept:error in SSLv3 read client certificate A 
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 162 to 195.251.248.240:1645
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0xf6eb62dbdc5f0203010001a381dc3081d930090603551d1304023000302c06096086480186f842010d041f161d4f70656e53534c2047656e657261746564204365727469666963617465301d0603551d0e041604144e5ee47cbe38a45cb82924fe1112f98fa256fa46307f0603551d230478307680140ec864aa08cad69e27555dfbb287b059ec42cc18a15ba4593057310b3009060355040613024155311330110603550408130a536f6d652d53746174653121301f060355040a1318496e7465726e6574205769646769747320507479204c74643110300e0603550403130774657374434134820100300d06092a864886f70d010104050003818100
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0x5ed9cd584881d777dcda52c662f776f8fb29c820b6625b0203010001a381b13081ae301d0603551d0e041604140ec864aa08cad69e27555dfbb287b059ec42cc18307f0603551d230478307680140ec864aa08cad69e27555dfbb287b059ec42cc18a15ba4593057310b3009060355040613024155311330110603550408130a536f6d652d5374617465312130
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x71ac65d5d61f846fc73e352e8b4925f4
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=163, length=136
        User-Name = "tester4"
        Framed-MTU = 1400
        Called-Station-Id = "000d.29ac.db5d"
        Calling-Station-Id = "0010.7a49.0176"
        Message-Authenticator = 0xcbac7b471502a2d4bc6da54f4fcc38a0
        EAP-Message = 0x020300060d00
        NAS-Port-Type = Virtual
        NAS-Port = 510
        State = 0x71ac65d5d61f846fc73e352e8b4925f4
        NAS-IP-Address = 195.251.248.240
        NAS-Identifier = "zea15"
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "chap" returns noop for request 3
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    rlm_realm: No '@' in User-Name = "tester4", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
radius_xlat:  'tester4'
rlm_sql (sql): sql_set_user escaped user --> 'tester4'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radcheck WHERE Username = 
'tester4' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 1
radius_xlat:  'SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radreply WHERE Username = 
'tester4' ORDER BY id'
radius_xlat:  'SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'
rlm_sql (sql): Released sql socket id: 1
  modcall[authorize]: module "sql" returns ok for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
modcall: group authorize returns updated for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 163 to 195.251.248.240:1645
        EAP-Message = 
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
        EAP-Message = 
0x024155311330110603550408130a536f6d652d53746174653121301f060355040a1318496e7465726e6574205769646769747320507479204c74643110300e06035504031307746573744341340e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xed0108ee8e4ddeffff83377f7c2ac2ce
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=164, length=1047
        User-Name = "tester4"
        Framed-MTU = 1400
        Called-Station-Id = "000d.29ac.db5d"
        Calling-Station-Id = "0010.7a49.0176"
        Message-Authenticator = 0xa66242100cec5486c8befdd445953bbc
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0x65afe4ad8396d96736d267c82f4ba0ebd6b4a6e5023c3cd9e73e8bf7c5afcde1a7f83e283d98f68fbb0cddbb5248b0dca86ceedeb505cda7d9eb453af33656d0599fb9c9496580b8aa3415e248254c50ea5959a3ce53a874c6ba94dc92d3588dd1c95f4fee25dd1ea683f2fbda1403010001011603010020c93074b412e796492466a1020fec18025afcec78ed04dd407faea2ddc00ca6ba
        NAS-Port-Type = Virtual
        NAS-Port = 510
        State = 0xed0108ee8e4ddeffff83377f7c2ac2ce
        NAS-IP-Address = 195.251.248.240
        NAS-Identifier = "zea15"
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "chap" returns noop for request 4
  rlm_eap: EAP packet type response id 4 length 253
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    rlm_realm: No '@' in User-Name = "tester4", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
radius_xlat:  'tester4'
rlm_sql (sql): sql_set_user escaped user --> 'tester4'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radcheck WHERE Username = 
'tester4' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 0
radius_xlat:  'SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radreply WHERE Username = 
'tester4' ORDER BY id'
radius_xlat:  'SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'
rlm_sql (sql): Released sql socket id: 0
  modcall[authorize]: module "sql" returns ok for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
modcall: group authorize returns updated for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0249], Certificate  
chain-depth=1, 
error=0
--> User-Name = tester4
--> BUF-Name = testCA4
--> subject = /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=testCA4
--> issuer  = /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=testCA4
--> verify return:1
chain-depth=0, 
error=0
--> User-Name = tester4
--> BUF-Name = tester4
--> subject = /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=tester4
--> issuer  = /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/CN=testCA4
--> verify return:1
TLS_accept: SSLv3 read client certificate A 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
TLS_accept: SSLv3 read client key exchange A 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], CertificateVerify  
TLS_accept: SSLv3 read certificate verify A 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
TLS_accept: SSLv3 read finished A 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
TLS_accept: SSLv3 write change cipher spec A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
TLS_accept: SSLv3 write finished A 
TLS_accept: SSLv3 flush data 
undefined: SSL negotiation finished successfully 
SSL Connection Established 
  eaptls_process returned 13 
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 164 to 195.251.248.240:1645
        EAP-Message = 
0x010500350d800000002b14030100010116030100206e11edc4156af531015653f96c3690016dc60fb061e0322729853ba86ea92127
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x7109fa8757c6a16c7aeccc9c80688c91
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=165, length=163
        User-Name = "tester4"
        Framed-MTU = 1400
        Called-Station-Id = "000d.29ac.db5d"
        Calling-Station-Id = "0010.7a49.0176"
        Message-Authenticator = 0x7d2d3619c6fac15ebd08ba59c257256a
        EAP-Message = 
0x020500210d800000001715030100129ed6444af264aa835cbd07ce4f630b5d403e
        NAS-Port-Type = Virtual
        NAS-Port = 510
        State = 0x7109fa8757c6a16c7aeccc9c80688c91
        NAS-IP-Address = 195.251.248.240
        NAS-Identifier = "zea15"
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "chap" returns noop for request 5
  rlm_eap: EAP packet type response id 5 length 33
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    rlm_realm: No '@' in User-Name = "tester4", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
radius_xlat:  'tester4'
rlm_sql (sql): sql_set_user escaped user --> 'tester4'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radcheck WHERE Username = 
'tester4' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 4
radius_xlat:  'SELECT 
radgroupcheck.id,radgroupcheck.GroupName,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op
  FROM radgroupcheck,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupcheck.GroupName ORDER BY radgroupcheck.id'
radius_xlat:  'SELECT id,UserName,Attribute,Value,op FROM radreply WHERE Username = 
'tester4' ORDER BY id'
radius_xlat:  'SELECT 
radgroupreply.id,radgroupreply.GroupName,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op
  FROM radgroupreply,usergroup WHERE usergroup.Username = 'tester4' AND 
usergroup.GroupName = radgroupreply.GroupName ORDER BY radgroupreply.id'
rlm_sql (sql): Released sql socket id: 4
  modcall[authorize]: module "sql" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
  eaptls_process returned 7 
  rlm_eap_tls: Received unexpected tunneled data after successful handshake.
 rlm_eap: Handler failed in EAP/tls
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 5
modcall: group authenticate returns invalid for request 5
auth: Failed to validate the user.
Delaying request 5 for 1 seconds
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.251.248.240:1645, id=165, length=163
Sending Access-Reject of id 165 to 195.251.248.240:1645
        EAP-Message = 0x04050004
        Message-Authenticator = 0x00000000000000000000000000000000
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 1 ID 161 with timestamp 4016ae80
Cleaning up request 2 ID 162 with timestamp 4016ae80
Cleaning up request 3 ID 163 with timestamp 4016ae80
Cleaning up request 4 ID 164 with timestamp 4016ae80
Cleaning up request 5 ID 165 with timestamp 4016ae80
Nothing to do.  Sleeping until we see a request.

Reply via email to