Hello,

I'm trying to start freeradius with a peap client but it doesn't work.
How can I do.

In users file :
toto Auth-Type := EAP, User-Password == "0x7666F0D93535E6C2F6A3DDAD29A7EF55"


With only TLS, i have no problem with my own certificates.

Thank you very much (i'm despaired).

Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /usr/local/radius093/etc/raddb/proxy.conf
Config: including file: /usr/local/radius093/etc/raddb/clients.conf
Config: including file: /usr/local/radius093/etc/raddb/snmp.conf
Config: including file: /usr/local/radius093/etc/raddb/sql.conf
main: prefix = "/usr/local/radius093"
main: localstatedir = "/usr/local/radius093/var"
main: logdir = "/usr/local/radius093/var/log/radius"
main: libdir = "/usr/local/radius093/lib"
main: radacctdir = "/usr/local/radius093/var/log/radius/radacct"
main: hostname_lookups = no
main: snmp = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 1912
main: allow_core_dumps = no
main: log_stripped_names = yes
main: log_file = "/usr/local/radius093/var/log/radius/radius.log"
main: log_auth = yes
main: log_auth_badpass = yes
main: log_auth_goodpass = yes
main: pidfile = "/usr/local/radius093/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/local/radius093/sbin/checkrad"
main: proxy_requests = yes
proxy: retry_delay = 5
proxy: retry_count = 3
proxy: synchronous = no
proxy: default_fallback = yes
proxy: dead_time = 120
proxy: post_proxy_authorize = yes
proxy: wake_all_if_all_dead = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
Using deprecated clients file. Support for this will go away soon.
read_config_files: reading realms
Using deprecated realms file. Support for this will go away soon.
radiusd: entering modules setup
Module: Library search path is /usr/local/radius093/lib
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = no
mschap: require_strong = no
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: authtype = "MS-CHAP"
Module: Instantiated mschap (mschap)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/usr/local/radius093/var/log/radius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "peap"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/usr/local/radius093/etc/raddb/cert-srv6.pem"
tls: certificate_file = "/usr/local/radius093/etc/raddb/cert-srv6.pem"
tls: CA_file = "/usr/local/radius093/etc/raddb/root6.pem"
tls: private_key_password = "xxxxx"
tls: dh_file = "/usr/local/radius093/etc/raddb/DH"
tls: random_file = "/usr/local/radius093/etc/raddb/random"
tls: fragment_size = 1024
tls: include_length = yes
tls: check_crl = no
rlm_eap: Loaded and initialized type tls
ttls: default_eap_type = "md5"
ttls: copy_request_to_tunnel = no
ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
peap: default_eap_type = "mschapv2"
peap: copy_request_to_tunnel = yes
peap: use_tunneled_reply = yes
rlm_eap: Loaded and initialized type peap
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/usr/local/radius093/etc/raddb/huntgroups"
preprocess: hints = "/usr/local/radius093/etc/raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/usr/local/radius093/etc/raddb/users"
files: acctusersfile = "/usr/local/radius093/etc/raddb/acct_users"
files: preproxy_usersfile = "/usr/local/radius093/etc/raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile = "/usr/local/radius093/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/usr/local/radius093/var/log/radius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on IP address *, ports 1912/udp and 1913/udp, with proxy on 1914/udp.
Ready to process requests.
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=0, length=133
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0x2fe652a9ff002d54fa0838024746eea7
EAP-Message = 0x0202000d017175657477696c66
NAS-Port-Type = Virtual
NAS-Port = 274
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 2 length 13
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 0 to 10.1.2.3:1645
EAP-Message = 0x010300061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x024e9a6685042b9979988f895cae6425
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=1, length=218
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0x7f068d88832d9f8b0d9e8a239a8b9765
EAP-Message = 0x0203005019800000004616030100410100003d030140484303de5fadfc9712a02561777033387bacbb8a7ce6106a86677c5e4c2e5100001600040005000a000900640062000300060013001200630100
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0x024e9a6685042b9979988f895cae6425
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 3 length 80
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 05ac], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 1 to 10.1.2.3:1645
EAP-Message = 0x0104040a19c000000609160301004a020000460301404842ffb64a82dca66c3d09a9a2779899f5ac4af7113a77011cb72cb255f06f20d7841c1ea9d80e59ddccf9e62ce82ba643e424f403b05a0f8818ddd7034d4fa000040016030105ac0b0005a80005a500027430820270308201d9a003020102020101300d06092a864886f70d01010405003071310b3009060355040613024652310c300a06035504081303506963310c300a06035504071303434d50310c300a060355040a1303555443310b3009060355040b13025349310f300d06035504031406353030305f77311a301806092a864886f70d010901160b77717574407574632e6672301e17
EAP-Message = 0x0d3034303330333130333634305a170d3035303330333130333634305a3072310b3009060355040613024652310c300a06035504081303506963310c300a06035504071303434d50310c300a060355040a1303555443310b3009060355040b13025349310f300d06035504031406353030305f77311b301906092a864886f70d010901160c7771756574407574632e667230819f300d06092a864886f70d010101050003818d0030818902818100a7e480eac8fcd262a9a01786fd7814568f3e0fadfd2538f215b2d87788153508ed3a2bc146d44acfe185588d05b6a5874b968ac86656825de12b33202e8f417e7b7a0da6a738dbabf4548e2363751d
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x010901160b77717574407574632e667230819f300d06
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xef56419098394bd602dac764d4cb7b55
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=2, length=144
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0x3aec4c354ee4d82ad591bf976999a5a3
EAP-Message = 0x020400061900
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0xef56419098394bd602dac764d4cb7b55
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
modcall[authorize]: module "chap" returns noop for request 2
modcall[authorize]: module "mschap" returns noop for request 2
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 2
rlm_eap: EAP packet type response id 4 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 2
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 2
modcall: group authorize returns updated for request 2
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 2
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 2 to 10.1.2.3:1645
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x555a86f3269398a2e94091b016030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x474bc9eb5f988655d078eab9228f4817
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=3, length=330
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0xdab3702ae2baa324fa501cbfaad246a4
EAP-Message = 0x020500c01980000000b616030100861000008200801121f1ce1813860b54f10110bb4c0d48cf85923de597329be423450d13d0c3d1592e0c32792ce9d56df1c469eb8dd770d44dfb316472efb89d568714a9498b909512fef539c320b71f23606f3655accb3b3bcd2d59a05f4a0714528ad540699e3b1577117a76e4433b1a261536586ddf598d6c59243df2993a5280b297696d561403010001011603010020a567baf797fe3d608844ef276e1df67abcd0d80c41033b818dac7fbfb7176eae
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0x474bc9eb5f988655d078eab9228f4817
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
modcall[authorize]: module "chap" returns noop for request 3
modcall[authorize]: module "mschap" returns noop for request 3
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 3
rlm_eap: EAP packet type response id 5 length 192
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 3
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 3
modcall: group authorize returns updated for request 3
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 3
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 3 to 10.1.2.3:1645
EAP-Message = 0x0106003119001403010001011603010020621fde8449f4b5e287ebf94cd5d7d652ad8aeae4db9213af0a528411ddaa886b
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3e314e3711dd5d616ee284d2e5b5a170
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=4, length=144
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0x8b2a41bf94d1c8cd8807f3a99c185825
EAP-Message = 0x020600061900
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0x3e314e3711dd5d616ee284d2e5b5a170
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 4
modcall[authorize]: module "preprocess" returns ok for request 4
modcall[authorize]: module "chap" returns noop for request 4
modcall[authorize]: module "mschap" returns noop for request 4
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 4
rlm_eap: EAP packet type response id 6 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 4
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 4
modcall: group authorize returns updated for request 4
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 4
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
rlm_eap_peap: EAPTLS_SUCCESS
modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 4 to 10.1.2.3:1645
EAP-Message = 0x01070020190017030100155d32708cf27372dbedec0d2a2b1f6002f8867c7dcd
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x688468bf2995a798b2340bf3bdaa0afb
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=5, length=174
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0xed9e741075a0c5dd99a8199d3e91cad1
EAP-Message = 0x020700241900170301001998b149b3aec5527d7c35eac0668ed4c488e068e2c62434ade3
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0x688468bf2995a798b2340bf3bdaa0afb
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
modcall[authorize]: module "chap" returns noop for request 5
modcall[authorize]: module "mschap" returns noop for request 5
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 5
rlm_eap: EAP packet type response id 7 length 36
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 5
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 5
modcall: group authorize returns updated for request 5
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 5
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Proceeding to decode tunneled attributes.


rlm_eap_peap: Identity - toto
rlm_eap_peap: Tunneled data is valid.
PEAP: Got tunneled EAP-Message
EAP-Message = 0x0207000d017175657477696c66
PEAP: Got tunneled identity of toto
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Sending tunneled request
EAP-Message = 0x0207000d017175657477696c66
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
NAS-Port-Type = Virtual
NAS-Port = 274
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
modcall[authorize]: module "chap" returns noop for request 5
modcall[authorize]: module "mschap" returns noop for request 5
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 5
rlm_eap: EAP packet type response id 7 length 13
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 5
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 5
modcall: group authorize returns updated for request 5
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 5
rlm_eap: EAP Identity
rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
PEAP: Got tunneled reply RADIUS code 11
EAP-Message = 0x010800221a0108001d1092ff188a785f52b9fee174f3887e1e9b7175657477696c66
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe73db67c028423671fd0b3b8e78b3109
PEAP: Got tunneled Access-Challenge
modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 5 to 10.1.2.3:1645
EAP-Message = 0x010800391900170301002e1900818410f515bcb43c5bccd8cc49d510311f49ef768a06188e5cd921d404533881984bd4cce373550bde94c95e
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xfa06d2af340a45ef766466ac3a2248d8
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=6, length=228
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0xf74f1e5fcaa9bf146c41a45517cebca3
EAP-Message = 0x0208005a1900170301004fea5c3a14f2477d60c62e14894d70ceec26a64d6a20970037d02a5f51e98ce6d5c48a8df0c73649de8b9762f9868f466b07b5b744db73ff34ccd309ca22f78e06a732b6cc957ea2461226474bd30be5
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0xfa06d2af340a45ef766466ac3a2248d8
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 6
modcall[authorize]: module "preprocess" returns ok for request 6
modcall[authorize]: module "chap" returns noop for request 6
modcall[authorize]: module "mschap" returns noop for request 6
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 6
rlm_eap: EAP packet type response id 8 length 90
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 6
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 6
modcall: group authorize returns updated for request 6
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 6
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Proceeding to decode tunneled attributes.


rlm_eap_peap: EAP type 26
rlm_eap_peap: Tunneled data is valid.
PEAP: Got tunneled EAP-Message
EAP-Message = 0x020800431a0208003e31b72cc1bf656730d4a66e0a7e79a0da2e0000000000000000d02462b062000756d90ae8335044777bd3e584c2a1ff5513007175657477696c66
PEAP: Adding old state with e7 3d
PEAP: Sending tunneled request
EAP-Message = 0x020800431a0208003e31b72cc1bf656730d4a66e0a7e79a0da2e0000000000000000d02462b062000756d90ae8335044777bd3e584c2a1ff5513007175657477696c66
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "toto"
State = 0xe73db67c028423671fd0b3b8e78b3109
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
NAS-Port-Type = Virtual
NAS-Port = 274
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 6
modcall[authorize]: module "preprocess" returns ok for request 6
modcall[authorize]: module "chap" returns noop for request 6
modcall[authorize]: module "mschap" returns noop for request 6
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 6
rlm_eap: EAP packet type response id 8 length 67
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 6
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 6
modcall: group authorize returns updated for request 6
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 6
rlm_eap: Request found, released from the list
rlm_eap: EAP/mschapv2
rlm_eap: processing type mschapv2
modcall: entering group Auth-Type for request 6
rlm_mschap: doing MS-CHAPv2 with NT-Password
rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
modcall[authenticate]: module "mschap" returns reject for request 6
modcall: group Auth-Type returns reject for request 6
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns reject for request 6
modcall: group authenticate returns reject for request 6
auth: Failed to validate the user.
Login incorrect: [toto/<no User-Password attribute>] (from client localhost port 274 cli 0004.2372.d636)
PEAP: Got tunneled reply RADIUS code 3
MS-CHAP-Error = "\000E=691 R=1"
EAP-Message = 0x04080004
Message-Authenticator = 0x00000000000000000000000000000000
PEAP: Tunneled authentication was rejected.
rlm_eap_peap: FAILURE
modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 6 to 10.1.2.3:1645
EAP-Message = 0x010900261900170301001bc1bb7c7002a726471e8cbb74b84a7c6886525963f5985c6e5a3281
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x58a6a3d8726970dd2df1ec7c3f5988b1
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.1.2.3:1645, id=7, length=176
User-Name = "toto"
Framed-MTU = 1400
Called-Station-Id = "000c.ceff.56e9"
Calling-Station-Id = "0004.2372.d636"
Message-Authenticator = 0x0f649947234c0f81c1dd2aabb71eb891
EAP-Message = 0x020900261900170301001b811a5c0b714f69ce0dd7cf5fa535a786c8755ea38cb5402751a785
NAS-Port-Type = Virtual
NAS-Port = 274
State = 0x58a6a3d8726970dd2df1ec7c3f5988b1
NAS-IP-Address = 10.1.2.3
NAS-Identifier = "aironet-si-2"
modcall: entering group authorize for request 7
modcall[authorize]: module "preprocess" returns ok for request 7
modcall[authorize]: module "chap" returns noop for request 7
modcall[authorize]: module "mschap" returns noop for request 7
rlm_realm: No '@' in User-Name = "toto", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 7
rlm_eap: EAP packet type response id 9 length 38
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 7
users: Matched DEFAULT at 152
users: Matched toto at 225
modcall[authorize]: module "files" returns ok for request 7
modcall: group authorize returns updated for request 7
rad_check_password: Found Auth-Type eap
auth: type "EAP"
modcall: entering group authenticate for request 7
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Proceeding to decode tunneled attributes.


rlm_eap_peap: Received EAP-TLV response.
rlm_eap_peap: Tunneled data is valid.
rlm_eap_peap: Had sent TLV failure, rejecting.
rlm_eap: Handler failed in EAP/peap
rlm_eap: Failed in EAP select
modcall[authenticate]: module "eap" returns invalid for request 7
modcall: group authenticate returns invalid for request 7
auth: Failed to validate the user.
Login incorrect: [toto/<no User-Password attribute>] (from client borne-aironet port 274 cli 0004.2372.d636)
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 0 with timestamp 404842ff
Cleaning up request 1 ID 1 with timestamp 404842ff
Cleaning up request 2 ID 2 with timestamp 404842ff
Cleaning up request 3 ID 3 with timestamp 404842ff
Cleaning up request 4 ID 4 with timestamp 404842ff
Cleaning up request 5 ID 5 with timestamp 404842ff
Cleaning up request 6 ID 6 with timestamp 404842ff
Sending Access-Reject of id 7 to 10.1.2.3:1645
EAP-Message = 0x04090004
Message-Authenticator = 0x00000000000000000000000000000000
Cleaning up request 7 ID 7 with timestamp 404842ff
Nothing to do. Sleeping until we see a request.


--
------------------------------------------
- Wilfried QUET                          -
- Université de Technologie de Compiègne -
- Service Informatique                   -
- tél. :  03 44 23 49 90                 -
- port.:  06 22 20 59 83                 -
- fax  :  03 44 23 46 77                 -
- mail :  [EMAIL PROTECTED]                   -
------------------------------------------


- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to