Hi folks.
I'm trying to authenticate WinXP clients using a Vivato Wi-Fi switch using EAP-PEAP. The server configuration seems to be same as i have seen from people that say they have PEAP working with Win XP. Any clues weither it is the server misconfiguration or the AP that is not working. Thanx Paul Debug: Starting - reading configuration files ... reread_config: reading radiusd.conf Config: including file: /usr/local/freeradius/raddb/proxy.conf Config: including file: /usr/local/freeradius/raddb/clients.conf Config: including file: /usr/local/freeradius/raddb/snmp.conf Config: including file: /usr/local/freeradius/raddb/eap.conf Config: including file: /usr/local/freeradius/raddb/sql.conf main: prefix = "/usr/local/freeradius" main: localstatedir = "/usr/local/freeradius/var" main: logdir = "/usr/local/freeradius/var/log/radius" main: libdir = "/usr/local/freeradius/lib" main: radacctdir = "/usr/local/freeradius/radacct" main: hostname_lookups = no main: max_request_time = 30 main: cleanup_delay = 5 main: max_requests = 1024 main: delete_blocked_requests = 0 main: port = 0 main: allow_core_dumps = no main: log_stripped_names = no main: log_file = "/usr/local/freeradius/var/log/radius/radius.log" main: log_auth = no main: log_auth_badpass = yes main: log_auth_goodpass = no main: pidfile = "/usr/local/freeradius/var/run/radiusd/radiusd.pid" main: user = "root" main: group = "wheel" main: usercollide = no main: lower_user = "no" main: lower_pass = "no" main: nospace_user = "no" main: nospace_pass = "no" main: checkrad = "/usr/local/freeradius/sbin/checkrad" main: proxy_requests = yes proxy: retry_delay = 5 proxy: retry_count = 3 proxy: synchronous = no proxy: default_fallback = yes proxy: dead_time = 120 proxy: post_proxy_authorize = yes proxy: wake_all_if_all_dead = no security: max_attributes = 200 security: reject_delay = 1 security: status_server = no main: debug_level = 0 read_config_files: reading dictionary read_config_files: reading naslist Using deprecated naslist file. Support for this will go away soon. read_config_files: reading clients read_config_files: reading realms radiusd: entering modules setup Module: Library search path is /usr/local/freeradius/lib Module: Loaded exec exec: wait = yes exec: program = "(null)" exec: input_pairs = "request" exec: output_pairs = "(null)" exec: packet_type = "(null)" rlm_exec: Wait=yes but no output defined. Did you mean output=none? Module: Instantiated exec (exec) Module: Loaded expr Module: Instantiated expr (expr) Module: Loaded PAP pap: encryption_scheme = "crypt" Module: Instantiated pap (pap) Module: Loaded CHAP Module: Instantiated chap (chap) Module: Loaded MS-CHAP mschap: use_mppe = yes mschap: require_encryption = no mschap: require_strong = no mschap: with_ntdomain_hack = no mschap: passwd = "(null)" mschap: authtype = "MS-CHAP" mschap: ntlm_auth = "(null)" Module: Instantiated mschap (mschap) Module: Loaded Pam pam: pam_auth = "radiusd" Module: Instantiated pam (pam) Module: Loaded eap eap: default_eap_type = "tls" eap: timer_expire = 120 eap: ignore_unknown_eap_types = yes eap: cisco_accounting_username_bug = no rlm_eap: Loaded and initialized type md5 rlm_eap: Loaded and initialized type leap gtc: challenge = "Password: " gtc: auth_type = "PAP" rlm_eap: Loaded and initialized type gtc tls: rsa_key_exchange = no tls: dh_key_exchange = yes tls: rsa_key_length = 512 tls: dh_key_length = 512 tls: verify_depth = 0 tls: CA_path = "(null)" tls: pem_file_type = yes tls: private_key_file = "/usr/local/freeradius/raddb/1x/bsd01.pem" tls: certificate_file = "/usr/local/freeradius/raddb/1x/bsd01.pem" tls: CA_file = "/usr/local/freeradius/raddb/1x/root.pem" tls: private_key_password = "mypass" tls: dh_file = "/usr/local/freeradius/raddb/1x/dh" tls: random_file = "/usr/local/freeradius/raddb/1x/random" tls: fragment_size = 1024 tls: include_length = yes tls: check_crl = no tls: check_cert_cn = "(null)" rlm_eap: Loaded and initialized type tls peap: default_eap_type = "mschapv2" peap: copy_request_to_tunnel = no peap: use_tunneled_reply = no peap: proxy_tunneled_request_as_eap = yes rlm_eap: Loaded and initialized type peap mschapv2: with_ntdomain_hack = no rlm_eap: Loaded and initialized type mschapv2 Module: Instantiated eap (eap) Module: Loaded preprocess preprocess: huntgroups = "/usr/local/freeradius/raddb/huntgroups" preprocess: hints = "/usr/local/freeradius/raddb/hints" preprocess: with_ascend_hack = no preprocess: ascend_channels_per_line = 23 preprocess: with_ntdomain_hack = no preprocess: with_specialix_jetstream_hack = no preprocess: with_cisco_vsa_hack = no Module: Instantiated preprocess (preprocess) Module: Loaded realm realm: format = "suffix" realm: delimiter = "@" realm: ignore_default = no realm: ignore_null = no Module: Instantiated realm (suffix) Module: Loaded files files: usersfile = "/usr/local/freeradius/raddb/users" files: acctusersfile = "/usr/local/freeradius/raddb/acct_users" files: preproxy_usersfile = "/usr/local/freeradius/raddb/preproxy_users" files: compat = "no" Module: Instantiated files (files) Module: Loaded Acct-Unique-Session-Id acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" Module: Instantiated acct_unique (acct_unique) Module: Loaded detail detail: detailfile = "/usr/local/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (detail) Module: Loaded System unix: cache = no unix: passwd = "(null)" unix: shadow = "(null)" unix: group = "(null)" unix: radwtmp = "/usr/local/freeradius/var/log/radius/radwtmp" unix: usegroup = no unix: cache_reload = 600 Module: Instantiated unix (unix) Module: Loaded radutmp radutmp: filename = "/usr/local/freeradius/var/log/radius/radutmp" radutmp: username = "%{User-Name}" radutmp: case_sensitive = yes radutmp: check_with_nas = yes radutmp: perm = 384 radutmp: callerid = yes Module: Instantiated radutmp (radutmp) Listening on authentication *:1812 Listening on accounting *:1813 Listening on proxy *:1814 Ready to process requests. rad_recv: Access-Request packet from host 66.38.229.2:1024, id=213, length=170 User-Name = "vivatotest1" NAS-IP-Address = 66.38.229.2 NAS-Port = 0 Called-Station-Id = "00:0B:33:01:1A:60" Calling-Station-Id = "00:02:2D:67:E2:A0" NAS-Identifier = "dns01.otalbds" Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 11Mbps 802.11b" EAP-Message = 0x020300100176697661746f7465737431 Message-Authenticator = 0x97c7bb6e353daa8880347882448651cb Processing the authorize section of radiusd.conf modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 modcall[authorize]: module "mschap" returns noop for request 0 rlm_realm: No '@' in User-Name = "vivatotest1", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 rlm_eap: EAP packet type response id 3 length 16 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 0 modcall[authorize]: module "files" returns notfound for request 0 modcall: group authorize returns updated for request 0 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 0 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 0 modcall: group authenticate returns handled for request 0 Sending Access-Challenge of id 213 to 66.38.229.2:1024 EAP-Message = 0x010400060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x8d063feaafca17cce5925ded1e67f831 Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 66.38.229.2:1024, id=214, length=172 User-Name = "vivatotest1" NAS-IP-Address = 66.38.229.2 NAS-Port = 0 Called-Station-Id = "00:0B:33:01:1A:60" Calling-Station-Id = "00:02:2D:67:E2:A0" NAS-Identifier = "dns01.otalbds" NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 11Mbps 802.11b" EAP-Message = 0x020400060319 State = 0x8d063feaafca17cce5925ded1e67f831 Message-Authenticator = 0x10c1b9eb473dca322f548c9f7d147eef Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 modcall[authorize]: module "chap" returns noop for request 1 modcall[authorize]: module "mschap" returns noop for request 1 rlm_realm: No '@' in User-Name = "vivatotest1", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1 rlm_eap: EAP packet type response id 4 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1 modcall[authorize]: module "files" returns notfound for request 1 modcall: group authorize returns updated for request 1 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1 rlm_eap: Request found, released from the list rlm_eap: EAP NAK rlm_eap: EAP-NAK asked for EAP-Type/peap rlm_eap: processing type tls rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 1 modcall: group authenticate returns handled for request 1 Sending Access-Challenge of id 214 to 66.38.229.2:1024 EAP-Message = 0x010500061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xfe7590978dd8ccf5767d999221b14ac9 Finished request 1 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 66.38.229.2:1024, id=215, length=246 User-Name = "vivatotest1" NAS-IP-Address = 66.38.229.2 NAS-Port = 0 Called-Station-Id = "00:0B:33:01:1A:60" Calling-Station-Id = "00:02:2D:67:E2:A0" NAS-Identifier = "dns01.otalbds" NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 11Mbps 802.11b" EAP-Message = 0x0205005019800000004616030100410100003d030140a23eb79d3410954b1dc167714412916fe4ab432538636e2753e29fc0c61cce00001600040005000a000900640062000300060013001200630100 State = 0xfe7590978dd8ccf5767d999221b14ac9 Message-Authenticator = 0xb857b5d88eaebbf50d5dcd8009ad50aa Processing the authorize section of radiusd.conf modcall: entering group authorize for request 2 modcall[authorize]: module "preprocess" returns ok for request 2 modcall[authorize]: module "chap" returns noop for request 2 modcall[authorize]: module "mschap" returns noop for request 2 rlm_realm: No '@' in User-Name = "vivatotest1", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 2 rlm_eap: EAP packet type response id 5 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 2 modcall[authorize]: module "files" returns notfound for request 2 modcall: group authorize returns updated for request 2 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 2 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0676], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone TLS_accept: SSLv3 write server done A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 2 modcall: group authenticate returns handled for request 2 Sending Access-Challenge of id 215 to 66.38.229.2:1024 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x1e5da03d72f65edf49ea970e059f44e2867869b897c69014708730967b51ec5fbd426ce25d03c4b913e6dbbdc15e6d048b8cab317280b6490003a23082039e30820307a003020102020100300d06092a864886f70d0101040500308197310b3009060355040613024341310b30090603550408130251433111300f060355040713084d6f6e747265616c31143012060355040a130b444953545249425554454c310c300a060355040b13034e4f433120301e06035504031317444953545249425554454c20576972656c6573732043413122302006092a864886f70d01090116136e6f6340646973747269627574656c2e6e6574301e170d3034303531 EAP-Message = 0x313231343130355a170d303430363130323134313035 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x69272e87ffd2f07e309494c522469c63 Finished request 2 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 66.38.229.2:1024, id=216, length=172 User-Name = "vivatotest1" NAS-IP-Address = 66.38.229.2 NAS-Port = 0 Called-Station-Id = "00:0B:33:01:1A:60" Calling-Station-Id = "00:02:2D:67:E2:A0" NAS-Identifier = "dns01.otalbds" NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 11Mbps 802.11b" EAP-Message = 0x020600061900 State = 0x69272e87ffd2f07e309494c522469c63 Message-Authenticator = 0xf89c045fe8d98837841a465a4f80a6ba Processing the authorize section of radiusd.conf modcall: entering group authorize for request 3 modcall[authorize]: module "preprocess" returns ok for request 3 modcall[authorize]: module "chap" returns noop for request 3 modcall[authorize]: module "mschap" returns noop for request 3 rlm_realm: No '@' in User-Name = "vivatotest1", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 3 rlm_eap: EAP packet type response id 6 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 3 modcall[authorize]: module "files" returns notfound for request 3 modcall: group authorize returns updated for request 3 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 3 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 3 modcall: group authenticate returns handled for request 3 Sending Access-Challenge of id 216 to 66.38.229.2:1024 EAP-Message = 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 EAP-Message = 0xcb21f3594c6abbbcd0a49945f6ce6f4eb4acf204d90853f0f91c6992fe5ca055f69299a8b0a9954c9065a91db6396277ed672b4eb840a4697243d602d381e75b2b0203010001a381f73081f4301d0603551d0e0416041446bafd1c48f779afadfe81c37277b502ac7efe103081c40603551d230481bc3081b9801446bafd1c48f779afadfe81c37277b502ac7efe10a1819da4819a308197310b3009060355040613024341310b30090603550408130251433111300f060355040713084d6f6e747265616c31143012060355040a130b444953545249425554454c310c300a060355040b13034e4f433120301e06035504031317444953545249425554 EAP-Message = 0x454c20576972656c6573732043413122302006092a864886f70d01090116136e6f6340646973747269627574656c2e6e6574820100300c0603551d13040530030101ff300d06092a864886f70d0101040500038181009ed4363a49b8e5fb03d293ad9845af0248711029a8a8064f73c264c88d7372721ff80c3ea004ad398367d4d143d8af8318d2c5273a552f468c3802ee0ef752e7871ad4be1e4ee4f726a58cdfc05b77de6e572d1e63243d27361f3333e0b469eb0396a4f2f4815c31e782d8fe4b464b84d486f882e66d60d149d5af61da49833e16030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa46f6e45bdb19ada59ea51e646d8fce3 Finished request 3 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 66.38.229.2:1024, id=217, length=172 User-Name = "vivatotest1" NAS-IP-Address = 66.38.229.2 NAS-Port = 0 Called-Station-Id = "00:0B:33:01:1A:60" Calling-Station-Id = "00:02:2D:67:E2:A0" NAS-Identifier = "dns01.otalbds" NAS-Port-Type = Wireless-802.11 Connect-Info = "CONNECT 11Mbps 802.11b" EAP-Message = 0x020700061900 State = 0xa46f6e45bdb19ada59ea51e646d8fce3 Message-Authenticator = 0x53f4082be1dc31d2f4288b072f784864 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 4 modcall[authorize]: module "preprocess" returns ok for request 4 modcall[authorize]: module "chap" returns noop for request 4 modcall[authorize]: module "mschap" returns noop for request 4 rlm_realm: No '@' in User-Name = "vivatotest1", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 4 rlm_eap: EAP packet type response id 7 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 4 modcall[authorize]: module "files" returns notfound for request 4 modcall: group authorize returns updated for request 4 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 4 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message eaptls_verify returned 3 eaptls_process returned 3 TLS_accept:error in SSLv3 read client certificate A rlm_eap_peap: EAPTLS_SUCCESS modcall[authenticate]: module "eap" returns handled for request 4 modcall: group authenticate returns handled for request 4 Sending Access-Challenge of id 217 to 66.38.229.2:1024 EAP-Message = 0x010800061900 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x8a11c13a441d27620348c48c0c325bac Finished request 4 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 0 ID 213 with timestamp 40a23f1f Cleaning up request 1 ID 214 with timestamp 40a23f1f Cleaning up request 2 ID 215 with timestamp 40a23f1f Cleaning up request 3 ID 216 with timestamp 40a23f1f Cleaning up request 4 ID 217 with timestamp 40a23f1f Nothing to do. Sleeping until we see a request. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html