hi
i m trying to configure peap with xp clients
i ve differents problems :

first when i click properties for peap for a dell true mobile i have an error of windows ( explorer.exe send to microsoft etc .... )
if someone has had this problem ( i have all the services packs and hotfixes )


seconf with a cisco card if i choose to use the windows login information the user name which is send is COMPUTERNAME//username


if i do not i have a prompt for the user name and password , but i have an access reject and i can t understand why
here are the radius logs
thanks
basile




rad_recv: Access-Request packet from host 195.220.107.24:21646, id=100, length=133
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0xb809d96df9890c5bfabc6b1f08be1f40
EAP-Message = 0x0201000b01736972697332
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns ok for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Requiring client certificate
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 100 to 195.220.107.24:21646
EAP-Message = 0x010200060d20
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x094dc0115bbe948141236dc0067c94f7
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=101, length=146
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0xffb041ae9c7d945e48b9abdc5ea8a289
EAP-Message = 0x020200060319
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x094dc0115bbe948141236dc0067c94f7
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns ok for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP NAK
rlm_eap: EAP-NAK asked for EAP-Type/peap
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 101 to 195.220.107.24:21646
EAP-Message = 0x010300061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x8887bc05e9ffad7ceea0ea8117356e79
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=102, length=220
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0xde91088232c648d7cebb392774185b42
EAP-Message = 0x0203005019800000004616030100410100003d030140b70c853366006d649af9a24cbcb24b1341a33490c98189db2b40913e0f46ce00001600040005000a000900640062000300060013001200630100
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x8887bc05e9ffad7ceea0ea8117356e79
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 2
modcall: group authorize returns ok for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0618], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 102 to 195.220.107.24:21646
EAP-Message = 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
EAP-Message = 0x7340736f72626f6e6e652e6672301e170d3034303530353134313734375a170d3035303530353134313734375a30819b310b3009060355040613024652310e300c060355040813055061726973310e300c060355040713055061726973310e300c060355040a13055369726973310e300c060355040b13055369726973312a302806035504031321524543542d696e74312d31312e726563746f7261742e736f72626f6e6e652e66723120301e06092a864886f70d0109011611736972697340736f72626f6e6e652e667230819f300d06092a864886f70d010101050003818d0030818902818100a841b636a15a9939aa6e637f05070ce8d73d44eb4f
EAP-Message = 0xe8aa0c5a
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe31e21cb29d505171b4057926ef10501
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=103, length=146
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x04e96fd0af81c5d02a95334f2acc4faa
EAP-Message = 0x020400061900
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0xe31e21cb29d505171b4057926ef10501
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 3
modcall: group authorize returns ok for request 3
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 103 to 195.220.107.24:21646
EAP-Message = 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
EAP-Message = 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
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3450dcdbc0cf560429eb7e6e92c367b4
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=104, length=146
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x302ee3063caddf001fe648e5b0a280c0
EAP-Message = 0x020500061900
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x3450dcdbc0cf560429eb7e6e92c367b4
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
modcall[authorize]: module "preprocess" returns ok for request 4
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 4
modcall: group authorize returns ok for request 4
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 104 to 195.220.107.24:21646
EAP-Message = 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
EAP-Message = 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
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x616f3b37acedc14f30f5a50f74c03547
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=105, length=146
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x37c1e74bdc4f281dd3ae0e4b62d13107
EAP-Message = 0x020600061900
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x616f3b37acedc14f30f5a50f74c03547
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 5
modcall: group authorize returns ok for request 5
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 105 to 195.220.107.24:21646
EAP-Message = 0x0107009f1900092a864886f70d01010405000381810030e198d0f40c139c1b05f33e4ab66ebb3afa0d8ce0c6a32ddf48fc859e0a2cd199d615f5a4f505ca27c9dcdde1e7168acba004ea69b660d6c5da3a8740edeec4fbcfb7f180d4a98cff2a1ba56a1d2f6521a36b32f8575c5542002b457421fcc1176e912e068a5c53c114b4e4d063fad1b6e13fdac63a07ab0140f0d90631997a16030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x12f20ec820c891aeb671a6f2aa9e493b
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=106, length=332
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x4199697370091f33a0327a580a48ee52
EAP-Message = 0x020700c01980000000b61603010086100000820080753d0d4bc9ec2ea2535787088b3c0de9558464cd574eb3615d7c361deec81158d47295552d16f5644513df32b8bbe7a537304d2ada4f2835fe60d633a362c2da6db78cdc12c050c7566fca859ee68fb811d0805a9e809306520afd059a3b6aa5755c450e017a0e6e709c601050a094acd6f8888b82d9ea1f6300e6b8cc36677214030100010116030100204f1a82173257da25cfa67c6fd7889bc05d2bf0d2f55b63da89a8547a09d3c3b7
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x12f20ec820c891aeb671a6f2aa9e493b
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
modcall[authorize]: module "preprocess" returns ok for request 6
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 6
modcall: group authorize returns ok for request 6
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 106 to 195.220.107.24:21646
EAP-Message = 0x0108003119001403010001011603010020f3f73a208c102e33485d2cca73d27cea7d7abda883a1df5bd30e3a373015d856
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x2dab6eb7139c03c84502ba6b58bb361a
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=107, length=146
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0xcacb09a1e99f86d7db9aac5d1b9df4ff
EAP-Message = 0x020800061900
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x2dab6eb7139c03c84502ba6b58bb361a
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
modcall[authorize]: module "preprocess" returns ok for request 7
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 7
modcall: group authorize returns ok for request 7
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
rlm_eap_peap: EAPTLS_SUCCESS
modcall[authenticate]: module "eap" returns handled for request 7
modcall: group authenticate returns handled for request 7
Sending Access-Challenge of id 107 to 195.220.107.24:21646
EAP-Message = 0x01090020190017030100151708d87b30401f677a4e0ba24e15355552145523ef
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x941c7db169278f73a8adb26050634685
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=108, length=174
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x8420dff94511507647509ac81eb5af8c
EAP-Message = 0x0209002219001703010017eccad5f30de1f7acd2dcc2725ff5dd0c198ca6dd9d1834
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x941c7db169278f73a8adb26050634685
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
modcall[authorize]: module "preprocess" returns ok for request 8
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 8
modcall: group authorize returns ok for request 8
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Identity - siris2
rlm_eap_peap: Tunneled data is valid.
PEAP: Got tunneled EAP-Message
EAP-Message = 0x0209000b01736972697332
PEAP: Got tunneled identity of siris2
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Setting User-Name to siris2
PEAP: Sending tunneled request
EAP-Message = 0x0209000b01736972697332
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "siris2"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
modcall[authorize]: module "preprocess" returns ok for request 8
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 8
modcall: group authorize returns ok for request 8
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
rlm_eap: EAP Identity
rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
modcall[authenticate]: module "eap" returns handled for request 8
modcall: group authenticate returns handled for request 8
PEAP: Got tunneled reply RADIUS code 11
EAP-Message = 0x010a00201a010a001b109858ab5fcba2ec1c8546ac764e90ea9b736972697332
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x0117fab51947d3b5ce6c28ba29f98035
PEAP: Processing from tunneled session code 0x8165050 11
EAP-Message = 0x010a00201a010a001b109858ab5fcba2ec1c8546ac764e90ea9b736972697332
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x0117fab51947d3b5ce6c28ba29f98035
PEAP: Got tunneled Access-Challenge
modcall[authenticate]: module "eap" returns handled for request 8
modcall: group authenticate returns handled for request 8
Sending Access-Challenge of id 108 to 195.220.107.24:21646
EAP-Message = 0x010a00371900170301002ca50fd7cf0f72c6d2fe617973d56076d9a031a0571dcea3eb03d44c635b0ac814d71edceb869e85a498030eed
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xba3a4fc37004a9101dd7a9656f66b380
Finished request 8
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=109, length=228
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x3e7e27f053e2783d2944be219bf4495a
EAP-Message = 0x020a00581900170301004dba9c3c8534ad268f1e7ca0cb871cb82672e1ccfb584238c86d7fad0e1a56440535da203a595d3006029e7748b040b078056a9199dcb611fe777702515348faf777d53a38993d9e3c0dc4afa313
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0xba3a4fc37004a9101dd7a9656f66b380
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
modcall[authorize]: module "preprocess" returns ok for request 9
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 9
modcall: group authorize returns ok for request 9
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: EAP type mschapv2
rlm_eap_peap: Tunneled data is valid.
PEAP: Got tunneled EAP-Message
EAP-Message = 0x020a00411a020a003c313743abc61340a6349619e32258b65ff10000000000000000dbef7b9de3fb765859b3042eac01182ab2dc1c6470a1344f00736972697332
PEAP: Setting User-Name to siris2
PEAP: Adding old state with 01 17
PEAP: Sending tunneled request
EAP-Message = 0x020a00411a020a003c313743abc61340a6349619e32258b65ff10000000000000000dbef7b9de3fb765859b3042eac01182ab2dc1c6470a1344f00736972697332
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "siris2"
State = 0x0117fab51947d3b5ce6c28ba29f98035
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
modcall[authorize]: module "preprocess" returns ok for request 9
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 9
modcall: group authorize returns ok for request 9
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
rlm_eap: Request found, released from the list
rlm_eap: EAP/mschapv2
rlm_eap: processing type mschapv2
ERROR: Unknown value specified for Auth-Type. Cannot perform requested action.
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns reject for request 9
modcall: group authenticate returns reject for request 9
auth: Failed to validate the user.
PEAP: Got tunneled reply RADIUS code 3
EAP-Message = 0x040a0004
Message-Authenticator = 0x00000000000000000000000000000000
PEAP: Processing from tunneled session code 0x8180e88 3
EAP-Message = 0x040a0004
Message-Authenticator = 0x00000000000000000000000000000000
PEAP: Tunneled authentication was rejected.
rlm_eap_peap: FAILURE
modcall[authenticate]: module "eap" returns handled for request 9
modcall: group authenticate returns handled for request 9
Sending Access-Challenge of id 109 to 195.220.107.24:21646
EAP-Message = 0x010b00261900170301001bb914025745d18b94eb0542c639a3453d6c3772ae6bf6c65069bcc8
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x1b96e00dcca7ea98e55e451745fabc1f
Finished request 9
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=110, length=178
User-Name = "siris2"
Framed-MTU = 1400
Called-Station-Id = "000e.38f7.6600"
Calling-Station-Id = "000e.83eb.3692"
Message-Authenticator = 0x816526d197770abfdfcbbec2ed3106d9
EAP-Message = 0x020b00261900170301001ba5181b3a1dcfeee0946957e4523c88277dceb20e852e51728b377f
NAS-Port-Type = Wireless-802.11
NAS-Port = 276
State = 0x1b96e00dcca7ea98e55e451745fabc1f
Service-Type = Framed-User
NAS-IP-Address = 195.220.107.24
NAS-Identifier = "test_siris"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 10
modcall[authorize]: module "preprocess" returns ok for request 10
users: Matched siris2 at 8
modcall[authorize]: module "files" returns ok for request 10
modcall: group authorize returns ok for request 10
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 10
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Received EAP-TLV response.
rlm_eap_peap: Tunneled data is valid.
rlm_eap_peap: Had sent TLV failure, rejecting.
rlm_eap: Handler failed in EAP/peap
rlm_eap: Failed in EAP select
modcall[authenticate]: module "eap" returns invalid for request 10
modcall: group authenticate returns invalid for request 10
auth: Failed to validate the user.
Delaying request 10 for 1 seconds
Finished request 10
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 195.220.107.24:21646, id=110, length=178
Sending Access-Reject of id 110 to 195.220.107.24:21646
EAP-Message = 0x040b0004
Message-Authenticator = 0x00000000000000000000000000000000
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 100 with timestamp 40b70b49
Cleaning up request 1 ID 101 with timestamp 40b70b49
Cleaning up request 2 ID 102 with timestamp 40b70b49
Cleaning up request 3 ID 103 with timestamp 40b70b49
Cleaning up request 4 ID 104 with timestamp 40b70b49
Cleaning up request 5 ID 105 with timestamp 40b70b49
Cleaning up request 6 ID 106 with timestamp 40b70b49
Cleaning up request 7 ID 107 with timestamp 40b70b49
Cleaning up request 8 ID 108 with timestamp 40b70b49
Cleaning up request 9 ID 109 with timestamp 40b70b49
Cleaning up request 10 ID 110 with timestamp 40b70b49
Nothing to do. Sleeping until we see a request.




- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to