------ Output from CVS version (functional) Starting - reading configuration files ... reread_config: reading radiusd.conf Config: including file: /project/radiusbeta/etc/raddb/proxy.conf Config: including file: /project/radiusbeta/etc/raddb/clients.conf Config: including file: /project/radiusbeta/etc/raddb/snmp.conf Config: including file: /project/radiusbeta/etc/raddb/sql.conf main: prefix = "/project/radiusbeta" main: localstatedir = "/project/radiusbeta/var" main: logdir = "/project/radiusbeta/var/log/radius" main: libdir = "/project/radiusbeta/lib" main: radacctdir = "/project/radiusbeta/var/log/radius/radacct" main: hostname_lookups = no main: max_request_time = 30 main: cleanup_delay = 5 main: max_requests = 1024 main: delete_blocked_requests = 0 main: port = 0 main: allow_core_dumps = no main: log_stripped_names = no main: log_file = "/project/radiusbeta/var/log/radius/radius.log" main: log_auth = yes main: log_auth_badpass = no main: log_auth_goodpass = no main: pidfile = "/project/radiusbeta/var/run/radiusd/radiusd.pid" main: user = "(null)" main: group = "(null)" main: usercollide = no main: lower_user = "no" main: lower_pass = "no" main: nospace_user = "no" main: nospace_pass = "no" main: checkrad = "/project/radiusbeta/sbin/checkrad" main: proxy_requests = yes proxy: retry_delay = 5 proxy: retry_count = 3 proxy: synchronous = no proxy: default_fallback = yes proxy: dead_time = 120 proxy: post_proxy_authorize = yes proxy: wake_all_if_all_dead = no security: max_attributes = 200 security: reject_delay = 1 security: status_server = no main: debug_level = 0 read_config_files: reading dictionary read_config_files: reading naslist Using deprecated naslist file. Support for this will go away soon. read_config_files: reading clients Using deprecated clients file. Support for this will go away soon. read_config_files: reading realms Using deprecated realms file. Support for this will go away soon. radiusd: entering modules setup Module: Library search path is /project/radiusbeta/lib Module: Loaded expr Module: Instantiated expr (expr) Module: Loaded PAP pap: encryption_scheme = "crypt" Module: Instantiated pap (pap) Module: Loaded CHAP Module: Instantiated chap (chap) Module: Loaded MS-CHAP mschap: use_mppe = yes mschap: require_encryption = no mschap: require_strong = no mschap: passwd = "(null)" mschap: authtype = "MS-CHAP" Module: Instantiated mschap (mschap) Module: Loaded System unix: cache = no unix: passwd = "(null)" unix: shadow = "(null)" unix: group = "(null)" unix: radwtmp = "/project/radiusbeta/var/log/radius/radwtmp" unix: usegroup = no unix: cache_reload = 600 Module: Instantiated unix (unix) Module: Loaded eap eap: default_eap_type = "peap" eap: timer_expire = 60 eap: ignore_unknown_eap_types = no rlm_eap: Loaded and initialized type md5 rlm_eap: Loaded and initialized type leap tls: rsa_key_exchange = no tls: dh_key_exchange = yes tls: rsa_key_length = 512 tls: dh_key_length = 512 tls: verify_depth = 0 tls: CA_path = "(null)" tls: pem_file_type = yes tls: private_key_file = "/project/radiusbeta/etc/raddb/certs/cert-srv.pem" tls: certificate_file = "/project/radiusbeta/etc/raddb/certs/cert-srv.pem" tls: CA_file = "/project/radiusbeta/etc/raddb/certs/demoCA/cacert.pem" tls: private_key_password = "whatever" tls: dh_file = "/project/radiusbeta/etc/raddb/certs/dh" tls: random_file = "/project/radiusbeta/etc/raddb/certs/random" tls: fragment_size = 1024 tls: include_length = yes tls: check_crl = no rlm_eap: Loaded and initialized type tls peap: default_eap_type = "mschapv2" peap: copy_request_to_tunnel = no peap: use_tunneled_reply = no rlm_eap: Loaded and initialized type peap rlm_eap: Loaded and initialized type mschapv2 Module: Instantiated eap (eap) Module: Loaded preprocess preprocess: huntgroups = "/project/radiusbeta/etc/raddb/huntgroups" preprocess: hints = "/project/radiusbeta/etc/raddb/hints" preprocess: with_ascend_hack = no preprocess: ascend_channels_per_line = 23 preprocess: with_ntdomain_hack = no preprocess: with_specialix_jetstream_hack = no preprocess: with_cisco_vsa_hack = no Module: Instantiated preprocess (preprocess) Module: Loaded detail detail: detailfile = "/project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (auth_log) Module: Loaded realm realm: format = "suffix" realm: delimiter = "@" Module: Instantiated realm (suffix) Module: Loaded files files: usersfile = "/project/radiusbeta/etc/raddb/users" files: acctusersfile = "/project/radiusbeta/etc/raddb/acct_users" files: preproxy_usersfile = "/project/radiusbeta/etc/raddb/preproxy_users" files: compat = "no" Module: Instantiated files (files) Module: Loaded Acct-Unique-Session-Id acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port-Id" Module: Instantiated acct_unique (acct_unique) detail: detailfile = "/project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (detail) Module: Loaded radutmp radutmp: filename = "/project/radiusbeta/var/log/radius/radutmp" radutmp: username = "%{User-Name}" radutmp: case_sensitive = yes radutmp: check_with_nas = yes radutmp: perm = 384 radutmp: callerid = yes Module: Instantiated radutmp (radutmp) detail: detailfile = "/project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/reply-detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (reply_log) Listening on IP address *, ports 1812/udp and 1813/udp, with proxy on 1814/udp. Ready to process requests. rad_recv: Access-Request packet from host 129.21.6.215:1812, id=214, length=102 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" EAP-Message = 0x0200000b01617765697473 Message-Authenticator = 0xaa628f4187f03708bb9b01c4e5a4dc34 modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 rlm_eap: EAP packet type response id 0 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 0 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 0 modcall: group authorize returns updated for request 0 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 0 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 0 modcall: group authenticate returns handled for request 0 Sending Access-Challenge of id 214 to 129.21.6.215:1812 EAP-Message = 0x010100061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x16d14611f38a748149ad9f74865e49f2 Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=215, length=189 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0x16d14611f38a748149ad9f74865e49f2 EAP-Message = 0x0201005019800000004616030100410100003d03014120f9f3a64da187ff4fa67999af515ca40bcb7b5e0daee30da091cb37716b6100001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0xfdb085f53aa5ed9312c92f38b7c03012 modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 1 modcall[authorize]: module "chap" returns noop for request 1 rlm_eap: EAP packet type response id 1 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 1 modcall: group authorize returns updated for request 1 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 1 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 undefined: before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 069a], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone TLS_accept: SSLv3 write server done A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 1 modcall: group authenticate returns handled for request 1 Sending Access-Challenge of id 215 to 129.21.6.215:1812 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x0003818d00308189028181009f68bc11ac17b1c6ea90096566c81ed4e8d388960cdedd53d9dcea5fed862e054ba3849b47324a11cb182dc249bf7958e5c4d93c6a3c870a7abb9fb53e914372e843351b24e2f5e9399297be92de6799971114db2e1c97acbdd47bb528364acfa90719585917456626cf9a771fed4769e20efd3ae1f616d7ee255cafd0b295050203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101040500038181003b5b3eddb93c5e37c98756cb8c0e0afbfd335e0a000aeda6b109e3af5b9fb50f8bc784ef99e5fa7e6ed3e7d402be98d73088bde3ca8dc3b9722d8f2a8d664bd2 EAP-Message = 0xdb225921361a811e1b8db8bb21b672b306d46fce242baa1e0dce1c54d06795c183dc8aa8c88bdfd4ef8980968ecfdb6d0e474e8e44d3a534f2020378459301170003be308203ba30820323a003020102020100300d06092a864886f70d01010405003081a0310b30090603550406130243413111300f0603550408130850726f76696e63653112301006035504071309536f6d65204369747931153013060355040a130c4f7267616e697a6174696f6e31133011060355040b130a6469736369706c696e65311b301906035504031312436c69656e742063657274696669636174653121301f06092a864886f70d0109011612636c69656e7440657861 EAP-Message = 0x6d706c652e636f6d301e170d30343038313631343036 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xfddaaba12ec607e56fc82351e7992d78 Finished request 1 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=216, length=115 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0xfddaaba12ec607e56fc82351e7992d78 EAP-Message = 0x020200061900 Message-Authenticator = 0xe65c9a65e0080fce1b8de3fbe8043b61 modcall: entering group authorize for request 2 modcall[authorize]: module "preprocess" returns ok for request 2 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 2 modcall[authorize]: module "chap" returns noop for request 2 rlm_eap: EAP packet type response id 2 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 2 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 2 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 2 modcall: group authorize returns updated for request 2 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 2 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 2 modcall: group authenticate returns handled for request 2 Sending Access-Challenge of id 216 to 129.21.6.215:1812 EAP-Message = 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 EAP-Message = 0x2b1bdee581b42b512a13251565f5aa782bd900bf67c11da874f2abdf5852024e5bb79484823287b0d861ea836da57a3c1fa0daf6fc5802c7f22012be2b416e6575318b1ad678025cfa1503564bdbeac1de773f9e8795358ebfb8a50203010001a38201003081fd301d0603551d0e04160414db1c9581e82842ebf2c2cc0b2cf153aee62fca923081cd0603551d230481c53081c28014db1c9581e82842ebf2c2cc0b2cf153aee62fca92a181a6a481a33081a0310b30090603550406130243413111300f0603550408130850726f76696e63653112301006035504071309536f6d65204369747931153013060355040a130c4f7267616e697a6174696f EAP-Message = 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 EAP-Message = 0x00040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x48544e3a94b53340e3cc0be69e7995ff Finished request 2 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=217, length=301 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0x48544e3a94b53340e3cc0be69e7995ff EAP-Message = 0x020300c01980000000b6160301008610000082008018dbf6c339ae345583972b266144c3b44c263a332638c4a9a33d13755ae0b83a67108fe28a54f9172184c37c625a5003858a3b173d67fc5e1fe5a4837eaf3c9e1d5bfe6fffd27ad9b819d1c797da53d38e99ab4fad5323b004fe1f1d1561cea1771c420cfaca246d6ed972939e1797682e43dc253bb14687a514aa17b814b3831403010001011603010020118ac071ba8c631c6e06f4ae04490205ab6e8854b5e9285f7b73b319b1b40d56 Message-Authenticator = 0xb08161a8c0dd322cf0c2068f6e93369f modcall: entering group authorize for request 3 modcall[authorize]: module "preprocess" returns ok for request 3 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 3 modcall[authorize]: module "chap" returns noop for request 3 rlm_eap: EAP packet type response id 3 length 192 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 3 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 3 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 3 modcall: group authorize returns updated for request 3 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 3 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange TLS_accept: SSLv3 read client key exchange A rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001] rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 read finished A rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001] TLS_accept: SSLv3 write change cipher spec A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 write finished A TLS_accept: SSLv3 flush data undefined: SSL negotiation finished successfully SSL Connection Established eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED modcall[authenticate]: module "eap" returns handled for request 3 modcall: group authenticate returns handled for request 3 Sending Access-Challenge of id 217 to 129.21.6.215:1812 EAP-Message = 0x0104003119001403010001011603010020afc63fc44bd21772b9444fec3c053837d5603d0aaf151f3e8be8d466e19e21d6 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb5fa46821569451123663db4215835f5 Finished request 3 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=218, length=115 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0xb5fa46821569451123663db4215835f5 EAP-Message = 0x020400061900 Message-Authenticator = 0xe90138d7ff13fd1eac01ca7a20ae9fe5 modcall: entering group authorize for request 4 modcall[authorize]: module "preprocess" returns ok for request 4 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 4 modcall[authorize]: module "chap" returns noop for request 4 rlm_eap: EAP packet type response id 4 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 4 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 4 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 4 modcall: group authorize returns updated for request 4 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 4 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap_peap: EAPTLS_SUCCESS modcall[authenticate]: module "eap" returns handled for request 4 modcall: group authenticate returns handled for request 4 Sending Access-Challenge of id 218 to 129.21.6.215:1812 EAP-Message = 0x0105002019001703010015a6737771d27bb31a55e516baf156946f55456aafad Message-Authenticator = 0x00000000000000000000000000000000 State = 0x1ac0174ac3adfc3798ec11c331c52660 Finished request 4 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=219, length=143 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0x1ac0174ac3adfc3798ec11c331c52660 EAP-Message = 0x02050022190017030100171a81d3ab1ab13043845ae42f2af5b32da785b3c874b2b4 Message-Authenticator = 0x16d813068232cfa86c94d6fe612fd6dc modcall: entering group authorize for request 5 modcall[authorize]: module "preprocess" returns ok for request 5 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 5 modcall[authorize]: module "chap" returns noop for request 5 rlm_eap: EAP packet type response id 5 length 34 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 5 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 5 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 5 modcall: group authorize returns updated for request 5 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 5 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Proceeding to decode tunneled attributes.
rlm_eap_peap: Identity - aweits rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled EAP-Message EAP-Message = 0x0205000b01617765697473 PEAP: Got tunneled identity of aweits PEAP: Setting default EAP type for tunneled EAP session. PEAP: Sending tunneled request EAP-Message = 0x0205000b01617765697473 Freeradius-Proxied-To = 127.0.0.1 User-Name = "aweits" modcall: entering group authorize for request 5 modcall[authorize]: module "preprocess" returns ok for request 5 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/127.0.0.1/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/127.0.0.1/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 5 modcall[authorize]: module "chap" returns noop for request 5 rlm_eap: EAP packet type response id 5 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 5 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 5 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 5 modcall: group authorize returns updated for request 5 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 5 rlm_eap: EAP Identity rlm_eap: processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge modcall[authenticate]: module "eap" returns handled for request 5 modcall: group authenticate returns handled for request 5 PEAP: Got tunneled reply RADIUS code 11 EAP-Message = 0x010600201a0106001b104a857baa5f289cd9d46836d29c93185b617765697473 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa817493541136b9ddf56a8725f049726 PEAP: Got tunneled Access-Challenge modcall[authenticate]: module "eap" returns handled for request 5 modcall: group authenticate returns handled for request 5 Sending Access-Challenge of id 219 to 129.21.6.215:1812 EAP-Message = 0x010600371900170301002c1cbd865804616edb3e6c952c056f5f3cb1a7963364a1738dcc66e5d6ce33be3236e4adbe38f855da8650d829 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x6b3697f5496e95e4a65d3463fe758668 Finished request 5 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=220, length=197 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0x6b3697f5496e95e4a65d3463fe758668 EAP-Message = 0x020600581900170301004de21a9d842ea54c7d28f0c73ad7a1e5abc91ba6b820054d3089ed43151807c0f3d203454f492ba21685ef3bf6adfd2cd0b1621612161f99225df2677fedb35f69808d29e5b1fb22c57a377f3d9a Message-Authenticator = 0xafd512664fab782c84fc008ca37ad44b modcall: entering group authorize for request 6 modcall[authorize]: module "preprocess" returns ok for request 6 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 6 modcall[authorize]: module "chap" returns noop for request 6 rlm_eap: EAP packet type response id 6 length 88 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 6 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 6 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 6 modcall: group authorize returns updated for request 6 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 6 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Proceeding to decode tunneled attributes. rlm_eap_peap: EAP type 26 rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled EAP-Message EAP-Message = 0x020600411a0206003c319e338e53b4095b38beb5618714ddd1140000000000000000f10301583eeb8b7f0d7c2cabf25f2e5da10cc71a06d15f2100617765697473 PEAP: Adding old state with a8 17 PEAP: Sending tunneled request EAP-Message = 0x020600411a0206003c319e338e53b4095b38beb5618714ddd1140000000000000000f10301583eeb8b7f0d7c2cabf25f2e5da10cc71a06d15f2100617765697473 Freeradius-Proxied-To = 127.0.0.1 User-Name = "aweits" State = 0xa817493541136b9ddf56a8725f049726 modcall: entering group authorize for request 6 modcall[authorize]: module "preprocess" returns ok for request 6 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/127.0.0.1/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/127.0.0.1/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 6 modcall[authorize]: module "chap" returns noop for request 6 rlm_eap: EAP packet type response id 6 length 65 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 6 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 6 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 6 modcall: group authorize returns updated for request 6 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 6 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - mschapv2 rlm_eap: processing type mschapv2 modcall: entering group Auth-Type for request 6 rlm_mschap: doing MS-CHAPv2 with NT-Password rlm_mschap: adding MS-CHAPv2 MPPE keys modcall[authenticate]: module "mschap" returns ok for request 6 modcall: group Auth-Type returns ok for request 6 MSCHAP Success modcall[authenticate]: module "eap" returns handled for request 6 modcall: group authenticate returns handled for request 6 PEAP: Got tunneled reply RADIUS code 11 MS-CHAP2-Success = 0x00533d35423738303041383538414535304632443635463530463833353143433837434331444142393334 MS-MPPE-Recv-Key = 0x16ae0145ef3cc761b04cb79e740a8f98 MS-MPPE-Send-Key = 0xb14895f3ec3dbb27d7d4007bdf9c5bf4 MS-MPPE-Encryption-Policy = 0x00000001 MS-MPPE-Encryption-Types = 0x00000006 EAP-Message = 0x010700331a0306002e533d35423738303041383538414535304632443635463530463833353143433837434331444142393334 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x34d82a6a8db2419ae09e2557fa4e23b1 PEAP: Got tunneled Access-Challenge modcall[authenticate]: module "eap" returns handled for request 6 modcall: group authenticate returns handled for request 6 Sending Access-Challenge of id 220 to 129.21.6.215:1812 EAP-Message = 0x0107004a1900170301003f1e7493226e15332e414f7f43b61c67f9a8b450dcf8186247847aca56bc456bfcaaf9f2f5d9cd21a146cac48dee6bf46e3f0c6d4d59eabfb02cd0b283843219 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x071dd022a2be0dbe39e87b71aa607220 Finished request 6 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=221, length=138 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0x071dd022a2be0dbe39e87b71aa607220 EAP-Message = 0x0207001d19001703010012ec5cd178e14693eab6c7177dcb10476fa43d Message-Authenticator = 0x7dabd58fc1b618aca07dc4479578cd62 modcall: entering group authorize for request 7 modcall[authorize]: module "preprocess" returns ok for request 7 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 7 modcall[authorize]: module "chap" returns noop for request 7 rlm_eap: EAP packet type response id 7 length 29 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 7 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 7 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 7 modcall: group authorize returns updated for request 7 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 7 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Proceeding to decode tunneled attributes. rlm_eap_peap: EAP type 26 rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled EAP-Message EAP-Message = 0x020700061a03 PEAP: Adding old state with 34 d8 PEAP: Sending tunneled request EAP-Message = 0x020700061a03 Freeradius-Proxied-To = 127.0.0.1 User-Name = "aweits" State = 0x34d82a6a8db2419ae09e2557fa4e23b1 modcall: entering group authorize for request 7 modcall[authorize]: module "preprocess" returns ok for request 7 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/127.0.0.1/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/127.0.0.1/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 7 modcall[authorize]: module "chap" returns noop for request 7 rlm_eap: EAP packet type response id 7 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 7 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 7 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 7 modcall: group authorize returns updated for request 7 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 7 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - mschapv2 rlm_eap: processing type mschapv2 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 7 modcall: group authenticate returns ok for request 7 Login OK: [aweits] (from client localhost port 0) modcall: entering group post-auth for request 7 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/127.0.0.1/reply-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/reply-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/127.0.0.1/reply-detail-20040816 modcall[post-auth]: module "reply_log" returns ok for request 7 modcall: group post-auth returns ok for request 7 PEAP: Got tunneled reply RADIUS code 2 EAP-Message = 0x03070004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "aweits" PEAP: Tunneled authentication was successful. rlm_eap_peap: SUCCESS modcall[authenticate]: module "eap" returns handled for request 7 modcall: group authenticate returns handled for request 7 Sending Access-Challenge of id 221 to 129.21.6.215:1812 EAP-Message = 0x010800261900170301001bdab3dcfbec96c998f674ee432002e6b07c0c7f980f332c038df68f Message-Authenticator = 0x00000000000000000000000000000000 State = 0x3156abc6533d2ef50733056b67da13de Finished request 7 Going to the next request --- Walking the entire request list --- Waking up in 5 seconds... rad_recv: Access-Request packet from host 129.21.6.215:1812, id=222, length=147 NAS-IP-Address = 129.21.6.215 NAS-Port-Type = Async User-Name = "aweits" Service-Type = Framed-User Framed-MTU = 1500 Calling-Station-Id = "00-08-0d-4c-03-37" State = 0x3156abc6533d2ef50733056b67da13de EAP-Message = 0x020800261900170301001bc298cce104f2e5fcc055087d7a49f055e173a98db67782a1c04d19 Message-Authenticator = 0x803f1d73d5b7b733618b0e77cf3ed1eb modcall: entering group authorize for request 8 modcall[authorize]: module "preprocess" returns ok for request 8 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/auth-detail-20040816 modcall[authorize]: module "auth_log" returns ok for request 8 modcall[authorize]: module "chap" returns noop for request 8 rlm_eap: EAP packet type response id 8 length 38 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 8 rlm_realm: No '@' in User-Name = "aweits", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 8 users: Matched aweits at 83 modcall[authorize]: module "files" returns ok for request 8 modcall: group authorize returns updated for request 8 rad_check_password: Found Auth-Type eap auth: type "EAP" modcall: entering group authenticate for request 8 rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Proceeding to decode tunneled attributes. rlm_eap_peap: Received EAP-TLV response. rlm_eap_peap: Tunneled data is valid. rlm_eap_peap: Success rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 8 modcall: group authenticate returns ok for request 8 Login OK: [aweits] (from client aweits-test port 0 cli 00-08-0d-4c-03-37) modcall: entering group post-auth for request 8 radius_xlat: '/project/radiusbeta/var/log/radius/radacct/129.21.6.215/reply-detail-20040816' rlm_detail: /project/radiusbeta/var/log/radius/radacct/%{Client-IP-Address}/reply-detail-%Y%m%d expands to /project/radiusbeta/var/log/radius/radacct/129.21.6.215/reply-detail-20040816 modcall[post-auth]: module "reply_log" returns ok for request 8 modcall: group post-auth returns ok for request 8 Sending Access-Accept of id 222 to 129.21.6.215:1812 MS-MPPE-Recv-Key = 0x711d6b20a2e17b61b07440cf1786f09f1e5463cef4476a85f9dce6216b524acb MS-MPPE-Send-Key = 0x9975ecb6f5f4a421c0038d62298025461dbf3967b7d93f86967b089564ef7491 EAP-Message = 0x03080004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "aweits" Finished request 8 Going to the next request Waking up in 5 seconds... --- Walking the entire request list --- Cleaning up request 0 ID 214 with timestamp 4120f9f3 Cleaning up request 1 ID 215 with timestamp 4120f9f3 Cleaning up request 2 ID 216 with timestamp 4120f9f3 Cleaning up request 3 ID 217 with timestamp 4120f9f3 Cleaning up request 4 ID 218 with timestamp 4120f9f3 Cleaning up request 5 ID 219 with timestamp 4120f9f3 Cleaning up request 6 ID 220 with timestamp 4120f9f3 Cleaning up request 7 ID 221 with timestamp 4120f9f3 Waking up in 1 seconds... --- Walking the entire request list --- Cleaning up request 8 ID 222 with timestamp 4120f9f4 Nothing to do. Sleeping until we see a request. -- Andrew W. Elble [EMAIL PROTECTED] Senior Network Engineer Rochester Institute of Technology PGP: BFAD 8461 4CCF DC95 DA2C B0EB 965B 082E 863E C912 - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html