here is [most] of the -X -A output

  rlm_eap: EAP packet type response id 4 length 192
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
modcall: group authorize returns updated for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 0 to 127.0.0.1:1025
EAP-Message = 0x0105003119001403010001011603010020f640f17cc4d9b95c689f37535f0c167e7ef85920fa1a584ae45ca46e4e27be88
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x89c31ab5692851c1b54665f205acfdb1
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=138
        User-Name = "jboast"
        NAS-IP-Address = 127.0.0.1
        Called-Station-Id = "0014bf1c0216"
        Calling-Station-Id = "0090967ee1f9"
        NAS-Identifier = "0014bf1c0216"
        NAS-Port = 38
        Framed-MTU = 1400
        State = 0x89c31ab5692851c1b54665f205acfdb1
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020500061900
        Message-Authenticator = 0x86ad4528b700aed9bb049bed435eeb10
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  rlm_eap: EAP packet type response id 5 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3
  eaptls_process returned 3
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 0 to 127.0.0.1:1025
EAP-Message = 0x0106002019001703010015c0b9557e082a58271186f1038ce6579a67a52b2c30
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x4641f1c68dfd842fbecaa2555be47878
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=166
        User-Name = "jboast"
        NAS-IP-Address = 127.0.0.1
        Called-Station-Id = "0014bf1c0216"
        Calling-Station-Id = "0090967ee1f9"
        NAS-Identifier = "0014bf1c0216"
        NAS-Port = 38
        Framed-MTU = 1400
        State = 0x4641f1c68dfd842fbecaa2555be47878
        NAS-Port-Type = Wireless-802.11
EAP-Message = 0x0206002219001703010017c6caefa5edac16bea7db9a9ee8f16dec3d5db28d1111ef
        Message-Authenticator = 0xceffd3aede7f9a429813aa64fde5fc65
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  rlm_eap: EAP packet type response id 6 length 34
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
modcall: group authorize returns updated for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - jboast
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled identity of jboast
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to jboast
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  rlm_eap: EAP packet type response id 6 length 11
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
modcall: group authorize returns updated for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 0 to 127.0.0.1:1025
EAP-Message = 0x010700371900170301002c822385e6e9fb2b3f8f6155f76311e50bfbdb2a4d27557ae1de8893be311197d14003ff17cb0259d2b452ce2f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xb931efb43a135bd61a8d7beedcd95701
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=220
        User-Name = "jboast"
        NAS-IP-Address = 127.0.0.1
        Called-Station-Id = "0014bf1c0216"
        Calling-Station-Id = "0090967ee1f9"
        NAS-Identifier = "0014bf1c0216"
        NAS-Port = 38
        Framed-MTU = 1400
        State = 0xb931efb43a135bd61a8d7beedcd95701
        NAS-Port-Type = Wireless-802.11
EAP-Message = 0x020700581900170301004dcd9e19e4f8d3efb85c7af02264394c0effdc9df18751700ce7a51ddb927afa8d37e5e0a96c4dc4e54c62183f32aa2a9af1da58a06434e307bde2540bf10bc20fafbeefd8fbdc591c3a111133f1
        Message-Authenticator = 0x72c9d318441ce6bedfb78bff20d6ef6a
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  rlm_eap: EAP packet type response id 7 length 88
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
modcall: group authorize returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Setting User-Name to jboast
  PEAP: Adding old state with 07 73
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  rlm_eap: EAP packet type response id 7 length 65
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
modcall: group authorize returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
ERROR: Unknown value specified for Auth-Type. Cannot perform requested action.
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 7
modcall: group authenticate returns reject for request 7
auth: Failed to validate the user.
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: group authenticate returns handled for request 7
Sending Access-Challenge of id 0 to 127.0.0.1:1025
EAP-Message = 0x010800261900170301001bef481fb0682ffedaef80653a2b14e3ce38c357d2ac27693b8b5b7e
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc1d1f811200e081feb3c7e131c64e96b
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=170
        User-Name = "jboast"
        NAS-IP-Address = 127.0.0.1
        Called-Station-Id = "0014bf1c0216"
        Calling-Station-Id = "0090967ee1f9"
        NAS-Identifier = "0014bf1c0216"
        NAS-Port = 38
        Framed-MTU = 1400
        State = 0xc1d1f811200e081feb3c7e131c64e96b
        NAS-Port-Type = Wireless-802.11
EAP-Message = 0x020800261900170301001b2e1b4f233395cb709a8d40be375a07c87f3d040c139b8989f41d4e
        Message-Authenticator = 0x8e4f17e45575d244747d1f0d76b2f772
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  rlm_eap: EAP packet type response id 8 length 38
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
modcall: group authorize returns updated for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure, rejecting.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 8
modcall: group authenticate returns invalid for request 8
auth: Failed to validate the user.
Delaying request 8 for 1 seconds
Finished request 8
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 0 to 127.0.0.1:1025
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
Cleaning up request 8 ID 0 with timestamp 4404fa1e
Nothing to do.  Sleeping until we see a request.


im sure it's something simple, i've been working at it all day, i need a break, hopefully someone can help.

Thanks
Jon
- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to