Hi all: I have configured the radius server . I have a linksys router with wireless security as RADIUS enabled and laptop that connects to the linksys router.
whenever i try connecting to the router, i get a segmentation fault. I am pasting the output ./radiusd -X -A Starting - reading configuration files ... reread_config: reading radiusd.conf Config: including file: /usr/local/radius/etc/raddb/proxy.conf Config: including file: /usr/local/radius/etc/raddb/clients.conf Config: including file: /usr/local/radius/etc/raddb/snmp.conf Config: including file: /usr/local/radius/etc/raddb/eap.conf Config: including file: /usr/local/radius/etc/raddb/sql.conf main: prefix = "/usr/local/radius" main: localstatedir = "/usr/local/radius/var" main: logdir = "/usr/local/radius/var/log/radius" main: libdir = "/usr/local/radius/lib" main: radacctdir = "/usr/local/radius/var/log/radius/radacct" main: hostname_lookups = no main: max_request_time = 30 main: cleanup_delay = 5 main: max_requests = 1024 main: delete_blocked_requests = 0 main: port = 0 main: allow_core_dumps = no main: log_stripped_names = no main: log_file = "/usr/local/radius/var/log/radius/radius.log" main: log_auth = no main: log_auth_badpass = no main: log_auth_goodpass = no main: pidfile = "/usr/local/radius/var/run/radiusd/radiusd.pid" main: user = "(null)" main: group = "(null)" main: usercollide = no main: lower_user = "no" main: lower_pass = "no" main: nospace_user = "no" main: nospace_pass = "no" main: checkrad = "/usr/local/radius/sbin/checkrad" main: proxy_requests = yes proxy: retry_delay = 5 proxy: retry_count = 3 proxy: synchronous = no proxy: default_fallback = yes proxy: dead_time = 120 proxy: post_proxy_authorize = no proxy: wake_all_if_all_dead = no security: max_attributes = 200 security: reject_delay = 1 security: status_server = no main: debug_level = 0 read_config_files: reading dictionary read_config_files: reading naslist Using deprecated naslist file. Support for this will go away soon. read_config_files: reading clients read_config_files: reading realms radiusd: entering modules setup Module: Library search path is /usr/local/radius/lib Module: Loaded exec exec: wait = yes exec: program = "(null)" exec: input_pairs = "request" exec: output_pairs = "(null)" exec: packet_type = "(null)" rlm_exec: Wait=yes but no output defined. Did you mean output=none? Module: Instantiated exec (exec) Module: Loaded expr Module: Instantiated expr (expr) Module: Loaded PAP pap: encryption_scheme = "crypt" Module: Instantiated pap (pap) Module: Loaded CHAP Module: Instantiated chap (chap) Module: Loaded MS-CHAP mschap: use_mppe = yes mschap: require_encryption = no mschap: require_strong = no mschap: with_ntdomain_hack = no mschap: passwd = "(null)" mschap: ntlm_auth = "(null)" Module: Instantiated mschap (mschap) Module: Loaded System unix: cache = no unix: passwd = "(null)" unix: shadow = "(null)" unix: group = "(null)" unix: radwtmp = "/usr/local/radius/var/log/radius/radwtmp" unix: usegroup = no unix: cache_reload = 600 Module: Instantiated unix (unix) Module: Loaded eap eap: default_eap_type = "tls" eap: timer_expire = 60 eap: ignore_unknown_eap_types = no eap: cisco_accounting_username_bug = no rlm_eap: Loaded and initialized type md5 rlm_eap: Loaded and initialized type leap gtc: challenge = "Password: " gtc: auth_type = "PAP" rlm_eap: Loaded and initialized type gtc tls: rsa_key_exchange = no tls: dh_key_exchange = yes tls: rsa_key_length = 512 tls: dh_key_length = 512 tls: verify_depth = 0 tls: CA_path = "(null)" tls: pem_file_type = yes tls: private_key_file = "/root/cer/cert-srv.pem" tls: certificate_file = "/root/cer/cert-srv.pem" tls: CA_file = "/root/cer/root.pem" tls: private_key_password = "whatever" tls: dh_file = "/usr/local/radius/etc/raddb/certs/dh" tls: random_file = "/usr/local/radius/etc/raddb/certs/random" tls: fragment_size = 1024 tls: include_length = yes tls: check_crl = no tls: check_cert_cn = "(null)" tls: cipher_list = "(null)" tls: check_cert_issuer = "(null)" rlm_eap_tls: Loading the certificate file as a chain rlm_eap: Loaded and initialized type tls mschapv2: with_ntdomain_hack = no rlm_eap: Loaded and initialized type mschapv2 Module: Instantiated eap (eap) Module: Loaded preprocess preprocess: huntgroups = "/usr/local/radius/etc/raddb/huntgroups" preprocess: hints = "/usr/local/radius/etc/raddb/hints" preprocess: with_ascend_hack = no preprocess: ascend_channels_per_line = 23 preprocess: with_ntdomain_hack = no preprocess: with_specialix_jetstream_hack = no preprocess: with_cisco_vsa_hack = no preprocess: with_alvarion_vsa_hack = no Module: Instantiated preprocess (preprocess) Module: Loaded realm realm: format = "suffix" realm: delimiter = "@" realm: ignore_default = no realm: ignore_null = no Module: Instantiated realm (suffix) Module: Loaded files files: usersfile = "/usr/local/radius/etc/raddb/users" files: acctusersfile = "/usr/local/radius/etc/raddb/acct_users" files: preproxy_usersfile = "/usr/local/radius/etc/raddb/preproxy_users" files: compat = "no" Module: Instantiated files (files) Module: Loaded Acct-Unique-Session-Id acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" Module: Instantiated acct_unique (acct_unique) Module: Loaded detail detail: detailfile = "/usr/local/radius/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (detail) Module: Loaded radutmp radutmp: filename = "/usr/local/radius/var/log/radius/radutmp" radutmp: username = "%{User-Name}" radutmp: case_sensitive = yes radutmp: check_with_nas = yes radutmp: perm = 384 radutmp: callerid = yes Module: Instantiated radutmp (radutmp) Listening on authentication *:1812 Listening on accounting *:1813 Ready to process requests. rad_recv: Access-Request packet from host 192.168.6.15:2050, id=0, length=129 User-Name = "cert-clt" NAS-IP-Address = 192.168.6.15 Called-Station-Id = "0012172a3dac" Calling-Station-Id = "0020e04d22f7" NAS-Identifier = "0012172a3dac" NAS-Port = 24 Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 EAP-Message = 0x0200000d01636572742d636c74 Message-Authenticator = 0xbceb70d19b2cc1c0dc9322fed00b080b Processing the authorize section of radiusd.conf modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 modcall[authorize]: module "mschap" returns noop for request 0 rlm_realm: No '@' in User-Name = "cert-clt", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 rlm_eap: EAP packet type response id 0 length 13 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 0 users: Matched entry cert-clt at line 147 modcall[authorize]: module "files" returns ok for request 0 modcall: leaving group authorize (returns updated) for request 0 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 0 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 0 modcall: leaving group authenticate (returns handled) for request 0 Sending Access-Challenge of id 0 to 192.168.6.15 port 2050 EAP-Message = 0x010100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xc74d3df792dfa42ce1d7641977a986be Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.6.15:2050, id=0, length=214 User-Name = "cert-clt" NAS-IP-Address = 192.168.6.15 Called-Station-Id = "0012172a3dac" Calling-Station-Id = "0020e04d22f7" NAS-Identifier = "0012172a3dac" NAS-Port = 24 Framed-MTU = 1400 State = 0xc74d3df792dfa42ce1d7641977a986be NAS-Port-Type = Wireless-802.11 EAP-Message = 0x020100500d800000004616030100410100003d03014655e5839870f7090875f2d03b01a78dfc08d4ff29504c0d955feed1f10d22e400001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0xb260838022a8d6cef007c044dfa525e1 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 modcall[authorize]: module "chap" returns noop for request 1 modcall[authorize]: module "mschap" returns noop for request 1 rlm_realm: No '@' in User-Name = "cert-clt", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1 rlm_eap: EAP packet type response id 1 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1 users: Matched entry cert-clt at line 147 modcall[authorize]: module "files" returns ok for request 1 modcall: leaving group authorize (returns updated) for request 1 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0615], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0093], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 1 modcall: leaving group authenticate (returns handled) for request 1 Sending Access-Challenge of id 0 to 192.168.6.15 port 2050 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x310d300b060355040a130443444143310c300a060355 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x64f32e25c5aaf8ab88d7a8e3848c6bc1 Finished request 1 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.6.15:2050, id=0, length=140 User-Name = "cert-clt" NAS-IP-Address = 192.168.6.15 Called-Station-Id = "0012172a3dac" Calling-Station-Id = "0020e04d22f7" NAS-Identifier = "0012172a3dac" NAS-Port = 24 Framed-MTU = 1400 State = 0x64f32e25c5aaf8ab88d7a8e3848c6bc1 NAS-Port-Type = Wireless-802.11 EAP-Message = 0x020200060d00 Message-Authenticator = 0x4e5b8e387844bf4783e884f01df16133 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 2 modcall[authorize]: module "preprocess" returns ok for request 2 modcall[authorize]: module "chap" returns noop for request 2 modcall[authorize]: module "mschap" returns noop for request 2 rlm_realm: No '@' in User-Name = "cert-clt", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 2 rlm_eap: EAP packet type response id 2 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 2 users: Matched entry cert-clt at line 147 modcall[authorize]: module "files" returns ok for request 2 modcall: leaving group authorize (returns updated) for request 2 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 2 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 2 modcall: leaving group authenticate (returns handled) for request 2 Sending Access-Challenge of id 0 to 192.168.6.15 port 2050 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x72616a616b74616340636461632e696e0e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4542b69e6b6fe472b3d3967cc1157fde Finished request 2 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.6.15:2050, id=0, length=1140 User-Name = "cert-clt" NAS-IP-Address = 192.168.6.15 Called-Station-Id = "0012172a3dac" Calling-Station-Id = "0020e04d22f7" NAS-Identifier = "0012172a3dac" NAS-Port = 24 Framed-MTU = 1400 State = 0x4542b69e6b6fe472b3d3967cc1157fde NAS-Port-Type = Wireless-802.11 EAP-Message = 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 EAP-Message = 0x7368747261310d300b060355040a130443444143310c300a060355040a1303534d55310d300b060355040b13044e4953473111300f06035504031308636572742d636c743120301e06092a864886f70d01090116117072616a616b74616340636461632e696e30819f300d06092a864886f70d010101050003818d0030818902818100bca99f739541ff5508930cdac4b928611acf16bbc153a5fd10ddd735468d3f8a633566a1c059b807aacfbf5d112d1abfaa5e4834245f04cc818e20442306909c3f16b0b4ae404493281ed2509083a6465704eec6036e6566270dffea047e9207ac7681f2ca70164aa0a2a014d96a439112b3f7877cfa1297a306 EAP-Message = 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 EAP-Message = 0x7986d161dcc789f90d05c6658bebcede0478701a9087b51f6caccffa970d358176534234c00472e5a9b24815972b7237d166d01d9b31cba5ab108398ce75d6730f00008200805b3c0af06040fc3b45ec57da589accc861eb1107a14a06e6d7b4e82676ac0529d4abf0c1894acd49e93406a5bde637a1eb5645e0faae07c60ff356cbd82ccdae1d967bd71885bed3231152adcf34f9d615e0b4bd07d076ae1e8b35be79ac768b02f5808f9268141921b4508e24f6b88252b9a63cbafa02845d796cef1e353f7e140301000101160301002035cb33f611aece26c4acad92877fd3d1d7e95621cc6a3855fb20b3f527ed4e51 Message-Authenticator = 0xdb211f26cce1b1207536c932978decea Processing the authorize section of radiusd.conf modcall: entering group authorize for request 3 modcall[authorize]: module "preprocess" returns ok for request 3 modcall[authorize]: module "chap" returns noop for request 3 modcall[authorize]: module "mschap" returns noop for request 3 rlm_realm: No '@' in User-Name = "cert-clt", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 3 rlm_eap: EAP packet type response id 3 length 253 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 3 users: Matched entry cert-clt at line 147 modcall[authorize]: module "files" returns ok for request 3 modcall: leaving group authorize (returns updated) for request 3 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 3 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 02a2], Certificate chain-depth=1, error=0 --> User-Name = cert-clt --> BUF-Name = praju --> subject = /C=IN/ST=Maharashtra/O=CDAC/O=SMU/OU=NISG/CN=praju/[EMAIL PROTECTED] --> issuer = /C=IN/ST=Maharashtra/O=CDAC/O=SMU/OU=NISG/CN=praju/[EMAIL PROTECTED] --> verify return:1 chain-depth=0, error=0 --> User-Name = cert-clt --> BUF-Name = cert-clt --> subject = /C=IN/ST=Maharashtra/O=CDAC/O=SMU/OU=NISG/CN=cert-clt/[EMAIL PROTECTED] --> issuer = /C=IN/ST=Maharashtra/O=CDAC/O=SMU/OU=NISG/CN=praju/[EMAIL PROTECTED] --> verify return:1 TLS_accept: SSLv3 read client certificate A rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange Segmentation fault I just cannot figure out where exactly its getting stuck. Thank you Prajakta Choudhari __________________________________________________________ Yahoo! India Answers: Share what you know. Learn something new http://in.answers.yahoo.com/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html