hello
I change in the file eap.conf
"Joel"         User-Password =="test1"
                 Service-Type = Framed-User,
                 Tunnel-type = VLAN,
                 Tunnel-Private-Group-ID =4,
                 Tunnel-Medium-Type =IEEE-802
and i import the server certificate into XP machine, but no thing change
i have this

rad_recv: Access-Request packet from host 145.238.3.182:1026, id=72, length=218
       Framed-MTU = 1480
       NAS-IP-Address = 145.238.3.182
       NAS-Identifier = "sw-test-radius-1"
       User-Name = "Depart SIO"
       Service-Type = Framed-User
       Framed-Protocol = PPP
       NAS-Port = 17
       NAS-Port-Type = Ethernet
       NAS-Port-Id = "17"
       Called-Station-Id = "00-14-38-fe-12-00"
       Calling-Station-Id = "00-12-3f-0e-99-6f"
       Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
       Tunnel-Type:0 = VLAN
       Tunnel-Medium-Type:0 = IEEE-802
       Tunnel-Private-Group-Id:0 = "301"
       EAP-Message = 0x0201000f014465706172742053494f
       Message-Authenticator = 0x7a8ea75b4842fe10bae927cbd5938736
 Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
 modcall[authorize]: module "preprocess" returns ok for request 0
 modcall[authorize]: module "chap" returns noop for request 0
 rlm_eap: EAP packet type response id 1 length 15
 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 modcall[authorize]: module "eap" returns updated for request 0
 modcall[authorize]: module "files" returns notfound for request 0
modcall: group authorize returns updated for request 0
 rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
 Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
 rlm_eap: EAP Identity
 rlm_eap: processing type tls
rlm_eap_tls: Requiring client certificate
 rlm_eap_tls: Initiate
 rlm_eap_tls: Start returned 1
 modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 72 to 145.238.3.182:1026
       EAP-Message = 0x010200060d20
       Message-Authenticator = 0x00000000000000000000000000000000
       State = 0xcdf6077af2991a10f3dcce70a2079b56
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 145.238.3.182:1026, id=73, length=227
       Framed-MTU = 1480
       NAS-IP-Address = 145.238.3.182
       NAS-Identifier = "sw-test-radius-1"
       User-Name = "Depart SIO"
       Service-Type = Framed-User
       Framed-Protocol = PPP
       NAS-Port = 17
       NAS-Port-Type = Ethernet
       NAS-Port-Id = "17"
       Called-Station-Id = "00-14-38-fe-12-00"
       Calling-Station-Id = "00-12-3f-0e-99-6f"
       Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
       Tunnel-Type:0 = VLAN
       Tunnel-Medium-Type:0 = IEEE-802
       Tunnel-Private-Group-Id:0 = "301"
       State = 0xcdf6077af2991a10f3dcce70a2079b56
       EAP-Message = 0x020200060315
       Message-Authenticator = 0x403441cb8421954cc3fa9f209d5babda
 Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
 modcall[authorize]: module "preprocess" returns ok for request 1
 modcall[authorize]: module "chap" returns noop for request 1
 rlm_eap: EAP packet type response id 2 length 6
 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 modcall[authorize]: module "eap" returns updated for request 1
 modcall[authorize]: module "files" returns notfound for request 1
modcall: group authorize returns updated for request 1
 rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
 Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
 rlm_eap: Request found, released from the list
 rlm_eap: EAP NAK
rlm_eap: EAP-NAK asked for EAP-Type/ttls
 rlm_eap: processing type tls
 rlm_eap_tls: Initiate
 rlm_eap_tls: Start returned 1
 modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 73 to 145.238.3.182:1026
       EAP-Message = 0x010300061520
       Message-Authenticator = 0x00000000000000000000000000000000
       State = 0xe6557140b1158bfa1f382cdbf7eca379
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 145.238.3.182:1026, id=74, length=281
       Framed-MTU = 1480
       NAS-IP-Address = 145.238.3.182
       NAS-Identifier = "sw-test-radius-1"
       User-Name = "Depart SIO"
       Service-Type = Framed-User
       Framed-Protocol = PPP
       NAS-Port = 17
       NAS-Port-Type = Ethernet
       NAS-Port-Id = "17"
       Called-Station-Id = "00-14-38-fe-12-00"
       Calling-Station-Id = "00-12-3f-0e-99-6f"
       Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
       Tunnel-Type:0 = VLAN
       Tunnel-Medium-Type:0 = IEEE-802
       Tunnel-Private-Group-Id:0 = "301"
       State = 0xe6557140b1158bfa1f382cdbf7eca379
EAP-Message = 0x0203003c158000000032160301002d010000290301ac74754322b496748f717bf26308a8accb53e372298ccd1f19cfd859e0e68ff6000002000a0100
       Message-Authenticator = 0x2c994f449b1411929a2539087643be40
 Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
 modcall[authorize]: module "preprocess" returns ok for request 2
 modcall[authorize]: module "chap" returns noop for request 2
 rlm_eap: EAP packet type response id 3 length 60
 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 modcall[authorize]: module "eap" returns updated for request 2
 modcall[authorize]: module "files" returns notfound for request 2
modcall: group authorize returns updated for request 2
 rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
 Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
 rlm_eap: Request found, released from the list
 rlm_eap: EAP/ttls
 rlm_eap: processing type ttls
 rlm_eap_ttls: Authenticate
 rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
 eaptls_verify returned 11
   (other): before/accept initialization
   TLS_accept: before/accept initialization
 rlm_eap_tls: <<< TLS 1.0 Handshake [length 002d], ClientHello
   TLS_accept: SSLv3 read client hello A
 rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
   TLS_accept: SSLv3 write server hello A
 rlm_eap_tls: >>> TLS 1.0 Handshake [length 0627], Certificate
   TLS_accept: SSLv3 write certificate A
 rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
   TLS_accept: SSLv3 write server done A
   TLS_accept: SSLv3 flush data
   TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
 eaptls_process returned 13
 modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 74 to 145.238.3.182:1026
EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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
       EAP-Message = 0x30110603550408130a536f6d652d5374617465310f30
       Message-Authenticator = 0x00000000000000000000000000000000
       State = 0x239fe38da9cd2a2a12eb8141fcd98d71
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 145.238.3.182:1026, id=75, length=227
       Framed-MTU = 1480
       NAS-IP-Address = 145.238.3.182
       NAS-Identifier = "sw-test-radius-1"
       User-Name = "Depart SIO"
       Service-Type = Framed-User
       Framed-Protocol = PPP
       NAS-Port = 17
       NAS-Port-Type = Ethernet
       NAS-Port-Id = "17"
       Called-Station-Id = "00-14-38-fe-12-00"
       Calling-Station-Id = "00-12-3f-0e-99-6f"
       Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
       Tunnel-Type:0 = VLAN
       Tunnel-Medium-Type:0 = IEEE-802
       Tunnel-Private-Group-Id:0 = "301"
       State = 0x239fe38da9cd2a2a12eb8141fcd98d71
       EAP-Message = 0x020400061500
       Message-Authenticator = 0xeadc80df077bada0c94408bd68c1094d
 Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
 modcall[authorize]: module "preprocess" returns ok for request 3
 modcall[authorize]: module "chap" returns noop for request 3
 rlm_eap: EAP packet type response id 4 length 6
 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 modcall[authorize]: module "eap" returns updated for request 3
 modcall[authorize]: module "files" returns notfound for request 3
modcall: group authorize returns updated for request 3
 rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
 Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
 rlm_eap: Request found, released from the list
 rlm_eap: EAP/ttls
 rlm_eap: processing type ttls
 rlm_eap_ttls: Authenticate
 rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
 rlm_eap_tls: ack handshake fragment handler
 eaptls_verify returned 1
 eaptls_process returned 13
 modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 75 to 145.238.3.182:1026
EAP-Message = 0x0105028e1580000006840d060355040713064d4555444f4e31133011060355040a130a4f4253204d4555444f4e31133011060355040b130a4465706172742053494f3121301f06092a864886f70d01090116127261636861383140686f746d61696c2e667230819f300d06092a864886f70d010101050003818d0030818902818100f2ce03feb0bbacd0c1b89ecea0621fa70d0c0dfd777f82b7da4b0c67908bdc72af35b501036b39c796fab274fe7c7098395139cd80c3def0e8ca65c3f1291a84a1f38342474758c9fa9aac36818b6626839b7f9a6673393d44940ebaea14cd662a0f5bd0487e27a29842095e7bd5309d75649205a5fad97bc41d75 EAP-Message = 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 EAP-Message = 0xf70d01010405000381810055e9fecdcd89146c84f21a7b232da59b1eee35c889d5eb07950d116f3baf9123308ea514daa6f7515e33994652f76748b981e7c5e5a00e6c5c4c03299318e812e100549970034482fef14fcaa937d71d79a6bfb4f0ce39b2bbe0f4028e1f90a2c7d1e1f6ded3df9e11af13c85fa10eaec4f6979f3010b4b5521d07e05e4a6ec916030100040e000000
       Message-Authenticator = 0x00000000000000000000000000000000
       State = 0x1ca2cda8a06565920f4cd14e5ca6b411
Finished request 3
Going to the next request
Waking up in 6 seconds...
i have :echec authentication in finish, why???

i try to put eap-tls or eap-peap but i don't know what 's my mistake??

thanks

From: <[EMAIL PROTECTED]>
Reply-To: FreeRadius users mailing list <freeradius-users@lists.freeradius.org>
To: "FreeRadius users mailing list" <freeradius-users@lists.freeradius.org>
Subject: Re: problem with eap/ttls winXP
Date: Wed, 26 Sep 2007 11:43:22 +0100

1. First thing written is eap.conf is "Do not set Auth-Type:=EAP". The
first thing you did put in your user's entry is ...

2. This applies to TTLS as well:

http://wiki.freeradius.org/index.php/FreeRADIUS_Wiki:FAQ#PEAP_or_EAP-TLS_Doesn.27t_Work_with_a_Windows_machine

If you have signed the server certificate yourself you also need to
import it onto the XP machine.

3. OK. Even if EAP part did work - where is your password???

Ivan Kalik
Kalik Informatika ISP


Dana 26/9/2007, "elhammoud rachida" <[EMAIL PROTECTED]> pi¹e:

>hello
>I try to put authentication eap/ttls with win XP, I install secureW2 TTLS,
>and i put this in my files:
>radiusd.conf
>autorize {
>        eap
>        files
>}
>authenticate {
>        Auth-Type PAP {
>                       pap
>         }
>        eap
>}
>
>eap.conf
>eap {
>        default_eap_type = ttls
>         timer_expire     = 60
>gtc {
>         auth_type = PAP
>                }
>
>tls {
>                        private_key_password = whatever
>                        private_key_file = ${raddbdir}/certs/serveur.pem
>
>                        certificate_file = ${raddbdir}/certs/serveur.pem
>                        CA_file = ${raddbdir}/certs/root.pem
>                        dh_file = ${raddbdir}/certs/dh
>                        random_file = ${raddbdir}/certs/random
>
>                        fragment_size = 1024
>
>                        include_length = yes
>}
>
>ttls {
>                        default_eap_type = gtc
>
>                        copy_request_to_tunnel = yes
>
>                        use_tunneled_reply = yes
>
>                }
>
>users
>"Joel"          Auth-Type := EAP , Calling-Station-Id =="00123f0e996f"
>                  Service-Type = Framed-User,
>                  Tunnel-type = VLAN,
>                  Tunnel-Private-Group-ID =4,
>                  Tunnel-Medium-Type =IEEE-802
>
>After start freeradius with radiusd -X -A i have this :
>
>Starting - reading configuration files ...
>reread_config:  reading radiusd.conf
>Config:   including file: /etc//raddb/proxy.conf
>Config:   including file: /etc//raddb/clients.conf
>Config:   including file: /etc//raddb/snmp.conf
>Config:   including file: /etc//raddb/eap.conf
>Config:   including file: /etc//raddb/sql.conf
>main: prefix = "/usr/local"
>main: localstatedir = "/usr/local/var"
>main: logdir = "/usr/local/var/log/radius"
>main: libdir = "/usr/local/lib"
>main: radacctdir = "/usr/local/var/log/radius/radacct"
>main: hostname_lookups = no
>main: max_request_time = 30
>main: cleanup_delay = 5
>main: max_requests = 1024
>main: delete_blocked_requests = 0
>main: port = 1812
>main: allow_core_dumps = no
>main: log_stripped_names = no
>main: log_file = "/usr/local/var/log/radius/radius.log"
>main: log_auth = no
>main: log_auth_badpass = no
>main: log_auth_goodpass = no
>main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
>main: user = "(null)"
>main: group = "(null)"
>main: usercollide = no
>main: lower_user = "no"
>main: lower_pass = "no"
>main: nospace_user = "no"
>main: nospace_pass = "no"
>main: checkrad = "/usr/local/sbin/checkrad"
>main: proxy_requests = yes
>proxy: retry_delay = 5
>proxy: retry_count = 3
>proxy: synchronous = no
>proxy: default_fallback = yes
>proxy: dead_time = 120
>proxy: post_proxy_authorize = yes
>proxy: wake_all_if_all_dead = no
>security: max_attributes = 200
>security: reject_delay = 1
>security: status_server = no
>main: debug_level = 0
>read_config_files:  reading dictionary
>read_config_files:  reading naslist
>Using deprecated naslist file.  Support for this will go away soon.
>read_config_files:  reading clients
>read_config_files:  reading realms
>radiusd:  entering modules setup
>Module: Library search path is /usr/local/lib
>Module: Loaded exec
>exec: wait = yes
>exec: program = "(null)"
>exec: input_pairs = "request"
>exec: output_pairs = "(null)"
>exec: packet_type = "(null)"
>rlm_exec: Wait=yes but no output defined. Did you mean output=none?
>Module: Instantiated exec (exec)
>Module: Loaded expr
>Module: Instantiated expr (expr)
>Module: Loaded PAP
>pap: encryption_scheme = "crypt"
>Module: Instantiated pap (pap)
>Module: Loaded CHAP
>Module: Instantiated chap (chap)
>Module: Loaded MS-CHAP
>mschap: use_mppe = yes
>mschap: require_encryption = no
>mschap: require_strong = no
>mschap: with_ntdomain_hack = no
>mschap: passwd = "(null)"
>mschap: authtype = "MS-CHAP"
>mschap: ntlm_auth = "(null)"
>Module: Instantiated mschap (mschap)
>Module: Loaded System
>unix: cache = no
>unix: passwd = "(null)"
>unix: shadow = "(null)"
>unix: group = "(null)"
>unix: radwtmp = "/usr/local/var/log/radius/radwtmp"
>unix: usegroup = no
>unix: cache_reload = 600
>Module: Instantiated unix (unix)
>Module: Loaded eap
>eap: default_eap_type = "ttls"
>eap: timer_expire = 60
>eap: ignore_unknown_eap_types = no
>eap: cisco_accounting_username_bug = no
>rlm_eap: Loaded and initialized type md5
>rlm_eap: Loaded and initialized type leap
>gtc: challenge = "Password: "
>gtc: auth_type = "PAP"
>rlm_eap: Loaded and initialized type gtc
>tls: rsa_key_exchange = no
>tls: dh_key_exchange = yes
>tls: rsa_key_length = 512
>tls: dh_key_length = 512
>tls: verify_depth = 0
>tls: CA_path = "(null)"
>tls: pem_file_type = yes
>tls: private_key_file = "/etc//raddb/certs/serveur.pem"
>tls: certificate_file = "/etc//raddb/certs/serveur.pem"
>tls: CA_file = "/etc//raddb/certs/root.pem"
>tls: private_key_password = "whatever"
>tls: dh_file = "/etc//raddb/certs/dh"
>tls: random_file = "/etc//raddb/certs/random"
>tls: fragment_size = 1024
>tls: include_length = yes
>tls: check_crl = no
>tls: check_cert_cn = "(null)"
>rlm_eap: Loaded and initialized type tls
>ttls: default_eap_type = "mschapv2"
>ttls: copy_request_to_tunnel = yes
>ttls: use_tunneled_reply = yes
>rlm_eap: Loaded and initialized type ttls
>mschapv2: with_ntdomain_hack = no
>rlm_eap: Loaded and initialized type mschapv2
>Module: Instantiated eap (eap)
>Module: Loaded preprocess
>preprocess: huntgroups = "/etc//raddb/huntgroups"
>preprocess: hints = "/etc//raddb/hints"
>preprocess: with_ascend_hack = no
>preprocess: ascend_channels_per_line = 23
>preprocess: with_ntdomain_hack = no
>preprocess: with_specialix_jetstream_hack = no
>preprocess: with_cisco_vsa_hack = no
>Module: Instantiated preprocess (preprocess)
>Module: Loaded files
>files: usersfile = "/etc//raddb/users"
>files: acctusersfile = "/etc//raddb/acct_users"
>files: preproxy_usersfile = "/etc//raddb/preproxy_users"
>files: compat = "no"
>Module: Instantiated files (files)
>Module: Loaded Acct-Unique-Session-Id
>acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
>Client-IP-Address, NAS-Port"
>Module: Instantiated acct_unique (acct_unique)
>Module: Loaded realm
>realm: format = "suffix"
>realm: delimiter = "@"
>realm: ignore_default = no
>realm: ignore_null = no
>Module: Instantiated realm (suffix)
>Module: Loaded detail
>detail: detailfile =
>"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
>detail: detailperm = 384
>detail: dirperm = 493
>detail: locking = no
>Module: Instantiated detail (detail)
>Module: Loaded radutmp
>radutmp: filename = "/usr/local/var/log/radius/radutmp"
>radutmp: username = "%{User-Name}"
>radutmp: case_sensitive = yes
>radutmp: check_with_nas = yes
>radutmp: perm = 384
>radutmp: callerid = yes
>Module: Instantiated radutmp (radutmp)
>Listening on authentication *:1812
>Listening on accounting *:1813
>Listening on proxy *:1814
>Ready to process requests.
>rad_recv: Access-Request packet from host 145.238.3.182:1026, id=239,
>length=206
>        Framed-MTU = 1480
>        NAS-IP-Address = 145.238.3.182
>        NAS-Identifier = "sw-test-radius-1"
>        User-Name = "Joel"
>        Service-Type = Framed-User
>        Framed-Protocol = PPP
>        NAS-Port = 15
>        NAS-Port-Type = Ethernet
>        NAS-Port-Id = "15"
>        Called-Station-Id = "00-14-38-fe-12-00"
>        Calling-Station-Id = "00-12-3f-0e-99-6f"
>        Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
>        Tunnel-Type:0 = VLAN
>        Tunnel-Medium-Type:0 = IEEE-802
>        Tunnel-Private-Group-Id:0 = "301"
>        EAP-Message = 0x02010009014a6f656c
>        Message-Authenticator = 0xe987ca4236baf7af5832f2d7ac47fa3a
>  Processing the authorize section of radiusd.conf
>modcall: entering group authorize for request 0
>  modcall[authorize]: module "preprocess" returns ok for request 0
>  rlm_eap: EAP packet type response id 1 length 9
>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
>  modcall[authorize]: module "eap" returns updated for request 0
>  modcall[authorize]: module "files" returns notfound for request 0
>modcall: group authorize returns updated for request 0
>  rad_check_password:  Found Auth-Type EAP
>auth: type "EAP"
>  Processing the authenticate section of radiusd.conf
>modcall: entering group authenticate for request 0
>  rlm_eap: EAP Identity
>  rlm_eap: processing type tls
>  rlm_eap_tls: Initiate
>  rlm_eap_tls: Start returned 1
>  modcall[authenticate]: module "eap" returns handled for request 0
>modcall: group authenticate returns handled for request 0
>Sending Access-Challenge of id 239 to 145.238.3.182:1026
>        EAP-Message = 0x010200061520
>        Message-Authenticator = 0x00000000000000000000000000000000
>        State = 0x5f4f4c366e47d80bec5ce29845ad9308
>Finished request 0
>Going to the next request
>--- Walking the entire request list ---
>Waking up in 6 seconds...
>rad_recv: Access-Request packet from host 145.238.3.182:1026, id=240,
>length=275
>        Framed-MTU = 1480
>        NAS-IP-Address = 145.238.3.182
>        NAS-Identifier = "sw-test-radius-1"
>        User-Name = "Joel"
>        Service-Type = Framed-User
>        Framed-Protocol = PPP
>        NAS-Port = 15
>        NAS-Port-Type = Ethernet
>        NAS-Port-Id = "15"
>        Called-Station-Id = "00-14-38-fe-12-00"
>        Calling-Station-Id = "00-12-3f-0e-99-6f"
>        Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
>        Tunnel-Type:0 = VLAN
>        Tunnel-Medium-Type:0 = IEEE-802
>        Tunnel-Private-Group-Id:0 = "301"
>        State = 0x5f4f4c366e47d80bec5ce29845ad9308
>        EAP-Message =
>0x0202003c158000000032160301002d0100002903017c822dabc05ae9c9eac2421c1cf36eaa52c66b2b24fdb8be8662cadc1a769b95000002000a0100
>        Message-Authenticator = 0xac95333ed54c9a95b895a469e622951b
>  Processing the authorize section of radiusd.conf
>modcall: entering group authorize for request 1
>  modcall[authorize]: module "preprocess" returns ok for request 1
>  rlm_eap: EAP packet type response id 2 length 60
>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
>  modcall[authorize]: module "eap" returns updated for request 1
>  modcall[authorize]: module "files" returns notfound for request 1
>modcall: group authorize returns updated for request 1
>  rad_check_password:  Found Auth-Type EAP
>auth: type "EAP"
>  Processing the authenticate section of radiusd.conf
>modcall: entering group authenticate for request 1
>  rlm_eap: Request found, released from the list
>  rlm_eap: EAP/ttls
>  rlm_eap: processing type ttls
>  rlm_eap_ttls: Authenticate
>  rlm_eap_tls: processing TLS
>rlm_eap_tls:  Length Included
>  eaptls_verify returned 11
>    (other): before/accept initialization
>    TLS_accept: before/accept initialization
>  rlm_eap_tls: <<< TLS 1.0 Handshake [length 002d], ClientHello
>    TLS_accept: SSLv3 read client hello A
>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
>    TLS_accept: SSLv3 write server hello A
>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05ad], Certificate
>    TLS_accept: SSLv3 write certificate A
>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
>    TLS_accept: SSLv3 write server done A
>    TLS_accept: SSLv3 flush data
>    TLS_accept:error in SSLv3 read client certificate A
>In SSL Handshake Phase
>In SSL Accept mode
>  eaptls_process returned 13
>  modcall[authenticate]: module "eap" returns handled for request 1
>modcall: group authenticate returns handled for request 1
>Sending Access-Challenge of id 240 to 145.238.3.182:1026
>        EAP-Message =
>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
>        EAP-Message =
>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
>        EAP-Message =
>0xbde405d8af927ce2e0ef7f34d21d78544292a2c6cf51685e5bdba6d024a19f2eff5a9960a04d84cf2588bc8170bc282eb5afa43f6e83f4ca738f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d01010405000381810088b7bd87cc58db7e30d5a68a0483af59de1eab87934d3fdc54d5d09c0ad88d5a2eb0dc696351bd11b034f69dadd04504b50b2879a9e845ca805b1cda5563ca52047727fed85accadc1e5f7a4914432c1a4a107138bd60eae9e81e2857a78f2b233777b6b0ce8a37321dce032819fd6b6f59034cf585037488a820396d890686d0003233082031f30820288a0030201020209
>        EAP-Message =
>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
>        EAP-Message = 0x61636861383140686f746d61696c2e667230819f300d
>        Message-Authenticator = 0x00000000000000000000000000000000
>        State = 0x27e30d08b4b036fbc4c4cb4e73b755f2
>Finished request 1
>Going to the next request
>Waking up in 6 seconds...
>rad_recv: Access-Request packet from host 145.238.3.182:1026, id=241,
>length=221
>        Framed-MTU = 1480
>        NAS-IP-Address = 145.238.3.182
>        NAS-Identifier = "sw-test-radius-1"
>        User-Name = "Joel"
>        Service-Type = Framed-User
>        Framed-Protocol = PPP
>        NAS-Port = 15
>        NAS-Port-Type = Ethernet
>        NAS-Port-Id = "15"
>        Called-Station-Id = "00-14-38-fe-12-00"
>        Calling-Station-Id = "00-12-3f-0e-99-6f"
>        Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
>        Tunnel-Type:0 = VLAN
>        Tunnel-Medium-Type:0 = IEEE-802
>        Tunnel-Private-Group-Id:0 = "301"
>        State = 0x27e30d08b4b036fbc4c4cb4e73b755f2
>        EAP-Message = 0x020300061500
>        Message-Authenticator = 0x317ff3409960cc916aed1d95b1dc0c10
>  Processing the authorize section of radiusd.conf
>modcall: entering group authorize for request 2
>  modcall[authorize]: module "preprocess" returns ok for request 2
>  rlm_eap: EAP packet type response id 3 length 6
>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
>  modcall[authorize]: module "eap" returns updated for request 2
>  modcall[authorize]: module "files" returns notfound for request 2
>modcall: group authorize returns updated for request 2
>  rad_check_password:  Found Auth-Type EAP
>auth: type "EAP"
>  Processing the authenticate section of radiusd.conf
>modcall: entering group authenticate for request 2
>  rlm_eap: Request found, released from the list
>  rlm_eap: EAP/ttls
>  rlm_eap: processing type ttls
>  rlm_eap_ttls: Authenticate
>  rlm_eap_tls: processing TLS
>rlm_eap_tls: Received EAP-TLS ACK message
>  rlm_eap_tls: ack handshake fragment handler
>  eaptls_verify returned 1
>  eaptls_process returned 13
>  modcall[authenticate]: module "eap" returns handled for request 2
>modcall: group authenticate returns handled for request 2
>Sending Access-Challenge of id 241 to 145.238.3.182:1026
>        EAP-Message =
>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
>        EAP-Message =
>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
> EAP-Message = 0xb73b3e8a7155a4173dc20ead5eee0240fc16030100040e000000
>        Message-Authenticator = 0x00000000000000000000000000000000
>        State = 0x0cbaf20c360d994292155c1353603bf9
>Finished request 2
>Going to the next request
>Waking up in 6 seconds...
>--- Walking the entire request list ---
>Cleaning up request 0 ID 239 with timestamp 46fa2c36
>Cleaning up request 1 ID 240 with timestamp 46fa2c36
>Cleaning up request 2 ID 241 with timestamp 46fa2c36
>Nothing to do.  Sleeping until we see a request.
>
>why a server dont sent response to client? no access-accept no access-rejet?
>and i dont have SSL negotiation finished successfully?
>please can you help me!!!
>thanks
>
>_________________________________________________________________
>Gagnez des écrans plats avec Live.com http://www.image-addict.fr/
>
>-
>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>
>

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

_________________________________________________________________
Découvrez le Blog heroic Fantaisy d'Eragon! http://eragon-heroic-fantasy.spaces.live.com/

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to