Hi,
I downloaded the last stable version via "git".
I typed the command git clone git://git.freeradius.org/freeradius-server.git radiusd. Is that correct?

Then i installed freeradius and run radiusd but the same log of radiusd appeared. The log is at the attachment.

Dimitris Theofilatos wrote:
I downloaded the last stable version
(alandekok-freeradius-server-9434abb910292e431b635235bdf591dc99d02f9c.tar.gz)

  That's not the "stable" branch.  That's the main branch.

  Anyways... it looks like github doesn't support downloading the "tar"
file of the stable branch.

  You'll have to grab it via "git".

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=2, 
length=314
        User-Name = "{am=1}anonym...@wintegra.com"
        EAP-Message = 
0x0202007015800000006616030100610100005d030149502abe282b6324c07315e57a95bd7f42dd38d221a592206f35256651f0c31e00003600390038003500160013000a00330032002f0007006600050004006300620061001500120009006500640060001400110008000600030100
        Message-Authenticator = 0xe0ef04d2f20e8b07aeec51fef34cb796
        NAS-IP-Address = 192.168.10.3
        NAS-Port-Type = 27
        Calling-Station-Id = "\000!\000\r\302#"
        Chargeable-User-Identity = ""
        WiMAX-Release = "1.0"
        WiMAX-Accounting-Capabilities = IP-Session-Based
        WiMAX-Hotlining-Capabilities = Not-Supported
        WiMAX-Idle-Mode-Notification-Cap = Supported
        WiMAX-Available-In-Client = 3
        WiMAX-Session-Termination-Capability = Dynamic-Authorization
        WiMAX-GMT-Timezone-offset = 0
        WiMAX-BS-Id = 0x0050c21174a4
        Service-Type = Framed-User
        Framed-MTU = 2000
        State = 0xc8679e10c8658b965d7f92904f2ccae1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}anonym...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 112
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
  TLS Length 102
[ttls] Length Included
[ttls] eaptls_verify returned 11 
[ttls]     (other): before/accept initialization 
[ttls]     TLS_accept: before/accept initialization 
[ttls] <<< TLS 1.0 Handshake [length 0061], ClientHello  
[ttls]     TLS_accept: SSLv3 read client hello A 
[ttls] >>> TLS 1.0 Handshake [length 002a], ServerHello  
[ttls]     TLS_accept: SSLv3 write server hello A 
[ttls] >>> TLS 1.0 Handshake [length 085e], Certificate  
[ttls]     TLS_accept: SSLv3 write certificate A 
[ttls] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange  
[ttls]     TLS_accept: SSLv3 write key exchange A 
[ttls] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[ttls]     TLS_accept: SSLv3 write server done A 
[ttls]     TLS_accept: SSLv3 flush data 
[ttls]     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode  
[ttls] eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 2 to 192.168.10.3 port 1812
        EAP-Message = 
0x0103040015c000000aad160301002a020000260301494f71b0d7e1840b2c11c0537907839253ff87703fee9b6e25a73c254c9c73a900003900160301085e0b00085a0008570003a6308203a23082028aa003020102020101300d06092a864886f70d0101040500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479
        EAP-Message = 
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
        EAP-Message = 
0x52ef3c508cdb5dc34fdbce90de1dbaa99692cf57b5b20daf961b079b92c551699fc29de1ec1f5181470661e6e66526287e7b610152312a0ee119ce2698c4596dee1f212fdc60f702d3692711c517bdf18bee2777d30b3d3ca8647f9aa608197c84fd124cd0fe7da013587a48f7b9e577dd1b06f95949239fc7b34d6f745829f594aa69f1f9bf6508b0e3b02c23c495a18cde79d8b89577e20ce045a605adb62104b480d0da0ecedb5f60baa2952002881f060aea178510cf62cca2c3590f6597cf6d0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d010104050003820101002b040e2df5999ba1c2
        EAP-Message = 
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
        EAP-Message = 0xa73082038fa0030201020209
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc8679e10c9648b965d7f92904f2ccae1
Finished request 1.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=3, 
length=208
        User-Name = "{am=1}anonym...@wintegra.com"
        EAP-Message = 0x020300061500
        Message-Authenticator = 0xb4eba39521cf804772bf900dc62abcd6
        NAS-IP-Address = 192.168.10.3
        NAS-Port-Type = 27
        Calling-Station-Id = "\000!\000\r\302#"
        Chargeable-User-Identity = ""
        WiMAX-Release = "1.0"
        WiMAX-Accounting-Capabilities = IP-Session-Based
        WiMAX-Hotlining-Capabilities = Not-Supported
        WiMAX-Idle-Mode-Notification-Cap = Supported
        WiMAX-Available-In-Client = 3
        WiMAX-Session-Termination-Capability = Dynamic-Authorization
        WiMAX-GMT-Timezone-offset = 0
        WiMAX-BS-Id = 0x0050c21174a4
        Service-Type = Framed-User
        Framed-MTU = 2000
        State = 0xc8679e10c9648b965d7f92904f2ccae1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}anonym...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] Received TLS ACK
[ttls] ACK handshake fragment handler
[ttls] eaptls_verify returned 1 
[ttls] eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 3 to 192.168.10.3 port 1812
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0x69cd13e3e4e237ffa31077c59e4df74453a82d2c7ab7dbb6b7c9358ba17ae283556305cf19f74d28417d70fb1aa4fdd497a109f4a57c2bff0d5e71cd4f52fbd0e798f86c4ce67517bf9e18386ad005c3e8aaecd28bf9ae9dd77943c9182bbc22c0d5da17ae13d95a83ef4b79a5fff8db15443805cd8fe8658c7339a7438ca1234942acbe6818e18cbfad1433ac660d23d4c010953b0203010001a381fb3081f8301d0603551d0e04160414b96d2853fdbf215ff1a2e43488fe202fe681e70b3081c80603551d230481c03081bd8014b96d2853fdbf215ff1a2e43488fe202fe681e70ba18199a48196308193310b3009060355040613024652310f300d
        EAP-Message = 
0x060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f726974798209008b9f43743266dc35300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100798c1916acdd0ce799869fdbea587c2c6d3f72edd149791720491df9812b8553115ad75ae6ee2e9d1469a607bcaad8182710018b3ee356163748a708aea1c5f8c3afda4b159380e8a4d3ef28880c
        EAP-Message = 0xa79eefed2545c5aeba5a4fb0
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc8679e10ca638b965d7f92904f2ccae1
Finished request 2.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=4, 
length=208
        User-Name = "{am=1}anonym...@wintegra.com"
        EAP-Message = 0x020400061500
        Message-Authenticator = 0x35e1fab7fa37d487be02c71a4a5b1d99
        NAS-IP-Address = 192.168.10.3
        NAS-Port-Type = 27
        Calling-Station-Id = "\000!\000\r\302#"
        Chargeable-User-Identity = ""
        WiMAX-Release = "1.0"
        WiMAX-Accounting-Capabilities = IP-Session-Based
        WiMAX-Hotlining-Capabilities = Not-Supported
        WiMAX-Idle-Mode-Notification-Cap = Supported
        WiMAX-Available-In-Client = 3
        WiMAX-Session-Termination-Capability = Dynamic-Authorization
        WiMAX-GMT-Timezone-offset = 0
        WiMAX-BS-Id = 0x0050c21174a4
        Service-Type = Framed-User
        Framed-MTU = 2000
        State = 0xc8679e10ca638b965d7f92904f2ccae1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}anonym...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] Received TLS ACK
[ttls] ACK handshake fragment handler
[ttls] eaptls_verify returned 1 
[ttls] eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 4 to 192.168.10.3 port 1812
        EAP-Message = 
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
        EAP-Message = 
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
        EAP-Message = 
0xa49dea9c8b2d648587200e9a55195c508573501e05e783db1ca486b320e60d876fa71baeb6e7418b6f5eedc5c3d75bdfa52cae5d77304b30e1feba441723dd9002465fbb14ed80d04cf6a00f35b2ae028afd12f6d1cb6629749a75cfe3a593121e41246c352430c5b23e183c6df47322387ffe3705c29666bde8ae60077c18f406b3ea4b4203f4a8d24723e67cdf75da31451e7b26441abab7127a6efb54decd3d3b5b06a6731dd38c4b5a1c826295cab2a805b5b3148d850987ea956a3b5a59376a04e0e412382b16030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc8679e10cb628b965d7f92904f2ccae1
Finished request 3.
Going to the next request
Waking up in 4.6 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=5, 
length=410
        User-Name = "{am=1}anonym...@wintegra.com"
        EAP-Message = 
0x020500d01580000000c61603010086100000820080576ceb0f126d49a5d2ca259848c6069f4dc5eb8649012cfcf7168b69688a0cbd32bf3820eb4e375851b87d4f084fcac725695578cbcafcea395d3de0968eee53d760f14dbfa78aee8991c63002e15da5d2920ae6e83a6eac62289e1476ad04901b6afc3b025caf876923bdf9bffb839a83799db3878d76841da224cfdf25bb43140301000101160301003090d29ea4c9ce86c9254e30a226c095afd30ce3d9e7d4aa96ef1a95434f1ee06ad4869c55674d5d2cf72c50c938bab1e0
        Message-Authenticator = 0xf73a978415b5f379ce8dcf2c66c31eec
        NAS-IP-Address = 192.168.10.3
        NAS-Port-Type = 27
        Calling-Station-Id = "\000!\000\r\302#"
        Chargeable-User-Identity = ""
        WiMAX-Release = "1.0"
        WiMAX-Accounting-Capabilities = IP-Session-Based
        WiMAX-Hotlining-Capabilities = Not-Supported
        WiMAX-Idle-Mode-Notification-Cap = Supported
        WiMAX-Available-In-Client = 3
        WiMAX-Session-Termination-Capability = Dynamic-Authorization
        WiMAX-GMT-Timezone-offset = 0
        WiMAX-BS-Id = 0x0050c21174a4
        Service-Type = Framed-User
        Framed-MTU = 2000
        State = 0xc8679e10cb628b965d7f92904f2ccae1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}anonym...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 208
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
  TLS Length 198
[ttls] Length Included
[ttls] eaptls_verify returned 11 
[ttls] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
[ttls]     TLS_accept: SSLv3 read client key exchange A 
[ttls] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[ttls] <<< TLS 1.0 Handshake [length 0010], Finished  
[ttls]     TLS_accept: SSLv3 read finished A 
[ttls] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[ttls]     TLS_accept: SSLv3 write change cipher spec A 
[ttls] >>> TLS 1.0 Handshake [length 0010], Finished  
[ttls]     TLS_accept: SSLv3 write finished A 
[ttls]     TLS_accept: SSLv3 flush data 
[ttls]     (other): SSL negotiation finished successfully 
SSL Connection Established 
[ttls] eaptls_process returned 13 
++[eap] returns handled
Sending Access-Challenge of id 5 to 192.168.10.3 port 1812
        EAP-Message = 
0x0106004515800000003b1403010001011603010030e114ae16ba3bd91b739be5cb91d9d13bcf346e27d38372c1ad349ae07937a9a25b4df255179929169b1c7cbe0088dbbd
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc8679e10cc618b965d7f92904f2ccae1
Finished request 4.
Going to the next request
Waking up in 2.9 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=6, 
length=410
        User-Name = "{am=1}anonym...@wintegra.com"
        EAP-Message = 
0x020600d01500170301002094799d25d74084060b372b6d197037d42376e34d63e30f3e40b151bbff3118f317030100a0ff85bb40757aeb5acaa914541a823977951025475c8049aa83d61cac6cae070ddaa1c688bf1d7a2c76445216e7341feffc74945fe380c5133da97aa395c7a129a124be073ccb6991d4a60b91a33472be2248fab4d21f4ca7484177075dfac6b2b0a16935c6af0b48cbe2f8ad8ff3bcc977ff023e8e540bc44b3c2d3065ad491ead06d60ae5361cd546193d5729965a2f5c06cc5af25a5a0d66eb7aeb815bad49
        Message-Authenticator = 0x5a5a55ab33dfbf5a3e489e9f1740038b
        NAS-IP-Address = 192.168.10.3
        NAS-Port-Type = 27
        Calling-Station-Id = "\000!\000\r\302#"
        Chargeable-User-Identity = ""
        WiMAX-Release = "1.0"
        WiMAX-Accounting-Capabilities = IP-Session-Based
        WiMAX-Hotlining-Capabilities = Not-Supported
        WiMAX-Idle-Mode-Notification-Cap = Supported
        WiMAX-Available-In-Client = 3
        WiMAX-Session-Termination-Capability = Dynamic-Authorization
        WiMAX-GMT-Timezone-offset = 0
        WiMAX-BS-Id = 0x0050c21174a4
        Service-Type = Framed-User
        Framed-MTU = 2000
        State = 0xc8679e10cc618b965d7f92904f2ccae1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}anonym...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 208
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] eaptls_verify returned 7 
[ttls] Done initial handshake
[ttls] eaptls_process returned 7 
[ttls] Session established.  Proceeding to decode tunneled attributes.
[ttls] Got tunneled request
        User-Name = "{am=1}wi...@wintegra.com"
        MS-CHAP-Challenge = 0x8bd7e3b7c587c1f714313949173e6c47
        MS-CHAP2-Response = 
0x40008bd7e3b7c587c1f714313949173e6c470000000000000000d84b09990d4e575cdad3c65610ceb0ea4b0da2059165b89d
        FreeRADIUS-Proxied-To = 127.0.0.1
[ttls] Sending tunneled request
        User-Name = "{am=1}wi...@wintegra.com"
        MS-CHAP-Challenge = 0x8bd7e3b7c587c1f714313949173e6c47
        MS-CHAP2-Response = 
0x40008bd7e3b7c587c1f714313949173e6c470000000000000000d84b09990d4e575cdad3c65610ceb0ea4b0da2059165b89d
        FreeRADIUS-Proxied-To = 127.0.0.1
server inner-tunnel {
+- entering group authorize {...}
[mschap] Found MS-CHAP attributes.  Setting 'Auth-Type  = mschap'
++[mschap] returns ok
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}wi...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
++[control] returns noop
[eap] No EAP-Message, not doing EAP
++[eap] returns noop
[files] users: Matched entry {am=1}wi...@wintegra.com at line 98
[files]         expand: Hello, %{User-Name} -> Hello, {am=1}wi...@wintegra.com
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = MSCHAP
+- entering group MS-CHAP {...}
[mschap] Told to do MS-CHAPv2 for {am=1}wi...@wintegra.com with NT-Password
[mschap] adding MS-CHAPv2 MPPE keys
++[mschap] returns ok
} # server inner-tunnel
[ttls] Got tunneled reply code 2
        Reply-Message = "Hello, {am=1}wi...@wintegra.com"
        MS-CHAP2-Success = 
0x40533d37323930314246313830413136443631363630363233413833333642443834314246384644343136
        MS-MPPE-Recv-Key = 0xcf1398cfe07b448e9fce8ec4019075b5
        MS-MPPE-Send-Key = 0x170b55cc84e9d1d69a7688f59c74ed62
        MS-MPPE-Encryption-Policy = 0x00000001
        MS-MPPE-Encryption-Types = 0x00000006
[ttls] Got tunneled Access-Accept
[ttls] Got MS-CHAP2-Success, tunneling it to the client in a challenge.
++[eap] returns handled
Sending Access-Challenge of id 6 to 192.168.10.3 port 1812
        EAP-Message = 
0x0107005f1580000000551703010050842c9267d6817f7ff86823f8e86f72af8d8273a132f8df7644cb8ca02ffe635deece837b330d90c5d0535b7c6265350b80e2bc3dd714e26db815d20c59fafcc56c1f52a0b59b63b2255f55e9dccb750c
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc8679e10cd608b965d7f92904f2ccae1
Finished request 5.
Going to the next request
Waking up in 2.8 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=7, 
length=208
        User-Name = "{am=1}anonym...@wintegra.com"
        EAP-Message = 0x020700061500
        Message-Authenticator = 0x91722e2e82e9cd9ca7ae5594452c9413
        NAS-IP-Address = 192.168.10.3
        NAS-Port-Type = 27
        Calling-Station-Id = "\000!\000\r\302#"
        Chargeable-User-Identity = ""
        WiMAX-Release = "1.0"
        WiMAX-Accounting-Capabilities = IP-Session-Based
        WiMAX-Hotlining-Capabilities = Not-Supported
        WiMAX-Idle-Mode-Notification-Cap = Supported
        WiMAX-Available-In-Client = 3
        WiMAX-Session-Termination-Capability = Dynamic-Authorization
        WiMAX-GMT-Timezone-offset = 0
        WiMAX-BS-Id = 0x0050c21174a4
        Service-Type = Framed-User
        Framed-MTU = 2000
        State = 0xc8679e10cd608b965d7f92904f2ccae1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] Looking up realm "wintegra.com" for User-Name = 
"{am=1}anonym...@wintegra.com"
[suffix] No such realm "wintegra.com"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] Received TLS ACK
[ttls] ACK handshake is finished
[ttls] eaptls_verify returned 3 
[ttls] eaptls_process returned 3 
[eap] Freeing handler
++[eap] returns ok
+- entering group post-auth {...}
++[exec] returns noop
[wimax] MIP-RK = 
0x2670f915ed3a273f1c570b1957a9273d90b917ff1df50ddc8bbd3c52ef25d6be815eed97d18fe8b1441ee96e2fda610eb9a234425ced20c222f9e128d55218a8
[wimax] MIP-SPI = 62b39501
[wimax] WARNING: WiMAX-MN-NAI was not found in the request or in the reply.
[wimax] WARNING: We cannot calculate MN-HA keys.
[wimax] WARNING: WiMAX-IP-Technology not found in reply.
[wimax] WARNING: Not calculating MN-HA keys
++[wimax] returns updated
Sending Access-Accept of id 7 to 192.168.10.3 port 1812
        MS-MPPE-Recv-Key = 
0x0b807e1db02ccb8eabde63e0d4f7558f80c50fc6c46bf30f0697a8169a279608
        MS-MPPE-Send-Key = 
0x52964f865d141e239c4ef6e8528c3b33c0b3db0c78c7eeee565c07563c161c21
        EAP-Message = 0x03070004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "{am=1}anonym...@wintegra.com"
Finished request 6.
Going to the next request
Waking up in 2.7 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=7, 
length=208
Sending duplicate reply to client wimaxbs port 1812 - ID: 7
Sending Access-Accept of id 7 to 192.168.10.3 port 1812
Waking up in 2.3 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=7, 
length=208
Sending duplicate reply to client wimaxbs port 1812 - ID: 7
Sending Access-Accept of id 7 to 192.168.10.3 port 1812
Waking up in 1.9 seconds.
rad_recv: Access-Request packet from host 192.168.10.3 port 1812, id=7, 
length=208
Sending duplicate reply to client wimaxbs port 1812 - ID: 7
Sending Access-Accept of id 7 to 192.168.10.3 port 1812

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to