Did you verify ntlm_auth is actually working outside of FreeRADIUS? The stuff below suggests its not...
-Arran [mschap] WARNING: Deprecated conditional expansion ":-". See "man unlang" for details [mschap] WARNING: Deprecated conditional expansion ":-". See "man unlang" for details [mschap] expand: --username=%{Stripped-User-Name:-%{User-Name:-None}} -> --username=dsaw [mschap] mschap2: 12 [mschap] expand: --challenge=%{mschap:Challenge:-00} -> --challenge=236c06ebf1d2d1cf [mschap] expand: --nt-response=%{mschap:NT-Response:-00} -> --nt-response=b1e7d8a8884d8902ff74532fb08057f83298f346bab1896d [2011/08/29 01:18:16, 0, pid=2301] /SourceCache/samba/samba-235.7/samba/source/utils/ntlm_auth.c:get_winbind_domain(146) could not obtain winbind domain name! Exec-Program output: Reading winbind reply failed! (0xc0000001) Exec-Program-Wait: plaintext: Reading winbind reply failed! (0xc0000001) Exec-Program: returned: 1 [mschap] External script failed. [mschap] FAILED: MS-CHAP2-Response is incorrect ++[mschap] returns reject On 29 Aug 2011, at 10:52, DavidS wrote: > Thanks Alan > Stopped the other Server instance and of course as you not message resolved > to > > radiusd: #### Opening IP addresses and Ports #### > listen { > type = "auth" > ipaddr = * > port = 0 > } > listen { > type = "acct" > ipaddr = * > port = 0 > } > Listening on authentication address * port 1812 > Listening on accounting address * port 1813 > Listening on proxy address * port 1814 > Ready to process requests. > > However I still cant get the damn setup to Authenticate. The output during a > failed attempt to authenticate a user, to my eyes did not reveal the issue > that i need to address in eap (as you propose) or elsewhere > > Here is the output during a user attempt to authenticate - any thoughts? > (Thanks David) > > Ready to process requests. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=1, > length=136 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0x562f50d7ee215e2703a4aa2ca625ccfd > EAP-Message = 0x0202000c0164736177636572 > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 2 length 12 > [eap] No EAP Start, assuming it's an on-going EAP conversation > ++[eap] returns updated > ++[unix] returns notfound > ++[files] returns noop > rlm_opendirectory: The host 192.168.0.98 does not have an access group. > rlm_opendirectory: Could not get the user's uuid. > ++[opendirectory] returns notfound > ++[expiration] returns noop > ++[logintime] returns noop > [pap] WARNING! No "known good" password found for the user. Authentication > may fail because of this. > ++[pap] returns noop > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] EAP Identity > [eap] processing type tls > [tls] Initiate > [tls] Start returned 1 > ++[eap] returns handled > Sending Access-Challenge of id 1 to 192.168.0.98 port 1645 > EAP-Message = 0x010300061520 > Message-Authenticator = 0x00000000000000000000000000000000 > State = 0x73a410f073a70568fa17f41fc5620938 > Finished request 0. > Going to the next request > Waking up in 4.9 seconds. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=2, > length=306 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0xaa6d7f080c19541eaf62c4dc81581a09 > EAP-Message = > 0x020300a415800000009a16030100950100009103014e5b4b3e338c0281aac0bcc701f19deaac117d722a79430407804edc3f8cf6f2000056c00ac009c007c008c013c014c011c012c004c005c002c003c00ec00fc00cc00d002f000500040035000a000900030008000600320033003800390016001500140013001200110034003a0018001b001a00170019000101000012000a00080006001700180019000b00020100 > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > State = 0x73a410f073a70568fa17f41fc5620938 > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 3 length 164 > [eap] Continuing tunnel setup. > ++[eap] returns ok > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] Request found, released from the list > [eap] EAP/ttls > [eap] processing type ttls > [ttls] Authenticate > [ttls] processing EAP-TLS > TLS Length 154 > [ttls] Length Included > [ttls] eaptls_verify returned 11 > [ttls] (other): before/accept initialization > [ttls] TLS_accept: before/accept initialization > [ttls] <<< TLS 1.0 Handshake [length 0095], ClientHello > [ttls] TLS_accept: SSLv3 read client hello A > [ttls] >>> TLS 1.0 Handshake [length 002a], ServerHello > [ttls] TLS_accept: SSLv3 write server hello A > [ttls] >>> TLS 1.0 Handshake [length 0e89], Certificate > [ttls] TLS_accept: SSLv3 write certificate A > [ttls] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone > [ttls] TLS_accept: SSLv3 write server done A > [ttls] TLS_accept: SSLv3 flush data > [ttls] TLS_accept: Need to read more data: SSLv3 read client certificate > A > In SSL Handshake Phase > In SSL Accept mode > [ttls] eaptls_process returned 13 > ++[eap] returns handled > Sending Access-Challenge of id 2 to 192.168.0.98 port 1645 > EAP-Message = > 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 > EAP-Message = > 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 > EAP-Message = > 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 > EAP-Message = > 0x030106082b06010505070302300e0603551d0f0101ff0404030205a030330603551d1f042c302a3028a026a0248622687474703a2f2f63726c2e676f64616464792e636f6d2f676473312d35342e63726c304d0603551d20044630443042060b6086480186fd6d010717013033303106082b06010505070201162568747470733a2f2f63657274732e676f64616464792e636f6d2f7265706f7369746f72792f30818006082b0601050507010104743072302406082b060105050730018618687474703a2f2f6f6373702e676f64616464792e636f6d2f304a06082b06010505073002863e687474703a2f2f6365727469666963617465732e676f6461 > EAP-Message = 0x6464792e636f6d2f7265706f > Message-Authenticator = 0x00000000000000000000000000000000 > State = 0x73a410f072a00568fa17f41fc5620938 > Finished request 1. > Going to the next request > Waking up in 4.9 seconds. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=3, > length=148 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0x2db3b6c8db5fe348e4b1bd10b20c258f > EAP-Message = 0x020400061500 > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > State = 0x73a410f072a00568fa17f41fc5620938 > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 4 length 6 > [eap] Continuing tunnel setup. > ++[eap] returns ok > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] Request found, released from the list > [eap] EAP/ttls > [eap] processing type ttls > [ttls] Authenticate > [ttls] processing EAP-TLS > [ttls] Received TLS ACK > [ttls] ACK handshake fragment handler > [ttls] eaptls_verify returned 1 > [ttls] eaptls_process returned 13 > ++[eap] returns handled > Sending Access-Challenge of id 3 to 192.168.0.98 port 1645 > EAP-Message = > 0x0105040015c000000ec67369746f72792f67645f696e7465726d6564696174652e637274301f0603551d23041830168014fdac6132936c45d6e2ee855f9abae7769968cce7306b0603551d11046430628208656f31312e6e6574820c7777772e656f31312e6e65748210736c726e6173302e656f31312e6e65748212736c727377697463682e656f31312e6e6574821173657276657231302e656f31312e6e6574820f736c723837372e656f31312e6e6574301d0603551d0e0416041484060b7bc0cfea495c2307cc9f9e49060817e12c300d06092a864886f70d010105050003820101007cb821a8dcf078841ddde21e6d43bf6d5093b22229cfe913 > EAP-Message = > 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 > EAP-Message = > 0x0d06092a864886f70d01010505003063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3036313131363031353433375a170d3236313131363031353433375a3081ca310b30090603550406130255533110300e060355040813074172697a6f6e61311330110603550407130a53636f74747364616c65311a3018060355040a1311476f44616464792e636f6d2c20496e632e31333031060355040b132a687474703a2f2f6365727469 > EAP-Message = > 0x666963617465732e676f64616464792e636f6d2f7265706f7369746f72793130302e06035504031327476f204461646479205365637572652043657274696669636174696f6e20417574686f726974793111300f06035504051308303739363932383730820122300d06092a864886f70d01010105000382010f003082010a0282010100c42dd5158c9c264cec3235eb5fb859015aa66181593b7063abe3dc3dc72ab8c933d379e43aed3c3023848eb33014b6b287c33d9554049edf99dd0b251e21de65297e35a8a954ebf6f73239d4265595adeffbfe5886d79ef4008d8c2a0cbd4204cea73f04f6ee80f2aaef52a16966dabe1aad5dda2c66ea1a6b > EAP-Message = 0xbbe51a514a002f48c79875d8 > Message-Authenticator = 0x00000000000000000000000000000000 > State = 0x73a410f071a10568fa17f41fc5620938 > Finished request 2. > Going to the next request > Waking up in 4.9 seconds. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=4, > length=148 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0xb4df3ea96b26ccc933e07c8daf238f8c > EAP-Message = 0x020500061500 > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > State = 0x73a410f071a10568fa17f41fc5620938 > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 5 length 6 > [eap] Continuing tunnel setup. > ++[eap] returns ok > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] Request found, released from the list > [eap] EAP/ttls > [eap] processing type ttls > [ttls] Authenticate > [ttls] processing EAP-TLS > [ttls] Received TLS ACK > [ttls] ACK handshake fragment handler > [ttls] eaptls_verify returned 1 > [ttls] eaptls_process returned 13 > ++[eap] returns handled > Sending Access-Challenge of id 4 to 192.168.0.98 port 1645 > EAP-Message = > 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 > EAP-Message = > 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 > EAP-Message = > 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 > EAP-Message = > 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 > EAP-Message = 0x82010d003082010802820101 > Message-Authenticator = 0x00000000000000000000000000000000 > State = 0x73a410f070a20568fa17f41fc5620938 > Finished request 3. > Going to the next request > Waking up in 4.9 seconds. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=5, > length=148 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0xa82b2ec6c5b16aac04984c38b383fa96 > EAP-Message = 0x020600061500 > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > State = 0x73a410f070a20568fa17f41fc5620938 > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 6 length 6 > [eap] Continuing tunnel setup. > ++[eap] returns ok > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] Request found, released from the list > [eap] EAP/ttls > [eap] processing type ttls > [ttls] Authenticate > [ttls] processing EAP-TLS > [ttls] Received TLS ACK > [ttls] ACK handshake fragment handler > [ttls] eaptls_verify returned 1 > [ttls] eaptls_process returned 13 > ++[eap] returns handled > Sending Access-Challenge of id 5 to 192.168.0.98 port 1645 > EAP-Message = > 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 > EAP-Message = > 0x74c5f8ffb569908f8474ea971baf020103a381c03081bd301d0603551d0e04160414d2c4b0d291d44c1171b361cb3da1fedda86ad4e330818d0603551d230481853081828014d2c4b0d291d44c1171b361cb3da1fedda86ad4e3a167a4653063310b30090603550406130255533121301f060355040a131854686520476f2044616464792047726f75702c20496e632e3131302f060355040b1328476f20446164647920436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100324bf3b2ca3e91fc12c6a1078c8e77a03306145c90 > EAP-Message = > 0x1e18f708a63d0a19f98780116e69e4961730ff3491637238eecc1c01a31d9428a431f67ac454d7f6e5315803a2ccce62db944573b5bf45c924b5d58202ad2379698db8b64dcecf4cca3323e81c88aa9d8b416e16c920e5899ecd3bda70f77e992620145425ab6e7385e69b219d0a6c820ea8f8c20cfa101e6c96ef870dc40f618badee832b95f88e92847239eb20ea83ed83cd976e08bceb4e26b6732be4d3f64cfe2671e26111744aff571a870f75482ecf516917a002126195d5d140b2104ceec4ac1043a6a59e0ad595629a0dcf8882c5320ce42b9f45e60d9f289cb1b92a5a57ad370faf1d7fdbbd9f16030100040e000000 > Message-Authenticator = 0x00000000000000000000000000000000 > State = 0x73a410f077a30568fa17f41fc5620938 > Finished request 4. > Going to the next request > Waking up in 4.9 seconds. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=6, > length=480 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0x49d07e0783dcd34e743f77688134f6a0 > EAP-Message = > 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 > EAP-Message = > 0x7afa967ca838b8fcd5e02794142216fb6f234114eba1bedf14030100010116030100309ccb0a854ba537cb852bba4e829095eecc777a146367523ef7408367aa73527e251f324f277a77fd69bd8275e3fb80cf > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > State = 0x73a410f077a30568fa17f41fc5620938 > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 7 length 253 > [eap] Continuing tunnel setup. > ++[eap] returns ok > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] Request found, released from the list > [eap] EAP/ttls > [eap] processing type ttls > [ttls] Authenticate > [ttls] processing EAP-TLS > TLS Length 326 > [ttls] Length Included > [ttls] eaptls_verify returned 11 > [ttls] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange > [ttls] TLS_accept: SSLv3 read client key exchange A > [ttls] <<< TLS 1.0 ChangeCipherSpec [length 0001] > [ttls] <<< TLS 1.0 Handshake [length 0010], Finished > [ttls] TLS_accept: SSLv3 read finished A > [ttls] >>> TLS 1.0 ChangeCipherSpec [length 0001] > [ttls] TLS_accept: SSLv3 write change cipher spec A > [ttls] >>> TLS 1.0 Handshake [length 0010], Finished > [ttls] TLS_accept: SSLv3 write finished A > [ttls] TLS_accept: SSLv3 flush data > [ttls] (other): SSL negotiation finished successfully > SSL Connection Established > [ttls] eaptls_process returned 13 > ++[eap] returns handled > Sending Access-Challenge of id 6 to 192.168.0.98 port 1645 > EAP-Message = > 0x0108004515800000003b140301000101160301003008670b7dfe3518a23af339575826eb71df43b6f75c4aa3a31a63da1f37fdd335f033ed4d3abed24011738f87683cd142 > Message-Authenticator = 0x00000000000000000000000000000000 > State = 0x73a410f076ac0568fa17f41fc5620938 > Finished request 5. > Going to the next request > Waking up in 4.9 seconds. > Cleaning up request 0 ID 1 with timestamp +2511 > Cleaning up request 1 ID 2 with timestamp +2511 > Cleaning up request 2 ID 3 with timestamp +2511 > Cleaning up request 3 ID 4 with timestamp +2511 > Cleaning up request 4 ID 5 with timestamp +2511 > Cleaning up request 5 ID 6 with timestamp +2511 > Ready to process requests. > rad_recv: Access-Request packet from host 192.168.0.98 port 1645, id=7, > length=285 > User-Name = "dsawcer" > Framed-MTU = 1400 > Called-Station-Id = "0023.331c.9680" > Calling-Station-Id = "9027.e4f9.25b0" > Service-Type = Login-User > Message-Authenticator = 0x97a15db1918171fe49d55d82bda7cba4 > EAP-Message = > 0x0208008f1580000000851703010080e2d9295b14cae59129b605c441aec00a3187009bb0ed4acc791fd1db3e46a58e9523480b479075cceb0b4af41e536d8005125b4bd7c326fbb382a43ec84f0684a5370e8971afde67d795ece00c588642a7892fcf41526cc4b1e724df9aec0bf4df5cad51ac25ae1489416a68ffac146347ee2cb35435ec593275ea486d85885c > NAS-Port-Type = Wireless-802.11 > NAS-Port = 257 > NAS-Port-Id = "257" > State = 0x73a410f076ac0568fa17f41fc5620938 > NAS-IP-Address = 192.168.0.98 > NAS-Identifier = "ap1250" > +- entering group authorize {...} > ++[preprocess] returns ok > ++[chap] returns noop > ++[mschap] returns noop > [suffix] No '@' in User-Name = "dsawcer", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > [eap] EAP packet type response id 8 length 143 > [eap] Continuing tunnel setup. > ++[eap] returns ok > Found Auth-Type = EAP > +- entering group authenticate {...} > [eap] Request found, released from the list > [eap] EAP/ttls > [eap] processing type ttls > [ttls] Authenticate > [ttls] processing EAP-TLS > TLS Length 133 > [ttls] Length Included > [ttls] eaptls_verify returned 11 > [ttls] eaptls_process returned 7 > [ttls] Session established. Proceeding to decode tunneled attributes. > [ttls] Got tunneled request > User-Name = "dsaw" > MS-CHAP-Challenge = 0x123df4ae238e051b426c24389c668556 > MS-CHAP2-Response = > 0x6000312af67f4db149fc6001912cb04a532f0000000000000000b1e7d8a8884d8902ff74532fb08057f83298f346bab1896d > FreeRADIUS-Proxied-To = 127.0.0.1 > [ttls] Sending tunneled request > User-Name = "dsaw" > MS-CHAP-Challenge = 0x123df4ae238e051b426c24389c668556 > MS-CHAP2-Response = > 0x6000312af67f4db149fc6001912cb04a532f0000000000000000b1e7d8a8884d8902ff74532fb08057f83298f346bab1896d > FreeRADIUS-Proxied-To = 127.0.0.1 > server inner-tunnel { > +- entering group authorize {...} > ++[chap] returns noop > [mschap] Found MS-CHAP attributes. Setting 'Auth-Type = mschap' > ++[mschap] returns ok > ++[unix] returns notfound > [suffix] No '@' in User-Name = "dsaw", looking up realm NULL > [suffix] No such realm "NULL" > ++[suffix] returns noop > ++[control] returns noop > [eap] No EAP-Message, not doing EAP > ++[eap] returns noop > [files] users: Matched entry dsaw at line 236 > ++[files] returns ok > ++[expiration] returns noop > ++[logintime] returns noop > [pap] Found existing Auth-Type, not changing it. > ++[pap] returns noop > Found Auth-Type = MSCHAP > +- entering group MS-CHAP {...} > [mschap] Told to do MS-CHAPv2 for dsaw with NT-Password > [mschap] WARNING: Deprecated conditional expansion ":-". See "man unlang" > for details > [mschap] WARNING: Deprecated conditional expansion ":-". See "man unlang" > for details > [mschap] expand: --username=%{Stripped-User-Name:-%{User-Name:-None}} -> > --username=dsaw > [mschap] mschap2: 12 > [mschap] expand: --challenge=%{mschap:Challenge:-00} -> > --challenge=236c06ebf1d2d1cf > [mschap] expand: --nt-response=%{mschap:NT-Response:-00} -> > --nt-response=b1e7d8a8884d8902ff74532fb08057f83298f346bab1896d > [2011/08/29 01:18:16, 0, pid=2301] > /SourceCache/samba/samba-235.7/samba/source/utils/ntlm_auth.c:get_winbind_domain(146) > could not obtain winbind domain name! > Exec-Program output: Reading winbind reply failed! (0xc0000001) > Exec-Program-Wait: plaintext: Reading winbind reply failed! (0xc0000001) > Exec-Program: returned: 1 > [mschap] External script failed. > [mschap] FAILED: MS-CHAP2-Response is incorrect > ++[mschap] returns reject > Failed to authenticate the user. > } # server inner-tunnel > [ttls] Got tunneled reply code 3 > MS-CHAP-Error = "`E=691 R=1" > [ttls] Got tunneled Access-Reject > [eap] Handler failed in EAP/ttls > [eap] Failed in EAP select > ++[eap] returns invalid > Failed to authenticate the user. > Using Post-Auth-Type Reject > +- entering group REJECT {...} > [attr_filter.access_reject] expand: %{User-Name} -> dsawcer > attr_filter: Matched entry DEFAULT at line 11 > ++[attr_filter.access_reject] returns updated > Delaying reject of request 6 for 1 seconds > Going to the next request > Waking up in 0.6 seconds. > Sending delayed reject for request 6 > Sending Access-Reject of id 7 to 192.168.0.98 port 1645 > EAP-Message = 0x04080004 > Message-Authenticator = 0x00000000000000000000000000000000 > Waking up in 4.9 seconds. > Cleaning up request 6 ID 7 with timestamp +2521 > Ready to process requests. > > > -- > View this message in context: > http://freeradius.1045715.n5.nabble.com/Mac-OXS-Server-version-of-FreeRadius-Error-tp4744750p4745526.html > Sent from the FreeRadius - User mailing list archive at Nabble.com. > - > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html > Arran Cudbard-Bell a.cudba...@freeradius.org RADIUS - Half the complexity of Diameter - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html