I've been to that site and looked around before as well as countless Google searches. The only thing remotely close to my issue is the certificate and windows XP issue. I rebuilt my environment and this time used the sample certs that according to the readme, are created with the correct attributes when the freeradius -X debug mode is enabled.
This is my error that I get most of the time, segmentation fault rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=163, length=69 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x020000090173657468 Message-Authenticator = 0xbc17ddf7a88642004721cbce9340ac69 # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 0 length 9 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this. ++[pap] returns noop Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] EAP Identity [eap] processing type tls [tls] Initiate [tls] Start returned 1 ++[eap] returns handled Sending Access-Challenge of id 163 to 172.16.0.5 port 50001 EAP-Message = 0x010100061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb3f7fb74b3f6e22ff520fc1c1d318d6d Finished request 0. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=164, length=294 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x020100d8190016030100cd010000c9030150aa6d36e34704b816ecbf8ba93a0a218168c856 300e80f647154d9f91e5250700005cc014c00a0039003800880087c00fc00500350084c012c0 0800160013c00dc003000ac013c00900330032009a009900450044c00ec004002f0096004100 07c011c007c00cc002000500040015001200090014001100080006000300ff01000044000b00 0403000102000a00340032000100020003000400050006000700080009000a000b000c000d00 0e000f001000110012001300140015001600170018001900230000 Message-Authenticator = 0x8eb56515952e384336bc5ae2817cf375 State = 0xb3f7fb74b3f6e22ff520fc1c1d318d6d # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 1 length 216 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] (other): before/accept initialization [peap] TLS_accept: before/accept initialization [peap] <<< TLS 1.0 Handshake [length 00cd], ClientHello [peap] TLS_accept: SSLv3 read client hello A [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello [peap] TLS_accept: SSLv3 write server hello A [peap] >>> TLS 1.0 Handshake [length 02b4], Certificate [peap] TLS_accept: SSLv3 write certificate A [peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange [peap] TLS_accept: SSLv3 write key exchange A [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone [peap] TLS_accept: SSLv3 write server done A [peap] TLS_accept: SSLv3 flush data [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 164 to 172.16.0.5 port 50001 EAP-Message = 0x0102040019c00000050a16030100310200002d030150aa6d2183ad3f781358ecb038c84aa5 3d8ecdbaae608ee5fb06a14cbe534e7a000039000005ff0100010016030102b40b0002b00002 ad0002aa308202a63082018e020900ec3ae1766fcc1e58300d06092a864886f70d0101050500 3015311330110603550403130a46524545524144495553301e170d3132313131393132333234 365a170d3232313131373132333234365a3015311330110603550403130a4652454552414449 555330820122300d06092a864886f70d01010105000382010f003082010a0282010100ad2f22 a51811df31b40221b1c484460547f03549615668c1c9925ed33a EAP-Message = 0xc57811b046051eb5a8c3e8d5439e955d098320136f13d98d7be0d4681a9259b07cb65ff88c d05bfb0ee0ffc6896c506f3094dca3194c84cdc8ca0868a40dbc9f952ed4302303cd014a6333 4a3ef77d403245cc68c701809a26fb4e1e2f14b4855e75f2163a67693cc92ba0de98abd49e3a 57ba78c6be7afd6de760fcd2ac492ef2cde96961440e06af7ea294f16a00133a9daa4ceadb43 2a543340fcc35ebe2c153f128220380ab9495928eb792aac36367d2438ad7b5a6422efa0f9b7 80481ff5dce1161c17df10ae0460debaf6e7dd19de58510dba5807897b4590dd49f5f2074fb1 0203010001300d06092a864886f70d010105050003820101006f EAP-Message = 0x0f28b6c3f62e6ff85a23bc18537b888884499b4804bc075330eeeadf52814d0a6bf66e6486 f0c0aee368b8b832ae7e25998d3bea7588de8db72a36072b5d6655810b9c44e31c37357530df 6a7806c1d0fef5998c53b4dcc651cd32c6389361bf2fb4171432a9b353c2aaa767bd47ab9046 c2b349d4abab2c1358ec711687e1abfa000904df25baebdf4a3bf314a35e49dd3886e2078140 c3897425d1df13c244d32bf35d7ba7a0dcfc52583b62492e4c2f24dc5c0c895587975ba59d41 9836c9b444b33ee8c3a705b2fa42abcb1e558731ef77da6dcd41e01641cdab1b5896dff9f3f5 2da01680f0b2a463a3d153ea8dd12603093db20314a36da34c66 EAP-Message = 0x9ee1160301020d0c00020900809a9e58f82faf6e17e7ba9255156a584b7719f94b9fb5c434 222600ed1d577c73555bf5da1862faa858342f92c09c11939e07d568f9d6e6de29ad61711040 04316d4b294d479e940e83115b7ff42946a073ffb68f390c21a818ed3f30655f3a797836139b 16045513ab4274a64e1bc89e55dc8b001f9ea450f428e1790844b2d3000102008049ad739880 e60cd5ab6cbfb975e09c7be684be43e60ca36bea77b864a676aeaf0b1a7d0735442b2e4cf9e4 ab09db8e571436d50c07755af1f1fdf2f2f26ea48ec68ea3bbf03341079c7e4be60a920838b6 59371aaa0b0eddde3071c434048106856c487571bdb60c8daacd EAP-Message = 0xeea8af6be108602a972da786 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb3f7fb74b2f5e22ff520fc1c1d318d6d Finished request 1. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=165, length=84 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x020200061900 Message-Authenticator = 0xda9c475758c7e807e5258014a244ebc0 State = 0xb3f7fb74b2f5e22ff520fc1c1d318d6d # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 2 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake fragment handler [peap] eaptls_verify returned 1 [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 165 to 172.16.0.5 port 50001 EAP-Message = 0x0103011a1900933f108371577c78a801000c1860fa6efc03a1a3e8a32626f84bc2ae2546c8 1f310d24a501c85e20dca446334a853b6362810a97c1448258628f25dfb7d26d1343c139b14c 000fc5d8a6ab9297a022dd6187a99e2459ff68ee85d0207091ba50f4dfd7b6be7ec7f12c04dc caacbdb0da838456d46c0590c7861f786643cf7162f5a37c5f1a206f6bec3b09f5e9f815f435 66253f39feb1efd37f50678c9c91b898f5eff1e34ce36b578d342a5cd70d45a7c43f8e166ed2 af85cd905dbaeaf34c39fb7c68cc4510a9326bdcb4b5b043ea143a0ce70b6ac5c451701eadc9 43cf2f646258a1367367a2aed101650e201ae76588b345cb9a7d EAP-Message = 0xe838bb5b00d5f6336bb64efa1a7c23de45225a2b16030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb3f7fb74b1f4e22ff520fc1c1d318d6d Finished request 2. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=166, length=282 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x020300cc190016030100861000008200805019c0695be0e54a719c0242ef0aace901421719 825c01f28d1d4f081451e0bfe6cb42c8d454eba6fd94c1c6e846ccf81059cce89960000a0c7f fffece9b16e0059cf5c6d0f0db0e11fe56010957b6d21f45a8fb7b8035a281bb9c9abfef1c60 e34542f3cab9d30a61749bc4bb60a4dd11fe8f415089f5b5362dea5c3ec5245e140301000101 1603010030ee97b56ff364cd0b1c7cee916614ba9e8737b23efd37470c47faeca770d34b592c 07d3b723dc135fcff01fc5c6fd863a Message-Authenticator = 0x3b338d63e94f7486a21cc273de803835 State = 0xb3f7fb74b1f4e22ff520fc1c1d318d6d # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 3 length 204 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange [peap] TLS_accept: SSLv3 read client key exchange A [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] [peap] <<< TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 read finished A [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] [peap] TLS_accept: SSLv3 write change cipher spec A [peap] >>> TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 write finished A [peap] TLS_accept: SSLv3 flush data [peap] (other): SSL negotiation finished successfully SSL Connection Established [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled Sending Access-Challenge of id 166 to 172.16.0.5 port 50001 EAP-Message = 0x010400411900140301000101160301003043c4e00f2601293467b6fb58f047ef50ee7dde9f f4b97b7a8e86954b458914794445b936597275f225b4719401ed1b36 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb3f7fb74b0f3e22ff520fc1c1d318d6d Finished request 3. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=167, length=84 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x020400061900 Message-Authenticator = 0xab23e1b9844cfa58d3307f9ebc20385d State = 0xb3f7fb74b0f3e22ff520fc1c1d318d6d # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 4 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake is finished [peap] eaptls_verify returned 3 [peap] eaptls_process returned 3 [peap] EAPTLS_SUCCESS [peap] Session established. Decoding tunneled attributes. [peap] Peap state TUNNEL ESTABLISHED ++[eap] returns handled Sending Access-Challenge of id 167 to 172.16.0.5 port 50001 EAP-Message = 0x0105002b19001703010020c710eafcfd876aa9316fcc41e5e905f791a021460fe3850a7e99 28d6cfa8305b Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb3f7fb74b7f2e22ff520fc1c1d318d6d Finished request 4. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=168, length=158 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x02050050190017030100202c5ac8e99adca13b1a6c098ea6dc0cb178d151dfc43cdf970544 c3e2e9e3b1ec170301002015109a5fcbcd44cbca1dd5dd6673304998bd2492a440c94848652e 2f1a035e9c Message-Authenticator = 0x213122e61bf7a8bc3e6bff3be796d62f State = 0xb3f7fb74b7f2e22ff520fc1c1d318d6d # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 5 length 80 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state WAITING FOR INNER IDENTITY [peap] Identity - seth [peap] Got inner identity 'seth' [peap] Setting default EAP type for tunneled EAP session. [peap] Got tunneled request EAP-Message = 0x020500090173657468 server { PEAP: Setting User-Name to seth Sending tunneled request EAP-Message = 0x020500090173657468 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "seth" Calling-Station-Id = "0000005e5578" NAS-IP-Address = 172.16.0.5 server inner-tunnel { # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel +- entering group authorize {...} ++[chap] returns noop ++[mschap] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[control] returns noop [eap] EAP packet type response id 5 length 9 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated [files] users: Matched entry DEFAULT at line 2 ++[files] returns ok ++[expiration] returns noop ++[logintime] returns noop ++[pap] returns noop } # server inner-tunnel [peap] Got tunneled reply code 0 PEAP: Calling authenticate in order to initiate tunneled EAP session. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel +- entering group authenticate {...} [eap] EAP Identity [eap] processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge ++[eap] returns handled PEAP: Cancelling proxy to realm Safeword until the tunneled EAP session has been established [peap] Got tunneled reply RADIUS code 11 EAP-Message = 0x0106001e1a01060019107aeaed2dcb79f4fb0ee4cdb4dc8d670673657468 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x69fe80c169f89a9253f2ef21c2e94100 [peap] Got tunneled Access-Challenge ++[eap] returns handled Sending Access-Challenge of id 168 to 172.16.0.5 port 50001 EAP-Message = 0x0106003b190017030100308bc2f072cb4578e12d618bb6e2a69569b23eda4f9faa20ef5422 ba59802274a06ccc253658006784b09cb70a2c8aaa4c Message-Authenticator = 0x00000000000000000000000000000000 State = 0xb3f7fb74b6f1e22ff520fc1c1d318d6d Finished request 5. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=169, length=206 User-Name = "seth" Calling-Station-Id = "0000005e5578" EAP-Message = 0x020600801900170301002015bf4b731b9f75694b700d2ea5ea707c6de1cc4e6e54bfd9ccda 2482d5a6baa2170301005067f8a3546cb54746390681b138e7b238e2a9d55db4953363c729ef 946bf26d8be2406ab290dfd965ee9e18d6bc1d42d9b433675817b5c34958f22b142fc17b2c7a 8e637482fd2a2d0878226c5b9303a1 Message-Authenticator = 0xc83ab7bcbdc56f1cc6c953dd563e473f State = 0xb3f7fb74b6f1e22ff520fc1c1d318d6d # Executing section authorize from file /etc/freeradius/sites-enabled/default +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop ++[digest] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] EAP packet type response id 6 length 128 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /etc/freeradius/sites-enabled/default +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state phase2 [peap] EAP type mschapv2 [peap] Got tunneled request EAP-Message = 0x0206003f1a0206003a3190378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292 e609cc06712699b8aa934a67af0fe4041f8280bde30073657468 server { PEAP: Setting User-Name to seth Sending tunneled request EAP-Message = 0x0206003f1a0206003a3190378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292 e609cc06712699b8aa934a67af0fe4041f8280bde30073657468 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "seth" State = 0x69fe80c169f89a9253f2ef21c2e94100 Calling-Station-Id = "0000005e5578" NAS-IP-Address = 172.16.0.5 server inner-tunnel { # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel +- entering group authorize {...} ++[chap] returns noop ++[mschap] returns noop [suffix] No '@' in User-Name = "seth", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[control] returns noop [eap] EAP packet type response id 6 length 63 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated [files] users: Matched entry DEFAULT at line 2 ++[files] returns ok ++[expiration] returns noop ++[logintime] returns noop ++[pap] returns noop } # server inner-tunnel [peap] Got tunneled reply code 0 PEAP: Calling authenticate in order to initiate tunneled EAP session. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/mschapv2 [eap] processing type mschapv2 [eap] Not-EAP proxy set. Not composing EAP ++[eap] returns handled PEAP: Tunneled authentication will be proxied to Safeword PEAP: Remembering to do EAP-MS-CHAP-V2 post-proxy. [eap] Tunneled session will be proxied. Not doing EAP. ++[eap] returns handled WARNING: Empty pre-proxy section. Using default return values. Sending Access-Request of id 169 to 172.16.0.15 port 1812 User-Name = "seth" Calling-Station-Id = "0000005e5578" NAS-IP-Address = 172.16.0.5 MS-CHAP-Challenge = 0x7aeaed2dcb79f4fb0ee4cdb4dc8d6706 MS-CHAP2-Response = 0x066590378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292e609cc06712699b8 aa934a67af0fe4041f8280bde3 Proxy-State = 0x313639 Proxying request 6 to home server 172.16.0.15 port 1812 Sending Access-Request of id 169 to 172.16.0.15 port 1812 User-Name = "seth" Calling-Station-Id = "0000005e5578" NAS-IP-Address = 172.16.0.5 MS-CHAP-Challenge = 0x7aeaed2dcb79f4fb0ee4cdb4dc8d6706 MS-CHAP2-Response = 0x066590378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292e609cc06712699b8 aa934a67af0fe4041f8280bde3 Proxy-State = 0x313639 Going to the next request Waking up in 0.9 seconds. rad_recv: Access-Accept packet from host 172.16.0.15 port 1812, id=169, length=230 Proxy-State = 0x313639 Framed-Protocol = PPP Service-Type = Framed-User Class = 0xce510b870000013700010200ac10000f00000000c1f0b6db791d9ba301cdc5f9ffdd9c5000 00000000000016 MS-MPPE-Recv-Key = 0xd4fda3950a54e46e9f1d2100f5fd2849 MS-MPPE-Send-Key = 0xe32328a8112e1ff06f5dba33df953287 MS-CHAP2-Success = 0x06533d46443130454631324241314635313645354433383831304430423639384344433645 453141383734 MS-CHAP-Domain = "\006SKL" # Executing section post-proxy from file /etc/freeradius/sites-enabled/default +- entering group post-proxy {...} [eap] Doing post-proxy callback [eap] Passing reply from proxy back into the tunnel. server inner-tunnel { [eap] Passing reply back for EAP-MS-CHAP-V2 # Executing section post-proxy from file /etc/freeradius/sites-enabled/inner-tunnel +- entering group post-proxy {...} ++[eap] returns noop WARNING: Empty post-auth section. Using default return values. # Executing section post-auth from file /etc/freeradius/sites-enabled/inner-tunnel } # server inner-tunnel [eap] Final reply from tunneled session code 2 Proxy-State = 0x313639 Framed-Protocol = PPP Service-Type = Framed-User Class = 0xce510b870000013700010200ac10000f00000000c1f0b6db791d9ba301cdc5f9ffdd9c5000 00000000000016 MS-MPPE-Recv-Key = 0xd4fda3950a54e46e9f1d2100f5fd2849 MS-MPPE-Send-Key = 0xe32328a8112e1ff06f5dba33df953287 MS-CHAP2-Success = 0x06533d46443130454631324241314635313645354433383831304430423639384344433645 453141383734 MS-CHAP-Domain = "\006SKL" [eap] Got reply 2 Segmentation fault -----Original Message----- From: freeradius-users-bounces+sethklampman=gmail....@lists.freeradius.org [mailto:freeradius-users-bounces+sethklampman=gmail....@lists.freeradius.org ] On Behalf Of Alan DeKok Sent: Monday, November 19, 2012 12:17 PM To: FreeRadius users mailing list Subject: Re: Proxying PEAP/MSCHAPv2 to NPS errors Seth Lampman wrote: > It's a VM and my third one I have created so I am not sure it would be > the memory? I am currently using Ubuntu would trying another OS be of any help? > > I don't always get the mutex, 99% of the time I get segmentation fault. > > Where do I find docs/bugs? Forgive the noob question but I have > looked all over and cant seem to find anything It's in the distribution "tar" file. See also https://github.com/FreeRADIUS/freeradius-server You can wander through the files there. Alan DeKok. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html