On 3 Jul 2013, at 17:19, Ti Leggett <legg...@mcs.anl.gov> wrote: > Ok. I'll be firing up gdb and adding more logging. Before I did that I added > a post_proxy detail log to see what the proxy server saw in that phase and > for Access-Rejected packets they never get to the post_proxy section. Not > sure if that sheds any more light on this. > > Anyway, so I know where to focus my debugging, I want to make sure I > understand how a proxied packet makes its way through the system. Is the path: > > authorize -> pre_proxy -> post_proxy > > That's how it looks from the debug logs. Do the authenticate sections ever > get hit?
That's the correct flow. authorize -> pre-proxy -> post-proxy -> post-auth Arran Cudbard-Bell <a.cudba...@freeradius.org> FreeRADIUS Development Team - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html