On 3 Jul 2013, at 17:19, Ti Leggett <legg...@mcs.anl.gov> wrote:

> Ok. I'll be firing up gdb and adding more logging. Before I did that I added 
> a post_proxy detail log to see what the proxy server saw in that phase and 
> for Access-Rejected packets they never get to the post_proxy section. Not 
> sure if that sheds any more light on this.
> 
> Anyway, so I know where to focus my debugging, I want to make sure I 
> understand how a proxied packet makes its way through the system. Is the path:
> 
> authorize -> pre_proxy -> post_proxy
> 
> That's how it looks from the debug logs. Do the authenticate sections ever 
> get hit? 

That's the correct flow. 

authorize -> pre-proxy -> post-proxy -> post-auth

Arran Cudbard-Bell <a.cudba...@freeradius.org>
FreeRADIUS Development Team

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to