It seems no response to the question that I post about  “mschapv2 not 
Working”. But I've made some progress myself and got another problem.
The winbind and ntlm problem is solved. When I copy the 
ntlm_auth statement to command line, it could successfully return a 
NT_KEY.
According to the winbindd.log, the authentication was (NT_STATUS_OK).
Unfortunately, the NT_KEY is not fed back to FR.
Would someone give me a hand by checking the log as following:
Thank you.

Chris Huang

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/raddb/proxy.conf
Config:   including file: /etc/raddb/clients.conf
Config:   including file: /etc/raddb/snmp.conf
Config:   including file: /etc/raddb/eap.conf
 main: prefix = "/usr/local/freeradius"
 main: localstatedir = "/var"
 main: logdir = "/var/log/radius"
 main: libdir = "/usr/local/freeradius/lib"
 main: radacctdir = "/var/log/radius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = yes
 main: log_file = "/var/log/radius/radius.log"
 main: log_destination = "files"
 main: log_auth = no
 main: log_auth_badpass = yes
 main: log_auth_goodpass = yes
 main: pidfile = "/var/run/radiusd/radiusd.pid"
 main: user = "(null)"
 main: group = "(null)"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/local/freeradius/sbin/checkrad"
 main: debug_level = 0
 main: proxy_requests = yes
 log: syslog_facility = "daemon"
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = no
 proxy: wake_all_if_all_dead = no
 proxy: proxy_fail_type = "(null)"
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/local/freeradius/lib
Module: Loaded exec
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded Expiration
 expiration: reply-message = "Password Has Expired  "
Module: Instantiated expiration (expiration)
Module: Loaded logintime
 logintime: reply-message = "You are calling outside your allowed 
timespan  "
 logintime: minimum-timeout = 60
Module: Instantiated logintime (logintime)
Module: Loaded MS-CHAP
 mschap: use_mppe = yes
 mschap: require_encryption = yes
 mschap: require_strong = yes
 mschap: with_ntdomain_hack = no
 mschap: passwd = "(null)"
 mschap: authtype = "MS-CHAP"
 mschap: ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%
{Stripped-User-Name:-%{User-Name:-None}} --challenge=%
{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} --
domain=CODE1"
Module: Instantiated mschap (mschap)
Module: Loaded eap
 eap: default_eap_type = "peap"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
 tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"
 tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"
 tls: private_key_password = "whatever"
 tls: dh_file = "/etc/raddb/certs/dh"
 tls: random_file = "/etc/raddb/certs/random"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = yes
 peap: use_tunneled_reply = no
 peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups = "/etc/raddb/huntgroups"
 preprocess: hints = "/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
 realm: format = "prefix"
 realm: delimiter = "\"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (ntdomain)
Module: Loaded detail
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/auth-
detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (auth_log)
Module: Loaded attr_filter
 attr_filter: attrsfile = "/etc/raddb/attrs"
 rlm_attr_filter: Authorize method will be deprecated.
Module: Instantiated attr_filter (attr_filter)
Module: Loaded DIGEST
Module: Instantiated digest (digest)
 realm: format = "prefix"
 realm: delimiter = "/"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (IPASS)
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
 files: usersfile = "/etc/raddb/users"
 files: acctusersfile = "/etc/raddb/acct_users"
 files: preproxy_usersfile = "/etc/raddb/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, 
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%
Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded System
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "(null)"
 unix: group = "(null)"
 unix: radwtmp = "/var/log/radius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded radutmp
 radutmp: filename = "/var/log/radius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/post-
proxy-detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (post_proxy_log)
Initializing the thread pool...
Listening on authentication *:1812
Listening on accounting *:1813
Listening on proxy *:1814
Ready to process requests.
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=140, length=142
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x22c51c795294d055c4673b85e9a6431f
        EAP-Message = 0x0202000d015457473030383335
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 0
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 0
  modcall[authorize]: module "attr_filter" returns noop for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
  modcall[authorize]: module "digest" returns noop for request 0
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 0
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
  rlm_eap: EAP packet type response id 2 length 13
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 0
  modcall[authorize]: module "expiration" returns noop for request 0
  modcall[authorize]: module "logintime" returns noop for request 0
modcall: group authorize returns updated for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 140 to 130.147.167.9:21668
        EAP-Message = 0x010300061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x7f5b0f9427ca84198b7c9b67d52fbca2
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=141, length=253
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x6349ead79219e4ad663d83dc5193dd5f
        EAP-Message = 
0x0203006a198000000060160301005b01000057030141c23f3fbd73b9
8b5655525b55ccf031c7d1e6adf272cc00501e9e09d19dc770000030003
90038003500160013000a00330032002f006600050004006500640063
0062006000150012000900140011000800030100
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0x7f5b0f9427ca84198b7c9b67d52fbca2
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 1
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 1
  modcall[authorize]: module "attr_filter" returns noop for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
  modcall[authorize]: module "digest" returns noop for request 1
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 1
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
  rlm_eap: EAP packet type response id 3 length 106
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 1
  modcall[authorize]: module "expiration" returns noop for request 1
  modcall[authorize]: module "logintime" returns noop for request 1
modcall: group authorize returns updated for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 005b], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0694], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 141 to 130.147.167.9:21668
        EAP-Message = 
0x0104040a19c0000006f1160301004a02000046030141c23f40334d54
25c921baba2fca3426715323b41c635ef6f5d05b6ff8b1c83b2014eeba6c
357f014a20a4e27d5aff0fc67f6645ade16062661e85f350f5569b6100350
016030106940b00069000068d0002cd308202c930820232a003020102
020102300d06092a864886f70d010104050030819f310b300906035504
06130243413111300f0603550408130850726f76696e63653112301006
035504071309536f6d65204369747931153013060355040a130c4f7267
616e697a6174696f6e31123010060355040b13096c6f63616c686f73743
11b301906035504031312436c69656e74206365
        EAP-Message = 
0x7274696669636174653121301f06092a864886f70d0109011612636c
69656e74406578616d706c652e636f6d301e170d30343031323531333
23631305a170d3035303132343133323631305a30819b310b30090603
550406130243413111300f0603550408130850726f76696e6365311230
1006035504071309536f6d65204369747931153013060355040a130c4f
7267616e697a6174696f6e31123010060355040b13096c6f63616c686f7
3743119301706035504031310526f6f742063657274696669636174653
11f301d06092a864886f70d0109011610726f6f74406578616d706c652e
636f6d30819f300d06092a864886f70d010101050003
        EAP-Message = 
0x818d0030818902818100dac525422bfedb082629a2cba44b3449c90d
0ab462fb72c8434a782098863d7eb7d7e70028c2b7ad555a51cc756cf4f
a1d7091615ab450d5289553ae6616aff014a55085d6b8fb4aee98638e4
26175cdd36c665c63cda177d34920eb30585edc8773999c2980f81ad46
38bbbea1c82d054023db7ef24a3ec1c3f6241a903d7f30203010001a317
301530130603551d25040c300a06082b06010505070301300d06092a8
64886f70d0101040500038181007a2d921b1cf13bf2982a9178ec9ede6d
88edc178a2e8bd40a0a06fb6f0769957884cd7084537083496fd1841652
93f583c8e8240eb68e042c94b15752e4c07e80d09
        EAP-Message = 
0x779afa3dd55c24fa54ac292d77205d1c2477ed30d59f57caf9bd21ff2a8
d16cc0911c50e4f295763fcb60efa3c3d2d0e43850f6e6fbe284902f6e835
03650003ba308203b63082031fa003020102020100300d06092a86488
6f70d010104050030819f310b30090603550406130243413111300f060
3550408130850726f76696e63653112301006035504071309536f6d652
04369747931153013060355040a130c4f7267616e697a6174696f6e311
23010060355040b13096c6f63616c686f7374311b30190603550403131
2436c69656e742063657274696669636174653121301f06092a864886f
70d0109011612636c69656e74406578616d706c
        EAP-Message = 
0x652e636f6d301e170d3034303132353133323630375a
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd95697bc5dc02b88d368e6bd93091358
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=142, length=153
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xd0440fd9b92b3648b6a8beb98da2f02c
        EAP-Message = 0x020400061900
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0xd95697bc5dc02b88d368e6bd93091358
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 2
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 2
  modcall[authorize]: module "attr_filter" returns noop for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
  modcall[authorize]: module "digest" returns noop for request 2
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 2
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 2
  modcall[authorize]: module "expiration" returns noop for request 2
  modcall[authorize]: module "logintime" returns noop for request 2
modcall: group authorize returns updated for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 142 to 130.147.167.9:21668
        EAP-Message = 
0x010502f71900170d3036303132343133323630375a30819f310b3009
0603550406130243413111300f0603550408130850726f76696e636531
12301006035504071309536f6d65204369747931153013060355040a1
30c4f7267616e697a6174696f6e31123010060355040b13096c6f63616c
686f7374311b301906035504031312436c69656e74206365727469666
9636174653121301f06092a864886f70d0109011612636c69656e74406
578616d706c652e636f6d30819f300d06092a864886f70d010101050003
818d0030818902818100d4c5b19724f164acf1ffb189db1c8fbff4f14396ea
7cb1e90f78d69451725377895dfe52ccb99b41e8
        EAP-Message = 
0x0ddeb58b127a943f4f58cbc562878192fbdc6fece9f871e7c130d35cf51
88817e9b133249edd2a1c75d31043ae87553cec7a77ef26aa7d74281db
9b77e17c6446c5dd9b188b43250ca0229963722a123a726b00b4027fd0
203010001a381ff3081fc301d0603551d0e0416041468d36d3e1ee7bc9d
5a057021c363da1365d1ade33081cc0603551d230481c43081c180146
8d36d3e1ee7bc9d5a057021c363da1365d1ade3a181a5a481a230819f3
10b30090603550406130243413111300f0603550408130850726f76696
e63653112301006035504071309536f6d652043697479311530130603
55040a130c4f7267616e697a6174696f6e31123010
        EAP-Message = 
0x060355040b13096c6f63616c686f7374311b30190603550403131243
6c69656e742063657274696669636174653121301f06092a864886f70d
0109011612636c69656e74406578616d706c652e636f6d820100300c06
03551d13040530030101ff300d06092a864886f70d0101040500038181
0033c00b66b1e579ef73a06798252dab8d5e5511fc00fd276d80d12f834
777c6743fdc2743fca1507704e4bc0979e4f60ac3ad9ee83e6f347369229
d1f77229ba2e982359da563024a00163dba6d6c986c0bad28af85132ff8f
0d76501bf1b7c2dff658ce1e62c01997b6e64e3e8d4373354ce99128476
51539063b85bbc5485c516030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x30ccc8ea09caec6484513d92e9fa8bf9
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=143, length=355
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x04bd823f4c542ae8eafafb94cc32cee8
        EAP-Message = 
0x020500d01980000000c6160301008610000082008070a83a18e8f6b5
1b8ccdb62cc15bc5c3b499853e2968e2e46e9376915f13115db3c9a437
39f5610f350b3832a0f40641e7d621fce47ed17501dda68248eee475325
71ab338d8520fdf0e51614403a2bbac08030492673d3d8e26ed489af11d
f40939708304c1f8f643dc3360cda2b2126fed86dbce3445366761a0eb7e
b26b4f14030100010116030100304fc842a8deef90ef18d88f2ce0014759
987404f6292c5687ee03dbc478ab36be8a9dbb8d69bf4d23c2512ea8a7
494116
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0x30ccc8ea09caec6484513d92e9fa8bf9
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 3
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 3
  modcall[authorize]: module "attr_filter" returns noop for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
  modcall[authorize]: module "digest" returns noop for request 3
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 3
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
  rlm_eap: EAP packet type response id 5 length 208
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 3
  modcall[authorize]: module "expiration" returns noop for request 3
  modcall[authorize]: module "logintime" returns noop for request 3
modcall: group authorize returns updated for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 143 to 130.147.167.9:21668
        EAP-Message = 
0x010600411900140301000101160301003071f62c20d4a3abde275ea0
0cce6a8bc3719595c1621eea72b01032e18b0909a66ae34a9f69de8d7e
955d49b4b9c50c8b
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xb167ec60a52128f3ff190609173666f3
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=144, length=153
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x96e49e5dc54cfbc3775a6d58edfefdb5
        EAP-Message = 0x020600061900
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0xb167ec60a52128f3ff190609173666f3
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 4
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 4
  modcall[authorize]: module "attr_filter" returns noop for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
  modcall[authorize]: module "digest" returns noop for request 4
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 4
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
  rlm_eap: EAP packet type response id 6 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 4
  modcall[authorize]: module "expiration" returns noop for request 4
  modcall[authorize]: module "logintime" returns noop for request 4
modcall: group authorize returns updated for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3
  eaptls_process returned 3
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 144 to 130.147.167.9:21668
        EAP-Message = 
0x01070050190017030100206f68a3f2c8e9c8c7ce39ca9bcb909375f3ee
e7e5c51925d1a79e322526517bec1703010020162479f7779cf5afe9033
d78ff6e30fbf834ba8e85af859b0b116da8e386fbb3
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x8c6aa827fdf1aa2b66049a9bf55e404f
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=145, length=227
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x3d25fd63a2e1cae3751ac5c8fc790e1a
        EAP-Message = 
0x02070050190017030100208493980efcb87e4fa49f0b86a6db8720f95
d78fb6a49c304da147bbfc6d11b1f1703010020b0f17753bd4b7faac2251f
258801c4a8dc871eab68f6a15520b15e76f4f1b873
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0x8c6aa827fdf1aa2b66049a9bf55e404f
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 5
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 5
  modcall[authorize]: module "attr_filter" returns noop for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
  modcall[authorize]: module "digest" returns noop for request 5
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 5
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 7 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 5
  modcall[authorize]: module "expiration" returns noop for request 5
  modcall[authorize]: module "logintime" returns noop for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - TWG00835
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 0x0207000d015457473030383335
  PEAP: Got tunneled identity of TWG00835
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to TWG00835
  PEAP: Sending tunneled request
        EAP-Message = 0x0207000d015457473030383335
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 5
radius_xlat:  '/var/log/radius/radacct/127.0.0.1/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/127.0.0.1/auth-detail-20041217
  modcall[authorize]: module "auth_log" returns ok for request 5
  modcall[authorize]: module "attr_filter" returns noop for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
  modcall[authorize]: module "digest" returns noop for request 5
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 5
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 7 length 13
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 5
  modcall[authorize]: module "expiration" returns noop for request 5
  modcall[authorize]: module "logintime" returns noop for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
  PEAP: Got tunneled reply RADIUS code 11
        EAP-Message = 
0x010800221a0108001d100fcf95b6e2ec60456a65c145a32a1e7d54574
73030383335
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x71867f16e7069e4c7b0874cc23af53ff
  PEAP: Processing from tunneled session code 0x828b930 11
        EAP-Message = 
0x010800221a0108001d100fcf95b6e2ec60456a65c145a32a1e7d54574
73030383335
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x71867f16e7069e4c7b0874cc23af53ff
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 145 to 130.147.167.9:21668
        EAP-Message = 
0x010800701900170301002089b92d8654832aa6627aa895528c3e252
66d5d2d65adb3fbb52525f6089cb177170301004077dafbce3c5343f3b1
a1266421a7f86e0cf786e16d30278dc66377160f5d10b9e7700bc20d905
3b9ca33f0cc93fb994e08f4439f1743e314d40c4e2e32717ed6
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf81fc0bb80a7c19f73d39a7323b848f0
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=146, length=291
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0xad8eb997902fed8e23a45491e20bf02f
        EAP-Message = 
0x0208009019001703010020e324f1de51e02aed0bf1fda9c73c4e5dbc8
185f507af7a1680cafe4a1a4e2b71170301006060e41c736b14c3ddc51a
b28097349f66019da00d7d8f64869997ea8dd225b128eb1c6716a8601bf
0989839bedf3b7df15adb9ce18afc512c4bcf03824eb991bd68d22f9e0b5
5ff6cba1da1eaa57d08a962bce5172125551792ebc2f3f0b1a384
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0xf81fc0bb80a7c19f73d39a7323b848f0
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 6
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 6
  modcall[authorize]: module "attr_filter" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
  modcall[authorize]: module "digest" returns noop for request 6
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 6
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 8 length 144
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 6
  modcall[authorize]: module "expiration" returns noop for request 6
  modcall[authorize]: module "logintime" returns noop for request 6
modcall: group authorize returns updated for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 
0x020800431a0208003e317b3623b24bd6a0ba2b497e79d39f97f00000
000000000000043f2610f874dff47cc2cb74e7c6e2b13be260b261e7ebb3
005457473030383335
  PEAP: Setting User-Name to TWG00835
  PEAP: Adding old state with 71 86
  PEAP: Sending tunneled request
        EAP-Message = 
0x020800431a0208003e317b3623b24bd6a0ba2b497e79d39f97f00000
000000000000043f2610f874dff47cc2cb74e7c6e2b13be260b261e7ebb3
005457473030383335
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "TWG00835"
        State = 0x71867f16e7069e4c7b0874cc23af53ff
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 6
radius_xlat:  '/var/log/radius/radacct/127.0.0.1/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/127.0.0.1/auth-detail-20041217
  modcall[authorize]: module "auth_log" returns ok for request 6
  modcall[authorize]: module "attr_filter" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
  modcall[authorize]: module "digest" returns noop for request 6
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 6
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 8 length 67
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 6
  modcall[authorize]: module "expiration" returns noop for request 6
  modcall[authorize]: module "logintime" returns noop for request 6
modcall: group authorize returns updated for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group Auth-Type for request 6
  rlm_mschap: No User-Password configured.  Cannot create LM-
Password.
  rlm_mschap: No User-Password configured.  Cannot create NT-
Password.
  rlm_mschap: Told to do MS-CHAPv2 for TWG00835 with NT-Password
radius_xlat:  '--username=TWG00835'
radius_xlat: Running registered xlat function of module mschap for 
string 'Challenge'
 mschap2: 0f
radius_xlat:  '--challenge=dd5a238a68d4f013'
radius_xlat: Running registered xlat function of module mschap for 
string 'NT-Response'
radius_xlat:  '--nt-
response=043f2610f874dff47cc2cb74e7c6e2b13be260b261e7ebb3'
Exec-Program output: NT_KEY: 
AFE59A56728C49012632C2586CD6A79B
Exec-Program-Wait: plaintext: NT_KEY: 
AFE59A56728C49012632C2586CD6A79B
Exec-Program: Abnormal child exit: No child processes
  rlm_mschap: External script failed.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 6
modcall: group Auth-Type returns reject for request 6
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 6
modcall: group authenticate returns reject for request 6
auth: Failed to validate the user.
  PEAP: Got tunneled reply RADIUS code 3
        MS-CHAP-Error = "\010E=691 R=1"
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Processing from tunneled session code 0x828cd28 3
        MS-CHAP-Error = "\010E=691 R=1"
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 146 to 130.147.167.9:21668
        EAP-Message = 
0x0109005019001703010020d18c7d0831f534298c6bb96b6a0f0d270f3
c977b7ca60cc548af981aa68f64d4170301002068532e5cb8d5f39085d2
1fccbb6a955c5259cda73182a8351745b970cc0541ab
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3a8b6bcbdf7efd8c916fabe9462d3e1b
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 130.147.167.9:21668, 
id=147, length=227
        User-Name = "TWG00835"
        Framed-MTU = 1400
        Called-Station-Id = "000f.24be.37a0"
        Calling-Station-Id = "000c.f138.502c"
        Service-Type = Login-User
        Message-Authenticator = 0x05f56517b322767c029d06e7c83a9827
        EAP-Message = 
0x02090050190017030100200c42d4e00b15fe0b42a6c9b7270f0ea6ef9
36c1ea4f62f7e03907e459262687d17030100207c9d6f17bedeb14de2b9
47bfcb247ba90da40c7b535b4c778b2791ea59e01eb4
        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1739
        State = 0x3a8b6bcbdf7efd8c916fabe9462d3e1b
        NAS-IP-Address = 130.147.167.9
        NAS-Identifier = "twgclifty3ap005"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
    rlm_realm: No '\' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 7
radius_xlat:  '/var/log/radius/radacct/130.147.167.9/auth-detail-20041217'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%
m%d expands to /var/log/radius/radacct/130.147.167.9/auth-detail-
20041217
  modcall[authorize]: module "auth_log" returns ok for request 7
  modcall[authorize]: module "attr_filter" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
  modcall[authorize]: module "digest" returns noop for request 7
    rlm_realm: No '/' in User-Name = "TWG00835", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "IPASS" returns noop for request 7
    rlm_realm: No '@' in User-Name = "TWG00835", looking up realm 
NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 9 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 154
  modcall[authorize]: module "files" returns ok for request 7
  modcall[authorize]: module "expiration" returns noop for request 7
  modcall[authorize]: module "logintime" returns noop for request 7
modcall: group authorize returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected earlier 
in this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 7
modcall: group authenticate returns invalid for request 7
auth: Failed to validate the user.
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 147 to 130.147.167.9:21668
        EAP-Message = 0x04090004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 140 with timestamp 41c23f40
Cleaning up request 1 ID 141 with timestamp 41c23f40
Cleaning up request 2 ID 142 with timestamp 41c23f40
Cleaning up request 3 ID 143 with timestamp 41c23f40
Cleaning up request 4 ID 144 with timestamp 41c23f40
Cleaning up request 5 ID 145 with timestamp 41c23f40
Cleaning up request 6 ID 146 with timestamp 41c23f40
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 7 ID 147 with timestamp 41c23f41
Nothing to do.  Sleeping until we see a request.





-------------------------------------------------
This mail sent through Seednet Webmail
http://webmail.seed.net.tw

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to