Advertisement
Guest User

Untitled

a guest
Aug 29th, 2011
377
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 32.14 KB | None | 0 0
  1. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=191, length=153
  2. User-Name = "tester"
  3. NAS-IP-Address = 10.10.17.123
  4. NAS-Port = 1
  5. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  6. Calling-Station-Id = "AC-81-12-31-25-3F"
  7. Framed-MTU = 1400
  8. NAS-Port-Type = Wireless-802.11
  9. Connect-Info = "CONNECT 54Mbps 802.11g"
  10. EAP-Message = 0x0200000b01746573746572
  11. Message-Authenticator = 0x0d4e73be2765e6c459d70a39defe2256
  12. +- entering group authorize
  13. ++[preprocess] returns ok
  14. ++[chap] returns noop
  15. ++[mschap] returns noop
  16. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  17. rlm_realm: No such realm "NULL"
  18. ++[suffix] returns noop
  19. rlm_eap: EAP packet type response id 0 length 11
  20. rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  21. ++[eap] returns updated
  22. ++[unix] returns notfound
  23. users: Matched entry tester at line 205
  24. ++[files] returns ok
  25. expand: %{User-Name} -> tester
  26. rlm_sql (sql): sql_set_user escaped user --> 'tester'
  27. rlm_sql (sql): Reserving sql socket id: 2
  28. expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'tester' ORDER BY id
  29. expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'tester' ORDER BY priority
  30. rlm_sql (sql): Released sql socket id: 2
  31. rlm_sql (sql): User tester not found
  32. ++[sql] returns notfound
  33. ++[expiration] returns noop
  34. ++[logintime] returns noop
  35. rlm_pap: Found existing Auth-Type, not changing it.
  36. ++[pap] returns noop
  37. rad_check_password: Found Auth-Type EAP
  38. auth: type "EAP"
  39. +- entering group authenticate
  40. rlm_eap: EAP Identity
  41. rlm_eap: processing type tls
  42. rlm_eap_tls: Initiate
  43. rlm_eap_tls: Start returned 1
  44. ++[eap] returns handled
  45. Sending Access-Challenge of id 191 to 10.10.17.123 port 1026
  46. EAP-Message = 0x010100061920
  47. Message-Authenticator = 0x00000000000000000000000000000000
  48. State = 0xa44b1a68a44a03fb909c3ce6cf13014b
  49. Finished request 1.
  50. Going to the next request
  51. Waking up in 4.9 seconds.
  52. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=192, length=265
  53. User-Name = "tester"
  54. NAS-IP-Address = 10.10.17.123
  55. NAS-Port = 1
  56. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  57. Calling-Station-Id = "AC-81-12-31-25-3F"
  58. Framed-MTU = 1400
  59. NAS-Port-Type = Wireless-802.11
  60. Connect-Info = "CONNECT 54Mbps 802.11g"
  61. EAP-Message = 0x0201006919800000005f160301005a0100005603014e5b87cc359da27bc5d1ad07ab4e4f84563b6d0d0eb204de3509c837389fe08700002800390038003500160013000a00330032002f000500040015001200090014001100080006000300ff020100000400230000
  62. State = 0xa44b1a68a44a03fb909c3ce6cf13014b
  63. Message-Authenticator = 0xe5c8876e4b21f4428a34d49d5f81a8a5
  64. +- entering group authorize
  65. ++[preprocess] returns ok
  66. ++[chap] returns noop
  67. ++[mschap] returns noop
  68. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  69. rlm_realm: No such realm "NULL"
  70. ++[suffix] returns noop
  71. rlm_eap: EAP packet type response id 1 length 105
  72. rlm_eap: Continuing tunnel setup.
  73. ++[eap] returns ok
  74. rad_check_password: Found Auth-Type EAP
  75. auth: type "EAP"
  76. +- entering group authenticate
  77. rlm_eap: Request found, released from the list
  78. rlm_eap: EAP/peap
  79. rlm_eap: processing type peap
  80. rlm_eap_peap: Authenticate
  81. rlm_eap_tls: processing TLS
  82. TLS Length 95
  83. rlm_eap_tls: Length Included
  84. eaptls_verify returned 11
  85. (other): before/accept initialization
  86. TLS_accept: before/accept initialization
  87. rlm_eap_tls: <<< TLS 1.0 Handshake [length 005a], ClientHello
  88. TLS_accept: SSLv3 read client hello A
  89. rlm_eap_tls: >>> TLS 1.0 Handshake [length 0035], ServerHello
  90. TLS_accept: SSLv3 write server hello A
  91. rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate
  92. TLS_accept: SSLv3 write certificate A
  93. rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
  94. TLS_accept: SSLv3 write key exchange A
  95. rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
  96. TLS_accept: SSLv3 write server done A
  97. TLS_accept: SSLv3 flush data
  98. TLS_accept: Need to read more data: SSLv3 read client certificate A
  99. In SSL Handshake Phase
  100. In SSL Accept mode
  101. eaptls_process returned 13
  102. rlm_eap_peap: EAPTLS_HANDLED
  103. ++[eap] returns handled
  104. Sending Access-Challenge of id 192 to 10.10.17.123 port 1026
  105. EAP-Message = 0x0102040019c000000ab816030100350200003103014e5bf9666403a7abb7066bfb0421ffb2bf850cd657fe54717c1d59afdb4c4ae4000039010009ff0100010000230000160301085e0b00085a0008570003a6308203a23082028aa003020102020101300d06092a864886f70d0101040500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c652043657274696669636174
  106. EAP-Message = 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
  107. EAP-Message = 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
  108. EAP-Message = 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
  109. EAP-Message = 0x174305e5620004ab308204a7
  110. Message-Authenticator = 0x00000000000000000000000000000000
  111. State = 0xa44b1a68a54903fb909c3ce6cf13014b
  112. Finished request 2.
  113. Going to the next request
  114. Waking up in 4.9 seconds.
  115. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=193, length=166
  116. User-Name = "tester"
  117. NAS-IP-Address = 10.10.17.123
  118. NAS-Port = 1
  119. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  120. Calling-Station-Id = "AC-81-12-31-25-3F"
  121. Framed-MTU = 1400
  122. NAS-Port-Type = Wireless-802.11
  123. Connect-Info = "CONNECT 54Mbps 802.11g"
  124. EAP-Message = 0x020200061900
  125. State = 0xa44b1a68a54903fb909c3ce6cf13014b
  126. Message-Authenticator = 0x177b0516eb720d169a80c61a73891690
  127. +- entering group authorize
  128. ++[preprocess] returns ok
  129. ++[chap] returns noop
  130. ++[mschap] returns noop
  131. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  132. rlm_realm: No such realm "NULL"
  133. ++[suffix] returns noop
  134. rlm_eap: EAP packet type response id 2 length 6
  135. rlm_eap: Continuing tunnel setup.
  136. ++[eap] returns ok
  137. rad_check_password: Found Auth-Type EAP
  138. auth: type "EAP"
  139. +- entering group authenticate
  140. rlm_eap: Request found, released from the list
  141. rlm_eap: EAP/peap
  142. rlm_eap: processing type peap
  143. rlm_eap_peap: Authenticate
  144. rlm_eap_tls: processing TLS
  145. rlm_eap_tls: Received EAP-TLS ACK message
  146. rlm_eap_tls: ack handshake fragment handler
  147. eaptls_verify returned 1
  148. eaptls_process returned 13
  149. rlm_eap_peap: EAPTLS_HANDLED
  150. ++[eap] returns handled
  151. Sending Access-Challenge of id 193 to 10.10.17.123 port 1026
  152. EAP-Message = 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
  153. EAP-Message = 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
  154. EAP-Message = 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
  155. EAP-Message = 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
  156. EAP-Message = 0x9a1829bf97df5858
  157. Message-Authenticator = 0x00000000000000000000000000000000
  158. State = 0xa44b1a68a64803fb909c3ce6cf13014b
  159. Finished request 3.
  160. Going to the next request
  161. Waking up in 4.9 seconds.
  162. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=194, length=166
  163. User-Name = "tester"
  164. NAS-IP-Address = 10.10.17.123
  165. NAS-Port = 1
  166. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  167. Calling-Station-Id = "AC-81-12-31-25-3F"
  168. Framed-MTU = 1400
  169. NAS-Port-Type = Wireless-802.11
  170. Connect-Info = "CONNECT 54Mbps 802.11g"
  171. EAP-Message = 0x020300061900
  172. State = 0xa44b1a68a64803fb909c3ce6cf13014b
  173. Message-Authenticator = 0xbdb6daf56d45c80d200cf563f6501516
  174. +- entering group authorize
  175. ++[preprocess] returns ok
  176. ++[chap] returns noop
  177. ++[mschap] returns noop
  178. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  179. rlm_realm: No such realm "NULL"
  180. ++[suffix] returns noop
  181. rlm_eap: EAP packet type response id 3 length 6
  182. rlm_eap: Continuing tunnel setup.
  183. ++[eap] returns ok
  184. rad_check_password: Found Auth-Type EAP
  185. auth: type "EAP"
  186. +- entering group authenticate
  187. rlm_eap: Request found, released from the list
  188. rlm_eap: EAP/peap
  189. rlm_eap: processing type peap
  190. rlm_eap_peap: Authenticate
  191. rlm_eap_tls: processing TLS
  192. rlm_eap_tls: Received EAP-TLS ACK message
  193. rlm_eap_tls: ack handshake fragment handler
  194. eaptls_verify returned 1
  195. eaptls_process returned 13
  196. rlm_eap_peap: EAPTLS_HANDLED
  197. ++[eap] returns handled
  198. Sending Access-Challenge of id 194 to 10.10.17.123 port 1026
  199. EAP-Message = 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
  200. EAP-Message = 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
  201. EAP-Message = 0xb4913390de928e6eac4b7d75ccbecfb603ae2f493efbe780b0429ba420902a67f721219ef3a683f191ef6d877e103e6ffcaa5a74b818f87ee8c20ad079df6953cdd0528522d149c70e63e3cefcf0941e8b18485d3c049fad05b954177f1773a691ca7d467b15e527b91a9c8883cfc68bd566b51b2c4f75382f7ba43dc8cc67b8d446433045bc8e8785964bcd9a793f4c7668cfff30a0cbc456a7553193c2f341b8942def581cfe321d47dd930f7282d19b96d3ff63e0dfce4fe72193742531da593d8066634b27413d6f3fef5a2fc016030100040e000000
  202. Message-Authenticator = 0x00000000000000000000000000000000
  203. State = 0xa44b1a68a74f03fb909c3ce6cf13014b
  204. Finished request 4.
  205. Going to the next request
  206. Waking up in 4.9 seconds.
  207. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=195, length=368
  208. User-Name = "tester"
  209. NAS-IP-Address = 10.10.17.123
  210. NAS-Port = 1
  211. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  212. Calling-Station-Id = "AC-81-12-31-25-3F"
  213. Framed-MTU = 1400
  214. NAS-Port-Type = Wireless-802.11
  215. Connect-Info = "CONNECT 54Mbps 802.11g"
  216. EAP-Message = 0x020400d01980000000c616030100861000008200808cd32b677611c366bd6eaf8a1c2064c4aac40d13821d16ae8475524b2d51f2abd68558418979955de735c67ff0d225e0b874cc972ecbc9b6c71cd6670d33aa055e67f95ed9a98a55bf873f65a4f0d1b4666d58b778a14ad86f3e727fc19351a2cf6df11bf935f632e249f3ae8a59b8de5b40e4bef70e6040f0e0331a06f5b17714030100010116030100306e5b5f1ce7129e8a1393f2e0685f9811c92381cf1037fb86390778daca7bb9562f7aafbeb3ddcd7510eb8597b798c2e4
  217. State = 0xa44b1a68a74f03fb909c3ce6cf13014b
  218. Message-Authenticator = 0xb2942d1c3e0656407952493d12ae140b
  219. +- entering group authorize
  220. ++[preprocess] returns ok
  221. ++[chap] returns noop
  222. ++[mschap] returns noop
  223. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  224. rlm_realm: No such realm "NULL"
  225. ++[suffix] returns noop
  226. rlm_eap: EAP packet type response id 4 length 208
  227. rlm_eap: Continuing tunnel setup.
  228. ++[eap] returns ok
  229. rad_check_password: Found Auth-Type EAP
  230. auth: type "EAP"
  231. +- entering group authenticate
  232. rlm_eap: Request found, released from the list
  233. rlm_eap: EAP/peap
  234. rlm_eap: processing type peap
  235. rlm_eap_peap: Authenticate
  236. rlm_eap_tls: processing TLS
  237. TLS Length 198
  238. rlm_eap_tls: Length Included
  239. eaptls_verify returned 11
  240. rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
  241. TLS_accept: SSLv3 read client key exchange A
  242. rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  243. rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
  244. TLS_accept: SSLv3 read finished A
  245. rlm_eap_tls: >>> TLS 1.0 Handshake [length 00aa]???
  246. TLS_accept: SSLv3 write session ticket A
  247. rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
  248. TLS_accept: SSLv3 write change cipher spec A
  249. rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
  250. TLS_accept: SSLv3 write finished A
  251. TLS_accept: SSLv3 flush data
  252. (other): SSL negotiation finished successfully
  253. SSL Connection Established
  254. eaptls_process returned 13
  255. rlm_eap_peap: EAPTLS_HANDLED
  256. ++[eap] returns handled
  257. Sending Access-Challenge of id 195 to 10.10.17.123 port 1026
  258. EAP-Message = 0x010500f0190016030100aa040000a60000000000a07497f5699a7d99fac33af1f62e002fb2d800b95d5f5116cdd864d314576af242692a04f736a5f3990e754cc3c5881238fb53dd440e5d57451577006e59c04252a935a80d487e1a93cb9895fff9c3bf8802025ba1ec2e344b0aeb1b26dc44a05f874e44803c32183c9a770e254c50878ccac999c4f6cd359a9ca286626905fb400dda62e4a01e2f05fadb6153908cf8433ee00ed4a8df7bda1bcaddebafe5a1d114030100010116030100309096c39cb570fca3e3a4b4bb13d8108b798277245bf3f18ac6b88100659abeeaeb04ebc3c8787419c4263ff2dc411b63
  259. Message-Authenticator = 0x00000000000000000000000000000000
  260. State = 0xa44b1a68a04e03fb909c3ce6cf13014b
  261. Finished request 5.
  262. Going to the next request
  263. Waking up in 4.7 seconds.
  264. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=196, length=166
  265. User-Name = "tester"
  266. NAS-IP-Address = 10.10.17.123
  267. NAS-Port = 1
  268. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  269. Calling-Station-Id = "AC-81-12-31-25-3F"
  270. Framed-MTU = 1400
  271. NAS-Port-Type = Wireless-802.11
  272. Connect-Info = "CONNECT 54Mbps 802.11g"
  273. EAP-Message = 0x020500061900
  274. State = 0xa44b1a68a04e03fb909c3ce6cf13014b
  275. Message-Authenticator = 0xe18d9c90fa3d7472443e81b29cd2c048
  276. +- entering group authorize
  277. ++[preprocess] returns ok
  278. ++[chap] returns noop
  279. ++[mschap] returns noop
  280. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  281. rlm_realm: No such realm "NULL"
  282. ++[suffix] returns noop
  283. rlm_eap: EAP packet type response id 5 length 6
  284. rlm_eap: Continuing tunnel setup.
  285. ++[eap] returns ok
  286. rad_check_password: Found Auth-Type EAP
  287. auth: type "EAP"
  288. +- entering group authenticate
  289. rlm_eap: Request found, released from the list
  290. rlm_eap: EAP/peap
  291. rlm_eap: processing type peap
  292. rlm_eap_peap: Authenticate
  293. rlm_eap_tls: processing TLS
  294. rlm_eap_tls: Received EAP-TLS ACK message
  295. rlm_eap_tls: ack handshake is finished
  296. eaptls_verify returned 3
  297. eaptls_process returned 3
  298. rlm_eap_peap: EAPTLS_SUCCESS
  299. ++[eap] returns handled
  300. Sending Access-Challenge of id 196 to 10.10.17.123 port 1026
  301. EAP-Message = 0x0106002b19001703010020652c2764e4665f50f7a5db450de8fc12faecb88e719569b552a77d7bea975a34
  302. Message-Authenticator = 0x00000000000000000000000000000000
  303. State = 0xa44b1a68a14d03fb909c3ce6cf13014b
  304. Finished request 6.
  305. Going to the next request
  306. Waking up in 4.7 seconds.
  307. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=197, length=256
  308. User-Name = "tester"
  309. NAS-IP-Address = 10.10.17.123
  310. NAS-Port = 1
  311. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  312. Calling-Station-Id = "AC-81-12-31-25-3F"
  313. Framed-MTU = 1400
  314. NAS-Port-Type = Wireless-802.11
  315. Connect-Info = "CONNECT 54Mbps 802.11g"
  316. EAP-Message = 0x020600601900170301002023a999edf1ff61a883ae95dd591c9b84781f28001097f9cd4372cd7299bd12b617030100301ac335c8c5c47aef731426a562e1e6d584e2151f1e1f9d766b7eb1aff02746f443fb08102be8913cb816d4c0c3304c5e
  317. State = 0xa44b1a68a14d03fb909c3ce6cf13014b
  318. Message-Authenticator = 0xa544d85995523b9b8bcd8fdf5f86deca
  319. +- entering group authorize
  320. ++[preprocess] returns ok
  321. ++[chap] returns noop
  322. ++[mschap] returns noop
  323. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  324. rlm_realm: No such realm "NULL"
  325. ++[suffix] returns noop
  326. rlm_eap: EAP packet type response id 6 length 96
  327. rlm_eap: Continuing tunnel setup.
  328. ++[eap] returns ok
  329. rad_check_password: Found Auth-Type EAP
  330. auth: type "EAP"
  331. +- entering group authenticate
  332. rlm_eap: Request found, released from the list
  333. rlm_eap: EAP/peap
  334. rlm_eap: processing type peap
  335. rlm_eap_peap: Authenticate
  336. rlm_eap_tls: processing TLS
  337. eaptls_verify returned 7
  338. rlm_eap_tls: Done initial handshake
  339. eaptls_process returned 7
  340. rlm_eap_peap: EAPTLS_OK
  341. rlm_eap_peap: Session established. Decoding tunneled attributes.
  342. rlm_eap_peap: Identity - tester
  343. PEAP: Got tunneled EAP-Message
  344. EAP-Message = 0x0206000b01746573746572
  345. PEAP: Got tunneled identity of tester
  346. PEAP: Setting default EAP type for tunneled EAP session.
  347. PEAP: Setting User-Name to tester
  348. PEAP: Sending tunneled request
  349. EAP-Message = 0x0206000b01746573746572
  350. FreeRADIUS-Proxied-To = 127.0.0.1
  351. User-Name = "tester"
  352. server inner-tunnel {
  353. +- entering group authorize
  354. ++[chap] returns noop
  355. ++[mschap] returns noop
  356. ++[unix] returns notfound
  357. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  358. rlm_realm: No such realm "NULL"
  359. ++[suffix] returns noop
  360. ++[control] returns noop
  361. rlm_eap: EAP packet type response id 6 length 11
  362. rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  363. ++[eap] returns updated
  364. users: Matched entry tester at line 205
  365. ++[files] returns ok
  366. ++[expiration] returns noop
  367. ++[logintime] returns noop
  368. rlm_pap: Found existing Auth-Type, not changing it.
  369. ++[pap] returns noop
  370. rad_check_password: Found Auth-Type EAP
  371. auth: type "EAP"
  372. +- entering group authenticate
  373. rlm_eap: EAP Identity
  374. rlm_eap: processing type mschapv2
  375. rlm_eap_mschapv2: Issuing Challenge
  376. ++[eap] returns handled
  377. } # server inner-tunnel
  378. PEAP: Got tunneled reply RADIUS code 11
  379. EAP-Message = 0x010700201a0107001b10d8f1accb9150ef9c2c4c56182beff468746573746572
  380. Message-Authenticator = 0x00000000000000000000000000000000
  381. State = 0x45ec2fcd45eb35548ba441bf0fe730d0
  382. PEAP: Processing from tunneled session code 0xc2aa20 11
  383. EAP-Message = 0x010700201a0107001b10d8f1accb9150ef9c2c4c56182beff468746573746572
  384. Message-Authenticator = 0x00000000000000000000000000000000
  385. State = 0x45ec2fcd45eb35548ba441bf0fe730d0
  386. PEAP: Got tunneled Access-Challenge
  387. ++[eap] returns handled
  388. Sending Access-Challenge of id 197 to 10.10.17.123 port 1026
  389. EAP-Message = 0x0107004b19001703010040385c65c50fe57aa1b312e35dcb4fba1dd7ec9509738128cd16366dcf9fe81566a588f1c1a247ba04a738dcbb8153cb29c8505e4df30a67eadc85273643f1159e
  390. Message-Authenticator = 0x00000000000000000000000000000000
  391. State = 0xa44b1a68a24c03fb909c3ce6cf13014b
  392. Finished request 7.
  393. Going to the next request
  394. Waking up in 4.7 seconds.
  395. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=198, length=304
  396. User-Name = "tester"
  397. NAS-IP-Address = 10.10.17.123
  398. NAS-Port = 1
  399. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  400. Calling-Station-Id = "AC-81-12-31-25-3F"
  401. Framed-MTU = 1400
  402. NAS-Port-Type = Wireless-802.11
  403. Connect-Info = "CONNECT 54Mbps 802.11g"
  404. EAP-Message = 0x0207009019001703010020de202f400c9316d118cd8364a59d4f80f38f7bfdfe7131d1e1deaa60b73236db17030100604c8c4435e3f29b4c44f3a57b2025d3a53d6b020626003a038e1f7aabd74262a9dd8fa9a897235599fbb14952053918f17ed1b633e0fb5933e0987dc3c7b48fbc8f90fa50c1b4f9783016ccc66b8ba76d7e86204ac2478e997c17b084da3039a0
  405. State = 0xa44b1a68a24c03fb909c3ce6cf13014b
  406. Message-Authenticator = 0xb561a93ecec9c28dfa2e346dcafd4858
  407. +- entering group authorize
  408. ++[preprocess] returns ok
  409. ++[chap] returns noop
  410. ++[mschap] returns noop
  411. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  412. rlm_realm: No such realm "NULL"
  413. ++[suffix] returns noop
  414. rlm_eap: EAP packet type response id 7 length 144
  415. rlm_eap: Continuing tunnel setup.
  416. ++[eap] returns ok
  417. rad_check_password: Found Auth-Type EAP
  418. auth: type "EAP"
  419. +- entering group authenticate
  420. rlm_eap: Request found, released from the list
  421. rlm_eap: EAP/peap
  422. rlm_eap: processing type peap
  423. rlm_eap_peap: Authenticate
  424. rlm_eap_tls: processing TLS
  425. eaptls_verify returned 7
  426. rlm_eap_tls: Done initial handshake
  427. eaptls_process returned 7
  428. rlm_eap_peap: EAPTLS_OK
  429. rlm_eap_peap: Session established. Decoding tunneled attributes.
  430. rlm_eap_peap: EAP type mschapv2
  431. PEAP: Got tunneled EAP-Message
  432. EAP-Message = 0x020700411a0207003c317b2cf0ebdeb9bd66236e165464dfdadd000000000000000073aeffecba1fd4c3769f6d5cdad787c283137b82e4cf873200746573746572
  433. PEAP: Setting User-Name to tester
  434. PEAP: Sending tunneled request
  435. EAP-Message = 0x020700411a0207003c317b2cf0ebdeb9bd66236e165464dfdadd000000000000000073aeffecba1fd4c3769f6d5cdad787c283137b82e4cf873200746573746572
  436. FreeRADIUS-Proxied-To = 127.0.0.1
  437. User-Name = "tester"
  438. State = 0x45ec2fcd45eb35548ba441bf0fe730d0
  439. server inner-tunnel {
  440. +- entering group authorize
  441. ++[chap] returns noop
  442. ++[mschap] returns noop
  443. ++[unix] returns notfound
  444. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  445. rlm_realm: No such realm "NULL"
  446. ++[suffix] returns noop
  447. ++[control] returns noop
  448. rlm_eap: EAP packet type response id 7 length 65
  449. rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  450. ++[eap] returns updated
  451. users: Matched entry tester at line 205
  452. ++[files] returns ok
  453. ++[expiration] returns noop
  454. ++[logintime] returns noop
  455. rlm_pap: Found existing Auth-Type, not changing it.
  456. ++[pap] returns noop
  457. rad_check_password: Found Auth-Type EAP
  458. auth: type "EAP"
  459. +- entering group authenticate
  460. rlm_eap: Request found, released from the list
  461. rlm_eap: EAP/mschapv2
  462. rlm_eap: processing type mschapv2
  463. +- entering group MS-CHAP
  464. rlm_mschap: Told to do MS-CHAPv2 for tester with NT-Password
  465. ++[mschap] returns ok
  466. MSCHAP Success
  467. ++[eap] returns handled
  468. } # server inner-tunnel
  469. PEAP: Got tunneled reply RADIUS code 11
  470. EAP-Message = 0x010800331a0307002e533d32354639454346413136313845393843333932443535433535454343424433353335463233374436
  471. Message-Authenticator = 0x00000000000000000000000000000000
  472. State = 0x45ec2fcd44e435548ba441bf0fe730d0
  473. PEAP: Processing from tunneled session code 0xc26520 11
  474. EAP-Message = 0x010800331a0307002e533d32354639454346413136313845393843333932443535433535454343424433353335463233374436
  475. Message-Authenticator = 0x00000000000000000000000000000000
  476. State = 0x45ec2fcd44e435548ba441bf0fe730d0
  477. PEAP: Got tunneled Access-Challenge
  478. ++[eap] returns handled
  479. Sending Access-Challenge of id 198 to 10.10.17.123 port 1026
  480. EAP-Message = 0x0108005b190017030100508646883fae54e44eb2f921f179af2b1cdf49057322b97f74c412896d60ac686cc4b7f048001382c38a549f619e739339c3ac76cbeb29b52dbedb9ee2c6e6c1a12f1ba8fad546102c2cf9b9efdae02465
  481. Message-Authenticator = 0x00000000000000000000000000000000
  482. State = 0xa44b1a68a34303fb909c3ce6cf13014b
  483. Finished request 8.
  484. Going to the next request
  485. Waking up in 4.7 seconds.
  486. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=199, length=240
  487. User-Name = "tester"
  488. NAS-IP-Address = 10.10.17.123
  489. NAS-Port = 1
  490. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  491. Calling-Station-Id = "AC-81-12-31-25-3F"
  492. Framed-MTU = 1400
  493. NAS-Port-Type = Wireless-802.11
  494. Connect-Info = "CONNECT 54Mbps 802.11g"
  495. EAP-Message = 0x0208005019001703010020253746a0d9b4eeda29bb1f124e930a7a043cb51710d189ccab4c0fa5b79ea47d17030100200527c5acae065ecd797ad2b54519586e8e965d75990730f28383c99d4949e87a
  496. State = 0xa44b1a68a34303fb909c3ce6cf13014b
  497. Message-Authenticator = 0x7203eab2f0816d31ba18a511592eaba7
  498. +- entering group authorize
  499. ++[preprocess] returns ok
  500. ++[chap] returns noop
  501. ++[mschap] returns noop
  502. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  503. rlm_realm: No such realm "NULL"
  504. ++[suffix] returns noop
  505. rlm_eap: EAP packet type response id 8 length 80
  506. rlm_eap: Continuing tunnel setup.
  507. ++[eap] returns ok
  508. rad_check_password: Found Auth-Type EAP
  509. auth: type "EAP"
  510. +- entering group authenticate
  511. rlm_eap: Request found, released from the list
  512. rlm_eap: EAP/peap
  513. rlm_eap: processing type peap
  514. rlm_eap_peap: Authenticate
  515. rlm_eap_tls: processing TLS
  516. eaptls_verify returned 7
  517. rlm_eap_tls: Done initial handshake
  518. eaptls_process returned 7
  519. rlm_eap_peap: EAPTLS_OK
  520. rlm_eap_peap: Session established. Decoding tunneled attributes.
  521. rlm_eap_peap: EAP type mschapv2
  522. PEAP: Got tunneled EAP-Message
  523. EAP-Message = 0x020800061a03
  524. PEAP: Setting User-Name to tester
  525. PEAP: Sending tunneled request
  526. EAP-Message = 0x020800061a03
  527. FreeRADIUS-Proxied-To = 127.0.0.1
  528. User-Name = "tester"
  529. State = 0x45ec2fcd44e435548ba441bf0fe730d0
  530. server inner-tunnel {
  531. +- entering group authorize
  532. ++[chap] returns noop
  533. ++[mschap] returns noop
  534. ++[unix] returns notfound
  535. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  536. rlm_realm: No such realm "NULL"
  537. ++[suffix] returns noop
  538. ++[control] returns noop
  539. rlm_eap: EAP packet type response id 8 length 6
  540. rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  541. ++[eap] returns updated
  542. users: Matched entry tester at line 205
  543. ++[files] returns ok
  544. ++[expiration] returns noop
  545. ++[logintime] returns noop
  546. rlm_pap: Found existing Auth-Type, not changing it.
  547. ++[pap] returns noop
  548. rad_check_password: Found Auth-Type EAP
  549. auth: type "EAP"
  550. +- entering group authenticate
  551. rlm_eap: Request found, released from the list
  552. rlm_eap: EAP/mschapv2
  553. rlm_eap: processing type mschapv2
  554. rlm_eap: Freeing handler
  555. ++[eap] returns ok
  556. } # server inner-tunnel
  557. PEAP: Got tunneled reply RADIUS code 2
  558. EAP-Message = 0x03080004
  559. Message-Authenticator = 0x00000000000000000000000000000000
  560. User-Name = "tester"
  561. PEAP: Processing from tunneled session code 0xc26800 2
  562. EAP-Message = 0x03080004
  563. Message-Authenticator = 0x00000000000000000000000000000000
  564. User-Name = "tester"
  565. PEAP: Tunneled authentication was successful.
  566. rlm_eap_peap: SUCCESS
  567. ++[eap] returns handled
  568. Sending Access-Challenge of id 199 to 10.10.17.123 port 1026
  569. EAP-Message = 0x0109003b190017030100301532390b936c7eab064a1a198166c6c0321dc45aa4fbbad48bf72fd9d3cdd700caa425b9caaa142b982d620298b8aa97
  570. Message-Authenticator = 0x00000000000000000000000000000000
  571. State = 0xa44b1a68ac4203fb909c3ce6cf13014b
  572. Finished request 9.
  573. Going to the next request
  574. Waking up in 4.6 seconds.
  575. rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=200, length=256
  576. User-Name = "tester"
  577. NAS-IP-Address = 10.10.17.123
  578. NAS-Port = 1
  579. Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
  580. Calling-Station-Id = "AC-81-12-31-25-3F"
  581. Framed-MTU = 1400
  582. NAS-Port-Type = Wireless-802.11
  583. Connect-Info = "CONNECT 54Mbps 802.11g"
  584. EAP-Message = 0x02090060190017030100206d2a1b3e69cfac6fcddc322ac4b20f30f6cf057aaed9d1057cf1aa8ad02293de170301003025d267fdc553937f2129be11ae5b884ac6f24079c03006ec659b85ac39751c3f759b708755c15c17b0fde3f3fe252a01
  585. State = 0xa44b1a68ac4203fb909c3ce6cf13014b
  586. Message-Authenticator = 0xd1fa183410e00d9a9b2f25c79f36dc34
  587. +- entering group authorize
  588. ++[preprocess] returns ok
  589. ++[chap] returns noop
  590. ++[mschap] returns noop
  591. rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
  592. rlm_realm: No such realm "NULL"
  593. ++[suffix] returns noop
  594. rlm_eap: EAP packet type response id 9 length 96
  595. rlm_eap: Continuing tunnel setup.
  596. ++[eap] returns ok
  597. rad_check_password: Found Auth-Type EAP
  598. auth: type "EAP"
  599. +- entering group authenticate
  600. rlm_eap: Request found, released from the list
  601. rlm_eap: EAP/peap
  602. rlm_eap: processing type peap
  603. rlm_eap_peap: Authenticate
  604. rlm_eap_tls: processing TLS
  605. eaptls_verify returned 7
  606. rlm_eap_tls: Done initial handshake
  607. eaptls_process returned 7
  608. rlm_eap_peap: EAPTLS_OK
  609. rlm_eap_peap: Session established. Decoding tunneled attributes.
  610. rlm_eap_peap: Received EAP-TLV response.
  611. rlm_eap_peap: Success
  612. rlm_eap: Freeing handler
  613. ++[eap] returns ok
  614. +- entering group post-auth
  615. rlm_sql (sql): Processing sql_postauth
  616. expand: %{User-Name} -> tester
  617. rlm_sql (sql): sql_set_user escaped user --> 'tester'
  618. expand: %{User-Password} ->
  619. expand: %{Chap-Password} ->
  620. expand: INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') -> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'tester', '', 'Access-Accept', '2011-08-30 00:41:10')
  621. rlm_sql (sql) in sql_postauth: query is INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'tester', '', 'Access-Accept', '2011-08-30 00:41:10')
  622. rlm_sql (sql): Reserving sql socket id: 1
  623. rlm_sql (sql): Released sql socket id: 1
  624. ++[sql] returns ok
  625. ++[exec] returns noop
  626. Sending Access-Accept of id 200 to 10.10.17.123 port 1026
  627. MS-MPPE-Recv-Key = 0x710bacbf2ab0b7ea73452dfc01200277d86c052a87e784b5490351d18f60dea3
  628. MS-MPPE-Send-Key = 0x97b6ba855b518458b70c0b01fcdaca880663821072bd3d6a2cb70dc78e8246c4
  629. EAP-Message = 0x03090004
  630. Message-Authenticator = 0x00000000000000000000000000000000
  631. User-Name = "tester"
  632. Finished request 10.
  633. Going to the next request
  634. Waking up in 4.6 seconds.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement