Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=191, length=153
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x0200000b01746573746572
- Message-Authenticator = 0x0d4e73be2765e6c459d70a39defe2256
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 0 length 11
- rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- users: Matched entry tester at line 205
- ++[files] returns ok
- expand: %{User-Name} -> tester
- rlm_sql (sql): sql_set_user escaped user --> 'tester'
- rlm_sql (sql): Reserving sql socket id: 2
- expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'tester' ORDER BY id
- expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'tester' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 2
- rlm_sql (sql): User tester not found
- ++[sql] returns notfound
- ++[expiration] returns noop
- ++[logintime] returns noop
- rlm_pap: Found existing Auth-Type, not changing it.
- ++[pap] returns noop
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: EAP Identity
- rlm_eap: processing type tls
- rlm_eap_tls: Initiate
- rlm_eap_tls: Start returned 1
- ++[eap] returns handled
- Sending Access-Challenge of id 191 to 10.10.17.123 port 1026
- EAP-Message = 0x010100061920
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a44a03fb909c3ce6cf13014b
- Finished request 1.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=192, length=265
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x0201006919800000005f160301005a0100005603014e5b87cc359da27bc5d1ad07ab4e4f84563b6d0d0eb204de3509c837389fe08700002800390038003500160013000a00330032002f000500040015001200090014001100080006000300ff020100000400230000
- State = 0xa44b1a68a44a03fb909c3ce6cf13014b
- Message-Authenticator = 0xe5c8876e4b21f4428a34d49d5f81a8a5
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 1 length 105
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- TLS Length 95
- rlm_eap_tls: Length Included
- eaptls_verify returned 11
- (other): before/accept initialization
- TLS_accept: before/accept initialization
- rlm_eap_tls: <<< TLS 1.0 Handshake [length 005a], ClientHello
- TLS_accept: SSLv3 read client hello A
- rlm_eap_tls: >>> TLS 1.0 Handshake [length 0035], ServerHello
- TLS_accept: SSLv3 write server hello A
- rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate
- TLS_accept: SSLv3 write certificate A
- rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
- TLS_accept: SSLv3 write key exchange A
- rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
- TLS_accept: SSLv3 write server done A
- TLS_accept: SSLv3 flush data
- TLS_accept: Need to read more data: SSLv3 read client certificate A
- In SSL Handshake Phase
- In SSL Accept mode
- eaptls_process returned 13
- rlm_eap_peap: EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 192 to 10.10.17.123 port 1026
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x9e4679a332e9d249ab274469d266f4e48ccdc54d6700e236ca46deb35731040495fc37b2f0f4f7a4e45eb58e862f3ce1f093d625be1e8dfacae815c378f243d44d4aad1e7d3f1d4bdbd36520224d5037fb001e33f83c28649e80a18cb9f6e2b630c797d179bf3e698bde3588f58e2d900cd9959a1608ee61ffb74b04ec9e9d8f3c883888007ae5dc68b5b62a2ec9b397309739b331ac1d8564e0342e8c4995c3692af187868fe974b698357e1079285872392ffd82d92a601ed6d073f7fae5cbc55d612b1db43ee4009aa62b430203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101040500038201
- EAP-Message = 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
- EAP-Message = 0x174305e5620004ab308204a7
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a54903fb909c3ce6cf13014b
- Finished request 2.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=193, length=166
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020200061900
- State = 0xa44b1a68a54903fb909c3ce6cf13014b
- Message-Authenticator = 0x177b0516eb720d169a80c61a73891690
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 2 length 6
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- rlm_eap_tls: Received EAP-TLS ACK message
- rlm_eap_tls: ack handshake fragment handler
- eaptls_verify returned 1
- eaptls_process returned 13
- rlm_eap_peap: EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 193 to 10.10.17.123 port 1026
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x9a1829bf97df5858
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a64803fb909c3ce6cf13014b
- Finished request 3.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=194, length=166
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020300061900
- State = 0xa44b1a68a64803fb909c3ce6cf13014b
- Message-Authenticator = 0xbdb6daf56d45c80d200cf563f6501516
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 3 length 6
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- rlm_eap_tls: Received EAP-TLS ACK message
- rlm_eap_tls: ack handshake fragment handler
- eaptls_verify returned 1
- eaptls_process returned 13
- rlm_eap_peap: EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 194 to 10.10.17.123 port 1026
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0xb4913390de928e6eac4b7d75ccbecfb603ae2f493efbe780b0429ba420902a67f721219ef3a683f191ef6d877e103e6ffcaa5a74b818f87ee8c20ad079df6953cdd0528522d149c70e63e3cefcf0941e8b18485d3c049fad05b954177f1773a691ca7d467b15e527b91a9c8883cfc68bd566b51b2c4f75382f7ba43dc8cc67b8d446433045bc8e8785964bcd9a793f4c7668cfff30a0cbc456a7553193c2f341b8942def581cfe321d47dd930f7282d19b96d3ff63e0dfce4fe72193742531da593d8066634b27413d6f3fef5a2fc016030100040e000000
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a74f03fb909c3ce6cf13014b
- Finished request 4.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=195, length=368
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020400d01980000000c616030100861000008200808cd32b677611c366bd6eaf8a1c2064c4aac40d13821d16ae8475524b2d51f2abd68558418979955de735c67ff0d225e0b874cc972ecbc9b6c71cd6670d33aa055e67f95ed9a98a55bf873f65a4f0d1b4666d58b778a14ad86f3e727fc19351a2cf6df11bf935f632e249f3ae8a59b8de5b40e4bef70e6040f0e0331a06f5b17714030100010116030100306e5b5f1ce7129e8a1393f2e0685f9811c92381cf1037fb86390778daca7bb9562f7aafbeb3ddcd7510eb8597b798c2e4
- State = 0xa44b1a68a74f03fb909c3ce6cf13014b
- Message-Authenticator = 0xb2942d1c3e0656407952493d12ae140b
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 4 length 208
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- TLS Length 198
- rlm_eap_tls: Length Included
- eaptls_verify returned 11
- rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
- TLS_accept: SSLv3 read client key exchange A
- rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
- rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
- TLS_accept: SSLv3 read finished A
- rlm_eap_tls: >>> TLS 1.0 Handshake [length 00aa]???
- TLS_accept: SSLv3 write session ticket A
- rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
- TLS_accept: SSLv3 write change cipher spec A
- rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
- TLS_accept: SSLv3 write finished A
- TLS_accept: SSLv3 flush data
- (other): SSL negotiation finished successfully
- SSL Connection Established
- eaptls_process returned 13
- rlm_eap_peap: EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 195 to 10.10.17.123 port 1026
- EAP-Message = 0x010500f0190016030100aa040000a60000000000a07497f5699a7d99fac33af1f62e002fb2d800b95d5f5116cdd864d314576af242692a04f736a5f3990e754cc3c5881238fb53dd440e5d57451577006e59c04252a935a80d487e1a93cb9895fff9c3bf8802025ba1ec2e344b0aeb1b26dc44a05f874e44803c32183c9a770e254c50878ccac999c4f6cd359a9ca286626905fb400dda62e4a01e2f05fadb6153908cf8433ee00ed4a8df7bda1bcaddebafe5a1d114030100010116030100309096c39cb570fca3e3a4b4bb13d8108b798277245bf3f18ac6b88100659abeeaeb04ebc3c8787419c4263ff2dc411b63
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a04e03fb909c3ce6cf13014b
- Finished request 5.
- Going to the next request
- Waking up in 4.7 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=196, length=166
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020500061900
- State = 0xa44b1a68a04e03fb909c3ce6cf13014b
- Message-Authenticator = 0xe18d9c90fa3d7472443e81b29cd2c048
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 5 length 6
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- rlm_eap_tls: Received EAP-TLS ACK message
- rlm_eap_tls: ack handshake is finished
- eaptls_verify returned 3
- eaptls_process returned 3
- rlm_eap_peap: EAPTLS_SUCCESS
- ++[eap] returns handled
- Sending Access-Challenge of id 196 to 10.10.17.123 port 1026
- EAP-Message = 0x0106002b19001703010020652c2764e4665f50f7a5db450de8fc12faecb88e719569b552a77d7bea975a34
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a14d03fb909c3ce6cf13014b
- Finished request 6.
- Going to the next request
- Waking up in 4.7 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=197, length=256
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020600601900170301002023a999edf1ff61a883ae95dd591c9b84781f28001097f9cd4372cd7299bd12b617030100301ac335c8c5c47aef731426a562e1e6d584e2151f1e1f9d766b7eb1aff02746f443fb08102be8913cb816d4c0c3304c5e
- State = 0xa44b1a68a14d03fb909c3ce6cf13014b
- Message-Authenticator = 0xa544d85995523b9b8bcd8fdf5f86deca
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 6 length 96
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- eaptls_verify returned 7
- rlm_eap_tls: Done initial handshake
- eaptls_process returned 7
- rlm_eap_peap: EAPTLS_OK
- rlm_eap_peap: Session established. Decoding tunneled attributes.
- rlm_eap_peap: Identity - tester
- PEAP: Got tunneled EAP-Message
- EAP-Message = 0x0206000b01746573746572
- PEAP: Got tunneled identity of tester
- PEAP: Setting default EAP type for tunneled EAP session.
- PEAP: Setting User-Name to tester
- PEAP: Sending tunneled request
- EAP-Message = 0x0206000b01746573746572
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "tester"
- server inner-tunnel {
- +- entering group authorize
- ++[chap] returns noop
- ++[mschap] returns noop
- ++[unix] returns notfound
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- ++[control] returns noop
- rlm_eap: EAP packet type response id 6 length 11
- rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- users: Matched entry tester at line 205
- ++[files] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- rlm_pap: Found existing Auth-Type, not changing it.
- ++[pap] returns noop
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: EAP Identity
- rlm_eap: processing type mschapv2
- rlm_eap_mschapv2: Issuing Challenge
- ++[eap] returns handled
- } # server inner-tunnel
- PEAP: Got tunneled reply RADIUS code 11
- EAP-Message = 0x010700201a0107001b10d8f1accb9150ef9c2c4c56182beff468746573746572
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x45ec2fcd45eb35548ba441bf0fe730d0
- PEAP: Processing from tunneled session code 0xc2aa20 11
- EAP-Message = 0x010700201a0107001b10d8f1accb9150ef9c2c4c56182beff468746573746572
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x45ec2fcd45eb35548ba441bf0fe730d0
- PEAP: Got tunneled Access-Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 197 to 10.10.17.123 port 1026
- EAP-Message = 0x0107004b19001703010040385c65c50fe57aa1b312e35dcb4fba1dd7ec9509738128cd16366dcf9fe81566a588f1c1a247ba04a738dcbb8153cb29c8505e4df30a67eadc85273643f1159e
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a24c03fb909c3ce6cf13014b
- Finished request 7.
- Going to the next request
- Waking up in 4.7 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=198, length=304
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x0207009019001703010020de202f400c9316d118cd8364a59d4f80f38f7bfdfe7131d1e1deaa60b73236db17030100604c8c4435e3f29b4c44f3a57b2025d3a53d6b020626003a038e1f7aabd74262a9dd8fa9a897235599fbb14952053918f17ed1b633e0fb5933e0987dc3c7b48fbc8f90fa50c1b4f9783016ccc66b8ba76d7e86204ac2478e997c17b084da3039a0
- State = 0xa44b1a68a24c03fb909c3ce6cf13014b
- Message-Authenticator = 0xb561a93ecec9c28dfa2e346dcafd4858
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 7 length 144
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- eaptls_verify returned 7
- rlm_eap_tls: Done initial handshake
- eaptls_process returned 7
- rlm_eap_peap: EAPTLS_OK
- rlm_eap_peap: Session established. Decoding tunneled attributes.
- rlm_eap_peap: EAP type mschapv2
- PEAP: Got tunneled EAP-Message
- EAP-Message = 0x020700411a0207003c317b2cf0ebdeb9bd66236e165464dfdadd000000000000000073aeffecba1fd4c3769f6d5cdad787c283137b82e4cf873200746573746572
- PEAP: Setting User-Name to tester
- PEAP: Sending tunneled request
- EAP-Message = 0x020700411a0207003c317b2cf0ebdeb9bd66236e165464dfdadd000000000000000073aeffecba1fd4c3769f6d5cdad787c283137b82e4cf873200746573746572
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "tester"
- State = 0x45ec2fcd45eb35548ba441bf0fe730d0
- server inner-tunnel {
- +- entering group authorize
- ++[chap] returns noop
- ++[mschap] returns noop
- ++[unix] returns notfound
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- ++[control] returns noop
- rlm_eap: EAP packet type response id 7 length 65
- rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- users: Matched entry tester at line 205
- ++[files] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- rlm_pap: Found existing Auth-Type, not changing it.
- ++[pap] returns noop
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/mschapv2
- rlm_eap: processing type mschapv2
- +- entering group MS-CHAP
- rlm_mschap: Told to do MS-CHAPv2 for tester with NT-Password
- ++[mschap] returns ok
- MSCHAP Success
- ++[eap] returns handled
- } # server inner-tunnel
- PEAP: Got tunneled reply RADIUS code 11
- EAP-Message = 0x010800331a0307002e533d32354639454346413136313845393843333932443535433535454343424433353335463233374436
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x45ec2fcd44e435548ba441bf0fe730d0
- PEAP: Processing from tunneled session code 0xc26520 11
- EAP-Message = 0x010800331a0307002e533d32354639454346413136313845393843333932443535433535454343424433353335463233374436
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x45ec2fcd44e435548ba441bf0fe730d0
- PEAP: Got tunneled Access-Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 198 to 10.10.17.123 port 1026
- EAP-Message = 0x0108005b190017030100508646883fae54e44eb2f921f179af2b1cdf49057322b97f74c412896d60ac686cc4b7f048001382c38a549f619e739339c3ac76cbeb29b52dbedb9ee2c6e6c1a12f1ba8fad546102c2cf9b9efdae02465
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68a34303fb909c3ce6cf13014b
- Finished request 8.
- Going to the next request
- Waking up in 4.7 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=199, length=240
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x0208005019001703010020253746a0d9b4eeda29bb1f124e930a7a043cb51710d189ccab4c0fa5b79ea47d17030100200527c5acae065ecd797ad2b54519586e8e965d75990730f28383c99d4949e87a
- State = 0xa44b1a68a34303fb909c3ce6cf13014b
- Message-Authenticator = 0x7203eab2f0816d31ba18a511592eaba7
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 8 length 80
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- eaptls_verify returned 7
- rlm_eap_tls: Done initial handshake
- eaptls_process returned 7
- rlm_eap_peap: EAPTLS_OK
- rlm_eap_peap: Session established. Decoding tunneled attributes.
- rlm_eap_peap: EAP type mschapv2
- PEAP: Got tunneled EAP-Message
- EAP-Message = 0x020800061a03
- PEAP: Setting User-Name to tester
- PEAP: Sending tunneled request
- EAP-Message = 0x020800061a03
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "tester"
- State = 0x45ec2fcd44e435548ba441bf0fe730d0
- server inner-tunnel {
- +- entering group authorize
- ++[chap] returns noop
- ++[mschap] returns noop
- ++[unix] returns notfound
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- ++[control] returns noop
- rlm_eap: EAP packet type response id 8 length 6
- rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- users: Matched entry tester at line 205
- ++[files] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- rlm_pap: Found existing Auth-Type, not changing it.
- ++[pap] returns noop
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/mschapv2
- rlm_eap: processing type mschapv2
- rlm_eap: Freeing handler
- ++[eap] returns ok
- } # server inner-tunnel
- PEAP: Got tunneled reply RADIUS code 2
- EAP-Message = 0x03080004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "tester"
- PEAP: Processing from tunneled session code 0xc26800 2
- EAP-Message = 0x03080004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "tester"
- PEAP: Tunneled authentication was successful.
- rlm_eap_peap: SUCCESS
- ++[eap] returns handled
- Sending Access-Challenge of id 199 to 10.10.17.123 port 1026
- EAP-Message = 0x0109003b190017030100301532390b936c7eab064a1a198166c6c0321dc45aa4fbbad48bf72fd9d3cdd700caa425b9caaa142b982d620298b8aa97
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xa44b1a68ac4203fb909c3ce6cf13014b
- Finished request 9.
- Going to the next request
- Waking up in 4.6 seconds.
- rad_recv: Access-Request packet from host 10.10.17.123 port 1026, id=200, length=256
- User-Name = "tester"
- NAS-IP-Address = 10.10.17.123
- NAS-Port = 1
- Called-Station-Id = "1C-AF-F7-95-98-58:bristol"
- Calling-Station-Id = "AC-81-12-31-25-3F"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x02090060190017030100206d2a1b3e69cfac6fcddc322ac4b20f30f6cf057aaed9d1057cf1aa8ad02293de170301003025d267fdc553937f2129be11ae5b884ac6f24079c03006ec659b85ac39751c3f759b708755c15c17b0fde3f3fe252a01
- State = 0xa44b1a68ac4203fb909c3ce6cf13014b
- Message-Authenticator = 0xd1fa183410e00d9a9b2f25c79f36dc34
- +- entering group authorize
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- rlm_realm: No '@' in User-Name = "tester", looking up realm NULL
- rlm_realm: No such realm "NULL"
- ++[suffix] returns noop
- rlm_eap: EAP packet type response id 9 length 96
- rlm_eap: Continuing tunnel setup.
- ++[eap] returns ok
- rad_check_password: Found Auth-Type EAP
- auth: type "EAP"
- +- entering group authenticate
- rlm_eap: Request found, released from the list
- rlm_eap: EAP/peap
- rlm_eap: processing type peap
- rlm_eap_peap: Authenticate
- rlm_eap_tls: processing TLS
- eaptls_verify returned 7
- rlm_eap_tls: Done initial handshake
- eaptls_process returned 7
- rlm_eap_peap: EAPTLS_OK
- rlm_eap_peap: Session established. Decoding tunneled attributes.
- rlm_eap_peap: Received EAP-TLV response.
- rlm_eap_peap: Success
- rlm_eap: Freeing handler
- ++[eap] returns ok
- +- entering group post-auth
- rlm_sql (sql): Processing sql_postauth
- expand: %{User-Name} -> tester
- rlm_sql (sql): sql_set_user escaped user --> 'tester'
- expand: %{User-Password} ->
- expand: %{Chap-Password} ->
- expand: INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') -> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'tester', '', 'Access-Accept', '2011-08-30 00:41:10')
- rlm_sql (sql) in sql_postauth: query is INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'tester', '', 'Access-Accept', '2011-08-30 00:41:10')
- rlm_sql (sql): Reserving sql socket id: 1
- rlm_sql (sql): Released sql socket id: 1
- ++[sql] returns ok
- ++[exec] returns noop
- Sending Access-Accept of id 200 to 10.10.17.123 port 1026
- MS-MPPE-Recv-Key = 0x710bacbf2ab0b7ea73452dfc01200277d86c052a87e784b5490351d18f60dea3
- MS-MPPE-Send-Key = 0x97b6ba855b518458b70c0b01fcdaca880663821072bd3d6a2cb70dc78e8246c4
- EAP-Message = 0x03090004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "tester"
- Finished request 10.
- Going to the next request
- Waking up in 4.6 seconds.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement