Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- (461) Received Access-Request Id 230 from 10.8.0.111:58432 to 10.8.64.155:1812 length 177
- (461) User-Name = "vkratsberg"
- (461) NAS-Port = 358
- (461) EAP-Message = 0x0200000f01766b7261747362657267
- (461) Message-Authenticator = 0x7ab870de8cac56743e39682d189e8467
- (461) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (461) NAS-Port-Id = "ge-3/0/6.0"
- (461) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (461) Called-Station-Id = "ec-3e-f7-68-35-00"
- (461) NAS-IP-Address = 10.8.0.111
- (461) NAS-Identifier = "nyc-access-sw011"
- (461) NAS-Port-Type = Ethernet
- (461) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (461) authorize {
- (461) policy filter_username {
- (461) if (&User-Name) {
- (461) if (&User-Name) -> TRUE
- (461) if (&User-Name) {
- (461) if (&User-Name =~ / /) {
- (461) if (&User-Name =~ / /) -> FALSE
- (461) if (&User-Name =~ /@[^@]*@/ ) {
- (461) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (461) if (&User-Name =~ /\.\./ ) {
- (461) if (&User-Name =~ /\.\./ ) -> FALSE
- (461) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (461) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (461) if (&User-Name =~ /\.$/) {
- (461) if (&User-Name =~ /\.$/) -> FALSE
- (461) if (&User-Name =~ /@\./) {
- (461) if (&User-Name =~ /@\./) -> FALSE
- (461) } # if (&User-Name) = notfound
- (461) } # policy filter_username = notfound
- (461) [preprocess] = ok
- (461) [chap] = noop
- (461) [mschap] = noop
- (461) [digest] = noop
- (461) suffix: Checking for suffix after "@"
- (461) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (461) suffix: No such realm "NULL"
- (461) [suffix] = noop
- (461) eap: Peer sent EAP Response (code 2) ID 0 length 15
- (461) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
- (461) [eap] = ok
- (461) } # authorize = ok
- (461) Found Auth-Type = eap
- (461) # Executing group from file /etc/raddb/sites-enabled/default
- (461) authenticate {
- (461) eap: Peer sent packet with method EAP Identity (1)
- (461) eap: Calling submodule eap_peap to process data
- (461) eap_peap: Initiating new EAP-TLS session
- (461) eap_peap: [eaptls start] = request
- (461) eap: Sending EAP Request (code 1) ID 1 length 6
- (461) eap: EAP session adding &reply:State = 0xfece9bc1fecf8204
- (461) [eap] = handled
- (461) } # authenticate = handled
- (461) Using Post-Auth-Type Challenge
- (461) Post-Auth-Type sub-section not found. Ignoring.
- (461) # Executing group from file /etc/raddb/sites-enabled/default
- (461) Sent Access-Challenge Id 230 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (461) EAP-Message = 0x010100061920
- (461) Message-Authenticator = 0x00000000000000000000000000000000
- (461) State = 0xfece9bc1fecf8204e5f72135a1474252
- (461) Finished request
- Waking up in 4.9 seconds.
- (462) Received Access-Request Id 231 from 10.8.0.111:58432 to 10.8.64.155:1812 length 195
- (462) User-Name = "vkratsberg"
- (462) NAS-Port = 358
- (462) State = 0xfece9bc1fecf8204e5f72135a1474252
- (462) EAP-Message = 0x0202000f01766b7261747362657267
- (462) Message-Authenticator = 0x987d24687229e5a0df4d03a347269eab
- (462) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (462) NAS-Port-Id = "ge-3/0/6.0"
- (462) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (462) Called-Station-Id = "ec-3e-f7-68-35-00"
- (462) NAS-IP-Address = 10.8.0.111
- (462) NAS-Identifier = "nyc-access-sw011"
- (462) NAS-Port-Type = Ethernet
- (462) session-state: No cached attributes
- (462) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (462) authorize {
- (462) policy filter_username {
- (462) if (&User-Name) {
- (462) if (&User-Name) -> TRUE
- (462) if (&User-Name) {
- (462) if (&User-Name =~ / /) {
- (462) if (&User-Name =~ / /) -> FALSE
- (462) if (&User-Name =~ /@[^@]*@/ ) {
- (462) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (462) if (&User-Name =~ /\.\./ ) {
- (462) if (&User-Name =~ /\.\./ ) -> FALSE
- (462) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (462) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (462) if (&User-Name =~ /\.$/) {
- (462) if (&User-Name =~ /\.$/) -> FALSE
- (462) if (&User-Name =~ /@\./) {
- (462) if (&User-Name =~ /@\./) -> FALSE
- (462) } # if (&User-Name) = notfound
- (462) } # policy filter_username = notfound
- (462) [preprocess] = ok
- (462) [chap] = noop
- (462) [mschap] = noop
- (462) [digest] = noop
- (462) suffix: Checking for suffix after "@"
- (462) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (462) suffix: No such realm "NULL"
- (462) [suffix] = noop
- (462) eap: Peer sent EAP Response (code 2) ID 2 length 15
- (462) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
- (462) [eap] = ok
- (462) } # authorize = ok
- (462) Found Auth-Type = eap
- (462) # Executing group from file /etc/raddb/sites-enabled/default
- (462) authenticate {
- (462) eap: Peer sent packet with method EAP Identity (1)
- (462) eap: Calling submodule eap_peap to process data
- (462) eap_peap: Initiating new EAP-TLS session
- (462) eap_peap: [eaptls start] = request
- (462) eap: Sending EAP Request (code 1) ID 3 length 6
- (462) eap: EAP session adding &reply:State = 0x4e4e9ffd4e4d8685
- (462) [eap] = handled
- (462) } # authenticate = handled
- (462) Using Post-Auth-Type Challenge
- (462) Post-Auth-Type sub-section not found. Ignoring.
- (462) # Executing group from file /etc/raddb/sites-enabled/default
- (462) Sent Access-Challenge Id 231 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (462) EAP-Message = 0x010300061920
- (462) Message-Authenticator = 0x00000000000000000000000000000000
- (462) State = 0x4e4e9ffd4e4d8685e2c45c149088adba
- (462) Finished request
- (463) Received Access-Request Id 232 from 10.8.0.111:58432 to 10.8.64.155:1812 length 311
- (463) User-Name = "vkratsberg"
- (463) NAS-Port = 358
- (463) State = 0x4e4e9ffd4e4d8685e2c45c149088adba
- (463) EAP-Message = 0x020300831980000000791603010074010000700301573f5133bbe7a9e4c0a3c440db4c397bb6e9d332e8b94372feb435853f07af0700002800ffc024c023c00ac009c008c028c027c014c013c012003d003c0035002f000ac007c011000500040100001f000a00080006001700180019000b0002010000
- (463) Message-Authenticator = 0x00f4f2d31a4f7d21e85ee6d3b425d869
- (463) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (463) NAS-Port-Id = "ge-3/0/6.0"
- (463) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (463) Called-Station-Id = "ec-3e-f7-68-35-00"
- (463) NAS-IP-Address = 10.8.0.111
- (463) NAS-Identifier = "nyc-access-sw011"
- (463) NAS-Port-Type = Ethernet
- (463) session-state: No cached attributes
- (463) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (463) authorize {
- (463) policy filter_username {
- (463) if (&User-Name) {
- (463) if (&User-Name) -> TRUE
- (463) if (&User-Name) {
- (463) if (&User-Name =~ / /) {
- (463) if (&User-Name =~ / /) -> FALSE
- (463) if (&User-Name =~ /@[^@]*@/ ) {
- (463) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (463) if (&User-Name =~ /\.\./ ) {
- (463) if (&User-Name =~ /\.\./ ) -> FALSE
- (463) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (463) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (463) if (&User-Name =~ /\.$/) {
- (463) if (&User-Name =~ /\.$/) -> FALSE
- (463) if (&User-Name =~ /@\./) {
- (463) if (&User-Name =~ /@\./) -> FALSE
- (463) } # if (&User-Name) = notfound
- (463) } # policy filter_username = notfound
- (463) [preprocess] = ok
- (463) [chap] = noop
- (463) [mschap] = noop
- (463) [digest] = noop
- (463) suffix: Checking for suffix after "@"
- (463) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (463) suffix: No such realm "NULL"
- (463) [suffix] = noop
- (463) eap: Peer sent EAP Response (code 2) ID 3 length 131
- (463) eap: Continuing tunnel setup
- (463) [eap] = ok
- (463) } # authorize = ok
- (463) Found Auth-Type = eap
- (463) # Executing group from file /etc/raddb/sites-enabled/default
- (463) authenticate {
- (463) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (463) eap: Finished EAP session with state 0x4e4e9ffd4e4d8685
- (463) eap: Previous EAP request found for state 0x4e4e9ffd4e4d8685, released from the list
- (463) eap: Peer sent packet with method EAP PEAP (25)
- (463) eap: Calling submodule eap_peap to process data
- (463) eap_peap: Continuing EAP-TLS
- (463) eap_peap: Peer indicated complete TLS record size will be 121 bytes
- (463) eap_peap: Got complete TLS record (121 bytes)
- (463) eap_peap: [eaptls verify] = length included
- (463) eap_peap: (other): before/accept initialization
- (463) eap_peap: TLS_accept: before/accept initialization
- (463) eap_peap: <<< recv TLS 1.0 Handshake [length 0074], ClientHello
- (463) eap_peap: TLS_accept: SSLv3 read client hello A
- (463) eap_peap: >>> send TLS 1.0 Handshake [length 0059], ServerHello
- (463) eap_peap: TLS_accept: SSLv3 write server hello A
- (463) eap_peap: >>> send TLS 1.0 Handshake [length 08d3], Certificate
- (463) eap_peap: TLS_accept: SSLv3 write certificate A
- (463) eap_peap: >>> send TLS 1.0 Handshake [length 014b], ServerKeyExchange
- (463) eap_peap: TLS_accept: SSLv3 write key exchange A
- (463) eap_peap: >>> send TLS 1.0 Handshake [length 0004], ServerHelloDone
- (463) eap_peap: TLS_accept: SSLv3 write server done A
- (463) eap_peap: TLS_accept: SSLv3 flush data
- (463) eap_peap: TLS_accept: Need to read more data: SSLv3 read client certificate A
- (463) eap_peap: TLS_accept: Need to read more data: SSLv3 read client certificate A
- (463) eap_peap: In SSL Handshake Phase
- (463) eap_peap: In SSL Accept mode
- (463) eap_peap: [eaptls process] = handled
- (463) eap: Sending EAP Request (code 1) ID 4 length 1004
- (463) eap: EAP session adding &reply:State = 0x4e4e9ffd4f4a8685
- (463) [eap] = handled
- (463) } # authenticate = handled
- (463) Using Post-Auth-Type Challenge
- (463) Post-Auth-Type sub-section not found. Ignoring.
- (463) # Executing group from file /etc/raddb/sites-enabled/default
- (463) Sent Access-Challenge Id 232 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (463) EAP-Message = 0x010403ec19c000000a8f1603010059020000550301573f51336c2421755e0079c2580b2f3bc2b3e8abfc6bc4d8bd9db4800411891d20db7e18d3097fb50d6e524ed64ab6b79186bcde72dc80088c7a5200b90b528660c01400000dff01000100000b00040300010216030108d30b0008cf0008cc0003de
- (463) Message-Authenticator = 0x00000000000000000000000000000000
- (463) State = 0x4e4e9ffd4f4a8685e2c45c149088adba
- (463) Finished request
- (464) Received Access-Request Id 233 from 10.8.0.111:58432 to 10.8.64.155:1812 length 186
- (464) User-Name = "vkratsberg"
- (464) NAS-Port = 358
- (464) State = 0x4e4e9ffd4f4a8685e2c45c149088adba
- (464) EAP-Message = 0x020400061900
- (464) Message-Authenticator = 0xa09e3e5a65cd793a2338fa9599cd8cf9
- (464) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (464) NAS-Port-Id = "ge-3/0/6.0"
- (464) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (464) Called-Station-Id = "ec-3e-f7-68-35-00"
- (464) NAS-IP-Address = 10.8.0.111
- (464) NAS-Identifier = "nyc-access-sw011"
- (464) NAS-Port-Type = Ethernet
- (464) session-state: No cached attributes
- (464) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (464) authorize {
- (464) policy filter_username {
- (464) if (&User-Name) {
- (464) if (&User-Name) -> TRUE
- (464) if (&User-Name) {
- (464) if (&User-Name =~ / /) {
- (464) if (&User-Name =~ / /) -> FALSE
- (464) if (&User-Name =~ /@[^@]*@/ ) {
- (464) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (464) if (&User-Name =~ /\.\./ ) {
- (464) if (&User-Name =~ /\.\./ ) -> FALSE
- (464) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (464) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (464) if (&User-Name =~ /\.$/) {
- (464) if (&User-Name =~ /\.$/) -> FALSE
- (464) if (&User-Name =~ /@\./) {
- (464) if (&User-Name =~ /@\./) -> FALSE
- (464) } # if (&User-Name) = notfound
- (464) } # policy filter_username = notfound
- (464) [preprocess] = ok
- (464) [chap] = noop
- (464) [mschap] = noop
- (464) [digest] = noop
- (464) suffix: Checking for suffix after "@"
- (464) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (464) suffix: No such realm "NULL"
- (464) [suffix] = noop
- (464) eap: Peer sent EAP Response (code 2) ID 4 length 6
- (464) eap: Continuing tunnel setup
- (464) [eap] = ok
- (464) } # authorize = ok
- (464) Found Auth-Type = eap
- (464) # Executing group from file /etc/raddb/sites-enabled/default
- (464) authenticate {
- (464) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (464) eap: Finished EAP session with state 0x4e4e9ffd4f4a8685
- (464) eap: Previous EAP request found for state 0x4e4e9ffd4f4a8685, released from the list
- (464) eap: Peer sent packet with method EAP PEAP (25)
- (464) eap: Calling submodule eap_peap to process data
- (464) eap_peap: Continuing EAP-TLS
- (464) eap_peap: Peer ACKed our handshake fragment
- (464) eap_peap: [eaptls verify] = request
- (464) eap_peap: [eaptls process] = handled
- (464) eap: Sending EAP Request (code 1) ID 5 length 1000
- (464) eap: EAP session adding &reply:State = 0x4e4e9ffd4c4b8685
- (464) [eap] = handled
- (464) } # authenticate = handled
- (464) Using Post-Auth-Type Challenge
- (464) Post-Auth-Type sub-section not found. Ignoring.
- (464) # Executing group from file /etc/raddb/sites-enabled/default
- (464) Sent Access-Challenge Id 233 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (464) EAP-Message = 0x010503e81940a985a92e8776b026aa0ca6454d39c8092f1777cb7717bafde9e0586c2db6953cbc1d0dc6dc89a54698f1474daa14ed35c2d76278209bed31b5b6f844db7500fb233337267f13341548de9a5a3219a57eaa7be8fbdc5048ac8060c257cf4e7bb8b599e15e02700609010004e8308204e430
- (464) Message-Authenticator = 0x00000000000000000000000000000000
- (464) State = 0x4e4e9ffd4c4b8685e2c45c149088adba
- (464) Finished request
- (465) Received Access-Request Id 234 from 10.8.0.111:58432 to 10.8.64.155:1812 length 186
- (465) User-Name = "vkratsberg"
- (465) NAS-Port = 358
- (465) State = 0x4e4e9ffd4c4b8685e2c45c149088adba
- (465) EAP-Message = 0x020500061900
- (465) Message-Authenticator = 0xdc458eeffc7a8ddec5a8557fd82287df
- (465) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (465) NAS-Port-Id = "ge-3/0/6.0"
- (465) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (465) Called-Station-Id = "ec-3e-f7-68-35-00"
- (465) NAS-IP-Address = 10.8.0.111
- (465) NAS-Identifier = "nyc-access-sw011"
- (465) NAS-Port-Type = Ethernet
- (465) session-state: No cached attributes
- (465) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (465) authorize {
- (465) policy filter_username {
- (465) if (&User-Name) {
- (465) if (&User-Name) -> TRUE
- (465) if (&User-Name) {
- (465) if (&User-Name =~ / /) {
- (465) if (&User-Name =~ / /) -> FALSE
- (465) if (&User-Name =~ /@[^@]*@/ ) {
- (465) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (465) if (&User-Name =~ /\.\./ ) {
- (465) if (&User-Name =~ /\.\./ ) -> FALSE
- (465) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (465) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (465) if (&User-Name =~ /\.$/) {
- (465) if (&User-Name =~ /\.$/) -> FALSE
- (465) if (&User-Name =~ /@\./) {
- (465) if (&User-Name =~ /@\./) -> FALSE
- (465) } # if (&User-Name) = notfound
- (465) } # policy filter_username = notfound
- (465) [preprocess] = ok
- (465) [chap] = noop
- (465) [mschap] = noop
- (465) [digest] = noop
- (465) suffix: Checking for suffix after "@"
- (465) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (465) suffix: No such realm "NULL"
- (465) [suffix] = noop
- (465) eap: Peer sent EAP Response (code 2) ID 5 length 6
- (465) eap: Continuing tunnel setup
- (465) [eap] = ok
- (465) } # authorize = ok
- (465) Found Auth-Type = eap
- (465) # Executing group from file /etc/raddb/sites-enabled/default
- (465) authenticate {
- (465) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (465) eap: Finished EAP session with state 0x4e4e9ffd4c4b8685
- (465) eap: Previous EAP request found for state 0x4e4e9ffd4c4b8685, released from the list
- (465) eap: Peer sent packet with method EAP PEAP (25)
- (465) eap: Calling submodule eap_peap to process data
- (465) eap_peap: Continuing EAP-TLS
- (465) eap_peap: Peer ACKed our handshake fragment
- (465) eap_peap: [eaptls verify] = request
- (465) eap_peap: [eaptls process] = handled
- (465) eap: Sending EAP Request (code 1) ID 6 length 721
- (465) eap: EAP session adding &reply:State = 0x4e4e9ffd4d488685
- (465) [eap] = handled
- (465) } # authenticate = handled
- (465) Using Post-Auth-Type Challenge
- (465) Post-Auth-Type sub-section not found. Ignoring.
- (465) # Executing group from file /etc/raddb/sites-enabled/default
- (465) Sent Access-Challenge Id 234 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (465) EAP-Message = 0x010602d1190020417574686f72697479820900cd92931e3c4b4509300f0603551d130101ff040530030101ff30360603551d1f042f302d302ba029a0278625687474703a2f2f7777772e6578616d706c652e6f72672f6578616d706c655f63612e63726c300d06092a864886f70d010105050003820101
- (465) Message-Authenticator = 0x00000000000000000000000000000000
- (465) State = 0x4e4e9ffd4d488685e2c45c149088adba
- (465) Finished request
- (461) Cleaning up request packet ID 230 with timestamp +249
- Waking up in 4.9 seconds.
- (466) Received Access-Request Id 235 from 10.8.0.111:58432 to 10.8.64.155:1812 length 324
- (466) User-Name = "vkratsberg"
- (466) NAS-Port = 358
- (466) State = 0x4e4e9ffd4d488685e2c45c149088adba
- (466) EAP-Message = 0x020600901980000000861603010046100000424104d782c2b1129e78bc5acfff77fb8a9629b40a690211cee44753cba7e714a1bc189b7505b870b22b007adff2914302d80e6b26e99199389883b085449dd343d6c51403010001011603010030876f6d4aa698bff9d98de1d5edda415c462a0e95b2984a
- (466) Message-Authenticator = 0xbd60eb5c3b154c485b8d2bb5845e10cf
- (466) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (466) NAS-Port-Id = "ge-3/0/6.0"
- (466) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (466) Called-Station-Id = "ec-3e-f7-68-35-00"
- (466) NAS-IP-Address = 10.8.0.111
- (466) NAS-Identifier = "nyc-access-sw011"
- (466) NAS-Port-Type = Ethernet
- (466) session-state: No cached attributes
- (466) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (466) authorize {
- (466) policy filter_username {
- (466) if (&User-Name) {
- (466) if (&User-Name) -> TRUE
- (466) if (&User-Name) {
- (466) if (&User-Name =~ / /) {
- (466) if (&User-Name =~ / /) -> FALSE
- (466) if (&User-Name =~ /@[^@]*@/ ) {
- (466) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (466) if (&User-Name =~ /\.\./ ) {
- (466) if (&User-Name =~ /\.\./ ) -> FALSE
- (466) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (466) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (466) if (&User-Name =~ /\.$/) {
- (466) if (&User-Name =~ /\.$/) -> FALSE
- (466) if (&User-Name =~ /@\./) {
- (466) if (&User-Name =~ /@\./) -> FALSE
- (466) } # if (&User-Name) = notfound
- (466) } # policy filter_username = notfound
- (466) [preprocess] = ok
- (466) [chap] = noop
- (466) [mschap] = noop
- (466) [digest] = noop
- (466) suffix: Checking for suffix after "@"
- (466) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (466) suffix: No such realm "NULL"
- (466) [suffix] = noop
- (466) eap: Peer sent EAP Response (code 2) ID 6 length 144
- (466) eap: Continuing tunnel setup
- (466) [eap] = ok
- (466) } # authorize = ok
- (466) Found Auth-Type = eap
- (466) # Executing group from file /etc/raddb/sites-enabled/default
- (466) authenticate {
- (466) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (466) eap: Finished EAP session with state 0x4e4e9ffd4d488685
- (466) eap: Previous EAP request found for state 0x4e4e9ffd4d488685, released from the list
- (466) eap: Peer sent packet with method EAP PEAP (25)
- (466) eap: Calling submodule eap_peap to process data
- (466) eap_peap: Continuing EAP-TLS
- (466) eap_peap: Peer indicated complete TLS record size will be 134 bytes
- (466) eap_peap: Got complete TLS record (134 bytes)
- (466) eap_peap: [eaptls verify] = length included
- (466) eap_peap: <<< recv TLS 1.0 Handshake [length 0046], ClientKeyExchange
- (466) eap_peap: TLS_accept: SSLv3 read client key exchange A
- (466) eap_peap: <<< recv TLS 1.0 ChangeCipherSpec [length 0001]
- (466) eap_peap: <<< recv TLS 1.0 Handshake [length 0010], Finished
- (466) eap_peap: TLS_accept: SSLv3 read finished A
- (466) eap_peap: >>> send TLS 1.0 ChangeCipherSpec [length 0001]
- (466) eap_peap: TLS_accept: SSLv3 write change cipher spec A
- (466) eap_peap: >>> send TLS 1.0 Handshake [length 0010], Finished
- (466) eap_peap: TLS_accept: SSLv3 write finished A
- (466) eap_peap: TLS_accept: SSLv3 flush data
- (466) eap_peap: (other): SSL negotiation finished successfully
- (466) eap_peap: SSL Connection Established
- (466) eap_peap: [eaptls process] = handled
- (466) eap: Sending EAP Request (code 1) ID 7 length 65
- (466) eap: EAP session adding &reply:State = 0x4e4e9ffd4a498685
- (466) [eap] = handled
- (466) } # authenticate = handled
- (466) Using Post-Auth-Type Challenge
- (466) Post-Auth-Type sub-section not found. Ignoring.
- (466) # Executing group from file /etc/raddb/sites-enabled/default
- (466) Sent Access-Challenge Id 235 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (466) EAP-Message = 0x0107004119001403010001011603010030736ace44ff96b30e7bcba8f48ddf50af12928a3f7a27e8a1908a31060fe79c4fb46deab2aa818c7a1ddb8fde7834627d
- (466) Message-Authenticator = 0x00000000000000000000000000000000
- (466) State = 0x4e4e9ffd4a498685e2c45c149088adba
- (466) Finished request
- Waking up in 4.9 seconds.
- (467) Received Access-Request Id 236 from 10.8.0.111:58432 to 10.8.64.155:1812 length 186
- (467) User-Name = "vkratsberg"
- (467) NAS-Port = 358
- (467) State = 0x4e4e9ffd4a498685e2c45c149088adba
- (467) EAP-Message = 0x020700061900
- (467) Message-Authenticator = 0x24531edb1114905b1c75d629e483a189
- (467) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (467) NAS-Port-Id = "ge-3/0/6.0"
- (467) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (467) Called-Station-Id = "ec-3e-f7-68-35-00"
- (467) NAS-IP-Address = 10.8.0.111
- (467) NAS-Identifier = "nyc-access-sw011"
- (467) NAS-Port-Type = Ethernet
- (467) session-state: No cached attributes
- (467) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (467) authorize {
- (467) policy filter_username {
- (467) if (&User-Name) {
- (467) if (&User-Name) -> TRUE
- (467) if (&User-Name) {
- (467) if (&User-Name =~ / /) {
- (467) if (&User-Name =~ / /) -> FALSE
- (467) if (&User-Name =~ /@[^@]*@/ ) {
- (467) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (467) if (&User-Name =~ /\.\./ ) {
- (467) if (&User-Name =~ /\.\./ ) -> FALSE
- (467) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (467) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (467) if (&User-Name =~ /\.$/) {
- (467) if (&User-Name =~ /\.$/) -> FALSE
- (467) if (&User-Name =~ /@\./) {
- (467) if (&User-Name =~ /@\./) -> FALSE
- (467) } # if (&User-Name) = notfound
- (467) } # policy filter_username = notfound
- (467) [preprocess] = ok
- (467) [chap] = noop
- (467) [mschap] = noop
- (467) [digest] = noop
- (467) suffix: Checking for suffix after "@"
- (467) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (467) suffix: No such realm "NULL"
- (467) [suffix] = noop
- (467) eap: Peer sent EAP Response (code 2) ID 7 length 6
- (467) eap: Continuing tunnel setup
- (467) [eap] = ok
- (467) } # authorize = ok
- (467) Found Auth-Type = eap
- (467) # Executing group from file /etc/raddb/sites-enabled/default
- (467) authenticate {
- (467) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (467) eap: Finished EAP session with state 0x4e4e9ffd4a498685
- (467) eap: Previous EAP request found for state 0x4e4e9ffd4a498685, released from the list
- (467) eap: Peer sent packet with method EAP PEAP (25)
- (467) eap: Calling submodule eap_peap to process data
- (467) eap_peap: Continuing EAP-TLS
- (467) eap_peap: Peer ACKed our handshake fragment. handshake is finished
- (467) eap_peap: [eaptls verify] = success
- (467) eap_peap: [eaptls process] = success
- (467) eap_peap: Session established. Decoding tunneled attributes
- (467) eap_peap: PEAP state TUNNEL ESTABLISHED
- (467) eap: Sending EAP Request (code 1) ID 8 length 43
- (467) eap: EAP session adding &reply:State = 0x4e4e9ffd4b468685
- (467) [eap] = handled
- (467) } # authenticate = handled
- (467) Using Post-Auth-Type Challenge
- (467) Post-Auth-Type sub-section not found. Ignoring.
- (467) # Executing group from file /etc/raddb/sites-enabled/default
- (467) Sent Access-Challenge Id 236 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (467) EAP-Message = 0x0108002b19001703010020a18d7dfd32101e93d301d56908b1359cc7991b779e990d7aa2e9c1bba66d2d86
- (467) Message-Authenticator = 0x00000000000000000000000000000000
- (467) State = 0x4e4e9ffd4b468685e2c45c149088adba
- (467) Finished request
- Waking up in 4.9 seconds.
- (468) Received Access-Request Id 237 from 10.8.0.111:58432 to 10.8.64.155:1812 length 223
- (468) User-Name = "vkratsberg"
- (468) NAS-Port = 358
- (468) State = 0x4e4e9ffd4b468685e2c45c149088adba
- (468) EAP-Message = 0x0208002b190017030100205f5f0b95bf01bd889b459f3b760eda6f70d2577871cb4b04e7a029b1a20d1c3c
- (468) Message-Authenticator = 0x3f60c5a3560a0098d9bb4bb6022f9fa7
- (468) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (468) NAS-Port-Id = "ge-3/0/6.0"
- (468) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (468) Called-Station-Id = "ec-3e-f7-68-35-00"
- (468) NAS-IP-Address = 10.8.0.111
- (468) NAS-Identifier = "nyc-access-sw011"
- (468) NAS-Port-Type = Ethernet
- (468) session-state: No cached attributes
- (468) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (468) authorize {
- (468) policy filter_username {
- (468) if (&User-Name) {
- (468) if (&User-Name) -> TRUE
- (468) if (&User-Name) {
- (468) if (&User-Name =~ / /) {
- (468) if (&User-Name =~ / /) -> FALSE
- (468) if (&User-Name =~ /@[^@]*@/ ) {
- (468) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (468) if (&User-Name =~ /\.\./ ) {
- (468) if (&User-Name =~ /\.\./ ) -> FALSE
- (468) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (468) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (468) if (&User-Name =~ /\.$/) {
- (468) if (&User-Name =~ /\.$/) -> FALSE
- (468) if (&User-Name =~ /@\./) {
- (468) if (&User-Name =~ /@\./) -> FALSE
- (468) } # if (&User-Name) = notfound
- (468) } # policy filter_username = notfound
- (468) [preprocess] = ok
- (468) [chap] = noop
- (468) [mschap] = noop
- (468) [digest] = noop
- (468) suffix: Checking for suffix after "@"
- (468) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (468) suffix: No such realm "NULL"
- (468) [suffix] = noop
- (468) eap: Peer sent EAP Response (code 2) ID 8 length 43
- (468) eap: Continuing tunnel setup
- (468) [eap] = ok
- (468) } # authorize = ok
- (468) Found Auth-Type = eap
- (468) # Executing group from file /etc/raddb/sites-enabled/default
- (468) authenticate {
- (468) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (468) eap: Finished EAP session with state 0x4e4e9ffd4b468685
- (468) eap: Previous EAP request found for state 0x4e4e9ffd4b468685, released from the list
- (468) eap: Peer sent packet with method EAP PEAP (25)
- (468) eap: Calling submodule eap_peap to process data
- (468) eap_peap: Continuing EAP-TLS
- (468) eap_peap: [eaptls verify] = ok
- (468) eap_peap: Done initial handshake
- (468) eap_peap: [eaptls process] = ok
- (468) eap_peap: Session established. Decoding tunneled attributes
- (468) eap_peap: PEAP state WAITING FOR INNER IDENTITY
- (468) eap_peap: Identity - vkratsberg
- (468) eap_peap: Got inner identity 'vkratsberg'
- (468) eap_peap: Setting default EAP type for tunneled EAP session
- (468) eap_peap: Got tunneled request
- (468) eap_peap: EAP-Message = 0x0208000f01766b7261747362657267
- (468) eap_peap: Setting User-Name to vkratsberg
- (468) eap_peap: Sending tunneled request to inner-tunnel
- (468) eap_peap: EAP-Message = 0x0208000f01766b7261747362657267
- (468) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1
- (468) eap_peap: User-Name = "vkratsberg"
- (468) Virtual server inner-tunnel received request
- (468) EAP-Message = 0x0208000f01766b7261747362657267
- (468) FreeRADIUS-Proxied-To = 127.0.0.1
- (468) User-Name = "vkratsberg"
- (468) WARNING: Outer and inner identities are the same. User privacy is compromised.
- (468) server inner-tunnel {
- (468) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel
- (468) authorize {
- (468) policy filter_username {
- (468) if (&User-Name) {
- (468) if (&User-Name) -> TRUE
- (468) if (&User-Name) {
- (468) if (&User-Name =~ / /) {
- (468) if (&User-Name =~ / /) -> FALSE
- (468) if (&User-Name =~ /@[^@]*@/ ) {
- (468) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (468) if (&User-Name =~ /\.\./ ) {
- (468) if (&User-Name =~ /\.\./ ) -> FALSE
- (468) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (468) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (468) if (&User-Name =~ /\.$/) {
- (468) if (&User-Name =~ /\.$/) -> FALSE
- (468) if (&User-Name =~ /@\./) {
- (468) if (&User-Name =~ /@\./) -> FALSE
- (468) } # if (&User-Name) = notfound
- (468) } # policy filter_username = notfound
- (468) [chap] = noop
- (468) [mschap] = noop
- (468) suffix: Checking for suffix after "@"
- (468) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (468) suffix: No such realm "NULL"
- (468) [suffix] = noop
- (468) update control {
- (468) &Proxy-To-Realm := LOCAL
- (468) } # update control = noop
- (468) eap: Peer sent EAP Response (code 2) ID 8 length 15
- (468) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
- (468) [eap] = ok
- (468) } # authorize = ok
- (468) Found Auth-Type = eap
- (468) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
- (468) authenticate {
- (468) eap: Peer sent packet with method EAP Identity (1)
- (468) eap: Calling submodule eap_gtc to process data
- (468) eap_gtc: EXPAND Password:
- (468) eap_gtc: --> Password:
- (468) eap: Sending EAP Request (code 1) ID 9 length 15
- (468) eap: EAP session adding &reply:State = 0xf0df1f11f0d6199d
- (468) [eap] = handled
- (468) } # authenticate = handled
- (468) } # server inner-tunnel
- (468) Virtual server sending reply
- (468) EAP-Message = 0x0109000f0650617373776f72643a20
- (468) Message-Authenticator = 0x00000000000000000000000000000000
- (468) State = 0xf0df1f11f0d6199d13916c06ec84bce5
- (468) eap_peap: Got tunneled reply code 11
- (468) eap_peap: EAP-Message = 0x0109000f0650617373776f72643a20
- (468) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
- (468) eap_peap: State = 0xf0df1f11f0d6199d13916c06ec84bce5
- (468) eap_peap: Got tunneled reply RADIUS code 11
- (468) eap_peap: EAP-Message = 0x0109000f0650617373776f72643a20
- (468) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
- (468) eap_peap: State = 0xf0df1f11f0d6199d13916c06ec84bce5
- (468) eap_peap: Got tunneled Access-Challenge
- (468) eap: Sending EAP Request (code 1) ID 9 length 43
- (468) eap: EAP session adding &reply:State = 0x4e4e9ffd48478685
- (468) [eap] = handled
- (468) } # authenticate = handled
- (468) Using Post-Auth-Type Challenge
- (468) Post-Auth-Type sub-section not found. Ignoring.
- (468) # Executing group from file /etc/raddb/sites-enabled/default
- (468) Sent Access-Challenge Id 237 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (468) EAP-Message = 0x0109002b1900170301002026f5417ad3bffd840c78367ae06d2ed416e72d7b24d8acacd7dbc257cd631de5
- (468) Message-Authenticator = 0x00000000000000000000000000000000
- (468) State = 0x4e4e9ffd48478685e2c45c149088adba
- (468) Finished request
- Waking up in 4.9 seconds.
- (469) Received Access-Request Id 238 from 10.8.0.111:58432 to 10.8.64.155:1812 length 239
- (469) User-Name = "vkratsberg"
- (469) NAS-Port = 358
- (469) State = 0x4e4e9ffd48478685e2c45c149088adba
- (469) EAP-Message = 0x0209003b190017030100308a00021a3a6ecf1043e62fd0f64588d10ca3e48730dc81be4a1e5359fdbf6526d302768d3a9030ea6867182c0d93c043
- (469) Message-Authenticator = 0xfc4826ee27ce3626ca5c971e2f8b0a1c
- (469) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (469) NAS-Port-Id = "ge-3/0/6.0"
- (469) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (469) Called-Station-Id = "ec-3e-f7-68-35-00"
- (469) NAS-IP-Address = 10.8.0.111
- (469) NAS-Identifier = "nyc-access-sw011"
- (469) NAS-Port-Type = Ethernet
- (469) session-state: No cached attributes
- (469) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (469) authorize {
- (469) policy filter_username {
- (469) if (&User-Name) {
- (469) if (&User-Name) -> TRUE
- (469) if (&User-Name) {
- (469) if (&User-Name =~ / /) {
- (469) if (&User-Name =~ / /) -> FALSE
- (469) if (&User-Name =~ /@[^@]*@/ ) {
- (469) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (469) if (&User-Name =~ /\.\./ ) {
- (469) if (&User-Name =~ /\.\./ ) -> FALSE
- (469) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (469) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (469) if (&User-Name =~ /\.$/) {
- (469) if (&User-Name =~ /\.$/) -> FALSE
- (469) if (&User-Name =~ /@\./) {
- (469) if (&User-Name =~ /@\./) -> FALSE
- (469) } # if (&User-Name) = notfound
- (469) } # policy filter_username = notfound
- (469) [preprocess] = ok
- (469) [chap] = noop
- (469) [mschap] = noop
- (469) [digest] = noop
- (469) suffix: Checking for suffix after "@"
- (469) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (469) suffix: No such realm "NULL"
- (469) [suffix] = noop
- (469) eap: Peer sent EAP Response (code 2) ID 9 length 59
- (469) eap: Continuing tunnel setup
- (469) [eap] = ok
- (469) } # authorize = ok
- (469) Found Auth-Type = eap
- (469) # Executing group from file /etc/raddb/sites-enabled/default
- (469) authenticate {
- (469) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (469) eap: Finished EAP session with state 0x4e4e9ffd48478685
- (469) eap: Previous EAP request found for state 0x4e4e9ffd48478685, released from the list
- (469) eap: Peer sent packet with method EAP PEAP (25)
- (469) eap: Calling submodule eap_peap to process data
- (469) eap_peap: Continuing EAP-TLS
- (469) eap_peap: [eaptls verify] = ok
- (469) eap_peap: Done initial handshake
- (469) eap_peap: [eaptls process] = ok
- (469) eap_peap: Session established. Decoding tunneled attributes
- (469) eap_peap: PEAP state phase2
- (469) eap_peap: EAP method GTC (6)
- (469) eap_peap: Got tunneled request
- (469) eap_peap: EAP-Message = 0x02090010065b566b726174313938335d
- (469) eap_peap: Setting User-Name to vkratsberg
- (469) eap_peap: Sending tunneled request to inner-tunnel
- (469) eap_peap: EAP-Message = 0x02090010065b566b726174313938335d
- (469) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1
- (469) eap_peap: User-Name = "vkratsberg"
- (469) eap_peap: State = 0xf0df1f11f0d6199d13916c06ec84bce5
- (469) Virtual server inner-tunnel received request
- (469) EAP-Message = 0x02090010065b566b726174313938335d
- (469) FreeRADIUS-Proxied-To = 127.0.0.1
- (469) User-Name = "vkratsberg"
- (469) State = 0xf0df1f11f0d6199d13916c06ec84bce5
- (469) WARNING: Outer and inner identities are the same. User privacy is compromised.
- (469) server inner-tunnel {
- (469) session-state: No cached attributes
- (469) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel
- (469) authorize {
- (469) policy filter_username {
- (469) if (&User-Name) {
- (469) if (&User-Name) -> TRUE
- (469) if (&User-Name) {
- (469) if (&User-Name =~ / /) {
- (469) if (&User-Name =~ / /) -> FALSE
- (469) if (&User-Name =~ /@[^@]*@/ ) {
- (469) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (469) if (&User-Name =~ /\.\./ ) {
- (469) if (&User-Name =~ /\.\./ ) -> FALSE
- (469) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (469) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (469) if (&User-Name =~ /\.$/) {
- (469) if (&User-Name =~ /\.$/) -> FALSE
- (469) if (&User-Name =~ /@\./) {
- (469) if (&User-Name =~ /@\./) -> FALSE
- (469) } # if (&User-Name) = notfound
- (469) } # policy filter_username = notfound
- (469) [chap] = noop
- (469) [mschap] = noop
- (469) suffix: Checking for suffix after "@"
- (469) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (469) suffix: No such realm "NULL"
- (469) [suffix] = noop
- (469) update control {
- (469) &Proxy-To-Realm := LOCAL
- (469) } # update control = noop
- (469) eap: Peer sent EAP Response (code 2) ID 9 length 16
- (469) eap: No EAP Start, assuming it's an on-going EAP conversation
- (469) [eap] = updated
- (469) files: Searching for user in group "juniper-admins"
- rlm_ldap (ldap): Reserved connection (13)
- (469) files: EXPAND (uid=%{%{Stripped-User-Name}:-%{User-Name}})
- (469) files: --> (uid=vkratsberg)
- (469) files: Performing search in "dc=sq,dc=net" with filter "(uid=vkratsberg)", scope "sub"
- (469) files: Waiting for search result...
- (469) files: User object found at DN "uid=vkratsberg,ou=people,dc=sq,dc=net"
- (469) files: Checking for user in group objects
- (469) files: EXPAND (&(cn=juniper-admins)(objectClass=GroupOfNames)(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}})))
- (469) files: --> (&(cn=juniper-admins)(objectClass=GroupOfNames)(|(member=uid\3dvkratsberg\2cou\3dpeople\2cdc\3dsq\2cdc\3dnet)(memberUid=vkratsberg)))
- (469) files: Performing search in "dc=sq,dc=net" with filter "(&(cn=juniper-admins)(objectClass=GroupOfNames)(|(member=uid\3dvkratsberg\2cou\3dpeople\2cdc\3dsq\2cdc\3dnet)(memberUid=vkratsberg)))", scope "sub"
- (469) files: Waiting for search result...
- (469) files: User found in group object "dc=sq,dc=net"
- rlm_ldap (ldap): Released connection (13)
- rlm_ldap (ldap): Need 2 more connections to reach 3 spares
- rlm_ldap (ldap): Opening additional connection (14), 1 of 30 pending slots used
- rlm_ldap (ldap): Connecting to ldap://ldap001.008.jfk.corp.squarespace.net:636
- TLS: certificate [CN=sqnet CA,DC=sq,DC=net] is not valid - error -8172:Peer's certificate issuer has been marked as not trusted by the user..
- rlm_ldap (ldap): Waiting for bind result...
- rlm_ldap (ldap): Bind successful
- (469) files: users: Matched entry DEFAULT at line 98
- (469) [files] = ok
- rlm_ldap (ldap): Reserved connection (12)
- (469) ldap: EXPAND (uid=%{%{Stripped-User-Name}:-%{User-Name}})
- (469) ldap: --> (uid=vkratsberg)
- (469) ldap: Performing search in "dc=sq,dc=net" with filter "(uid=vkratsberg)", scope "sub"
- (469) ldap: Waiting for search result...
- (469) ldap: User object found at DN "uid=vkratsberg,ou=people,dc=sq,dc=net"
- (469) ldap: Processing user attributes
- (469) ldap: control:Password-With-Header += '{SSHA}Qen1MM87QS4nPktGhWkyE3ECTjucBhAp+Ce+Ug=='
- rlm_ldap (ldap): Released connection (12)
- rlm_ldap (ldap): Need 1 more connections to reach 3 spares
- rlm_ldap (ldap): Opening additional connection (15), 1 of 29 pending slots used
- rlm_ldap (ldap): Connecting to ldap://ldap001.008.jfk.corp.squarespace.net:636
- TLS: certificate [CN=sqnet CA,DC=sq,DC=net] is not valid - error -8172:Peer's certificate issuer has been marked as not trusted by the user..
- rlm_ldap (ldap): Waiting for bind result...
- rlm_ldap (ldap): Bind successful
- (469) [ldap] = updated
- (469) [expiration] = noop
- (469) [logintime] = noop
- (469) pap: Converted: Password-With-Header -> SSHA1-Password
- (469) pap: Removing &control:Password-With-Header
- (469) pap: Normalizing SSHA1-Password from base64 encoding, 40 bytes -> 28 bytes
- (469) pap: WARNING: Auth-Type already set. Not setting to PAP
- (469) [pap] = noop
- (469) } # authorize = updated
- (469) Found Auth-Type = eap
- (469) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
- (469) authenticate {
- (469) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (469) eap: Finished EAP session with state 0xf0df1f11f0d6199d
- (469) eap: Previous EAP request found for state 0xf0df1f11f0d6199d, released from the list
- (469) eap: Peer sent packet with method EAP GTC (6)
- (469) eap: Calling submodule eap_gtc to process data
- (469) eap_gtc: # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
- (469) eap_gtc: Auth-Type PAP {
- (469) pap: Login attempt with password
- (469) pap: Comparing with "known-good" SSHA-Password
- (469) pap: User authenticated successfully
- (469) [pap] = ok
- (469) } # Auth-Type PAP = ok
- (469) eap: Sending EAP Success (code 3) ID 9 length 4
- (469) eap: Freeing handler
- (469) [eap] = ok
- (469) } # authenticate = ok
- (469) # Executing section post-auth from file /etc/raddb/sites-enabled/inner-tunnel
- (469) post-auth { ... } # empty sub-section is ignored
- (469) } # server inner-tunnel
- (469) Virtual server sending reply
- (469) Service-Type = Login-User
- (469) Idle-Timeout = 600
- (469) Juniper-Local-User-Name = "admin"
- (469) Tunnel-Type = VLAN
- (469) Tunnel-Medium-Type = IEEE-802
- (469) Tunnel-Private-Group-Id = "810"
- (469) EAP-Message = 0x03090004
- (469) Message-Authenticator = 0x00000000000000000000000000000000
- (469) User-Name = "vkratsberg"
- (469) eap_peap: Got tunneled reply code 2
- (469) eap_peap: Service-Type = Login-User
- (469) eap_peap: Idle-Timeout = 600
- (469) eap_peap: Juniper-Local-User-Name = "admin"
- (469) eap_peap: Tunnel-Type = VLAN
- (469) eap_peap: Tunnel-Medium-Type = IEEE-802
- (469) eap_peap: Tunnel-Private-Group-Id = "810"
- (469) eap_peap: EAP-Message = 0x03090004
- (469) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
- (469) eap_peap: User-Name = "vkratsberg"
- (469) eap_peap: Got tunneled reply RADIUS code 2
- (469) eap_peap: Service-Type = Login-User
- (469) eap_peap: Idle-Timeout = 600
- (469) eap_peap: Juniper-Local-User-Name = "admin"
- (469) eap_peap: Tunnel-Type = VLAN
- (469) eap_peap: Tunnel-Medium-Type = IEEE-802
- (469) eap_peap: Tunnel-Private-Group-Id = "810"
- (469) eap_peap: EAP-Message = 0x03090004
- (469) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
- (469) eap_peap: User-Name = "vkratsberg"
- (469) eap_peap: Tunneled authentication was successful
- (469) eap_peap: SUCCESS
- (469) eap_peap: Saving tunneled attributes for later
- (469) eap: Sending EAP Request (code 1) ID 10 length 43
- (469) eap: EAP session adding &reply:State = 0x4e4e9ffd49448685
- (469) [eap] = handled
- (469) } # authenticate = handled
- (469) Using Post-Auth-Type Challenge
- (469) Post-Auth-Type sub-section not found. Ignoring.
- (469) # Executing group from file /etc/raddb/sites-enabled/default
- (469) Sent Access-Challenge Id 238 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (469) EAP-Message = 0x010a002b1900170301002052841017c0fb9a037645f9700f6561dd0b59a6156d963ded9973bdfa581e03d5
- (469) Message-Authenticator = 0x00000000000000000000000000000000
- (469) State = 0x4e4e9ffd49448685e2c45c149088adba
- (469) Finished request
- Waking up in 2.8 seconds.
- (470) Received Access-Request Id 239 from 10.8.0.111:58432 to 10.8.64.155:1812 length 223
- (470) User-Name = "vkratsberg"
- (470) NAS-Port = 358
- (470) State = 0x4e4e9ffd49448685e2c45c149088adba
- (470) EAP-Message = 0x020a002b1900170301002032bb95765a4a991bf842da499825ee17be132e0f2c2133a8ec348c6f9598ddc0
- (470) Message-Authenticator = 0xd38ca916b5ce9adf61930c120dde81e0
- (470) Acct-Session-Id = "8O2.1x81bb08a50008e754"
- (470) NAS-Port-Id = "ge-3/0/6.0"
- (470) Calling-Station-Id = "00-e0-4c-b8-16-4d"
- (470) Called-Station-Id = "ec-3e-f7-68-35-00"
- (470) NAS-IP-Address = 10.8.0.111
- (470) NAS-Identifier = "nyc-access-sw011"
- (470) NAS-Port-Type = Ethernet
- (470) session-state: No cached attributes
- (470) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (470) authorize {
- (470) policy filter_username {
- (470) if (&User-Name) {
- (470) if (&User-Name) -> TRUE
- (470) if (&User-Name) {
- (470) if (&User-Name =~ / /) {
- (470) if (&User-Name =~ / /) -> FALSE
- (470) if (&User-Name =~ /@[^@]*@/ ) {
- (470) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (470) if (&User-Name =~ /\.\./ ) {
- (470) if (&User-Name =~ /\.\./ ) -> FALSE
- (470) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (470) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (470) if (&User-Name =~ /\.$/) {
- (470) if (&User-Name =~ /\.$/) -> FALSE
- (470) if (&User-Name =~ /@\./) {
- (470) if (&User-Name =~ /@\./) -> FALSE
- (470) } # if (&User-Name) = notfound
- (470) } # policy filter_username = notfound
- (470) [preprocess] = ok
- (470) [chap] = noop
- (470) [mschap] = noop
- (470) [digest] = noop
- (470) suffix: Checking for suffix after "@"
- (470) suffix: No '@' in User-Name = "vkratsberg", looking up realm NULL
- (470) suffix: No such realm "NULL"
- (470) [suffix] = noop
- (470) eap: Peer sent EAP Response (code 2) ID 10 length 43
- (470) eap: Continuing tunnel setup
- (470) [eap] = ok
- (470) } # authorize = ok
- (470) Found Auth-Type = eap
- (470) # Executing group from file /etc/raddb/sites-enabled/default
- (470) authenticate {
- (470) eap: Expiring EAP session with state 0xfece9bc1fecf8204
- (470) eap: Finished EAP session with state 0x4e4e9ffd49448685
- (470) eap: Previous EAP request found for state 0x4e4e9ffd49448685, released from the list
- (470) eap: Peer sent packet with method EAP PEAP (25)
- (470) eap: Calling submodule eap_peap to process data
- (470) eap_peap: Continuing EAP-TLS
- (470) eap_peap: [eaptls verify] = ok
- (470) eap_peap: Done initial handshake
- (470) eap_peap: [eaptls process] = ok
- (470) eap_peap: Session established. Decoding tunneled attributes
- (470) eap_peap: PEAP state send tlv success
- (470) eap_peap: Received EAP-TLV response
- (470) eap_peap: Success
- (470) eap_peap: Using saved attributes from the original Access-Accept
- (470) eap_peap: Service-Type = Login-User
- (470) eap_peap: Idle-Timeout = 600
- (470) eap_peap: Juniper-Local-User-Name = "admin"
- (470) eap_peap: Tunnel-Type = VLAN
- (470) eap_peap: Tunnel-Medium-Type = IEEE-802
- (470) eap_peap: Tunnel-Private-Group-Id = "810"
- (470) eap_peap: User-Name = "vkratsberg"
- (470) eap_peap: caching User-Name = "vkratsberg"
- (470) eap_peap: Failed to find 'persist_dir' in TLS configuration. Session will not be cached on disk.
- (470) eap: Sending EAP Success (code 3) ID 10 length 4
- (470) eap: Freeing handler
- (470) [eap] = ok
- (470) } # authenticate = ok
- (470) # Executing section post-auth from file /etc/raddb/sites-enabled/default
- (470) post-auth {
- (470) update {
- (470) No attributes updated
- (470) } # update = noop
- (470) [exec] = noop
- (470) policy remove_reply_message_if_eap {
- (470) if (&reply:EAP-Message && &reply:Reply-Message) {
- (470) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
- (470) else {
- (470) [noop] = noop
- (470) } # else = noop
- (470) } # policy remove_reply_message_if_eap = noop
- (470) } # post-auth = noop
- (470) Sent Access-Accept Id 239 from 10.8.64.155:1812 to 10.8.0.111:58432 length 0
- (470) Service-Type = Login-User
- (470) Idle-Timeout = 600
- (470) Juniper-Local-User-Name = "admin"
- (470) Tunnel-Type = VLAN
- (470) Tunnel-Medium-Type = IEEE-802
- (470) Tunnel-Private-Group-Id = "810"
- (470) User-Name = "vkratsberg"
- (470) MS-MPPE-Recv-Key = 0x2c95cb81f5a82111803f40f7ed33e3c1f81a3ea922e2ba460972da52ba4ae71b
- (470) MS-MPPE-Send-Key = 0xdc512fa7dda8277dada82e409d0082705ff3d4ba52db225b7c335c46bf0a0371
- (470) EAP-Message = 0x030a0004
- (470) Message-Authenticator = 0x00000000000000000000000000000000
- (470) Finished request
- Waking up in 2.8 seconds.
- (462) Cleaning up request packet ID 231 with timestamp +254
- (463) Cleaning up request packet ID 232 with timestamp +254
- (464) Cleaning up request packet ID 233 with timestamp +254
- (465) Cleaning up request packet ID 234 with timestamp +254
- (466) Cleaning up request packet ID 235 with timestamp +254
- (467) Cleaning up request packet ID 236 with timestamp +254
- (468) Cleaning up request packet ID 237 with timestamp +254
- Waking up in 2.0 seconds.
- (469) Cleaning up request packet ID 238 with timestamp +254
- (470) Cleaning up request packet ID 239 with timestamp +256
- Ready to process requests
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement