Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- FreeRADIUS Version 2.1.10, for host x86_64-pc-linux-gnu, built on Sep 24 2012 at 17:58:57
- Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
- There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
- PARTICULAR PURPOSE.
- You may redistribute copies of FreeRADIUS under the terms of the
- GNU General Public License v2.
- Starting - reading configuration files ...
- including configuration file /etc/freeradius/radiusd.conf
- including configuration file /etc/freeradius/proxy.conf
- including configuration file /etc/freeradius/clients.conf
- including files in directory /etc/freeradius/modules/
- including configuration file /etc/freeradius/modules/always
- including configuration file /etc/freeradius/modules/exec
- including configuration file /etc/freeradius/modules/sql_log
- including configuration file /etc/freeradius/modules/passwd
- including configuration file /etc/freeradius/modules/mschap
- including configuration file /etc/freeradius/modules/logintime
- including configuration file /etc/freeradius/modules/echo
- including configuration file /etc/freeradius/modules/expiration
- including configuration file /etc/freeradius/modules/detail.log
- including configuration file /etc/freeradius/modules/realm
- including configuration file /etc/freeradius/modules/unix
- including configuration file /etc/freeradius/modules/expr
- including configuration file /etc/freeradius/modules/dynamic_clients
- including configuration file /etc/freeradius/modules/policy
- including configuration file /etc/freeradius/modules/cui
- including configuration file /etc/freeradius/modules/mac2vlan
- including configuration file /etc/freeradius/modules/krb5
- including configuration file /etc/freeradius/modules/ippool
- including configuration file /etc/freeradius/modules/attr_rewrite
- including configuration file /etc/freeradius/modules/pap
- including configuration file /etc/freeradius/modules/detail.example.com
- including configuration file /etc/freeradius/modules/acct_unique
- including configuration file /etc/freeradius/modules/checkval
- including configuration file /etc/freeradius/modules/sradutmp
- including configuration file /etc/freeradius/modules/preprocess
- including configuration file /etc/freeradius/modules/counter
- including configuration file /etc/freeradius/modules/opendirectory
- including configuration file /etc/freeradius/modules/chap
- including configuration file /etc/freeradius/modules/attr_filter
- including configuration file /etc/freeradius/modules/files
- including configuration file /etc/freeradius/modules/etc_group
- including configuration file /etc/freeradius/modules/perl
- including configuration file /etc/freeradius/modules/radutmp
- including configuration file /etc/freeradius/modules/wimax
- including configuration file /etc/freeradius/modules/mac2ip
- including configuration file /etc/freeradius/modules/ldap
- including configuration file /etc/freeradius/modules/smbpasswd
- including configuration file /etc/freeradius/modules/detail
- including configuration file /etc/freeradius/modules/sqlcounter_expire_on_login
- including configuration file /etc/freeradius/modules/smsotp
- including configuration file /etc/freeradius/modules/digest
- including configuration file /etc/freeradius/modules/linelog
- including configuration file /etc/freeradius/modules/ntlm_auth
- including configuration file /etc/freeradius/modules/inner-eap
- including configuration file /etc/freeradius/modules/pam
- including configuration file /etc/freeradius/modules/otp
- including configuration file /etc/freeradius/eap.conf
- including configuration file /etc/freeradius/sql.conf
- including configuration file /etc/freeradius/sql/mysql/dialup.conf
- including configuration file /etc/freeradius/policy.conf
- including files in directory /etc/freeradius/sites-enabled/
- including configuration file /etc/freeradius/sites-enabled/ausgabe.txt
- including configuration file /etc/freeradius/sites-enabled/inner-tunnel
- including configuration file /etc/freeradius/sites-enabled/default
- main {
- user = "freerad"
- group = "freerad"
- allow_core_dumps = no
- }
- including dictionary file /etc/freeradius/dictionary
- main {
- prefix = "/usr"
- localstatedir = "/var"
- logdir = "/var/log/freeradius"
- libdir = "/usr/lib/freeradius"
- radacctdir = "/var/log/freeradius/radacct"
- hostname_lookups = no
- max_request_time = 30
- cleanup_delay = 5
- max_requests = 1024
- pidfile = "/var/run/freeradius/freeradius.pid"
- checkrad = "/usr/sbin/checkrad"
- debug_level = 0
- proxy_requests = yes
- log {
- stripped_names = no
- auth = no
- auth_badpass = no
- auth_goodpass = no
- }
- security {
- max_attributes = 200
- reject_delay = 1
- status_server = yes
- }
- }
- radiusd: #### Loading Realms and Home Servers ####
- proxy server {
- retry_delay = 5
- retry_count = 3
- default_fallback = no
- dead_time = 120
- wake_all_if_all_dead = no
- }
- realm LOCAL {
- }
- realm kl-dfki.de {
- authhost = LOCAL
- accthost = LOCAL
- }
- realm DEFAULT {
- nostrip
- authhost = 172.16.3.225
- accthost = 172.16.3.225
- secret = xxxxx
- }
- radiusd: #### Loading Clients ####
- client localhost {
- ipaddr = 127.0.0.1
- require_message_authenticator = no
- secret = "xxxx"
- nastype = "other"
- }
- client OpenURC-Global {
- ipaddr = 172.16.3.225
- require_message_authenticator = no
- secret = "xxxx"
- nastype = "other"
- }
- client Router1 {
- ipaddr = 192.168.1.1
- require_message_authenticator = no
- secret = "xxxx"
- nastype = "other"
- }
- radiusd: #### Instantiating modules ####
- instantiate {
- Module: Linked to module rlm_exec
- Module: Instantiating module "exec" from file /etc/freeradius/modules/exec
- exec {
- wait = no
- input_pairs = "request"
- shell_escape = yes
- }
- Module: Linked to module rlm_expr
- Module: Instantiating module "expr" from file /etc/freeradius/modules/expr
- Module: Linked to module rlm_expiration
- Module: Instantiating module "expiration" from file /etc/freeradius/modules/expiration
- expiration {
- reply-message = "Password Has Expired "
- }
- Module: Linked to module rlm_logintime
- Module: Instantiating module "logintime" from file /etc/freeradius/modules/logintime
- logintime {
- reply-message = "You are calling outside your allowed timespan "
- minimum-timeout = 60
- }
- }
- radiusd: #### Loading Virtual Servers ####
- server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel
- modules {
- Module: Checking authenticate {...} for more modules to load
- Module: Linked to module rlm_mschap
- Module: Instantiating module "mschap" from file /etc/freeradius/modules/mschap
- mschap {
- use_mppe = yes
- require_encryption = no
- require_strong = no
- with_ntdomain_hack = no
- }
- Module: Linked to module rlm_eap
- Module: Instantiating module "eap" from file /etc/freeradius/eap.conf
- eap {
- default_eap_type = "peap"
- timer_expire = 60
- ignore_unknown_eap_types = no
- cisco_accounting_username_bug = no
- max_sessions = 4096
- }
- Module: Linked to sub-module rlm_eap_md5
- Module: Instantiating eap-md5
- Module: Linked to sub-module rlm_eap_leap
- Module: Instantiating eap-leap
- Module: Linked to sub-module rlm_eap_gtc
- Module: Instantiating eap-gtc
- gtc {
- challenge = "Password: "
- auth_type = "PAP"
- }
- Module: Linked to sub-module rlm_eap_tls
- Module: Instantiating eap-tls
- tls {
- rsa_key_exchange = no
- dh_key_exchange = yes
- rsa_key_length = 512
- dh_key_length = 512
- verify_depth = 0
- pem_file_type = yes
- private_key_file = "/etc/wireless/certs/server/server.pem"
- certificate_file = "/etc/wireless/certs/server/server.pem"
- CA_file = "/etc/wireless/certs/server/ca.pem"
- private_key_password = "xxxxx"
- dh_file = "/etc/wireless/dh"
- random_file = "/etc/wireless/random"
- fragment_size = 1024
- include_length = yes
- check_crl = no
- cipher_list = "HIGH"
- cache {
- enable = no
- lifetime = 24
- max_entries = 255
- }
- verify {
- }
- }
- Module: Linked to sub-module rlm_eap_ttls
- Module: Instantiating eap-ttls
- ttls {
- default_eap_type = "mschapv2"
- copy_request_to_tunnel = yes
- use_tunneled_reply = yes
- virtual_server = "inner-tunnel"
- include_length = yes
- }
- Module: Linked to sub-module rlm_eap_peap
- Module: Instantiating eap-peap
- peap {
- default_eap_type = "mschapv2"
- copy_request_to_tunnel = yes
- use_tunneled_reply = yes
- proxy_tunneled_request_as_eap = no
- virtual_server = "inner-tunnel"
- }
- Module: Linked to sub-module rlm_eap_mschapv2
- Module: Instantiating eap-mschapv2
- mschapv2 {
- with_ntdomain_hack = no
- }
- Module: Checking authorize {...} for more modules to load
- Module: Linked to module rlm_realm
- Module: Instantiating module "suffix" from file /etc/freeradius/modules/realm
- realm suffix {
- format = "suffix"
- delimiter = "@"
- ignore_default = no
- ignore_null = no
- }
- Module: Linked to module rlm_files
- Module: Instantiating module "files" from file /etc/freeradius/modules/files
- files {
- usersfile = "/etc/freeradius/users"
- acctusersfile = "/etc/freeradius/acct_users"
- preproxy_usersfile = "/etc/freeradius/preproxy_users"
- compat = "no"
- }
- Module: Linked to module rlm_sql
- Module: Instantiating module "sql" from file /etc/freeradius/sql.conf
- sql {
- driver = "rlm_sql_mysql"
- server = "localhost"
- port = ""
- login = "root"
- password = "xxxxx"
- radius_db = "radius"
- read_groups = yes
- sqltrace = no
- sqltracefile = "/var/log/freeradius/sqltrace.sql"
- readclients = yes
- deletestalesessions = yes
- num_sql_socks = 5
- lifetime = 0
- max_queries = 0
- sql_user_name = "%{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}}"
- default_user_profile = ""
- nas_query = "SELECT id, nasname, shortname, type, secret, server FROM nas"
- authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
- authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
- authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id"
- authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id"
- accounting_onoff_query = " UPDATE radacct SET acctstoptime = '%S', acctsessiontime = unix_timestamp('%S') - unix_timestamp(acctstarttime), acctterminatecause = '%{Acct-Terminate-Cause}', acctstopdelay = %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= '%S'"
- accounting_update_query = " UPDATE radacct SET framedipaddress = '%{Framed-IP-Address}', acctsessiontime = '%{Acct-Session-Time}', acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}' WHERE acctsessionid = '%{Acct-Session-Id}' AND username = '%{SQL-User-Name}' AND nasipaddress = '%{NAS-IP-Address}'"
- accounting_update_query_alt = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctsessiontime, acctauthentic, connectinfo_start, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, servicetype, framedprotocol, framedipaddress, acctstartdelay, xascendsessionsvrkey) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{X-Ascend-Session-Svr-Key}')"
- accounting_start_query = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay, xascendsessionsvrkey) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', '%S', NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}')"
- accounting_start_query_alt = " UPDATE radacct SET acctstarttime = '%S', acctstartdelay = '%{%{Acct-Delay-Time}:-0}', connectinfo_start = '%{Connect-Info}' WHERE acctsessionid = '%{Acct-Session-Id}' AND username = '%{SQL-User-Name}' AND nasipaddress = '%{NAS-IP-Address}'"
- accounting_stop_query = " UPDATE radacct SET acctstoptime = '%S', acctsessiontime = '%{Acct-Session-Time}', acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', acctterminatecause = '%{Acct-Terminate-Cause}', acctstopdelay = '%{%{Acct-Delay-Time}:-0}', connectinfo_stop = '%{Connect-Info}' WHERE acctsessionid = '%{Acct-Session-Id}' AND username = '%{SQL-User-Name}' AND nasipaddress = '%{NAS-IP-Address}'"
- accounting_stop_query_alt = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Acct-Terminate-Cause}', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')"
- group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority"
- connect_failure_retry_delay = 60
- simul_count_query = ""
- simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
- postauth_query = "INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S')"
- safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
- }
- rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
- rlm_sql (sql): Attempting to connect to root@localhost:/radius
- rlm_sql (sql): starting 0
- rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
- rlm_sql_mysql: Starting connect to MySQL server for #0
- rlm_sql (sql): Connected new DB handle, #0
- rlm_sql (sql): starting 1
- rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
- rlm_sql_mysql: Starting connect to MySQL server for #1
- rlm_sql (sql): Connected new DB handle, #1
- rlm_sql (sql): starting 2
- rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
- rlm_sql_mysql: Starting connect to MySQL server for #2
- rlm_sql (sql): Connected new DB handle, #2
- rlm_sql (sql): starting 3
- rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
- rlm_sql_mysql: Starting connect to MySQL server for #3
- rlm_sql (sql): Connected new DB handle, #3
- rlm_sql (sql): starting 4
- rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
- rlm_sql_mysql: Starting connect to MySQL server for #4
- rlm_sql (sql): Connected new DB handle, #4
- rlm_sql (sql): Processing generate_sql_clients
- rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname, shortname, type, secret, server FROM nas
- rlm_sql (sql): Reserving sql socket id: 4
- rlm_sql (sql): Read entry nasname=172.16.18.238,shortname=OpenURC_KL,secret=xxxx
- rlm_sql (sql): Adding client 172.16.18.238 (OpenURC_KL, server=<none>) to clients list
- rlm_sql (sql): Released sql socket id: 4
- Module: Checking session {...} for more modules to load
- Module: Linked to module rlm_radutmp
- Module: Instantiating module "radutmp" from file /etc/freeradius/modules/radutmp
- radutmp {
- filename = "/var/log/freeradius/radutmp"
- username = "%{User-Name}"
- case_sensitive = yes
- check_with_nas = yes
- perm = 384
- callerid = yes
- }
- Module: Checking post-proxy {...} for more modules to load
- Module: Checking post-auth {...} for more modules to load
- Module: Linked to module rlm_attr_filter
- Module: Instantiating module "attr_filter.access_reject" from file /etc/freeradius/modules/attr_filter
- attr_filter attr_filter.access_reject {
- attrsfile = "/etc/freeradius/attrs.access_reject"
- key = "%{User-Name}"
- }
- } # modules
- } # server
- server { # from file /etc/freeradius/radiusd.conf
- modules {
- Module: Checking authenticate {...} for more modules to load
- Module: Linked to module rlm_digest
- Module: Instantiating module "digest" from file /etc/freeradius/modules/digest
- Module: Checking authorize {...} for more modules to load
- Module: Linked to module rlm_preprocess
- Module: Instantiating module "preprocess" from file /etc/freeradius/modules/preprocess
- preprocess {
- huntgroups = "/etc/freeradius/huntgroups"
- hints = "/etc/freeradius/hints"
- with_ascend_hack = no
- ascend_channels_per_line = 23
- with_ntdomain_hack = no
- with_specialix_jetstream_hack = no
- with_cisco_vsa_hack = no
- with_alvarion_vsa_hack = no
- }
- Module: Linked to module rlm_detail
- Module: Instantiating module "auth_log" from file /etc/freeradius/modules/detail.log
- detail auth_log {
- detailfile = "/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
- header = "%t"
- detailperm = 384
- dirperm = 493
- locking = no
- log_packet_header = no
- }
- Module: Checking preacct {...} for more modules to load
- Module: Linked to module rlm_acct_unique
- Module: Instantiating module "acct_unique" from file /etc/freeradius/modules/acct_unique
- acct_unique {
- key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
- }
- Module: Checking accounting {...} for more modules to load
- Module: Instantiating module "detail" from file /etc/freeradius/modules/detail
- detail {
- detailfile = "/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
- header = "%t"
- detailperm = 384
- dirperm = 493
- locking = no
- log_packet_header = no
- }
- Module: Linked to module rlm_unix
- Module: Instantiating module "unix" from file /etc/freeradius/modules/unix
- unix {
- radwtmp = "/var/log/freeradius/radwtmp"
- }
- Module: Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/modules/attr_filter
- attr_filter attr_filter.accounting_response {
- attrsfile = "/etc/freeradius/attrs.accounting_response"
- key = "%{User-Name}"
- }
- Module: Checking session {...} for more modules to load
- Module: Checking post-proxy {...} for more modules to load
- Module: Checking post-auth {...} for more modules to load
- } # modules
- } # server
- radiusd: #### Opening IP addresses and Ports ####
- listen {
- type = "auth"
- ipaddr = *
- port = 0
- }
- listen {
- type = "acct"
- ipaddr = *
- port = 0
- }
- listen {
- type = "auth"
- ipaddr = 127.0.0.1
- port = 18120
- }
- Listening on authentication address * port 1812
- Listening on accounting address * port 1813
- Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel
- Listening on proxy address * port 1814
- Ready to process requests.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=205, length=184
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x02050016016d61726b7573406b6c2d64666b692e6465
- Message-Authenticator = 0xd2c63516a877eb07e6ea2ff536b59c7f
- Proxy-State = 0x3336
- Proxy-State = 0x313433
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 5 length 22
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[files] returns noop
- [sql] expand: %{Stripped-User-Name} -> markus
- [sql] expand: %{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}} -> markus
- [sql] sql_set_user escaped user --> 'markus'
- rlm_sql (sql): Reserving sql socket id: 3
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'markus' ORDER BY id
- [sql] User found in radcheck table
- [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'markus' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'markus' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 3
- ++[sql] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type tls
- [tls] Initiate
- [tls] Start returned 1
- ++[eap] returns handled
- Sending Access-Challenge of id 205 to 172.16.3.225 port 1814
- EAP-Message = 0x010600061920
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2bd12dfa7a4efca0ea3eef625
- Proxy-State = 0x3336
- Proxy-State = 0x313433
- Finished request 0.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=160, length=267
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x0206005719800000004d160301004801000044030150756b236af31d1cff7a4452e8365d1ec47009d9c46593b13f83e9f13140e8d900001600040005000a0009006400620003000600130012006301000005ff01000100
- State = 0xbd14c6c2bd12dfa7a4efca0ea3eef625
- Message-Authenticator = 0xa876367ceab654fa12cbc8ff013ea449
- Proxy-State = 0x3337
- Proxy-State = 0x323533
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 6 length 87
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 77
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] (other): before/accept initialization
- [peap] TLS_accept: before/accept initialization
- [peap] <<< TLS 1.0 Handshake [length 0048], ClientHello
- [peap] TLS_accept: SSLv3 read client hello A
- [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello
- [peap] TLS_accept: SSLv3 write server hello A
- [peap] >>> TLS 1.0 Handshake [length 07b2], Certificate
- [peap] TLS_accept: SSLv3 write certificate A
- [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
- [peap] TLS_accept: SSLv3 write server done A
- [peap] TLS_accept: SSLv3 flush data
- [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
- In SSL Handshake Phase
- In SSL Accept mode
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 160 to 172.16.3.225 port 1814
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x89e39d883f8a9ea82709e2f2c21405f777b178ad759ebf1a7db1fd8e79e9c44699840765a4e9ff2110bc5f40aebeb02a0526f40fa50460311a6466cb5fec569f2be0143a12ab7c5ec9ab7ce36f41ad02e4b58899a36fac57e3953618a2d5af97d463ef353562ceac83e3260069c92a47736a122a87958dc055d18a79812b2465dfa580ddfabc0e0d0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d01010405000382010100705316e84a45d684ce9a240af0f38dc3d51c3ef0767812b2cb5108630a2f4a3705a22c365edc04948fd3aad63d8d05ec3baf32fbc8b97f0629c5cca3f0f3a966b5de35
- EAP-Message = 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
- EAP-Message = 0x040813065261646975733111
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2bc13dfa7a4efca0ea3eef625
- Proxy-State = 0x3337
- Proxy-State = 0x323533
- Finished request 1.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=74, length=186
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020700061900
- State = 0xbd14c6c2bc13dfa7a4efca0ea3eef625
- Message-Authenticator = 0xa9b62c87a019129aa9fcb3b8f9559096
- Proxy-State = 0x3338
- Proxy-State = 0x313536
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 7 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 74 to 172.16.3.225 port 1814
- EAP-Message = 0x010803fc1940300f06035504071308536161726c616e64310d300b060355040a130444464b49311d301b06092a864886f70d010901160e61646d696e4064666b692e636f6d3110300e060355040313074f70656e555243301e170d3132313030313136303135385a170d3133313030313136303135385a3071310b3009060355040613024445310f300d060355040813065261646975733111300f06035504071308536161726c616e64310d300b060355040a130444464b49311d301b06092a864886f70d010901160e61646d696e4064666b692e636f6d3110300e060355040313074f70656e55524330820122300d06092a864886f70d0101010500
- EAP-Message = 0x0382010f003082010a0282010100d2c5c75600372e4aeef7ba1e1ddb69d6b457aacae441c07f6cae9a398506492ab16c46eb1965813c9e81da8db928539aab5299090f0986fd893cffe5cbdc55333e6812c2087e1f832062255400069d78a56c208fa37d1b374efe0b21797f8d8a8da5b86f80ec98dd6dc703c7dce6b2f5c6242d19d9ecd2f2c3f3c71fca3cff827d8dab44e8b53c993350f5f8ac76c5c79f3537c757e4a63fcc967c6adb56602e1c698717f7798d667ce7daa4d8a012d6c873079081786acc0ffc992020b07414253f24c5f774410c8f9075b13487840e44a03e0d42c2a1e38ad4315d62c8b0b7062d3fe2b4e4cdc6322f306b3d1509
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x3987a767df292136
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2bf1cdfa7a4efca0ea3eef625
- Proxy-State = 0x3338
- Proxy-State = 0x313536
- Finished request 2.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=165, length=185
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020800061900
- State = 0xbd14c6c2bf1cdfa7a4efca0ea3eef625
- Message-Authenticator = 0x54471b5225d084f791010e38a0feedf9
- Proxy-State = 0x3339
- Proxy-State = 0x3831
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 8 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 165 to 172.16.3.225 port 1814
- EAP-Message = 0x010900101900e316030100040e000000
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2be1ddfa7a4efca0ea3eef625
- Proxy-State = 0x3339
- Proxy-State = 0x3831
- Finished request 3.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=87, length=509
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 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
- EAP-Message = 0x6b27691a4231de7b2aad4dcfbd5aeec9c8847b72b999702d140301000101160301002868d139093bc34d87e116f596db8d145bfc7365a7f97425b99f7384629efd306332cc31807e92221b
- State = 0xbd14c6c2be1ddfa7a4efca0ea3eef625
- Message-Authenticator = 0x85f35437110f84a3e50c0b928d4a84ef
- Proxy-State = 0x3430
- Proxy-State = 0x3935
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 9 length 253
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 318
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange
- [peap] TLS_accept: SSLv3 read client key exchange A
- [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
- [peap] <<< TLS 1.0 Handshake [length 0010], Finished
- [peap] TLS_accept: SSLv3 read finished A
- [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
- [peap] TLS_accept: SSLv3 write change cipher spec A
- [peap] >>> TLS 1.0 Handshake [length 0010], Finished
- [peap] TLS_accept: SSLv3 write finished A
- [peap] TLS_accept: SSLv3 flush data
- [peap] (other): SSL negotiation finished successfully
- SSL Connection Established
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 87 to 172.16.3.225 port 1814
- EAP-Message = 0x010a003919001403010001011603010028efa6af376a7473eea192489827277d5c1c877a929f4c6a05635c1ff7c529bb5c0ffb9bf2d6127060
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2b91edfa7a4efca0ea3eef625
- Proxy-State = 0x3430
- Proxy-State = 0x3935
- Finished request 4.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=21, length=186
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020a00061900
- State = 0xbd14c6c2b91edfa7a4efca0ea3eef625
- Message-Authenticator = 0x363fd9e959d2bfb32a6555ab233a8798
- Proxy-State = 0x3431
- Proxy-State = 0x313435
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 10 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake is finished
- [peap] eaptls_verify returned 3
- [peap] eaptls_process returned 3
- [peap] EAPTLS_SUCCESS
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state TUNNEL ESTABLISHED
- ++[eap] returns handled
- Sending Access-Challenge of id 21 to 172.16.3.225 port 1814
- EAP-Message = 0x010b002b19001703010020dfb9390fbb1f525218dd469968c68ec210efc73324abc99c584eaa342165433c
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2b81fdfa7a4efca0ea3eef625
- Proxy-State = 0x3431
- Proxy-State = 0x313435
- Finished request 5.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=173, length=230
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020b00331900170301002819c6e29242e49dacbde95dcced1a40d20412b42ce84efdf7e189599de1436bf1538f8263c50e645b
- State = 0xbd14c6c2b81fdfa7a4efca0ea3eef625
- Message-Authenticator = 0x4681dc3b23c6df583d389258d40c55bb
- Proxy-State = 0x3432
- Proxy-State = 0x3135
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 11 length 51
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state WAITING FOR INNER IDENTITY
- [peap] Identity - markus@kl-dfki.de
- [peap] Got inner identity 'markus@kl-dfki.de'
- [peap] Setting default EAP type for tunneled EAP session.
- [peap] Got tunneled request
- EAP-Message = 0x020b0016016d61726b7573406b6c2d64666b692e6465
- server {
- PEAP: Setting User-Name to markus@kl-dfki.de
- Sending tunneled request
- EAP-Message = 0x020b0016016d61726b7573406b6c2d64666b692e6465
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- server inner-tunnel {
- # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
- +- entering group authorize {...}
- ++[mschap] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- ++[control] returns ok
- [eap] EAP packet type response id 11 length 22
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[files] returns noop
- [sql] expand: %{Stripped-User-Name} -> markus
- [sql] expand: %{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}} -> markus
- [sql] sql_set_user escaped user --> 'markus'
- rlm_sql (sql): Reserving sql socket id: 2
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'markus' ORDER BY id
- [sql] User found in radcheck table
- [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'markus' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'markus' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 2
- ++[sql] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type mschapv2
- rlm_eap_mschapv2: Issuing Challenge
- ++[eap] returns handled
- } # server inner-tunnel
- [peap] Got tunneled reply code 11
- EAP-Message = 0x010c002b1a010c002610dff330499f0888961177e7d367fda8a76d61726b7573406b6c2d64666b692e6465
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbc13db05bc1fc1d3c3eff3a8118293e8
- [peap] Got tunneled reply RADIUS code 11
- EAP-Message = 0x010c002b1a010c002610dff330499f0888961177e7d367fda8a76d61726b7573406b6c2d64666b692e6465
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbc13db05bc1fc1d3c3eff3a8118293e8
- [peap] Got tunneled Access-Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 173 to 172.16.3.225 port 1814
- EAP-Message = 0x010c004b19001703010040b79adadf8d5cb5d88870b5783adf0196322e2d7567f69159df3571676eaee865c6fe637288f35c29646f9d4f9d3f039e812003d257a8f490acecdb38336d8cac
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2bb18dfa7a4efca0ea3eef625
- Proxy-State = 0x3432
- Proxy-State = 0x3135
- Finished request 6.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=18, length=286
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020c006b1900170301006080fe867c0feee663e9a5c8b7260d6a4bd5e54f777bfcc846dc7f8da84c01dd9dd39ced0ada46bc6ddb428ad97f50e7f8483153ae8b09dc58d4dd1cf85d4b18ded79e222a7e8d71f3adb9be5a0ac61ecbe5672bfa31b2999fcb00944c76831b08
- State = 0xbd14c6c2bb18dfa7a4efca0ea3eef625
- Message-Authenticator = 0x917259924db687a9c48331c16f1f5783
- Proxy-State = 0x3433
- Proxy-State = 0x3836
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 12 length 107
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state phase2
- [peap] EAP type mschapv2
- [peap] Got tunneled request
- EAP-Message = 0x020c004c1a020c004731d37619192b238a1d9e8f22f4a84f5cd1000000000000000064a56d5ac725ff35d8473e01a5b9b762f88251dfa7d921ca006d61726b7573406b6c2d64666b692e6465
- server {
- PEAP: Setting User-Name to markus@kl-dfki.de
- Sending tunneled request
- EAP-Message = 0x020c004c1a020c004731d37619192b238a1d9e8f22f4a84f5cd1000000000000000064a56d5ac725ff35d8473e01a5b9b762f88251dfa7d921ca006d61726b7573406b6c2d64666b692e6465
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "markus@kl-dfki.de"
- State = 0xbc13db05bc1fc1d3c3eff3a8118293e8
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- server inner-tunnel {
- # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
- +- entering group authorize {...}
- ++[mschap] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- ++[control] returns ok
- [eap] EAP packet type response id 12 length 76
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[files] returns noop
- [sql] expand: %{Stripped-User-Name} -> markus
- [sql] expand: %{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}} -> markus
- [sql] sql_set_user escaped user --> 'markus'
- rlm_sql (sql): Reserving sql socket id: 1
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'markus' ORDER BY id
- [sql] User found in radcheck table
- [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'markus' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'markus' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 1
- ++[sql] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/mschapv2
- [eap] processing type mschapv2
- [mschapv2] # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- [mschapv2] +- entering group MS-CHAP {...}
- [mschap] Creating challenge hash with username: markus@kl-dfki.de
- [mschap] Told to do MS-CHAPv2 for markus@kl-dfki.de with NT-Password
- [mschap] adding MS-CHAPv2 MPPE keys
- ++[mschap] returns ok
- MSCHAP Success
- ++[eap] returns handled
- } # server inner-tunnel
- [peap] Got tunneled reply code 11
- EAP-Message = 0x010d00331a030c002e533d43384334393446454633313434323338363345413644453738434230383845343445353431373739
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbc13db05bd1ec1d3c3eff3a8118293e8
- [peap] Got tunneled reply RADIUS code 11
- EAP-Message = 0x010d00331a030c002e533d43384334393446454633313434323338363345413644453738434230383845343445353431373739
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbc13db05bd1ec1d3c3eff3a8118293e8
- [peap] Got tunneled Access-Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 18 to 172.16.3.225 port 1814
- EAP-Message = 0x010d005319001703010048218e2326e06471b07ba743719f2d8325a00fcb24a27225d21f80d657186ce4980527ff86b25c10950fa55cf9ad3fdf768f1ffe419a700668c6546c586b6d62a2765276083b726777
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2ba19dfa7a4efca0ea3eef625
- Proxy-State = 0x3433
- Proxy-State = 0x3836
- Finished request 7.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=212, length=215
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020d002319001703010018c7d47c7efec6b3cee59b0b2151a6a9fb01e8f4a7bf72394b
- State = 0xbd14c6c2ba19dfa7a4efca0ea3eef625
- Message-Authenticator = 0xb14dd8164450f3cbf6a6ea80bbf600cc
- Proxy-State = 0x3434
- Proxy-State = 0x323331
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 13 length 35
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state phase2
- [peap] EAP type mschapv2
- [peap] Got tunneled request
- EAP-Message = 0x020d00061a03
- server {
- PEAP: Setting User-Name to markus@kl-dfki.de
- Sending tunneled request
- EAP-Message = 0x020d00061a03
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "markus@kl-dfki.de"
- State = 0xbc13db05bd1ec1d3c3eff3a8118293e8
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- server inner-tunnel {
- # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
- +- entering group authorize {...}
- ++[mschap] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- ++[control] returns ok
- [eap] EAP packet type response id 13 length 6
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[files] returns noop
- [sql] expand: %{Stripped-User-Name} -> markus
- [sql] expand: %{%{Stripped-User-Name}:-%{%{User-Name}:-DEFAULT}} -> markus
- [sql] sql_set_user escaped user --> 'markus'
- rlm_sql (sql): Reserving sql socket id: 0
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'markus' ORDER BY id
- [sql] User found in radcheck table
- [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'markus' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'markus' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 0
- ++[sql] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/mschapv2
- [eap] processing type mschapv2
- [eap] Freeing handler
- ++[eap] returns ok
- WARNING: Empty post-auth section. Using default return values.
- # Executing section post-auth from file /etc/freeradius/sites-enabled/inner-tunnel
- } # server inner-tunnel
- [peap] Got tunneled reply code 2
- MS-MPPE-Encryption-Policy = 0x00000001
- MS-MPPE-Encryption-Types = 0x00000006
- MS-MPPE-Send-Key = 0xfdb1b0daec75e2fc02fd948810c5e66b
- MS-MPPE-Recv-Key = 0xbf96319899b9f1a859df71230454d6b5
- EAP-Message = 0x030d0004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "markus"
- [peap] Got tunneled reply RADIUS code 2
- MS-MPPE-Encryption-Policy = 0x00000001
- MS-MPPE-Encryption-Types = 0x00000006
- MS-MPPE-Send-Key = 0xfdb1b0daec75e2fc02fd948810c5e66b
- MS-MPPE-Recv-Key = 0xbf96319899b9f1a859df71230454d6b5
- EAP-Message = 0x030d0004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "markus"
- [peap] Tunneled authentication was successful.
- [peap] SUCCESS
- [peap] Saving tunneled attributes for later
- ++[eap] returns handled
- Sending Access-Challenge of id 212 to 172.16.3.225 port 1814
- EAP-Message = 0x010e002b190017030100207b41f9f268d1c6d52ed4ac639296a1b981e6e3966262909f58a2b5fb90d8984d
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xbd14c6c2b51adfa7a4efca0ea3eef625
- Proxy-State = 0x3434
- Proxy-State = 0x323331
- Finished request 8.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 172.16.3.225 port 1814, id=58, length=223
- User-Name = "markus@kl-dfki.de"
- NAS-IP-Address = 172.16.18.82
- NAS-Port = 1
- Called-Station-Id = "4C-E6-76-CC-54-C7:OpenURC"
- Calling-Station-Id = "00-24-2C-2A-F9-89"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 54Mbps 802.11g"
- EAP-Message = 0x020e002b19001703010020e45d47b3679ba850d20f535b695395ecc7d20eac30d8516bdbd4ef36c92b824d
- State = 0xbd14c6c2b51adfa7a4efca0ea3eef625
- Message-Authenticator = 0x19a3643a556af28f90dfe535b826023a
- Proxy-State = 0x3435
- Proxy-State = 0x313437
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[preprocess] returns ok
- [auth_log] expand: /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] /var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/freeradius/radacct/172.16.3.225/auth-detail-20121010
- [auth_log] expand: %t -> Wed Oct 10 14:33:38 2012
- ++[auth_log] returns ok
- ++[mschap] returns noop
- ++[digest] returns noop
- [suffix] Looking up realm "kl-dfki.de" for User-Name = "markus@kl-dfki.de"
- [suffix] Found realm "kl-dfki.de"
- [suffix] Adding Stripped-User-Name = "markus"
- [suffix] Adding Realm = "kl-dfki.de"
- [suffix] Authentication realm is LOCAL.
- ++[suffix] returns ok
- [eap] EAP packet type response id 14 length 43
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state send tlv success
- [peap] Received EAP-TLV response.
- [peap] Success
- [peap] Using saved attributes from the original Access-Accept
- User-Name = "markus"
- [eap] Freeing handler
- ++[eap] returns ok
- # Executing section post-auth from file /etc/freeradius/sites-enabled/default
- +- entering group post-auth {...}
- ++[exec] returns noop
- Sending Access-Accept of id 58 to 172.16.3.225 port 1814
- User-Name = "markus"
- MS-MPPE-Recv-Key = 0x26c83d9577f8e06537d0b2d74ffd6194175771c85f16ff741e3178cba1b6cfb4
- MS-MPPE-Send-Key = 0x54375696e746e92edc43738d5f266116756be409d577ebbb3c769b456fa34f77
- EAP-Message = 0x030e0004
- Message-Authenticator = 0x00000000000000000000000000000000
- Proxy-State = 0x3435
- Proxy-State = 0x313437
- Finished request 9.
- Going to the next request
- Waking up in 4.9 seconds.
- Cleaning up request 0 ID 205 with timestamp +16
- Cleaning up request 1 ID 160 with timestamp +16
- Cleaning up request 2 ID 74 with timestamp +16
- Cleaning up request 3 ID 165 with timestamp +16
- Cleaning up request 4 ID 87 with timestamp +16
- Cleaning up request 5 ID 21 with timestamp +16
- Cleaning up request 6 ID 173 with timestamp +16
- Cleaning up request 7 ID 18 with timestamp +16
- Cleaning up request 8 ID 212 with timestamp +16
- Cleaning up request 9 ID 58 with timestamp +16
- Ready to process requests.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement