Advertisement
Guest User

Untitled

a guest
Jan 4th, 2012
198
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 30.92 KB | None | 0 0
  1. ad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=40, length=155
  2. User-Name = "gettons"
  3. NAS-Port = 0
  4. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  5. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  6. Framed-MTU = 1400
  7. NAS-Port-Type = Wireless-802.11
  8. Connect-Info = "CONNECT 0Mbps 802.11"
  9. EAP-Message = 0x02c8000c01676574746f6e73
  10. Message-Authenticator = 0x7bc282689ed3c650f5add3341b567c4f
  11. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  12. +- entering group authorize {...}
  13. ++[preprocess] returns ok
  14. ++[chap] returns noop
  15. ++[mschap] returns noop
  16. ++[digest] returns noop
  17. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  18. ++[suffix] returns noop
  19. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  20. ++[ntdomain] returns noop
  21. [eap] EAP packet type response id 200 length 12
  22. [eap] No EAP Start, assuming it's an on-going EAP conversation
  23. ++[eap] returns updated
  24. [files] users: Matched entry gettons at line 2
  25. ++[files] returns ok
  26. rlm_counter: Entering module authorize code
  27. rlm_counter: Could not find Check item value pair
  28. ++[daily] returns noop
  29. rlm_counter: Entering module authorize code
  30. rlm_counter: Could not find Check item value pair
  31. ++[weekly] returns noop
  32. rlm_counter: Entering module authorize code
  33. rlm_counter: Could not find Check item value pair
  34. ++[monthly] returns noop
  35. rlm_counter: Entering module authorize code
  36. rlm_counter: Could not find Check item value pair
  37. ++[forever] returns noop
  38. rlm_checkval: Item Name: Calling-Station-Id, Value: B4-07-F9-E5-9F-81
  39. rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
  40. ++[checkval] returns notfound
  41. ++[expiration] returns noop
  42. ++[logintime] returns noop
  43. [pap] WARNING: Auth-Type already set. Not setting to PAP
  44. ++[pap] returns noop
  45. Found Auth-Type = EAP
  46. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  47. +- entering group authenticate {...}
  48. [eap] EAP Identity
  49. [eap] processing type md5
  50. rlm_eap_md5: Issuing Challenge
  51. ++[eap] returns handled
  52. Sending Access-Challenge of id 40 to 127.0.0.1 port 65073
  53. EAP-Message = 0x01c900160410febbca8447cd1d7151465374c853fd6e
  54. Message-Authenticator = 0x00000000000000000000000000000000
  55. State = 0x8cb4d4e18c7dd01be41732a0d5ea4804
  56. Finished request 0.
  57. Going to the next request
  58. Waking up in 4.9 seconds.
  59. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=41, length=167
  60. User-Name = "gettons"
  61. NAS-Port = 0
  62. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  63. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  64. Framed-MTU = 1400
  65. NAS-Port-Type = Wireless-802.11
  66. Connect-Info = "CONNECT 0Mbps 802.11"
  67. EAP-Message = 0x02c900060319
  68. State = 0x8cb4d4e18c7dd01be41732a0d5ea4804
  69. Message-Authenticator = 0x9f0ade29c187f76814bbd2d8f2c68907
  70. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  71. +- entering group authorize {...}
  72. ++[preprocess] returns ok
  73. ++[chap] returns noop
  74. ++[mschap] returns noop
  75. ++[digest] returns noop
  76. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  77. ++[suffix] returns noop
  78. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  79. ++[ntdomain] returns noop
  80. [eap] EAP packet type response id 201 length 6
  81. [eap] No EAP Start, assuming it's an on-going EAP conversation
  82. ++[eap] returns updated
  83. [files] users: Matched entry gettons at line 2
  84. ++[files] returns ok
  85. rlm_counter: Entering module authorize code
  86. rlm_counter: Could not find Check item value pair
  87. ++[daily] returns noop
  88. rlm_counter: Entering module authorize code
  89. rlm_counter: Could not find Check item value pair
  90. ++[weekly] returns noop
  91. rlm_counter: Entering module authorize code
  92. rlm_counter: Could not find Check item value pair
  93. ++[monthly] returns noop
  94. rlm_counter: Entering module authorize code
  95. rlm_counter: Could not find Check item value pair
  96. ++[forever] returns noop
  97. rlm_checkval: Item Name: Calling-Station-Id, Value: B4-07-F9-E5-9F-81
  98. rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
  99. ++[checkval] returns notfound
  100. ++[expiration] returns noop
  101. ++[logintime] returns noop
  102. [pap] WARNING: Auth-Type already set. Not setting to PAP
  103. ++[pap] returns noop
  104. Found Auth-Type = EAP
  105. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  106. +- entering group authenticate {...}
  107. [eap] Request found, released from the list
  108. [eap] EAP NAK
  109. [eap] EAP-NAK asked for EAP-Type/peap
  110. [eap] processing type tls
  111. [tls] Initiate
  112. [tls] Start returned 1
  113. ++[eap] returns handled
  114. Sending Access-Challenge of id 41 to 127.0.0.1 port 65073
  115. EAP-Message = 0x01ca00061920
  116. Message-Authenticator = 0x00000000000000000000000000000000
  117. State = 0x8cb4d4e18d7ecd1be41732a0d5ea4804
  118. Finished request 1.
  119. Going to the next request
  120. Waking up in 4.9 seconds.
  121. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=42, length=361
  122. User-Name = "gettons"
  123. NAS-Port = 0
  124. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  125. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  126. Framed-MTU = 1400
  127. NAS-Port-Type = Wireless-802.11
  128. Connect-Info = "CONNECT 0Mbps 802.11"
  129. EAP-Message = 0x02ca00c81980000000be16030100b9010000b503014f04b2de4603a188ce060d424156eb6f676fdccbd9aa948c90b9a2a85a819ca2000048c014c00a00390038c00fc0050035c012c00800160013c00dc003000ac013c00900330032c00ec004002fc011c007c00cc002000500040015001200090014001100080006000300ff01000044000b000403000102000a00340032000100020003000400050006000700080009000a000b000c000d000e000f001000110012001300140015001600170018001900230000
  130. State = 0x8cb4d4e18d7ecd1be41732a0d5ea4804
  131. Message-Authenticator = 0x7b1313e86458723a4f6b5b927cd97a74
  132. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  133. +- entering group authorize {...}
  134. ++[preprocess] returns ok
  135. ++[chap] returns noop
  136. ++[mschap] returns noop
  137. ++[digest] returns noop
  138. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  139. ++[suffix] returns noop
  140. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  141. ++[ntdomain] returns noop
  142. [eap] EAP packet type response id 202 length 200
  143. [eap] Continuing tunnel setup.
  144. ++[eap] returns ok
  145. Found Auth-Type = EAP
  146. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  147. +- entering group authenticate {...}
  148. [eap] Request found, released from the list
  149. [eap] EAP/peap
  150. [eap] processing type peap
  151. [peap] processing EAP-TLS
  152. TLS Length 190
  153. [peap] Length Included
  154. [peap] eaptls_verify returned 11
  155. [peap] (other): before/accept initialization
  156. [peap] TLS_accept: before/accept initialization
  157. [peap] <<< TLS 1.0 Handshake [length 00b9], ClientHello
  158. [peap] TLS_accept: SSLv3 read client hello A
  159. [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello
  160. [peap] TLS_accept: SSLv3 write server hello A
  161. [peap] >>> TLS 1.0 Handshake [length 085e], Certificate
  162. [peap] TLS_accept: SSLv3 write certificate A
  163. [peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
  164. [peap] TLS_accept: SSLv3 write key exchange A
  165. [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
  166. [peap] TLS_accept: SSLv3 write server done A
  167. [peap] TLS_accept: SSLv3 flush data
  168. [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
  169. In SSL Handshake Phase
  170. In SSL Accept mode
  171. [peap] eaptls_process returned 13
  172. [peap] EAPTLS_HANDLED
  173. ++[eap] returns handled
  174. Sending Access-Challenge of id 42 to 127.0.0.1 port 65073
  175. EAP-Message = 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
  176. EAP-Message = 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
  177. EAP-Message = 0x01be1ecd9408cbf996525a9787b2277365bce6dc9631575a1e6c760d389bb3c31e76a1ad1714b3bd5b62b958ae8579d1a126a5e3ac8c0e7ad637b2810ecbbee6c3ee927ccde8a0b14ac7b7c43ed488ed48f2ab82254ae5c91cbd194e93c8ecf736d03debcccaeadd718caef0fd301e379ed27f6eb046288d26355a235c3568211a915d09f7f8ff1d515b75617477cbfd006ebd88fce81910f561ae3f6ed790aca46246bb1140fdd6a40c37585652e1e08e5efa3d3c3cfc7e6a1dff5d90ef1abaec307dab323edd24550203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d010104050003820101008a23
  178. EAP-Message = 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
  179. EAP-Message = 0xe70004ab308204a73082038f
  180. Message-Authenticator = 0x00000000000000000000000000000000
  181. State = 0x8cb4d4e18e7fcd1be41732a0d5ea4804
  182. Finished request 2.
  183. Going to the next request
  184. Waking up in 4.9 seconds.
  185. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=43, length=167
  186. User-Name = "gettons"
  187. NAS-Port = 0
  188. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  189. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  190. Framed-MTU = 1400
  191. NAS-Port-Type = Wireless-802.11
  192. Connect-Info = "CONNECT 0Mbps 802.11"
  193. EAP-Message = 0x02cb00061900
  194. State = 0x8cb4d4e18e7fcd1be41732a0d5ea4804
  195. Message-Authenticator = 0x7fd748346aa8c166dbbbf6186ae1b164
  196. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  197. +- entering group authorize {...}
  198. ++[preprocess] returns ok
  199. ++[chap] returns noop
  200. ++[mschap] returns noop
  201. ++[digest] returns noop
  202. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  203. ++[suffix] returns noop
  204. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  205. ++[ntdomain] returns noop
  206. [eap] EAP packet type response id 203 length 6
  207. [eap] Continuing tunnel setup.
  208. ++[eap] returns ok
  209. Found Auth-Type = EAP
  210. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  211. +- entering group authenticate {...}
  212. [eap] Request found, released from the list
  213. [eap] EAP/peap
  214. [eap] processing type peap
  215. [peap] processing EAP-TLS
  216. [peap] Received TLS ACK
  217. [peap] ACK handshake fragment handler
  218. [peap] eaptls_verify returned 1
  219. [peap] eaptls_process returned 13
  220. [peap] EAPTLS_HANDLED
  221. ++[eap] returns handled
  222. Sending Access-Challenge of id 43 to 127.0.0.1 port 65073
  223. EAP-Message = 0x01cc03fc1940a00302010202090091770d95e6fe161a300d06092a864886f70d0101050500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3132303130333231343532365a170d3133303130323231343532365a308193310b3009060355040613024652310f300d0603550408130652616469757331
  224. EAP-Message = 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
  225. EAP-Message = 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
  226. EAP-Message = 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
  227. EAP-Message = 0x7bc8c1593991bda3
  228. Message-Authenticator = 0x00000000000000000000000000000000
  229. State = 0x8cb4d4e18f78cd1be41732a0d5ea4804
  230. Finished request 3.
  231. Going to the next request
  232. Waking up in 4.9 seconds.
  233. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=44, length=167
  234. User-Name = "gettons"
  235. NAS-Port = 0
  236. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  237. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  238. Framed-MTU = 1400
  239. NAS-Port-Type = Wireless-802.11
  240. Connect-Info = "CONNECT 0Mbps 802.11"
  241. EAP-Message = 0x02cc00061900
  242. State = 0x8cb4d4e18f78cd1be41732a0d5ea4804
  243. Message-Authenticator = 0x3229a0ba559e3a98a7321b7c3e4f859d
  244. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  245. +- entering group authorize {...}
  246. ++[preprocess] returns ok
  247. ++[chap] returns noop
  248. ++[mschap] returns noop
  249. ++[digest] returns noop
  250. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  251. ++[suffix] returns noop
  252. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  253. ++[ntdomain] returns noop
  254. [eap] EAP packet type response id 204 length 6
  255. [eap] Continuing tunnel setup.
  256. ++[eap] returns ok
  257. Found Auth-Type = EAP
  258. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  259. +- entering group authenticate {...}
  260. [eap] Request found, released from the list
  261. [eap] EAP/peap
  262. [eap] processing type peap
  263. [peap] processing EAP-TLS
  264. [peap] Received TLS ACK
  265. [peap] ACK handshake fragment handler
  266. [peap] eaptls_verify returned 1
  267. [peap] eaptls_process returned 13
  268. [peap] EAPTLS_HANDLED
  269. ++[eap] returns handled
  270. Sending Access-Challenge of id 44 to 127.0.0.1 port 65073
  271. EAP-Message = 0x01cd02ce190013b45d44a3de043fe5232b85a75971a64ab5fcf1add6008c11ed4e54906803183010d0defa1ebf20e16e3d176eaa17d2711f45b750aa6ac9629284a7f250f48690f4f3f7592ab4ec95cff175b67bf9610d11591606962d7aafee548144ca9e53c66e30020a1cbb7e88a572b753174cec6d4677287b2945f05f703597779f570bfac8637fb215723b9643449eb3186a69fcdd120f2ef3c991826cdca7eca49969cf55ea1bcece821a9caeae03f7160301020d0c0002090080fde67a30f99f4906d4a388235033ca79ad48cc85a8b61662961c5bb052df11129e6be6ebce5874e3b82998191ee6c2748cbd5b962cdd6ebbb5a15cae605a88
  272. EAP-Message = 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
  273. EAP-Message = 0x933d362268a278f4fc8ce1fb6f1baa37cabae6d61c7e3c248d2aa7ace3d378b230a45c04052373a6ba9e7cf2cc23aa7d4b114d7cde98b9511c09fd7336a445cda30584ab399e765804e40d097575f71e501bd69e924a77b13765615aab3e52dd7771af8d826c7954139efeecd87d9d1138896df06d82c968467f8dbe425a14d9f877d4aed1f77c7b005929b68d43896b9d9f42fb34eb74c6d5fb59873d079f85b59b5d28bea59b84039e673af344aa5c2c697d51f7ce96ba361da170c3fa705d93255619a6dcd7ddf3344916030100040e000000
  274. Message-Authenticator = 0x00000000000000000000000000000000
  275. State = 0x8cb4d4e18879cd1be41732a0d5ea4804
  276. Finished request 4.
  277. Going to the next request
  278. Waking up in 4.8 seconds.
  279. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=45, length=369
  280. User-Name = "gettons"
  281. NAS-Port = 0
  282. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  283. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  284. Framed-MTU = 1400
  285. NAS-Port-Type = Wireless-802.11
  286. Connect-Info = "CONNECT 0Mbps 802.11"
  287. EAP-Message = 0x02cd00d01980000000c61603010086100000820080c318303186a30648b988ea51f40b4d982f571271faf51e31f8a3a883b75fc63e00b3a4377aeea9222878fb6fffdc9633d7661804e945c2b19e3047405af6b8f484a07a74cc6a6aa90a69a5a6154af95bd46b8c09f2561e50a15903297ceec0c377852e317500abd1e8193a01dad7d92d157a27d05e343e0aaa4c432c06d99d511403010001011603010030225fbd18e4d0d29b1b4476a7cb55b0876b0d014abbe7f3650714090700275b60685588e9233324b4b6d089cfb3592efc
  288. State = 0x8cb4d4e18879cd1be41732a0d5ea4804
  289. Message-Authenticator = 0xcf7618dd0d62af551fd5019dec716f16
  290. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  291. +- entering group authorize {...}
  292. ++[preprocess] returns ok
  293. ++[chap] returns noop
  294. ++[mschap] returns noop
  295. ++[digest] returns noop
  296. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  297. ++[suffix] returns noop
  298. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  299. ++[ntdomain] returns noop
  300. [eap] EAP packet type response id 205 length 208
  301. [eap] Continuing tunnel setup.
  302. ++[eap] returns ok
  303. Found Auth-Type = EAP
  304. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  305. +- entering group authenticate {...}
  306. [eap] Request found, released from the list
  307. [eap] EAP/peap
  308. [eap] processing type peap
  309. [peap] processing EAP-TLS
  310. TLS Length 198
  311. [peap] Length Included
  312. [peap] eaptls_verify returned 11
  313. [peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
  314. [peap] TLS_accept: SSLv3 read client key exchange A
  315. [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
  316. [peap] <<< TLS 1.0 Handshake [length 0010], Finished
  317. [peap] TLS_accept: SSLv3 read finished A
  318. [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
  319. [peap] TLS_accept: SSLv3 write change cipher spec A
  320. [peap] >>> TLS 1.0 Handshake [length 0010], Finished
  321. [peap] TLS_accept: SSLv3 write finished A
  322. [peap] TLS_accept: SSLv3 flush data
  323. [peap] (other): SSL negotiation finished successfully
  324. SSL Connection Established
  325. [peap] eaptls_process returned 13
  326. [peap] EAPTLS_HANDLED
  327. ++[eap] returns handled
  328. Sending Access-Challenge of id 45 to 127.0.0.1 port 65073
  329. EAP-Message = 0x01ce00411900140301000101160301003080252a5f76a2c9fab13b053ef06c377f8a1090210279596596b6d843590fe2a80013d936a6cf8d4360304586cabca96d
  330. Message-Authenticator = 0x00000000000000000000000000000000
  331. State = 0x8cb4d4e1897acd1be41732a0d5ea4804
  332. Finished request 5.
  333. Going to the next request
  334. Waking up in 4.7 seconds.
  335. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=46, length=167
  336. User-Name = "gettons"
  337. NAS-Port = 0
  338. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  339. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  340. Framed-MTU = 1400
  341. NAS-Port-Type = Wireless-802.11
  342. Connect-Info = "CONNECT 0Mbps 802.11"
  343. EAP-Message = 0x02ce00061900
  344. State = 0x8cb4d4e1897acd1be41732a0d5ea4804
  345. Message-Authenticator = 0xfb7d8e1b82331431e3c4c1c12ebc1181
  346. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  347. +- entering group authorize {...}
  348. ++[preprocess] returns ok
  349. ++[chap] returns noop
  350. ++[mschap] returns noop
  351. ++[digest] returns noop
  352. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  353. ++[suffix] returns noop
  354. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  355. ++[ntdomain] returns noop
  356. [eap] EAP packet type response id 206 length 6
  357. [eap] Continuing tunnel setup.
  358. ++[eap] returns ok
  359. Found Auth-Type = EAP
  360. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  361. +- entering group authenticate {...}
  362. [eap] Request found, released from the list
  363. [eap] EAP/peap
  364. [eap] processing type peap
  365. [peap] processing EAP-TLS
  366. [peap] Received TLS ACK
  367. [peap] ACK handshake is finished
  368. [peap] eaptls_verify returned 3
  369. [peap] eaptls_process returned 3
  370. [peap] EAPTLS_SUCCESS
  371. [peap] Session established. Decoding tunneled attributes.
  372. [peap] Peap state TUNNEL ESTABLISHED
  373. ++[eap] returns handled
  374. Sending Access-Challenge of id 46 to 127.0.0.1 port 65073
  375. EAP-Message = 0x01cf002b1900170301002039d844cdca8284419de9220266e1913ff90cbaa59093b9c47aa1c9e4e7f5a358
  376. Message-Authenticator = 0x00000000000000000000000000000000
  377. State = 0x8cb4d4e18a7bcd1be41732a0d5ea4804
  378. Finished request 6.
  379. Going to the next request
  380. Waking up in 4.6 seconds.
  381. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=47, length=241
  382. User-Name = "gettons"
  383. NAS-Port = 0
  384. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  385. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  386. Framed-MTU = 1400
  387. NAS-Port-Type = Wireless-802.11
  388. Connect-Info = "CONNECT 0Mbps 802.11"
  389. EAP-Message = 0x02cf005019001703010020ca086fb1fae6b506d772977551324d60e8d3faf9d919081800b06cdb73b09c7e1703010020da1cafb2f8a990ffc3f18bd24ac15dd48adf395ac37f770174b8cc62d99cbd28
  390. State = 0x8cb4d4e18a7bcd1be41732a0d5ea4804
  391. Message-Authenticator = 0x861d19b433111a08ffb2ef3975fd33c5
  392. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  393. +- entering group authorize {...}
  394. ++[preprocess] returns ok
  395. ++[chap] returns noop
  396. ++[mschap] returns noop
  397. ++[digest] returns noop
  398. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  399. ++[suffix] returns noop
  400. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  401. ++[ntdomain] returns noop
  402. [eap] EAP packet type response id 207 length 80
  403. [eap] Continuing tunnel setup.
  404. ++[eap] returns ok
  405. Found Auth-Type = EAP
  406. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  407. +- entering group authenticate {...}
  408. [eap] Request found, released from the list
  409. [eap] EAP/peap
  410. [eap] processing type peap
  411. [peap] processing EAP-TLS
  412. [peap] eaptls_verify returned 7
  413. [peap] Done initial handshake
  414. [peap] eaptls_process returned 7
  415. [peap] EAPTLS_OK
  416. [peap] Session established. Decoding tunneled attributes.
  417. [peap] Peap state WAITING FOR INNER IDENTITY
  418. [peap] Identity - gettons
  419. [peap] Got inner identity 'gettons'
  420. [peap] Requesting SoH from client
  421. ++[eap] returns handled
  422. Sending Access-Challenge of id 47 to 127.0.0.1 port 65073
  423. EAP-Message = 0x01d0003b190017030100302f9ea5e66a70458301e7c71c1f9383bed8ff7e731c749aae3e65d0ac8b404463be5b91fa06274f9f2a07732e715deb0f
  424. Message-Authenticator = 0x00000000000000000000000000000000
  425. State = 0x8cb4d4e18b64cd1be41732a0d5ea4804
  426. Finished request 7.
  427. Going to the next request
  428. Waking up in 4.6 seconds.
  429. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=48, length=257
  430. User-Name = "gettons"
  431. NAS-Port = 0
  432. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  433. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  434. Framed-MTU = 1400
  435. NAS-Port-Type = Wireless-802.11
  436. Connect-Info = "CONNECT 0Mbps 802.11"
  437. EAP-Message = 0x02d00060190017030100201ff929f968850805dc8790553a4a0f817e8cdc8bb6697613071b83ce11d6d8e31703010030a302eba4daa9ac61809c27a98008d8b2da2e85e53f978905de4770846bdbf3230d3c21bc2ad3d7ba633e2cce86afbb5d
  438. State = 0x8cb4d4e18b64cd1be41732a0d5ea4804
  439. Message-Authenticator = 0x83b9228a5f3b6fb929a8ed36b7fb90b7
  440. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  441. +- entering group authorize {...}
  442. ++[preprocess] returns ok
  443. ++[chap] returns noop
  444. ++[mschap] returns noop
  445. ++[digest] returns noop
  446. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  447. ++[suffix] returns noop
  448. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  449. ++[ntdomain] returns noop
  450. [eap] EAP packet type response id 208 length 96
  451. [eap] Continuing tunnel setup.
  452. ++[eap] returns ok
  453. Found Auth-Type = EAP
  454. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  455. +- entering group authenticate {...}
  456. [eap] Request found, released from the list
  457. [eap] EAP/peap
  458. [eap] processing type peap
  459. [peap] processing EAP-TLS
  460. [peap] eaptls_verify returned 7
  461. [peap] Done initial handshake
  462. [peap] eaptls_process returned 7
  463. [peap] EAPTLS_OK
  464. [peap] Session established. Decoding tunneled attributes.
  465. [peap] Peap state WAITING FOR SOH RESPONSE
  466. [peap] EAP type nak
  467. [peap] SoH - client NAKed
  468. [peap] Setting User-Name to gettons
  469. [peap] Processing SoH request
  470. SoH-Supported = no
  471. FreeRADIUS-Proxied-To = 127.0.0.1
  472. User-Name = "gettons"
  473. [peap] server soh {
  474. No such virtual server "soh"
  475. Invalid user: [gettons/<no User-Password attribute>] (from client wifi-ap port 0 via TLS tunnel)
  476. [peap] } # server soh
  477. [peap] Got SoH reply
  478. [peap] SoH was rejected
  479. [peap] FAILURE
  480. ++[eap] returns handled
  481. Sending Access-Challenge of id 48 to 127.0.0.1 port 65073
  482. EAP-Message = 0x01d1002b19001703010020b712e44f59941935b5c496fa325ade6679a70e6f419d76114835a36ca8e685ca
  483. Message-Authenticator = 0x00000000000000000000000000000000
  484. State = 0x8cb4d4e18465cd1be41732a0d5ea4804
  485. Finished request 8.
  486. Going to the next request
  487. Waking up in 4.6 seconds.
  488. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=49, length=241
  489. User-Name = "gettons"
  490. NAS-Port = 0
  491. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  492. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  493. Framed-MTU = 1400
  494. NAS-Port-Type = Wireless-802.11
  495. Connect-Info = "CONNECT 0Mbps 802.11"
  496. EAP-Message = 0x02d1005019001703010020d60eb9ff044089fd0e11afaea75e34b549e6b5addcbab8cacca8ddae0a41de3417030100202e658a2b64c34a8d5e8a770049127e8d9d3caa79351a6afe67e50a47a538edaf
  497. State = 0x8cb4d4e18465cd1be41732a0d5ea4804
  498. Message-Authenticator = 0xc17ac6242663b70954146bda7c1c1e2b
  499. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  500. +- entering group authorize {...}
  501. ++[preprocess] returns ok
  502. ++[chap] returns noop
  503. ++[mschap] returns noop
  504. ++[digest] returns noop
  505. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  506. ++[suffix] returns noop
  507. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  508. ++[ntdomain] returns noop
  509. [eap] EAP packet type response id 209 length 80
  510. [eap] Continuing tunnel setup.
  511. ++[eap] returns ok
  512. Found Auth-Type = EAP
  513. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  514. +- entering group authenticate {...}
  515. [eap] Request found, released from the list
  516. [eap] EAP/peap
  517. [eap] processing type peap
  518. [peap] processing EAP-TLS
  519. [peap] eaptls_verify returned 7
  520. [peap] Done initial handshake
  521. [peap] eaptls_process returned 7
  522. [peap] EAPTLS_OK
  523. [peap] Session established. Decoding tunneled attributes.
  524. [peap] Peap state send tlv failure
  525. [peap] Received EAP-TLV response.
  526. [peap] The users session was previously rejected: returning reject (again.)
  527. [peap] *** This means you need to read the PREVIOUS messages in the debug output
  528. [peap] *** to find out the reason why the user was rejected.
  529. [peap] *** Look for "reject" or "fail". Those earlier messages will tell you.
  530. [peap] *** what went wrong, and how to fix the problem.
  531. [eap] Handler failed in EAP/peap
  532. [eap] Failed in EAP select
  533. ++[eap] returns invalid
  534. Failed to authenticate the user.
  535. Login incorrect: [gettons/<via Auth-Type = EAP>] (from client wifi-ap port 0 cli B4-07-F9-E5-9F-81)
  536. Using Post-Auth-Type Reject
  537. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  538. +- entering group REJECT {...}
  539. [attr_filter.access_reject] expand: %{User-Name} -> gettons
  540. attr_filter: Matched entry DEFAULT at line 11
  541. ++[attr_filter.access_reject] returns updated
  542. Delaying reject of request 9 for 1 seconds
  543. Going to the next request
  544. Waking up in 0.9 seconds.
  545. Sending delayed reject for request 9
  546. Sending Access-Reject of id 49 to 127.0.0.1 port 65073
  547. EAP-Message = 0x04d10004
  548. Message-Authenticator = 0x00000000000000000000000000000000
  549. Waking up in 3.6 seconds.
  550. rad_recv: Access-Request packet from host 127.0.0.1 port 65073, id=50, length=155
  551. User-Name = "gettons"
  552. NAS-Port = 0
  553. Called-Station-Id = "00-15-AF-49-26-20:reallycantwait2"
  554. Calling-Station-Id = "B4-07-F9-E5-9F-81"
  555. Framed-MTU = 1400
  556. NAS-Port-Type = Wireless-802.11
  557. Connect-Info = "CONNECT 0Mbps 802.11"
  558. EAP-Message = 0x02d8000c01676574746f6e73
  559. Message-Authenticator = 0x164d15f645975dbf0f0f500123db1d83
  560. # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
  561. +- entering group authorize {...}
  562. ++[preprocess] returns ok
  563. ++[chap] returns noop
  564. ++[mschap] returns noop
  565. ++[digest] returns noop
  566. [suffix] No '@' in User-Name = "gettons", skipping NULL due to config.
  567. ++[suffix] returns noop
  568. [ntdomain] No '\' in User-Name = "gettons", skipping NULL due to config.
  569. ++[ntdomain] returns noop
  570. [eap] EAP packet type response id 216 length 12
  571. [eap] No EAP Start, assuming it's an on-going EAP conversation
  572. ++[eap] returns updated
  573. [files] users: Matched entry gettons at line 2
  574. ++[files] returns ok
  575. rlm_counter: Entering module authorize code
  576. rlm_counter: Could not find Check item value pair
  577. ++[daily] returns noop
  578. rlm_counter: Entering module authorize code
  579. rlm_counter: Could not find Check item value pair
  580. ++[weekly] returns noop
  581. rlm_counter: Entering module authorize code
  582. rlm_counter: Could not find Check item value pair
  583. ++[monthly] returns noop
  584. rlm_counter: Entering module authorize code
  585. rlm_counter: Could not find Check item value pair
  586. ++[forever] returns noop
  587. rlm_checkval: Item Name: Calling-Station-Id, Value: B4-07-F9-E5-9F-81
  588. rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
  589. ++[checkval] returns notfound
  590. ++[expiration] returns noop
  591. ++[logintime] returns noop
  592. [pap] WARNING: Auth-Type already set. Not setting to PAP
  593. ++[pap] returns noop
  594. Found Auth-Type = EAP
  595. # Executing group from file /usr/local/etc/raddb/sites-enabled/default
  596. +- entering group authenticate {...}
  597. [eap] EAP Identity
  598. [eap] processing type md5
  599. rlm_eap_md5: Issuing Challenge
  600. ++[eap] returns handled
  601. Sending Access-Challenge of id 50 to 127.0.0.1 port 65073
  602. EAP-Message = 0x01d900160410ad630934d855f55014809cf6fbccf42f
  603. Message-Authenticator = 0x00000000000000000000000000000000
  604. State = 0xd0137933d0ca7dda1d7d66cadc156221
  605. Finished request 10.
  606. Going to the next request
  607. Waking up in 0.9 seconds.
  608. Cleaning up request 0 ID 40 with timestamp +9
  609. Cleaning up request 1 ID 41 with timestamp +9
  610. Cleaning up request 2 ID 42 with timestamp +9
  611. Cleaning up request 3 ID 43 with timestamp +9
  612. Cleaning up request 4 ID 44 with timestamp +9
  613. Waking up in 0.1 seconds.
  614. Cleaning up request 5 ID 45 with timestamp +9
  615. Cleaning up request 6 ID 46 with timestamp +9
  616. Cleaning up request 7 ID 47 with timestamp +9
  617. Cleaning up request 8 ID 48 with timestamp +9
  618. Waking up in 1.0 seconds.
  619. Cleaning up request 9 ID 49 with timestamp +9
  620. Waking up in 2.6 seconds.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement