Guest User

FreeRadiusTestLog

a guest
Oct 8th, 2013
496
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 33.42 KB | None | 0 0
  1. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=137
  2. User-Name = "TestUser1"
  3. NAS-IP-Address = 127.0.0.1
  4. Called-Station-Id = "20e52a2a793a"
  5. Calling-Station-Id = "c48508cf0a6c"
  6. NAS-Identifier = "20e52a2a793a"
  7. NAS-Port = 41
  8. Framed-MTU = 1400
  9. NAS-Port-Type = Wireless-802.11
  10. EAP-Message = 0x020000110142656e416c61626173746572
  11. Message-Authenticator = 0x5f2915c6e46594f98e863174de2eb4cd
  12. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  13. +- entering group authorize {...}
  14. ++[mschap] returns noop
  15. [eap] EAP packet type response id 0 length 17
  16. [eap] No EAP Start, assuming it's an on-going EAP conversation
  17. ++[eap] returns updated
  18. [files] users: Matched entry TestUser1 at line 8
  19. ++[files] returns ok
  20. [pap] WARNING: Auth-Type already set. Not setting to PAP
  21. ++[pap] returns noop
  22. Found Auth-Type = EAP
  23. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  24. +- entering group authenticate {...}
  25. [eap] EAP Identity
  26. [eap] processing type tls
  27. [tls] Initiate
  28. [tls] Start returned 1
  29. ++[eap] returns handled
  30. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  31. WISPr-Bandwidth-Max-Down := 1650064384
  32. RP-Downstream-Speed-Limit := 9999999
  33. WISPr-Bandwidth-Max-Up := 1650064384
  34. RP-Upstream-Speed-Limit := 9999999
  35. EAP-Message = 0x010100061920
  36. Message-Authenticator = 0x00000000000000000000000000000000
  37. State = 0xd631e7ebd630fef883091aaf86091818
  38. Finished request 0.
  39. Going to the next request
  40. Waking up in 4.9 seconds.
  41. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=369
  42. Cleaning up request 0 ID 0 with timestamp +430
  43. User-Name = "TestUser1"
  44. NAS-IP-Address = 127.0.0.1
  45. Called-Station-Id = "20e52a2a793a"
  46. Calling-Station-Id = "c48508cf0a6c"
  47. NAS-Identifier = "20e52a2a793a"
  48. NAS-Port = 41
  49. Framed-MTU = 1400
  50. State = 0xd631e7ebd630fef883091aaf86091818
  51. NAS-Port-Type = Wireless-802.11
  52. EAP-Message = 0x020100e71980000000dd16030100d8010000d4030152546738a319f95e372c239303a022acd8355ae4abc4a1cec4c5a825eae1985e000066c014c00ac022c0210039003800880087c00fc00500350084c012c008c01cc01b00160013c00dc003000ac013c009c01fc01e00330032009a009900450044c00ec004002f00960041c011c007c00cc002000500040015001200090014001100080006000300ff01000045000b000403000102000a00340032000e000d0019000b000c00180009000a00160017000800060007001400150004000500120013000100020003000f00100011000f000101
  53. Message-Authenticator = 0x221ba705c69be1b9ecd09983aedf84bb
  54. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  55. +- entering group authorize {...}
  56. ++[mschap] returns noop
  57. [eap] EAP packet type response id 1 length 231
  58. [eap] Continuing tunnel setup.
  59. ++[eap] returns ok
  60. Found Auth-Type = EAP
  61. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  62. +- entering group authenticate {...}
  63. [eap] Request found, released from the list
  64. [eap] EAP/peap
  65. [eap] processing type peap
  66. [peap] processing EAP-TLS
  67. TLS Length 221
  68. [peap] Length Included
  69. [peap] eaptls_verify returned 11
  70. [peap] (other): before/accept initialization
  71. [peap] TLS_accept: before/accept initialization
  72. [peap] <<< TLS 1.0 Handshake [length 00d8], ClientHello
  73. [peap] TLS_accept: SSLv3 read client hello A
  74. [peap] >>> TLS 1.0 Handshake [length 0036], ServerHello
  75. [peap] TLS_accept: SSLv3 write server hello A
  76. [peap] >>> TLS 1.0 Handshake [length 083b], Certificate
  77. [peap] TLS_accept: SSLv3 write certificate A
  78. [peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
  79. [peap] TLS_accept: SSLv3 write key exchange A
  80. [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
  81. [peap] TLS_accept: SSLv3 write server done A
  82. [peap] TLS_accept: SSLv3 flush data
  83. [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
  84. In SSL Handshake Phase
  85. In SSL Accept mode
  86. [peap] eaptls_process returned 13
  87. [peap] EAPTLS_HANDLED
  88. ++[eap] returns handled
  89. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  90. EAP-Message = 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
  91. EAP-Message = 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
  92. EAP-Message = 0x916e058b49295500e9270c9a53504e2a44ac95f90846f9e0e1b264658456c5a42c9c68f857d7a9f15c69815454db0ccd3e57695fa54cb1b47cb72946a0fa37c40482e78ccf3f3fb7da234991e9bb98171dd842b362bcb80472e7435782c8223ed2aa08565ffc2b5c36998c7b6ff4e102088c5fa01b42aced9857679045b4ebef192997f05c3dcbeb47f15e769a164cbbf1befb9dbb44e5e8fc88ec6dfce836131bdb6dc36427926251c95bd8b07d647ae9947cf25c06ebfc27691604d4f5eba60bd7ad0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038201010051b28b9906ba2606
  93. EAP-Message = 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
  94. EAP-Message = 0x048f30820377a00302010202
  95. Message-Authenticator = 0x00000000000000000000000000000000
  96. State = 0xd631e7ebd733fef883091aaf86091818
  97. Finished request 1.
  98. Going to the next request
  99. Waking up in 4.9 seconds.
  100. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=144
  101. Cleaning up request 1 ID 0 with timestamp +430
  102. User-Name = "TestUser1"
  103. NAS-IP-Address = 127.0.0.1
  104. Called-Station-Id = "20e52a2a793a"
  105. Calling-Station-Id = "c48508cf0a6c"
  106. NAS-Identifier = "20e52a2a793a"
  107. NAS-Port = 41
  108. Framed-MTU = 1400
  109. State = 0xd631e7ebd733fef883091aaf86091818
  110. NAS-Port-Type = Wireless-802.11
  111. EAP-Message = 0x020200061900
  112. Message-Authenticator = 0x04e9ae08bc8e835861e9a778c2db1301
  113. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  114. +- entering group authorize {...}
  115. ++[mschap] returns noop
  116. [eap] EAP packet type response id 2 length 6
  117. [eap] Continuing tunnel setup.
  118. ++[eap] returns ok
  119. Found Auth-Type = EAP
  120. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  121. +- entering group authenticate {...}
  122. [eap] Request found, released from the list
  123. [eap] EAP/peap
  124. [eap] processing type peap
  125. [peap] processing EAP-TLS
  126. [peap] Received TLS ACK
  127. [peap] ACK handshake fragment handler
  128. [peap] eaptls_verify returned 1
  129. [peap] eaptls_process returned 13
  130. [peap] EAPTLS_HANDLED
  131. ++[eap] returns handled
  132. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  133. EAP-Message = 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
  134. EAP-Message = 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
  135. EAP-Message = 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
  136. EAP-Message = 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
  137. EAP-Message = 0xa68c8b5ce97765a5
  138. Message-Authenticator = 0x00000000000000000000000000000000
  139. State = 0xd631e7ebd432fef883091aaf86091818
  140. Finished request 2.
  141. Going to the next request
  142. Waking up in 4.9 seconds.
  143. rad_recv: Access-Request packet from host 127.0.0.1 port 37619, id=6, length=80
  144. User-Name = "c48508cf0a6c"
  145. NAS-Port = 1
  146. NAS-Port-Type = Wireless-802.11
  147. User-Password = "TestRadiusSharedSecret"
  148. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  149. +- entering group authorize {...}
  150. ++[mschap] returns noop
  151. [eap] No EAP-Message, not doing EAP
  152. ++[eap] returns noop
  153. ++[files] returns noop
  154. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  155. ++[pap] returns noop
  156. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  157. Failed to authenticate the user.
  158. Login incorrect: [c48508cf0a6c/TestRadiusSharedSecret] (from client DD-WRT-RADIUS port 1)
  159. Using Post-Auth-Type REJECT
  160. WARNING: Unknown value specified for Post-Auth-Type. Cannot perform requested action.
  161. Delaying reject of request 3 for 1 seconds
  162. Going to the next request
  163. Waking up in 0.9 seconds.
  164. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=144
  165. Cleaning up request 2 ID 0 with timestamp +431
  166. User-Name = "TestUser1"
  167. NAS-IP-Address = 127.0.0.1
  168. Called-Station-Id = "20e52a2a793a"
  169. Calling-Station-Id = "c48508cf0a6c"
  170. NAS-Identifier = "20e52a2a793a"
  171. NAS-Port = 41
  172. Framed-MTU = 1400
  173. State = 0xd631e7ebd432fef883091aaf86091818
  174. NAS-Port-Type = Wireless-802.11
  175. EAP-Message = 0x020300061900
  176. Message-Authenticator = 0x0b8f8dcb9eda208f1755ffd523d2ba86
  177. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  178. +- entering group authorize {...}
  179. ++[mschap] returns noop
  180. [eap] EAP packet type response id 3 length 6
  181. [eap] Continuing tunnel setup.
  182. ++[eap] returns ok
  183. Found Auth-Type = EAP
  184. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  185. +- entering group authenticate {...}
  186. [eap] Request found, released from the list
  187. [eap] EAP/peap
  188. [eap] processing type peap
  189. [peap] processing EAP-TLS
  190. [peap] Received TLS ACK
  191. [peap] ACK handshake fragment handler
  192. [peap] eaptls_verify returned 1
  193. [peap] eaptls_process returned 13
  194. [peap] EAPTLS_HANDLED
  195. ++[eap] returns handled
  196. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  197. EAP-Message = 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
  198. EAP-Message = 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
  199. EAP-Message = 0x7425b588226f04a48c5614b186039c9639bbeee45299980f097bfbfdc52df1462d9b994bd26b739417096a736b742144b08a55b12745a5b9c52fe8d22d9bd896aff566d68eca1a525f4ef80242543d5d065edf18f8bcc54a0728458c6db800e97fac70e7f2f8c5fe46cd35a6af20fd4a5f8fe882be8563f7ed153f2a4d40621cebc3dff41e4a4627d3bfc0ea9d74bef814d4c34147620d8d9c39d7f68ff192d7933154911c6013cf628c9570b916030100040e000000
  200. Message-Authenticator = 0x00000000000000000000000000000000
  201. State = 0xd631e7ebd535fef883091aaf86091818
  202. Finished request 4.
  203. Going to the next request
  204. Waking up in 0.9 seconds.
  205. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=346
  206. Cleaning up request 4 ID 0 with timestamp +431
  207. User-Name = "TestUser1"
  208. NAS-IP-Address = 127.0.0.1
  209. Called-Station-Id = "20e52a2a793a"
  210. Calling-Station-Id = "c48508cf0a6c"
  211. NAS-Identifier = "20e52a2a793a"
  212. NAS-Port = 41
  213. Framed-MTU = 1400
  214. State = 0xd631e7ebd535fef883091aaf86091818
  215. NAS-Port-Type = Wireless-802.11
  216. EAP-Message = 0x020400d01980000000c61603010086100000820080819e35027b493f3acdf47577afe54af7cca56d0ceba7adf4ca496344fe575d2f2749d563688d0d65f5f1ea286959e3659fc39299248ddffae0c6ebfe987cfd0ea3fc000f9788fbe4d729ca32cf12bf162a5ed74261a93b2d6441d77f983917b79a534070dd4f5fa127bf33f4698f7b0c4ce00fe0f17dfad87ae615f76c8940d71403010001011603010030e44af7175a115fbdb5e27cfd6e10e5590cefcbadf1d69b97a57cb2baaa5c6f6a36eb616f3f882cd12e4537f9c20f6ab1
  217. Message-Authenticator = 0xd91a2aaa2c046ac2372d3fdb243f376c
  218. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  219. +- entering group authorize {...}
  220. ++[mschap] returns noop
  221. [eap] EAP packet type response id 4 length 208
  222. [eap] Continuing tunnel setup.
  223. ++[eap] returns ok
  224. Found Auth-Type = EAP
  225. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  226. +- entering group authenticate {...}
  227. [eap] Request found, released from the list
  228. [eap] EAP/peap
  229. [eap] processing type peap
  230. [peap] processing EAP-TLS
  231. TLS Length 198
  232. [peap] Length Included
  233. [peap] eaptls_verify returned 11
  234. [peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
  235. [peap] TLS_accept: SSLv3 read client key exchange A
  236. [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
  237. [peap] <<< TLS 1.0 Handshake [length 0010], Finished
  238. [peap] TLS_accept: SSLv3 read finished A
  239. [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
  240. [peap] TLS_accept: SSLv3 write change cipher spec A
  241. [peap] >>> TLS 1.0 Handshake [length 0010], Finished
  242. [peap] TLS_accept: SSLv3 write finished A
  243. [peap] TLS_accept: SSLv3 flush data
  244. [peap] (other): SSL negotiation finished successfully
  245. SSL Connection Established
  246. [peap] eaptls_process returned 13
  247. [peap] EAPTLS_HANDLED
  248. ++[eap] returns handled
  249. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  250. EAP-Message = 0x01050041190014030100010116030100300cb32853dcf2e0e187f653efe5b6ad7ef9e19c5c42b0abf05caf76456afdb6bddb653f4f66831d05926e2cf3e423255b
  251. Message-Authenticator = 0x00000000000000000000000000000000
  252. State = 0xd631e7ebd234fef883091aaf86091818
  253. Finished request 5.
  254. Going to the next request
  255. Waking up in 0.6 seconds.
  256. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=144
  257. Cleaning up request 5 ID 0 with timestamp +431
  258. User-Name = "TestUser1"
  259. NAS-IP-Address = 127.0.0.1
  260. Called-Station-Id = "20e52a2a793a"
  261. Calling-Station-Id = "c48508cf0a6c"
  262. NAS-Identifier = "20e52a2a793a"
  263. NAS-Port = 41
  264. Framed-MTU = 1400
  265. State = 0xd631e7ebd234fef883091aaf86091818
  266. NAS-Port-Type = Wireless-802.11
  267. EAP-Message = 0x020500061900
  268. Message-Authenticator = 0xf12fbd031a47d1b03081610b444800d2
  269. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  270. +- entering group authorize {...}
  271. ++[mschap] returns noop
  272. [eap] EAP packet type response id 5 length 6
  273. [eap] Continuing tunnel setup.
  274. ++[eap] returns ok
  275. Found Auth-Type = EAP
  276. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  277. +- entering group authenticate {...}
  278. [eap] Request found, released from the list
  279. [eap] EAP/peap
  280. [eap] processing type peap
  281. [peap] processing EAP-TLS
  282. [peap] Received TLS ACK
  283. [peap] ACK handshake is finished
  284. [peap] eaptls_verify returned 3
  285. [peap] eaptls_process returned 3
  286. [peap] EAPTLS_SUCCESS
  287. [peap] Session established. Decoding tunneled attributes.
  288. [peap] Peap state TUNNEL ESTABLISHED
  289. ++[eap] returns handled
  290. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  291. EAP-Message = 0x0106002b19001703010020ba00301b6855dff9aa101e7b0fd82f1363526c90dbab43fb6eba7655c335bbfc
  292. Message-Authenticator = 0x00000000000000000000000000000000
  293. State = 0xd631e7ebd337fef883091aaf86091818
  294. Finished request 6.
  295. Going to the next request
  296. Waking up in 0.6 seconds.
  297. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=234
  298. Cleaning up request 6 ID 0 with timestamp +431
  299. User-Name = "TestUser1"
  300. NAS-IP-Address = 127.0.0.1
  301. Called-Station-Id = "20e52a2a793a"
  302. Calling-Station-Id = "c48508cf0a6c"
  303. NAS-Identifier = "20e52a2a793a"
  304. NAS-Port = 41
  305. Framed-MTU = 1400
  306. State = 0xd631e7ebd337fef883091aaf86091818
  307. NAS-Port-Type = Wireless-802.11
  308. EAP-Message = 0x0206006019001703010020ca71340b92214bf6f7ca85fd143196d70bdfa7a69a391adbd0bdadd6d355db5517030100302463063b091e7ea25deb45a278687959ab138eea52c410800e02904a777fcbaabd9687b83ea154284e4625ddef26cf5b
  309. Message-Authenticator = 0x6d1458a43ad4c2f5601bcaa78bc26b3a
  310. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  311. +- entering group authorize {...}
  312. ++[mschap] returns noop
  313. [eap] EAP packet type response id 6 length 96
  314. [eap] Continuing tunnel setup.
  315. ++[eap] returns ok
  316. Found Auth-Type = EAP
  317. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  318. +- entering group authenticate {...}
  319. [eap] Request found, released from the list
  320. [eap] EAP/peap
  321. [eap] processing type peap
  322. [peap] processing EAP-TLS
  323. [peap] eaptls_verify returned 7
  324. [peap] Done initial handshake
  325. [peap] eaptls_process returned 7
  326. [peap] EAPTLS_OK
  327. [peap] Session established. Decoding tunneled attributes.
  328. [peap] Peap state WAITING FOR INNER IDENTITY
  329. [peap] Identity - TestUser1
  330. [peap] Got inner identity 'TestUser1'
  331. [peap] Setting default EAP type for tunneled EAP session.
  332. [peap] Got tunneled request
  333. EAP-Message = 0x020600110142656e416c61626173746572
  334. server {
  335. [peap] Setting User-Name to TestUser1
  336. Sending tunneled request
  337. EAP-Message = 0x020600110142656e416c61626173746572
  338. FreeRADIUS-Proxied-To = 127.0.0.1
  339. User-Name = "TestUser1"
  340. NAS-IP-Address = 127.0.0.1
  341. Called-Station-Id = "20e52a2a793a"
  342. Calling-Station-Id = "c48508cf0a6c"
  343. NAS-Identifier = "20e52a2a793a"
  344. NAS-Port = 41
  345. Framed-MTU = 1400
  346. NAS-Port-Type = Wireless-802.11
  347. server {
  348. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  349. +- entering group authorize {...}
  350. ++[mschap] returns noop
  351. [eap] EAP packet type response id 6 length 17
  352. [eap] No EAP Start, assuming it's an on-going EAP conversation
  353. ++[eap] returns updated
  354. [files] users: Matched entry DEFAULT at line 2
  355. [files] expand: %{User-Name} -> TestUser1
  356. [files] users: Matched entry TestUser1 at line 8
  357. ++[files] returns ok
  358. [pap] WARNING: Auth-Type already set. Not setting to PAP
  359. ++[pap] returns noop
  360. Found Auth-Type = EAP
  361. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  362. +- entering group authenticate {...}
  363. [eap] EAP Identity
  364. [eap] processing type mschapv2
  365. rlm_eap_mschapv2: Issuing Challenge
  366. ++[eap] returns handled
  367. } # server
  368. [peap] Got tunneled reply code 11
  369. Session-Timeout := 3600
  370. User-Name := "TestUser1"
  371. Acct-Interim-Interval := 300
  372. WISPr-Bandwidth-Max-Down := 1650064384
  373. RP-Downstream-Speed-Limit := 9999999
  374. WISPr-Bandwidth-Max-Up := 1650064384
  375. RP-Upstream-Speed-Limit := 9999999
  376. EAP-Message = 0x010700261a010700211030e714e9f8aa640c4517f1b8ada7470c42656e416c61626173746572
  377. Message-Authenticator = 0x00000000000000000000000000000000
  378. State = 0xf49e6db9f499777f1a8b74b2f2f61816
  379. [peap] Got tunneled reply RADIUS code 11
  380. Session-Timeout := 3600
  381. User-Name := "TestUser1"
  382. Acct-Interim-Interval := 300
  383. WISPr-Bandwidth-Max-Down := 1650064384
  384. RP-Downstream-Speed-Limit := 9999999
  385. WISPr-Bandwidth-Max-Up := 1650064384
  386. RP-Upstream-Speed-Limit := 9999999
  387. EAP-Message = 0x010700261a010700211030e714e9f8aa640c4517f1b8ada7470c42656e416c61626173746572
  388. Message-Authenticator = 0x00000000000000000000000000000000
  389. State = 0xf49e6db9f499777f1a8b74b2f2f61816
  390. [peap] Got tunneled Access-Challenge
  391. ++[eap] returns handled
  392. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  393. EAP-Message = 0x0107004b19001703010040ac0faae853afc0d4e83f6edee7b93d02e5690053a165e98dd0cfb2a4373cb3d741b342ac3479e42e9b9d861ac0491637ef1ec8e6032c5895849ba214040b1b4f
  394. Message-Authenticator = 0x00000000000000000000000000000000
  395. State = 0xd631e7ebd036fef883091aaf86091818
  396. Finished request 7.
  397. Going to the next request
  398. Waking up in 0.5 seconds.
  399. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=282
  400. Cleaning up request 7 ID 0 with timestamp +431
  401. User-Name = "TestUser1"
  402. NAS-IP-Address = 127.0.0.1
  403. Called-Station-Id = "20e52a2a793a"
  404. Calling-Station-Id = "c48508cf0a6c"
  405. NAS-Identifier = "20e52a2a793a"
  406. NAS-Port = 41
  407. Framed-MTU = 1400
  408. State = 0xd631e7ebd036fef883091aaf86091818
  409. NAS-Port-Type = Wireless-802.11
  410. EAP-Message = 0x020700901900170301002060563e4c733c597f055eddcfc8f52e8d090d9bd3c551a912803cb241902d9fde1703010060c1226f36d3ef6546e0c69abd8886b07ee6ca9c453729ac60791184ed19c28709dd7b97b8341462595341190f00babbe21296de8e31d5474f0b574d2a1397a82eed31b8482a4bb03cd94210866cc056fbbe575b0f4d83581ded49394410d6fbc5
  411. Message-Authenticator = 0x9cfd3199f9af2ef029cced52289eee64
  412. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  413. +- entering group authorize {...}
  414. ++[mschap] returns noop
  415. [eap] EAP packet type response id 7 length 144
  416. [eap] Continuing tunnel setup.
  417. ++[eap] returns ok
  418. Found Auth-Type = EAP
  419. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  420. +- entering group authenticate {...}
  421. [eap] Request found, released from the list
  422. [eap] EAP/peap
  423. [eap] processing type peap
  424. [peap] processing EAP-TLS
  425. [peap] eaptls_verify returned 7
  426. [peap] Done initial handshake
  427. [peap] eaptls_process returned 7
  428. [peap] EAPTLS_OK
  429. [peap] Session established. Decoding tunneled attributes.
  430. [peap] Peap state phase2
  431. [peap] EAP type mschapv2
  432. [peap] Got tunneled request
  433. EAP-Message = 0x020700471a0207004231fc6750c10d132f820d910e25faab3880000000000000000061098b7613e3917ffe494f938e5fc49defab65c1d87a8be30042656e416c61626173746572
  434. server {
  435. [peap] Setting User-Name to TestUser1
  436. Sending tunneled request
  437. EAP-Message = 0x020700471a0207004231fc6750c10d132f820d910e25faab3880000000000000000061098b7613e3917ffe494f938e5fc49defab65c1d87a8be30042656e416c61626173746572
  438. FreeRADIUS-Proxied-To = 127.0.0.1
  439. User-Name = "TestUser1"
  440. State = 0xf49e6db9f499777f1a8b74b2f2f61816
  441. NAS-IP-Address = 127.0.0.1
  442. Called-Station-Id = "20e52a2a793a"
  443. Calling-Station-Id = "c48508cf0a6c"
  444. NAS-Identifier = "20e52a2a793a"
  445. NAS-Port = 41
  446. Framed-MTU = 1400
  447. NAS-Port-Type = Wireless-802.11
  448. server {
  449. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  450. +- entering group authorize {...}
  451. ++[mschap] returns noop
  452. [eap] EAP packet type response id 7 length 71
  453. [eap] No EAP Start, assuming it's an on-going EAP conversation
  454. ++[eap] returns updated
  455. [files] users: Matched entry DEFAULT at line 2
  456. [files] expand: %{User-Name} -> TestUser1
  457. [files] users: Matched entry TestUser1 at line 8
  458. ++[files] returns ok
  459. [pap] WARNING: Auth-Type already set. Not setting to PAP
  460. ++[pap] returns noop
  461. Found Auth-Type = EAP
  462. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  463. +- entering group authenticate {...}
  464. [eap] Request found, released from the list
  465. [eap] EAP/mschapv2
  466. [eap] processing type mschapv2
  467. [mschapv2] # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  468. [mschapv2] +- entering group MS-CHAP {...}
  469. [mschap] Creating challenge hash with username: TestUser1
  470. [mschap] Client is using MS-CHAPv2 for TestUser1, we need NT-Password
  471. [mschap] adding MS-CHAPv2 MPPE keys
  472. ++[mschap] returns ok
  473. MSCHAP Success
  474. ++[eap] returns handled
  475. } # server
  476. [peap] Got tunneled reply code 11
  477. Session-Timeout := 3600
  478. User-Name := "TestUser1"
  479. Acct-Interim-Interval := 300
  480. WISPr-Bandwidth-Max-Down := 1650064384
  481. RP-Downstream-Speed-Limit := 9999999
  482. WISPr-Bandwidth-Max-Up := 1650064384
  483. RP-Upstream-Speed-Limit := 9999999
  484. EAP-Message = 0x010800331a0307002e533d39314433423844334232383636323630304145414144383234344132353646373630374130373545
  485. Message-Authenticator = 0x00000000000000000000000000000000
  486. State = 0xf49e6db9f596777f1a8b74b2f2f61816
  487. [peap] Got tunneled reply RADIUS code 11
  488. Session-Timeout := 3600
  489. User-Name := "TestUser1"
  490. Acct-Interim-Interval := 300
  491. WISPr-Bandwidth-Max-Down := 1650064384
  492. RP-Downstream-Speed-Limit := 9999999
  493. WISPr-Bandwidth-Max-Up := 1650064384
  494. RP-Upstream-Speed-Limit := 9999999
  495. EAP-Message = 0x010800331a0307002e533d39314433423844334232383636323630304145414144383234344132353646373630374130373545
  496. Message-Authenticator = 0x00000000000000000000000000000000
  497. State = 0xf49e6db9f596777f1a8b74b2f2f61816
  498. [peap] Got tunneled Access-Challenge
  499. ++[eap] returns handled
  500. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  501. EAP-Message = 0x0108005b19001703010050086ff96c40bbf30c9395efd0e2d85b13090e91a5eaab1bf86a63d8497010af47fc674490d26612466b9539e3ac6b42467fb6030f7c5c2295bb9febe00ae0b659621c92b2b85423c0317453e8f21ed722
  502. Message-Authenticator = 0x00000000000000000000000000000000
  503. State = 0xd631e7ebd139fef883091aaf86091818
  504. Finished request 8.
  505. Going to the next request
  506. Waking up in 0.5 seconds.
  507. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=218
  508. Cleaning up request 8 ID 0 with timestamp +431
  509. User-Name = "TestUser1"
  510. NAS-IP-Address = 127.0.0.1
  511. Called-Station-Id = "20e52a2a793a"
  512. Calling-Station-Id = "c48508cf0a6c"
  513. NAS-Identifier = "20e52a2a793a"
  514. NAS-Port = 41
  515. Framed-MTU = 1400
  516. State = 0xd631e7ebd139fef883091aaf86091818
  517. NAS-Port-Type = Wireless-802.11
  518. EAP-Message = 0x02080050190017030100206d6dd801215d0b8266f2a440e705fb2d8989f61134d581036b67bc88003bb9ea1703010020302ec11216fd98faefa041a6f98364ad2ff2026e27e292875f917048a75d40c0
  519. Message-Authenticator = 0xad474b6126413fb32c88b9396b939d74
  520. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  521. +- entering group authorize {...}
  522. ++[mschap] returns noop
  523. [eap] EAP packet type response id 8 length 80
  524. [eap] Continuing tunnel setup.
  525. ++[eap] returns ok
  526. Found Auth-Type = EAP
  527. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  528. +- entering group authenticate {...}
  529. [eap] Request found, released from the list
  530. [eap] EAP/peap
  531. [eap] processing type peap
  532. [peap] processing EAP-TLS
  533. [peap] eaptls_verify returned 7
  534. [peap] Done initial handshake
  535. [peap] eaptls_process returned 7
  536. [peap] EAPTLS_OK
  537. [peap] Session established. Decoding tunneled attributes.
  538. [peap] Peap state phase2
  539. [peap] EAP type mschapv2
  540. [peap] Got tunneled request
  541. EAP-Message = 0x020800061a03
  542. server {
  543. [peap] Setting User-Name to TestUser1
  544. Sending tunneled request
  545. EAP-Message = 0x020800061a03
  546. FreeRADIUS-Proxied-To = 127.0.0.1
  547. User-Name = "TestUser1"
  548. State = 0xf49e6db9f596777f1a8b74b2f2f61816
  549. NAS-IP-Address = 127.0.0.1
  550. Called-Station-Id = "20e52a2a793a"
  551. Calling-Station-Id = "c48508cf0a6c"
  552. NAS-Identifier = "20e52a2a793a"
  553. NAS-Port = 41
  554. Framed-MTU = 1400
  555. NAS-Port-Type = Wireless-802.11
  556. server {
  557. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  558. +- entering group authorize {...}
  559. ++[mschap] returns noop
  560. [eap] EAP packet type response id 8 length 6
  561. [eap] No EAP Start, assuming it's an on-going EAP conversation
  562. ++[eap] returns updated
  563. [files] users: Matched entry DEFAULT at line 2
  564. [files] expand: %{User-Name} -> TestUser1
  565. [files] users: Matched entry TestUser1 at line 8
  566. ++[files] returns ok
  567. [pap] WARNING: Auth-Type already set. Not setting to PAP
  568. ++[pap] returns noop
  569. Found Auth-Type = EAP
  570. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  571. +- entering group authenticate {...}
  572. [eap] Request found, released from the list
  573. [eap] EAP/mschapv2
  574. [eap] processing type mschapv2
  575. [eap] Freeing handler
  576. ++[eap] returns ok
  577. Login OK: [TestUser1] (from client DD-WRT-RADIUS port 41 cli c48508cf0a6c via TLS tunnel)
  578. WARNING: Empty post-auth section. Using default return values.
  579. } # server
  580. [peap] Got tunneled reply code 2
  581. Session-Timeout := 3600
  582. User-Name := "TestUser1"
  583. Acct-Interim-Interval := 300
  584. WISPr-Bandwidth-Max-Down := 1650064384
  585. RP-Downstream-Speed-Limit := 9999999
  586. WISPr-Bandwidth-Max-Up := 1650064384
  587. RP-Upstream-Speed-Limit := 9999999
  588. MS-MPPE-Encryption-Policy = 0x00000002
  589. MS-MPPE-Encryption-Types = 0x00000004
  590. MS-MPPE-Send-Key = 0xa7a93a04637565c24bba118de411bbd7
  591. MS-MPPE-Recv-Key = 0x84b2bb054a23696c9299a5ae59374d97
  592. EAP-Message = 0x03080004
  593. Message-Authenticator = 0x00000000000000000000000000000000
  594. [peap] Got tunneled reply RADIUS code 2
  595. Session-Timeout := 3600
  596. User-Name := "TestUser1"
  597. Acct-Interim-Interval := 300
  598. WISPr-Bandwidth-Max-Down := 1650064384
  599. RP-Downstream-Speed-Limit := 9999999
  600. WISPr-Bandwidth-Max-Up := 1650064384
  601. RP-Upstream-Speed-Limit := 9999999
  602. MS-MPPE-Encryption-Policy = 0x00000002
  603. MS-MPPE-Encryption-Types = 0x00000004
  604. MS-MPPE-Send-Key = 0xa7a93a04637565c24bba118de411bbd7
  605. MS-MPPE-Recv-Key = 0x84b2bb054a23696c9299a5ae59374d97
  606. EAP-Message = 0x03080004
  607. Message-Authenticator = 0x00000000000000000000000000000000
  608. [peap] Tunneled authentication was successful.
  609. [peap] SUCCESS
  610. [peap] Saving tunneled attributes for later
  611. ++[eap] returns handled
  612. Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
  613. EAP-Message = 0x0109002b19001703010020b13325ab89769cef4e4c0ac74c0107207f27248050bc6997e02ffaef7cb01ab4
  614. Message-Authenticator = 0x00000000000000000000000000000000
  615. State = 0xd631e7ebde38fef883091aaf86091818
  616. Finished request 9.
  617. Going to the next request
  618. Waking up in 0.3 seconds.
  619. rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=218
  620. Cleaning up request 9 ID 0 with timestamp +431
  621. User-Name = "TestUser1"
  622. NAS-IP-Address = 127.0.0.1
  623. Called-Station-Id = "20e52a2a793a"
  624. Calling-Station-Id = "c48508cf0a6c"
  625. NAS-Identifier = "20e52a2a793a"
  626. NAS-Port = 41
  627. Framed-MTU = 1400
  628. State = 0xd631e7ebde38fef883091aaf86091818
  629. NAS-Port-Type = Wireless-802.11
  630. EAP-Message = 0x02090050190017030100200f297ae834c3c1c20dff8b3be0c8b1f6775ed785530d47a0b40be193a68d4b7b1703010020f99e0e1bf3e166689438c9b66cb1d1d7263aeb0b21d3b1c8daa12eec8bd0f340
  631. Message-Authenticator = 0xf875e879e800108940a2934773e73495
  632. # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
  633. +- entering group authorize {...}
  634. ++[mschap] returns noop
  635. [eap] EAP packet type response id 9 length 80
  636. [eap] Continuing tunnel setup.
  637. ++[eap] returns ok
  638. Found Auth-Type = EAP
  639. # Executing group from file /jffs/etc/freeradius/sites-enabled/default
  640. +- entering group authenticate {...}
  641. [eap] Request found, released from the list
  642. [eap] EAP/peap
  643. [eap] processing type peap
  644. [peap] processing EAP-TLS
  645. [peap] eaptls_verify returned 7
  646. [peap] Done initial handshake
  647. [peap] eaptls_process returned 7
  648. [peap] EAPTLS_OK
  649. [peap] Session established. Decoding tunneled attributes.
  650. [peap] Peap state send tlv success
  651. [peap] Received EAP-TLV response.
  652. [peap] Success
  653. [peap] Using saved attributes from the original Access-Accept
  654. Session-Timeout := 3600
  655. User-Name := "TestUser1"
  656. Acct-Interim-Interval := 300
  657. WISPr-Bandwidth-Max-Down := 1650064384
  658. RP-Downstream-Speed-Limit := 9999999
  659. WISPr-Bandwidth-Max-Up := 1650064384
  660. RP-Upstream-Speed-Limit := 9999999
  661. [eap] Freeing handler
  662. ++[eap] returns ok
  663. Login OK: [TestUser1] (from client DD-WRT-RADIUS port 41 cli c48508cf0a6c)
  664. WARNING: Empty post-auth section. Using default return values.
  665. Sending Access-Accept of id 0 to 127.0.0.1 port 52374
  666. Session-Timeout := 3600
  667. User-Name := "TestUser1"
  668. Acct-Interim-Interval := 300
  669. WISPr-Bandwidth-Max-Down := 1650064384
  670. RP-Downstream-Speed-Limit := 9999999
  671. WISPr-Bandwidth-Max-Up := 1650064384
  672. RP-Upstream-Speed-Limit := 9999999
  673. MS-MPPE-Recv-Key = 0xf6d4b0ec7fe0c85dbb974b12ff33879d8ee50d7d6ce17c5c414f1927be5d81f7
  674. MS-MPPE-Send-Key = 0x63288657d100b44d8e206f96e076a82c69da2b41d059bbbd8dba5f7d0e9f0a55
  675. EAP-Message = 0x03090004
  676. Message-Authenticator = 0x00000000000000000000000000000000
  677. Finished request 10.
  678. Going to the next request
  679. Waking up in 0.3 seconds.
  680. Sending delayed reject for request 3
  681. Sending Access-Reject of id 6 to 127.0.0.1 port 37619
  682. Waking up in 4.6 seconds.
  683. Cleaning up request 10 ID 0 with timestamp +431
  684. Waking up in 0.3 seconds.
  685. Cleaning up request 3 ID 6 with timestamp +431
Add Comment
Please, Sign In to add comment