Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=137
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020000110142656e416c61626173746572
- Message-Authenticator = 0x5f2915c6e46594f98e863174de2eb4cd
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 0 length 17
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- [files] users: Matched entry TestUser1 at line 8
- ++[files] returns ok
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] returns noop
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type tls
- [tls] Initiate
- [tls] Start returned 1
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- EAP-Message = 0x010100061920
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd630fef883091aaf86091818
- Finished request 0.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=369
- Cleaning up request 0 ID 0 with timestamp +430
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd630fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020100e71980000000dd16030100d8010000d4030152546738a319f95e372c239303a022acd8355ae4abc4a1cec4c5a825eae1985e000066c014c00ac022c0210039003800880087c00fc00500350084c012c008c01cc01b00160013c00dc003000ac013c009c01fc01e00330032009a009900450044c00ec004002f00960041c011c007c00cc002000500040015001200090014001100080006000300ff01000045000b000403000102000a00340032000e000d0019000b000c00180009000a00160017000800060007001400150004000500120013000100020003000f00100011000f000101
- Message-Authenticator = 0x221ba705c69be1b9ecd09983aedf84bb
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 1 length 231
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 221
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] (other): before/accept initialization
- [peap] TLS_accept: before/accept initialization
- [peap] <<< TLS 1.0 Handshake [length 00d8], ClientHello
- [peap] TLS_accept: SSLv3 read client hello A
- [peap] >>> TLS 1.0 Handshake [length 0036], ServerHello
- [peap] TLS_accept: SSLv3 write server hello A
- [peap] >>> TLS 1.0 Handshake [length 083b], Certificate
- [peap] TLS_accept: SSLv3 write certificate A
- [peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
- [peap] TLS_accept: SSLv3 write key exchange A
- [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
- [peap] TLS_accept: SSLv3 write server done A
- [peap] TLS_accept: SSLv3 flush data
- [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
- In SSL Handshake Phase
- In SSL Accept mode
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x048f30820377a00302010202
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd733fef883091aaf86091818
- Finished request 1.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=144
- Cleaning up request 1 ID 0 with timestamp +430
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd733fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020200061900
- Message-Authenticator = 0x04e9ae08bc8e835861e9a778c2db1301
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 2 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 0x010303fc1940090098e5c7935f703751300d06092a864886f70d010105050030818b310b30090603550406130243413110300e060355040813074f6e746172696f3110300e06035504071307546f726f6e746f31123010060355040a13094146532c20496e632e311d301b06092a864886f70d010901160e696e666f40616673696e632e6361312530230603550403131c4146532c20496e632e20524144495553204365727469666963617465301e170d3133313030383036303032325a170d3134313030383036303032325a30818b310b30090603550406130243413110300e060355040813074f6e746172696f3110300e06035504071307546f72
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x035504071307546f726f6e746f31123010060355040a13094146532c20496e632e311d301b06092a864886f70d010901160e696e666f40616673696e632e6361312530230603550403131c4146532c20496e632e2052414449555320436572746966696361746582090098e5c7935f703751300c0603551d13040530030101ff300d06092a864886f70d0101050500038201010009aa85fc63be78dd2708f6885208264ab2cad3568588ca70909e46082eb0c999532c74deee60922d7707e7c1ff5ad75571b65a06418e2ba9e798d6801b677ae198d7f9cd8cb77bc4adf33737d02f6a855893ba075d88113f167164dd59fb9a2f7894019c18a9f94743
- EAP-Message = 0xa68c8b5ce97765a5
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd432fef883091aaf86091818
- Finished request 2.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 37619, id=6, length=80
- User-Name = "c48508cf0a6c"
- NAS-Port = 1
- NAS-Port-Type = Wireless-802.11
- User-Password = "TestRadiusSharedSecret"
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] No EAP-Message, not doing EAP
- ++[eap] returns noop
- ++[files] returns noop
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] returns noop
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Login incorrect: [c48508cf0a6c/TestRadiusSharedSecret] (from client DD-WRT-RADIUS port 1)
- Using Post-Auth-Type REJECT
- WARNING: Unknown value specified for Post-Auth-Type. Cannot perform requested action.
- Delaying reject of request 3 for 1 seconds
- Going to the next request
- Waking up in 0.9 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=144
- Cleaning up request 2 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd432fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020300061900
- Message-Authenticator = 0x0b8f8dcb9eda208f1755ffd523d2ba86
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 3 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x7425b588226f04a48c5614b186039c9639bbeee45299980f097bfbfdc52df1462d9b994bd26b739417096a736b742144b08a55b12745a5b9c52fe8d22d9bd896aff566d68eca1a525f4ef80242543d5d065edf18f8bcc54a0728458c6db800e97fac70e7f2f8c5fe46cd35a6af20fd4a5f8fe882be8563f7ed153f2a4d40621cebc3dff41e4a4627d3bfc0ea9d74bef814d4c34147620d8d9c39d7f68ff192d7933154911c6013cf628c9570b916030100040e000000
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd535fef883091aaf86091818
- Finished request 4.
- Going to the next request
- Waking up in 0.9 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=346
- Cleaning up request 4 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd535fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020400d01980000000c61603010086100000820080819e35027b493f3acdf47577afe54af7cca56d0ceba7adf4ca496344fe575d2f2749d563688d0d65f5f1ea286959e3659fc39299248ddffae0c6ebfe987cfd0ea3fc000f9788fbe4d729ca32cf12bf162a5ed74261a93b2d6441d77f983917b79a534070dd4f5fa127bf33f4698f7b0c4ce00fe0f17dfad87ae615f76c8940d71403010001011603010030e44af7175a115fbdb5e27cfd6e10e5590cefcbadf1d69b97a57cb2baaa5c6f6a36eb616f3f882cd12e4537f9c20f6ab1
- Message-Authenticator = 0xd91a2aaa2c046ac2372d3fdb243f376c
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 4 length 208
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 198
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
- [peap] TLS_accept: SSLv3 read client key exchange A
- [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
- [peap] <<< TLS 1.0 Handshake [length 0010], Finished
- [peap] TLS_accept: SSLv3 read finished A
- [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
- [peap] TLS_accept: SSLv3 write change cipher spec A
- [peap] >>> TLS 1.0 Handshake [length 0010], Finished
- [peap] TLS_accept: SSLv3 write finished A
- [peap] TLS_accept: SSLv3 flush data
- [peap] (other): SSL negotiation finished successfully
- SSL Connection Established
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 0x01050041190014030100010116030100300cb32853dcf2e0e187f653efe5b6ad7ef9e19c5c42b0abf05caf76456afdb6bddb653f4f66831d05926e2cf3e423255b
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd234fef883091aaf86091818
- Finished request 5.
- Going to the next request
- Waking up in 0.6 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=144
- Cleaning up request 5 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd234fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020500061900
- Message-Authenticator = 0xf12fbd031a47d1b03081610b444800d2
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 5 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake is finished
- [peap] eaptls_verify returned 3
- [peap] eaptls_process returned 3
- [peap] EAPTLS_SUCCESS
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state TUNNEL ESTABLISHED
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 0x0106002b19001703010020ba00301b6855dff9aa101e7b0fd82f1363526c90dbab43fb6eba7655c335bbfc
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd337fef883091aaf86091818
- Finished request 6.
- Going to the next request
- Waking up in 0.6 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=234
- Cleaning up request 6 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd337fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x0206006019001703010020ca71340b92214bf6f7ca85fd143196d70bdfa7a69a391adbd0bdadd6d355db5517030100302463063b091e7ea25deb45a278687959ab138eea52c410800e02904a777fcbaabd9687b83ea154284e4625ddef26cf5b
- Message-Authenticator = 0x6d1458a43ad4c2f5601bcaa78bc26b3a
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 6 length 96
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state WAITING FOR INNER IDENTITY
- [peap] Identity - TestUser1
- [peap] Got inner identity 'TestUser1'
- [peap] Setting default EAP type for tunneled EAP session.
- [peap] Got tunneled request
- EAP-Message = 0x020600110142656e416c61626173746572
- server {
- [peap] Setting User-Name to TestUser1
- Sending tunneled request
- EAP-Message = 0x020600110142656e416c61626173746572
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- server {
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 6 length 17
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- [files] users: Matched entry DEFAULT at line 2
- [files] expand: %{User-Name} -> TestUser1
- [files] users: Matched entry TestUser1 at line 8
- ++[files] returns ok
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] returns noop
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type mschapv2
- rlm_eap_mschapv2: Issuing Challenge
- ++[eap] returns handled
- } # server
- [peap] Got tunneled reply code 11
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- EAP-Message = 0x010700261a010700211030e714e9f8aa640c4517f1b8ada7470c42656e416c61626173746572
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xf49e6db9f499777f1a8b74b2f2f61816
- [peap] Got tunneled reply RADIUS code 11
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- EAP-Message = 0x010700261a010700211030e714e9f8aa640c4517f1b8ada7470c42656e416c61626173746572
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xf49e6db9f499777f1a8b74b2f2f61816
- [peap] Got tunneled Access-Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 0x0107004b19001703010040ac0faae853afc0d4e83f6edee7b93d02e5690053a165e98dd0cfb2a4373cb3d741b342ac3479e42e9b9d861ac0491637ef1ec8e6032c5895849ba214040b1b4f
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd036fef883091aaf86091818
- Finished request 7.
- Going to the next request
- Waking up in 0.5 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=282
- Cleaning up request 7 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd036fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020700901900170301002060563e4c733c597f055eddcfc8f52e8d090d9bd3c551a912803cb241902d9fde1703010060c1226f36d3ef6546e0c69abd8886b07ee6ca9c453729ac60791184ed19c28709dd7b97b8341462595341190f00babbe21296de8e31d5474f0b574d2a1397a82eed31b8482a4bb03cd94210866cc056fbbe575b0f4d83581ded49394410d6fbc5
- Message-Authenticator = 0x9cfd3199f9af2ef029cced52289eee64
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 7 length 144
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state phase2
- [peap] EAP type mschapv2
- [peap] Got tunneled request
- EAP-Message = 0x020700471a0207004231fc6750c10d132f820d910e25faab3880000000000000000061098b7613e3917ffe494f938e5fc49defab65c1d87a8be30042656e416c61626173746572
- server {
- [peap] Setting User-Name to TestUser1
- Sending tunneled request
- EAP-Message = 0x020700471a0207004231fc6750c10d132f820d910e25faab3880000000000000000061098b7613e3917ffe494f938e5fc49defab65c1d87a8be30042656e416c61626173746572
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "TestUser1"
- State = 0xf49e6db9f499777f1a8b74b2f2f61816
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- server {
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 7 length 71
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- [files] users: Matched entry DEFAULT at line 2
- [files] expand: %{User-Name} -> TestUser1
- [files] users: Matched entry TestUser1 at line 8
- ++[files] returns ok
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] returns noop
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/mschapv2
- [eap] processing type mschapv2
- [mschapv2] # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- [mschapv2] +- entering group MS-CHAP {...}
- [mschap] Creating challenge hash with username: TestUser1
- [mschap] Client is using MS-CHAPv2 for TestUser1, we need NT-Password
- [mschap] adding MS-CHAPv2 MPPE keys
- ++[mschap] returns ok
- MSCHAP Success
- ++[eap] returns handled
- } # server
- [peap] Got tunneled reply code 11
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- EAP-Message = 0x010800331a0307002e533d39314433423844334232383636323630304145414144383234344132353646373630374130373545
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xf49e6db9f596777f1a8b74b2f2f61816
- [peap] Got tunneled reply RADIUS code 11
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- EAP-Message = 0x010800331a0307002e533d39314433423844334232383636323630304145414144383234344132353646373630374130373545
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xf49e6db9f596777f1a8b74b2f2f61816
- [peap] Got tunneled Access-Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 0x0108005b19001703010050086ff96c40bbf30c9395efd0e2d85b13090e91a5eaab1bf86a63d8497010af47fc674490d26612466b9539e3ac6b42467fb6030f7c5c2295bb9febe00ae0b659621c92b2b85423c0317453e8f21ed722
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebd139fef883091aaf86091818
- Finished request 8.
- Going to the next request
- Waking up in 0.5 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=218
- Cleaning up request 8 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebd139fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x02080050190017030100206d6dd801215d0b8266f2a440e705fb2d8989f61134d581036b67bc88003bb9ea1703010020302ec11216fd98faefa041a6f98364ad2ff2026e27e292875f917048a75d40c0
- Message-Authenticator = 0xad474b6126413fb32c88b9396b939d74
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 8 length 80
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state phase2
- [peap] EAP type mschapv2
- [peap] Got tunneled request
- EAP-Message = 0x020800061a03
- server {
- [peap] Setting User-Name to TestUser1
- Sending tunneled request
- EAP-Message = 0x020800061a03
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "TestUser1"
- State = 0xf49e6db9f596777f1a8b74b2f2f61816
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- server {
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 8 length 6
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- [files] users: Matched entry DEFAULT at line 2
- [files] expand: %{User-Name} -> TestUser1
- [files] users: Matched entry TestUser1 at line 8
- ++[files] returns ok
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] returns noop
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/mschapv2
- [eap] processing type mschapv2
- [eap] Freeing handler
- ++[eap] returns ok
- Login OK: [TestUser1] (from client DD-WRT-RADIUS port 41 cli c48508cf0a6c via TLS tunnel)
- WARNING: Empty post-auth section. Using default return values.
- } # server
- [peap] Got tunneled reply code 2
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- MS-MPPE-Encryption-Policy = 0x00000002
- MS-MPPE-Encryption-Types = 0x00000004
- MS-MPPE-Send-Key = 0xa7a93a04637565c24bba118de411bbd7
- MS-MPPE-Recv-Key = 0x84b2bb054a23696c9299a5ae59374d97
- EAP-Message = 0x03080004
- Message-Authenticator = 0x00000000000000000000000000000000
- [peap] Got tunneled reply RADIUS code 2
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- MS-MPPE-Encryption-Policy = 0x00000002
- MS-MPPE-Encryption-Types = 0x00000004
- MS-MPPE-Send-Key = 0xa7a93a04637565c24bba118de411bbd7
- MS-MPPE-Recv-Key = 0x84b2bb054a23696c9299a5ae59374d97
- EAP-Message = 0x03080004
- Message-Authenticator = 0x00000000000000000000000000000000
- [peap] Tunneled authentication was successful.
- [peap] SUCCESS
- [peap] Saving tunneled attributes for later
- ++[eap] returns handled
- Sending Access-Challenge of id 0 to 127.0.0.1 port 52374
- EAP-Message = 0x0109002b19001703010020b13325ab89769cef4e4c0ac74c0107207f27248050bc6997e02ffaef7cb01ab4
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xd631e7ebde38fef883091aaf86091818
- Finished request 9.
- Going to the next request
- Waking up in 0.3 seconds.
- rad_recv: Access-Request packet from host 127.0.0.1 port 52374, id=0, length=218
- Cleaning up request 9 ID 0 with timestamp +431
- User-Name = "TestUser1"
- NAS-IP-Address = 127.0.0.1
- Called-Station-Id = "20e52a2a793a"
- Calling-Station-Id = "c48508cf0a6c"
- NAS-Identifier = "20e52a2a793a"
- NAS-Port = 41
- Framed-MTU = 1400
- State = 0xd631e7ebde38fef883091aaf86091818
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x02090050190017030100200f297ae834c3c1c20dff8b3be0c8b1f6775ed785530d47a0b40be193a68d4b7b1703010020f99e0e1bf3e166689438c9b66cb1d1d7263aeb0b21d3b1c8daa12eec8bd0f340
- Message-Authenticator = 0xf875e879e800108940a2934773e73495
- # Executing section authorize from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authorize {...}
- ++[mschap] returns noop
- [eap] EAP packet type response id 9 length 80
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- # Executing group from file /jffs/etc/freeradius/sites-enabled/default
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state send tlv success
- [peap] Received EAP-TLV response.
- [peap] Success
- [peap] Using saved attributes from the original Access-Accept
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- [eap] Freeing handler
- ++[eap] returns ok
- Login OK: [TestUser1] (from client DD-WRT-RADIUS port 41 cli c48508cf0a6c)
- WARNING: Empty post-auth section. Using default return values.
- Sending Access-Accept of id 0 to 127.0.0.1 port 52374
- Session-Timeout := 3600
- User-Name := "TestUser1"
- Acct-Interim-Interval := 300
- WISPr-Bandwidth-Max-Down := 1650064384
- RP-Downstream-Speed-Limit := 9999999
- WISPr-Bandwidth-Max-Up := 1650064384
- RP-Upstream-Speed-Limit := 9999999
- MS-MPPE-Recv-Key = 0xf6d4b0ec7fe0c85dbb974b12ff33879d8ee50d7d6ce17c5c414f1927be5d81f7
- MS-MPPE-Send-Key = 0x63288657d100b44d8e206f96e076a82c69da2b41d059bbbd8dba5f7d0e9f0a55
- EAP-Message = 0x03090004
- Message-Authenticator = 0x00000000000000000000000000000000
- Finished request 10.
- Going to the next request
- Waking up in 0.3 seconds.
- Sending delayed reject for request 3
- Sending Access-Reject of id 6 to 127.0.0.1 port 37619
- Waking up in 4.6 seconds.
- Cleaning up request 10 ID 0 with timestamp +431
- Waking up in 0.3 seconds.
- Cleaning up request 3 ID 6 with timestamp +431
Add Comment
Please, Sign In to add comment