Advertisement
cogedengbe

Back end Radius server debug output

Feb 24th, 2015
321
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 55.48 KB | None | 0 0
  1. FreeRADIUS Version 2.2.0, for host i686-pc-linux-gnu, built on Sep 20 2012 at 09:52:41
  2. Copyright (C) 1999-2012 The FreeRADIUS server project and contributors.
  3. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
  4. PARTICULAR PURPOSE.
  5. You may redistribute copies of FreeRADIUS under the terms of the
  6. GNU General Public License v2.
  7. Starting - reading configuration files ...
  8. including configuration file /etc/freeradius/radiusd.conf
  9. including configuration file /etc/freeradius/proxy.conf
  10. including configuration file /etc/freeradius/clients.conf
  11. including configuration file /etc/freeradius/eap.conf
  12. including configuration file /etc/freeradius/policy.conf
  13. including files in directory /etc/freeradius/sites-enabled/
  14. including configuration file /etc/freeradius/sites-enabled/default
  15. including configuration file /etc/freeradius/sites-enabled/inner-tunnel
  16. main {
  17. user = "freerad"
  18. group = "freerad"
  19. allow_core_dumps = no
  20. }
  21. including dictionary file /etc/freeradius/dictionary
  22. main {
  23. name = "radiusd"
  24. prefix = "/usr"
  25. localstatedir = "/var"
  26. sbindir = "/usr/sbin"
  27. logdir = "/var/log/freeradius"
  28. run_dir = "/var/run/freeradius"
  29. libdir = "/usr/lib/freeradius"
  30. radacctdir = "/var/log/freeradius/radacct"
  31. hostname_lookups = no
  32. max_request_time = 30
  33. cleanup_delay = 5
  34. max_requests = 1024
  35. pidfile = "/var/run/freeradius/freeradius.pid"
  36. checkrad = "/usr/sbin/checkrad"
  37. debug_level = 0
  38. proxy_requests = yes
  39. log {
  40. stripped_names = no
  41. auth = yes
  42. auth_badpass = no
  43. auth_goodpass = no
  44. }
  45. security {
  46. max_attributes = 200
  47. reject_delay = 1
  48. status_server = yes
  49. }
  50. }
  51. radiusd: #### Loading Realms and Home Servers ####
  52. proxy server {
  53. retry_delay = 5
  54. retry_count = 3
  55. default_fallback = no
  56. dead_time = 120
  57. wake_all_if_all_dead = no
  58. }
  59. home_server localhost {
  60. ipaddr = 127.0.0.1
  61. port = 1812
  62. type = "auth"
  63. secret = "testing123"
  64. response_window = 20
  65. max_outstanding = 65536
  66. require_message_authenticator = no
  67. zombie_period = 40
  68. status_check = "status-server"
  69. ping_interval = 30
  70. check_interval = 30
  71. num_answers_to_alive = 3
  72. num_pings_to_alive = 3
  73. revive_interval = 120
  74. status_check_timeout = 4
  75. coa {
  76. irt = 2
  77. mrt = 16
  78. mrc = 5
  79. mrd = 30
  80. }
  81. }
  82. home_server_pool my_auth_failover {
  83. type = fail-over
  84. home_server = localhost
  85. }
  86. realm example.com {
  87. auth_pool = my_auth_failover
  88. }
  89. realm LOCAL {
  90. }
  91. realm worc.ac.uk {
  92. authhost = LOCAL
  93. accthost = LOCAL
  94. }
  95. realm worcester.ac.uk {
  96. authhost = LOCAL
  97. accthost = LOCAL
  98. }
  99. realm uni.worc.ac.uk {
  100. authhost = LOCAL
  101. accthost = LOCAL
  102. }
  103. realm NULL {
  104. authhost = LOCAL
  105. accthost = LOCAL
  106. }
  107. radiusd: #### Loading Clients ####
  108. client localhost {
  109. ipaddr = 127.0.0.1
  110. require_message_authenticator = no
  111. secret = "testing123"
  112. nastype = "other"
  113. }
  114. client 131.1.129.0/24 {
  115. require_message_authenticator = no
  116. secret = "3dur04m"
  117. }
  118. client 193.62.48.37 {
  119. require_message_authenticator = no
  120. secret = "H1sN604s9Z99o"
  121. }
  122. client 193.62.48.38 {
  123. require_message_authenticator = no
  124. secret = "H1sN604s9Z99o"
  125. }
  126. radiusd: #### Instantiating modules ####
  127. instantiate {
  128. Module: Linked to module rlm_exec
  129. Module: Instantiating module "exec" from file /etc/freeradius/radiusd.conf
  130. exec {
  131. wait = yes
  132. input_pairs = "request"
  133. shell_escape = yes
  134. }
  135. Module: Linked to module rlm_expr
  136. Module: Instantiating module "expr" from file /etc/freeradius/radiusd.conf
  137. Module: Linked to module rlm_expiration
  138. Module: Instantiating module "expiration" from file /etc/freeradius/radiusd.conf
  139. expiration {
  140. reply-message = "Password Has Expired "
  141. }
  142. Module: Linked to module rlm_logintime
  143. Module: Instantiating module "logintime" from file /etc/freeradius/radiusd.conf
  144. logintime {
  145. reply-message = "You are calling outside your allowed timespan "
  146. minimum-timeout = 60
  147. }
  148. }
  149. radiusd: #### Loading Virtual Servers ####
  150. server { # from file /etc/freeradius/radiusd.conf
  151. modules {
  152. Module: Creating Post-Auth-Type = REJECT
  153. Module: Checking authenticate {...} for more modules to load
  154. Module: Linked to module rlm_pap
  155. Module: Instantiating module "pap" from file /etc/freeradius/radiusd.conf
  156. pap {
  157. encryption_scheme = "auto"
  158. auto_header = no
  159. }
  160. Module: Linked to module rlm_mschap
  161. Module: Instantiating module "mschap_ad" from file /etc/freeradius/radiusd.conf
  162. mschap mschap_ad {
  163. use_mppe = yes
  164. require_encryption = yes
  165. require_strong = yes
  166. with_ntdomain_hack = yes
  167. ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{Stripped-User-Name:-%{User-Name:-None}} --domain=%{%{mschap_ad:NT-Domain}:-%{Domain-Name}} --challenge=%{mschap_ad:Challenge:-00} --nt-response=%{mschap_ad:NT-Response:-00}"
  168. allow_retry = yes
  169. }
  170. Module: Linked to module rlm_eap
  171. Module: Instantiating module "eap" from file /etc/freeradius/eap.conf
  172. eap {
  173. default_eap_type = "peap"
  174. timer_expire = 60
  175. ignore_unknown_eap_types = no
  176. cisco_accounting_username_bug = no
  177. max_sessions = 2048
  178. }
  179. Module: Linked to sub-module rlm_eap_md5
  180. Module: Instantiating eap-md5
  181. Module: Linked to sub-module rlm_eap_leap
  182. Module: Instantiating eap-leap
  183. Module: Linked to sub-module rlm_eap_gtc
  184. Module: Instantiating eap-gtc
  185. gtc {
  186. challenge = "Password: "
  187. auth_type = "PAP"
  188. }
  189. Module: Linked to sub-module rlm_eap_tls
  190. Module: Instantiating eap-tls
  191. tls {
  192. rsa_key_exchange = no
  193. dh_key_exchange = yes
  194. rsa_key_length = 512
  195. dh_key_length = 512
  196. verify_depth = 0
  197. CA_path = "/etc/freeradius/certs"
  198. pem_file_type = yes
  199. private_key_file = "/etc/freeradius/certs/eduroam61.key"
  200. certificate_file = "/etc/freeradius/certs/eduroam61.pem"
  201. private_key_password = "******"
  202. dh_file = "/etc/freeradius/certs/dh"
  203. random_file = "/etc/freeradius/certs/random"
  204. fragment_size = 1024
  205. include_length = yes
  206. check_crl = no
  207. cipher_list = "DEFAULT"
  208. ecdh_curve = "prime256v1"
  209. cache {
  210. enable = no
  211. lifetime = 24
  212. max_entries = 0
  213. }
  214. }
  215. Module: Linked to sub-module rlm_eap_ttls
  216. Module: Instantiating eap-ttls
  217. ttls {
  218. default_eap_type = "md5"
  219. copy_request_to_tunnel = yes
  220. use_tunneled_reply = yes
  221. virtual_server = "inner-tunnel"
  222. include_length = yes
  223. }
  224. Module: Linked to sub-module rlm_eap_peap
  225. Module: Instantiating eap-peap
  226. peap {
  227. default_eap_type = "mschapv2"
  228. copy_request_to_tunnel = yes
  229. use_tunneled_reply = yes
  230. proxy_tunneled_request_as_eap = yes
  231. virtual_server = "inner-tunnel"
  232. soh = no
  233. }
  234. Module: Linked to sub-module rlm_eap_mschapv2
  235. Module: Instantiating eap-mschapv2
  236. mschapv2 {
  237. with_ntdomain_hack = no
  238. send_error = no
  239. }
  240. Module: Checking authorize {...} for more modules to load
  241. Module: Linked to module rlm_preprocess
  242. Module: Instantiating module "preprocess" from file /etc/freeradius/radiusd.conf
  243. preprocess {
  244. huntgroups = "/etc/freeradius/huntgroups"
  245. hints = "/etc/freeradius/hints"
  246. with_ascend_hack = no
  247. ascend_channels_per_line = 23
  248. with_ntdomain_hack = no
  249. with_specialix_jetstream_hack = no
  250. with_cisco_vsa_hack = no
  251. with_alvarion_vsa_hack = no
  252. }
  253. reading pairlist file /etc/freeradius/huntgroups
  254. reading pairlist file /etc/freeradius/hints
  255. Module: Linked to module rlm_realm
  256. Module: Instantiating module "ntdomain" from file /etc/freeradius/radiusd.conf
  257. realm ntdomain {
  258. format = "prefix"
  259. delimiter = "\"
  260. ignore_default = no
  261. ignore_null = yes
  262. }
  263. Module: Instantiating module "suffix" from file /etc/freeradius/radiusd.conf
  264. realm suffix {
  265. format = "suffix"
  266. delimiter = "@"
  267. ignore_default = no
  268. ignore_null = no
  269. }
  270. Module: Linked to module rlm_files
  271. Module: Instantiating module "files" from file /etc/freeradius/radiusd.conf
  272. files {
  273. usersfile = "/etc/freeradius/users"
  274. acctusersfile = "/etc/freeradius/acct_users"
  275. preproxy_usersfile = "/etc/freeradius/preproxy_users"
  276. compat = "no"
  277. }
  278. reading pairlist file /etc/freeradius/users
  279. reading pairlist file /etc/freeradius/acct_users
  280. reading pairlist file /etc/freeradius/preproxy_users
  281. Module: Checking preacct {...} for more modules to load
  282. Module: Linked to module rlm_acct_unique
  283. Module: Instantiating module "acct_unique" from file /etc/freeradius/radiusd.conf
  284. acct_unique {
  285. key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
  286. }
  287. Module: Checking accounting {...} for more modules to load
  288. Module: Linked to module rlm_unix
  289. Module: Instantiating module "unix" from file /etc/freeradius/radiusd.conf
  290. unix {
  291. radwtmp = "/var/log/freeradius/radwtmp"
  292. }
  293. Module: Linked to module rlm_radutmp
  294. Module: Instantiating module "radutmp" from file /etc/freeradius/radiusd.conf
  295. radutmp {
  296. filename = "/var/log/freeradius/radutmp"
  297. username = "%{User-Name}"
  298. case_sensitive = yes
  299. check_with_nas = yes
  300. perm = 384
  301. callerid = yes
  302. }
  303. Module: Linked to module rlm_attr_filter
  304. Module: Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/radiusd.conf
  305. attr_filter attr_filter.accounting_response {
  306. attrsfile = "/etc/freeradius/attrs.accounting_response"
  307. key = "%{User-Name}"
  308. relaxed = no
  309. }
  310. reading pairlist file /etc/freeradius/attrs.accounting_response
  311. Module: Checking session {...} for more modules to load
  312. Module: Checking post-proxy {...} for more modules to load
  313. Module: Checking post-auth {...} for more modules to load
  314. Module: Instantiating module "attr_filter.access_reject" from file /etc/freeradius/radiusd.conf
  315. attr_filter attr_filter.access_reject {
  316. attrsfile = "/etc/freeradius/attrs.access_reject"
  317. key = "%{User-Name}"
  318. relaxed = no
  319. }
  320. reading pairlist file /etc/freeradius/attrs.access_reject
  321. } # modules
  322. } # server
  323. server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel
  324. modules {
  325. Module: Creating Auth-Type = home
  326. Module: Checking authenticate {...} for more modules to load
  327. Module: Linked to module rlm_ldap
  328. Module: Instantiating module "home" from file /etc/freeradius/radiusd.conf
  329. ldap home {
  330. server = "131.1.2.14"
  331. port = 3268
  332. password = ***********"
  333. identity = "**********"
  334. net_timeout = 5
  335. timeout = 30
  336. timelimit = 30
  337. max_uses = 0
  338. tls_mode = no
  339. start_tls = no
  340. tls_require_cert = "allow"
  341. tls {
  342. start_tls = no
  343. cacertfile = "/etc/freeradius/certs/eduroam60.pem"
  344. cacertdir = "/etc/freeradius/certs"
  345. keyfile = "/etc/freeradius/certs/eduroam60.key"
  346. randfile = "/etc/freeradius/certs/random"
  347. require_cert = "demand"
  348. }
  349. basedn = "DC=worc,DC=ac,DC=uk"
  350. filter = "(sAMAccountName=%{Stripped-User-Name:-%{User-Name}})"
  351. base_filter = "(objectclass=radiusprofile)"
  352. password_attribute = "eapUserPassword"
  353. auto_header = no
  354. access_attr = "sAMAccountName"
  355. access_attr_used_for_allow = yes
  356. chase_referrals = yes
  357. rebind = yes
  358. groupname_attribute = "cn"
  359. groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
  360. dictionary_mapping = "/etc/freeradius/ldap.attrmap"
  361. ldap_debug = 0
  362. ldap_connections_number = 30
  363. compare_check_items = no
  364. do_xlat = yes
  365. set_auth_type = yes
  366. }
  367. rlm_ldap: Registering ldap_groupcmp for Ldap-Group
  368. rlm_ldap: Creating new attribute home-Ldap-Group
  369. rlm_ldap: Registering ldap_groupcmp for home-Ldap-Group
  370. rlm_ldap: Registering ldap_xlat with xlat_name home
  371. rlm_ldap: reading ldap<->radius mappings from file /etc/freeradius/ldap.attrmap
  372. rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
  373. rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
  374. rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
  375. rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
  376. rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
  377. rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
  378. rlm_ldap: LDAP sambaLmPassword mapped to RADIUS LM-Password
  379. rlm_ldap: LDAP sambaNtPassword mapped to RADIUS NT-Password
  380. rlm_ldap: LDAP acctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
  381. rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
  382. rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address
  383. rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
  384. rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
  385. rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
  386. rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
  387. rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
  388. rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
  389. rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
  390. rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
  391. rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
  392. rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
  393. rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
  394. rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
  395. rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
  396. rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
  397. rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
  398. rlm_ldap: LDAP radiusClass mapped to RADIUS Class
  399. rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
  400. rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
  401. rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
  402. rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
  403. rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
  404. rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
  405. rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS Framed-AppleTalk-Link
  406. rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS Framed-AppleTalk-Network
  407. rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS Framed-AppleTalk-Zone
  408. rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
  409. rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
  410. rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message
  411. rlm_ldap: LDAP radiusTunnelType mapped to RADIUS Tunnel-Type
  412. rlm_ldap: LDAP radiusTunnelMediumType mapped to RADIUS Tunnel-Medium-Type
  413. rlm_ldap: LDAP radiusTunnelPrivateGroupId mapped to RADIUS Tunnel-Private-Group-Id
  414. rlm_ldap: LDAP userPassword mapped to RADIUS User-Password
  415. conns: 0x8a616d0
  416. Module: Linked to module rlm_chap
  417. Module: Instantiating module "chap" from file /etc/freeradius/radiusd.conf
  418. Module: Checking authorize {...} for more modules to load
  419. Module: Checking session {...} for more modules to load
  420. Module: Checking post-proxy {...} for more modules to load
  421. Module: Checking post-auth {...} for more modules to load
  422. } # modules
  423. } # server
  424. radiusd: #### Opening IP addresses and Ports ####
  425. listen {
  426. type = "auth"
  427. ipaddr = *
  428. port = 0
  429. }
  430. listen {
  431. type = "acct"
  432. ipaddr = *
  433. port = 0
  434. }
  435. ... adding new socket proxy address * port 60622
  436. Listening on authentication address * port 1812
  437. Listening on accounting address * port 1813
  438. Listening on proxy address * port 1814
  439. Ready to process requests.
  440. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=74, length=141
  441. User-Name = "anonymous"
  442. NAS-IP-Address = 127.0.0.1
  443. Calling-Station-Id = "02-00-00-00-00-01"
  444. Framed-MTU = 1400
  445. NAS-Port-Type = Wireless-802.11
  446. Connect-Info = "CONNECT 11Mbps 802.11b"
  447. EAP-Message = 0x0200000e01616e6f6e796d6f7573
  448. Message-Authenticator = 0x1457993743e1e3c51b17908e14b95467
  449. Domain-Name = "WORC.AC.UK"
  450. Proxy-State = 0x30
  451. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  452. +- entering group authorize {...}
  453. ++[preprocess] returns ok
  454. ++[mschap_ad] returns noop
  455. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  456. ++[ntdomain] returns noop
  457. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  458. [suffix] Found realm "NULL"
  459. [suffix] Adding Stripped-User-Name = "anonymous"
  460. [suffix] Adding Realm = "NULL"
  461. [suffix] Authentication realm is LOCAL.
  462. ++[suffix] returns ok
  463. [eap] EAP packet type response id 0 length 14
  464. [eap] No EAP Start, assuming it's an on-going EAP conversation
  465. ++[eap] returns updated
  466. ++[files] returns noop
  467. ++[expiration] returns noop
  468. ++[logintime] returns noop
  469. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  470. ++[pap] returns noop
  471. Found Auth-Type = EAP
  472. # Executing group from file /etc/freeradius/sites-enabled/default
  473. +- entering group EAP {...}
  474. [eap] EAP Identity
  475. [eap] processing type tls
  476. [tls] Initiate
  477. [tls] Start returned 1
  478. ++[eap] returns handled
  479. Sending Access-Challenge of id 74 to 193.62.48.38 port 1814
  480. EAP-Message = 0x010100061920
  481. Message-Authenticator = 0x00000000000000000000000000000000
  482. State = 0x75a766a375a67f726488f389cf8e8ffd
  483. Proxy-State = 0x30
  484. Finished request 0.
  485. Going to the next request
  486. Waking up in 4.9 seconds.
  487. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=227, length=244
  488. User-Name = "anonymous"
  489. NAS-IP-Address = 127.0.0.1
  490. Calling-Station-Id = "02-00-00-00-00-01"
  491. Framed-MTU = 1400
  492. NAS-Port-Type = Wireless-802.11
  493. Connect-Info = "CONNECT 11Mbps 802.11b"
  494. EAP-Message = 0x02010063198000000059160301005401000050030154ec503693c979b06156e9bcdedfa463288e63daf23a0aec470d098e41942db200002800390038003500160013000a00330032002f000500040015001200090014001100080006000300ff020100
  495. State = 0x75a766a375a67f726488f389cf8e8ffd
  496. Message-Authenticator = 0x7871317fa48bb75af18737575eda76f0
  497. Domain-Name = "WORC.AC.UK"
  498. Proxy-State = 0x31
  499. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  500. +- entering group authorize {...}
  501. ++[preprocess] returns ok
  502. ++[mschap_ad] returns noop
  503. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  504. ++[ntdomain] returns noop
  505. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  506. [suffix] Found realm "NULL"
  507. [suffix] Adding Stripped-User-Name = "anonymous"
  508. [suffix] Adding Realm = "NULL"
  509. [suffix] Authentication realm is LOCAL.
  510. ++[suffix] returns ok
  511. [eap] EAP packet type response id 1 length 99
  512. [eap] Continuing tunnel setup.
  513. ++[eap] returns ok
  514. Found Auth-Type = EAP
  515. # Executing group from file /etc/freeradius/sites-enabled/default
  516. +- entering group EAP {...}
  517. [eap] Request found, released from the list
  518. [eap] EAP/peap
  519. [eap] processing type peap
  520. [peap] processing EAP-TLS
  521. TLS Length 89
  522. [peap] Length Included
  523. [peap] eaptls_verify returned 11
  524. [peap] (other): before/accept initialization
  525. [peap] TLS_accept: before/accept initialization
  526. [peap] <<< TLS 1.0 Handshake [length 0054], ClientHello
  527. [peap] TLS_accept: SSLv3 read client hello A
  528. [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello
  529. [peap] TLS_accept: SSLv3 write server hello A
  530. [peap] >>> TLS 1.0 Handshake [length 143f], Certificate
  531. [peap] TLS_accept: SSLv3 write certificate A
  532. [peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
  533. [peap] TLS_accept: SSLv3 write key exchange A
  534. [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
  535. [peap] TLS_accept: SSLv3 write server done A
  536. [peap] TLS_accept: SSLv3 flush data
  537. [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
  538. In SSL Handshake Phase
  539. In SSL Accept mode
  540. [peap] eaptls_process returned 13
  541. [peap] EAPTLS_HANDLED
  542. ++[eap] returns handled
  543. Sending Access-Challenge of id 227 to 193.62.48.38 port 1814
  544. EAP-Message = 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
  545. EAP-Message = 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
  546. EAP-Message = 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
  547. EAP-Message = 0x2da02b8629687474703a2f2f63726c2e7463732e746572656e612e6f72672f544552454e4153534c43412e63726c306d06082b060105050701010461305f303506082b060105050730028629687474703a2f2f6372742e7463732e746572656e612e6f72672f544552454e4153534c43412e637274302606082b06010505073001861a687474703a2f2f6f6373702e7463732e746572656e612e6f7267301f0603551d110418301682147577656475726f616d2e776f72632e61632e756b300d06092a864886f70d010105050003820101003fb05ffb23193cc81798abb8079c82fde71eb5bb172c8e229f91ebbeb03048c743dc5f85e83185d21e6d65
  548. EAP-Message = 0x6b9b655fb03a47612cfc9c70
  549. Message-Authenticator = 0x00000000000000000000000000000000
  550. State = 0x75a766a374a57f726488f389cf8e8ffd
  551. Proxy-State = 0x31
  552. Finished request 1.
  553. Going to the next request
  554. Waking up in 4.9 seconds.
  555. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=122, length=151
  556. User-Name = "anonymous"
  557. NAS-IP-Address = 127.0.0.1
  558. Calling-Station-Id = "02-00-00-00-00-01"
  559. Framed-MTU = 1400
  560. NAS-Port-Type = Wireless-802.11
  561. Connect-Info = "CONNECT 11Mbps 802.11b"
  562. EAP-Message = 0x020200061900
  563. State = 0x75a766a374a57f726488f389cf8e8ffd
  564. Message-Authenticator = 0x92a50b0623629da267a9435155d9a00f
  565. Domain-Name = "WORC.AC.UK"
  566. Proxy-State = 0x32
  567. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  568. +- entering group authorize {...}
  569. ++[preprocess] returns ok
  570. ++[mschap_ad] returns noop
  571. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  572. ++[ntdomain] returns noop
  573. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  574. [suffix] Found realm "NULL"
  575. [suffix] Adding Stripped-User-Name = "anonymous"
  576. [suffix] Adding Realm = "NULL"
  577. [suffix] Authentication realm is LOCAL.
  578. ++[suffix] returns ok
  579. [eap] EAP packet type response id 2 length 6
  580. [eap] Continuing tunnel setup.
  581. ++[eap] returns ok
  582. Found Auth-Type = EAP
  583. # Executing group from file /etc/freeradius/sites-enabled/default
  584. +- entering group EAP {...}
  585. [eap] Request found, released from the list
  586. [eap] EAP/peap
  587. [eap] processing type peap
  588. [peap] processing EAP-TLS
  589. [peap] Received TLS ACK
  590. [peap] ACK handshake fragment handler
  591. [peap] eaptls_verify returned 1
  592. [peap] eaptls_process returned 13
  593. [peap] EAPTLS_HANDLED
  594. ++[eap] returns handled
  595. Sending Access-Challenge of id 122 to 193.62.48.38 port 1814
  596. EAP-Message = 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
  597. EAP-Message = 0x010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3134313030393030303030305a170d3234313030383233353935395a3064310b3009060355040613024e4c311630140603550408130d4e6f6f72642d486f6c6c616e643112301006035504071309416d7374657264616d310f300d060355040a1306544552454e413118
  598. EAP-Message = 0x30160603550403130f544552454e412053534c204341203230820122300d06092a864886f70d01010105000382010f003082010a0282010100b03a6d7fa9b8009ef3853a08642cf9440c20b4b3154d062da6f093c948bef764ada48e15b331811417fc6ee28b19758b3612cf076d7678265e27bf2c16ba42fbdd1e508f64af759b0a3a82a93125518e7fc442dd1f5c9391bb94fa7057fae7fdb8b868ca9b6a19245437fe326189f722c18f63d5d1697e494dbcd7d0db4cd6f60fbdc1884293d691f99f969911ea6e72e780216cf14e8eec63b83daf6539d085922a793a0ed6e8ad9b2589a2d42e726b73a1d2e2dfce5870ffc05401775df9769d2f43da
  599. EAP-Message = 0xa226dd1d429a4d38b156fe3ab4cb6b6cf26a9f3fb3ae3ba7d0153eac277f1bf4596050567e9d75259e3fc676bfff99ccd8f1a96a895fdee707cd8d8b0203010001a382017f3082017b301f0603551d230418301680145379bf5aaa2b4acf5480e1d89bc09df2b20366cb301d0603551d0e041604145bd08a1c9a325be0b5dd96541be18628b0fdb6bd300e0603551d0f0101ff04040302018630120603551d130101ff040830060101ff020100301d0603551d250416301406082b0601050507030106082b06010505070302302c0603551d2004253023300d060b2b06010401b2310102021d3008060667810c0102013008060667810c010202305006
  600. EAP-Message = 0x03551d1f04493047
  601. Message-Authenticator = 0x00000000000000000000000000000000
  602. State = 0x75a766a377a47f726488f389cf8e8ffd
  603. Proxy-State = 0x32
  604. Finished request 2.
  605. Going to the next request
  606. Waking up in 4.9 seconds.
  607. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=106, length=151
  608. User-Name = "anonymous"
  609. NAS-IP-Address = 127.0.0.1
  610. Calling-Station-Id = "02-00-00-00-00-01"
  611. Framed-MTU = 1400
  612. NAS-Port-Type = Wireless-802.11
  613. Connect-Info = "CONNECT 11Mbps 802.11b"
  614. EAP-Message = 0x020300061900
  615. State = 0x75a766a377a47f726488f389cf8e8ffd
  616. Message-Authenticator = 0x530d5d9acc67a5213873a396a52c7192
  617. Domain-Name = "WORC.AC.UK"
  618. Proxy-State = 0x33
  619. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  620. +- entering group authorize {...}
  621. ++[preprocess] returns ok
  622. ++[mschap_ad] returns noop
  623. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  624. ++[ntdomain] returns noop
  625. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  626. [suffix] Found realm "NULL"
  627. [suffix] Adding Stripped-User-Name = "anonymous"
  628. [suffix] Adding Realm = "NULL"
  629. [suffix] Authentication realm is LOCAL.
  630. ++[suffix] returns ok
  631. [eap] EAP packet type response id 3 length 6
  632. [eap] Continuing tunnel setup.
  633. ++[eap] returns ok
  634. Found Auth-Type = EAP
  635. # Executing group from file /etc/freeradius/sites-enabled/default
  636. +- entering group EAP {...}
  637. [eap] Request found, released from the list
  638. [eap] EAP/peap
  639. [eap] processing type peap
  640. [peap] processing EAP-TLS
  641. [peap] Received TLS ACK
  642. [peap] ACK handshake fragment handler
  643. [peap] eaptls_verify returned 1
  644. [peap] eaptls_process returned 13
  645. [peap] EAPTLS_HANDLED
  646. ++[eap] returns handled
  647. Sending Access-Challenge of id 106 to 193.62.48.38 port 1814
  648. EAP-Message = 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
  649. EAP-Message = 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
  650. EAP-Message = 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
  651. EAP-Message = 0x80614336300d06092a864886f70d01010c0500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f
  652. EAP-Message = 0x726b312e302c0603
  653. Message-Authenticator = 0x00000000000000000000000000000000
  654. State = 0x75a766a376a37f726488f389cf8e8ffd
  655. Proxy-State = 0x33
  656. Finished request 3.
  657. Going to the next request
  658. Waking up in 4.9 seconds.
  659. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=67, length=151
  660. User-Name = "anonymous"
  661. NAS-IP-Address = 127.0.0.1
  662. Calling-Station-Id = "02-00-00-00-00-01"
  663. Framed-MTU = 1400
  664. NAS-Port-Type = Wireless-802.11
  665. Connect-Info = "CONNECT 11Mbps 802.11b"
  666. EAP-Message = 0x020400061900
  667. State = 0x75a766a376a37f726488f389cf8e8ffd
  668. Message-Authenticator = 0x3aa9fab152344804dff01b404f0b8520
  669. Domain-Name = "WORC.AC.UK"
  670. Proxy-State = 0x34
  671. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  672. +- entering group authorize {...}
  673. ++[preprocess] returns ok
  674. ++[mschap_ad] returns noop
  675. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  676. ++[ntdomain] returns noop
  677. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  678. [suffix] Found realm "NULL"
  679. [suffix] Adding Stripped-User-Name = "anonymous"
  680. [suffix] Adding Realm = "NULL"
  681. [suffix] Authentication realm is LOCAL.
  682. ++[suffix] returns ok
  683. [eap] EAP packet type response id 4 length 6
  684. [eap] Continuing tunnel setup.
  685. ++[eap] returns ok
  686. Found Auth-Type = EAP
  687. # Executing group from file /etc/freeradius/sites-enabled/default
  688. +- entering group EAP {...}
  689. [eap] Request found, released from the list
  690. [eap] EAP/peap
  691. [eap] processing type peap
  692. [peap] processing EAP-TLS
  693. [peap] Received TLS ACK
  694. [peap] ACK handshake fragment handler
  695. [peap] eaptls_verify returned 1
  696. [peap] eaptls_process returned 13
  697. [peap] EAPTLS_HANDLED
  698. ++[eap] returns handled
  699. Sending Access-Challenge of id 67 to 193.62.48.38 port 1814
  700. EAP-Message = 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
  701. EAP-Message = 0x0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757
  702. EAP-Message = 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
  703. EAP-Message = 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
  704. EAP-Message = 0xa4bc2def46725735
  705. Message-Authenticator = 0x00000000000000000000000000000000
  706. State = 0x75a766a371a27f726488f389cf8e8ffd
  707. Proxy-State = 0x34
  708. Finished request 4.
  709. Going to the next request
  710. Waking up in 4.9 seconds.
  711. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=164, length=151
  712. User-Name = "anonymous"
  713. NAS-IP-Address = 127.0.0.1
  714. Calling-Station-Id = "02-00-00-00-00-01"
  715. Framed-MTU = 1400
  716. NAS-Port-Type = Wireless-802.11
  717. Connect-Info = "CONNECT 11Mbps 802.11b"
  718. EAP-Message = 0x020500061900
  719. State = 0x75a766a371a27f726488f389cf8e8ffd
  720. Message-Authenticator = 0xd176018495d3cbd611d715b2e6ee2152
  721. Domain-Name = "WORC.AC.UK"
  722. Proxy-State = 0x35
  723. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  724. +- entering group authorize {...}
  725. ++[preprocess] returns ok
  726. ++[mschap_ad] returns noop
  727. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  728. ++[ntdomain] returns noop
  729. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  730. [suffix] Found realm "NULL"
  731. [suffix] Adding Stripped-User-Name = "anonymous"
  732. [suffix] Adding Realm = "NULL"
  733. [suffix] Authentication realm is LOCAL.
  734. ++[suffix] returns ok
  735. [eap] EAP packet type response id 5 length 6
  736. [eap] Continuing tunnel setup.
  737. ++[eap] returns ok
  738. Found Auth-Type = EAP
  739. # Executing group from file /etc/freeradius/sites-enabled/default
  740. +- entering group EAP {...}
  741. [eap] Request found, released from the list
  742. [eap] EAP/peap
  743. [eap] processing type peap
  744. [peap] processing EAP-TLS
  745. [peap] Received TLS ACK
  746. [peap] ACK handshake fragment handler
  747. [peap] eaptls_verify returned 1
  748. [peap] eaptls_process returned 13
  749. [peap] EAPTLS_HANDLED
  750. ++[eap] returns handled
  751. Sending Access-Challenge of id 164 to 193.62.48.38 port 1814
  752. EAP-Message = 0x010603fc194005bfbb46bb6e6d3799b6ff239291c66e40f88f2956ea5fd55f1453acf04f61eaf722cca7560be2b8341f26d97b1905683fba3cd43806a2d3e68f0ee3b4716d4042c584b440952bf465a04879f61d8163969d4f75e0f87ce48ea9d1f2ad8ab38cc721cdc2ef00043a308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f
  753. EAP-Message = 0x74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad70
  754. EAP-Message = 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
  755. EAP-Message = 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
  756. EAP-Message = 0x96b7dc7e4eee70fd
  757. Message-Authenticator = 0x00000000000000000000000000000000
  758. State = 0x75a766a370a17f726488f389cf8e8ffd
  759. Proxy-State = 0x35
  760. Finished request 5.
  761. Going to the next request
  762. Waking up in 4.9 seconds.
  763. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=204, length=151
  764. User-Name = "anonymous"
  765. NAS-IP-Address = 127.0.0.1
  766. Calling-Station-Id = "02-00-00-00-00-01"
  767. Framed-MTU = 1400
  768. NAS-Port-Type = Wireless-802.11
  769. Connect-Info = "CONNECT 11Mbps 802.11b"
  770. EAP-Message = 0x020600061900
  771. State = 0x75a766a370a17f726488f389cf8e8ffd
  772. Message-Authenticator = 0xb450e182ea399f1bca489c26e70cfb7d
  773. Domain-Name = "WORC.AC.UK"
  774. Proxy-State = 0x36
  775. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  776. +- entering group authorize {...}
  777. ++[preprocess] returns ok
  778. ++[mschap_ad] returns noop
  779. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  780. ++[ntdomain] returns noop
  781. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  782. [suffix] Found realm "NULL"
  783. [suffix] Adding Stripped-User-Name = "anonymous"
  784. [suffix] Adding Realm = "NULL"
  785. [suffix] Authentication realm is LOCAL.
  786. ++[suffix] returns ok
  787. [eap] EAP packet type response id 6 length 6
  788. [eap] Continuing tunnel setup.
  789. ++[eap] returns ok
  790. Found Auth-Type = EAP
  791. # Executing group from file /etc/freeradius/sites-enabled/default
  792. +- entering group EAP {...}
  793. [eap] Request found, released from the list
  794. [eap] EAP/peap
  795. [eap] processing type peap
  796. [peap] processing EAP-TLS
  797. [peap] Received TLS ACK
  798. [peap] ACK handshake fragment handler
  799. [peap] eaptls_verify returned 1
  800. [peap] eaptls_process returned 13
  801. [peap] EAPTLS_HANDLED
  802. ++[eap] returns handled
  803. Sending Access-Challenge of id 204 to 193.62.48.38 port 1814
  804. EAP-Message = 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
  805. EAP-Message = 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
  806. EAP-Message = 0xf37ad768c1993d78ffb150fb6b4476de15d8e5e4657e02a6030392d63499bfcb333975b9890bdd68efe4d475b37ef74c45776c6ffa7bca279b8d902d1716482de294e0a4a5bf8a820a3e002577f14b12764cb2fad73bfb52c3a51bb1d9b4f195d1d6d60353faece479908135e232333f59873fad9a7cca91f738ef04c3c79a01ae61da70f8059da9f0f8f0a547d7a993bb5fe1627c5acd3de47dfa5e351a9211b184047854e70d7f3420ea38e562d7201c9804f696a80eddf692ffd7a8cdd508b2a33fbf9d48fd6b8f7516030100040e000000
  807. Message-Authenticator = 0x00000000000000000000000000000000
  808. State = 0x75a766a373a07f726488f389cf8e8ffd
  809. Proxy-State = 0x36
  810. Finished request 6.
  811. Going to the next request
  812. Waking up in 4.9 seconds.
  813. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=235, length=353
  814. User-Name = "anonymous"
  815. NAS-IP-Address = 127.0.0.1
  816. Calling-Station-Id = "02-00-00-00-00-01"
  817. Framed-MTU = 1400
  818. NAS-Port-Type = Wireless-802.11
  819. Connect-Info = "CONNECT 11Mbps 802.11b"
  820. EAP-Message = 0x020700d01980000000c61603010086100000820080b8ece6756d390089cff72bc852a848599db46a31f0b370c5c4ef12b725165db20015f16e4c810015b1ec64b219b0459453665025bb14301bafee19d735d51d9408347e76706acbfd5d062c905617d090f5c51ba6aabd450f17c1fcf98bccd73969011f926f7e8faf4948ce4c8826d669de4175513ee81626f0b1c6244f37c6ce14030100010116030100306d8781b931f8bea315280f71bc0ae8f2bdd84127e9ef8be0740d97b480651492914eca08e47813e33a547bb799353ba6
  821. State = 0x75a766a373a07f726488f389cf8e8ffd
  822. Message-Authenticator = 0xdaa0ac8b625cf50700eff3c9ae17cf12
  823. Domain-Name = "WORC.AC.UK"
  824. Proxy-State = 0x37
  825. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  826. +- entering group authorize {...}
  827. ++[preprocess] returns ok
  828. ++[mschap_ad] returns noop
  829. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  830. ++[ntdomain] returns noop
  831. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  832. [suffix] Found realm "NULL"
  833. [suffix] Adding Stripped-User-Name = "anonymous"
  834. [suffix] Adding Realm = "NULL"
  835. [suffix] Authentication realm is LOCAL.
  836. ++[suffix] returns ok
  837. [eap] EAP packet type response id 7 length 208
  838. [eap] Continuing tunnel setup.
  839. ++[eap] returns ok
  840. Found Auth-Type = EAP
  841. # Executing group from file /etc/freeradius/sites-enabled/default
  842. +- entering group EAP {...}
  843. [eap] Request found, released from the list
  844. [eap] EAP/peap
  845. [eap] processing type peap
  846. [peap] processing EAP-TLS
  847. TLS Length 198
  848. [peap] Length Included
  849. [peap] eaptls_verify returned 11
  850. [peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
  851. [peap] TLS_accept: SSLv3 read client key exchange A
  852. [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
  853. [peap] <<< TLS 1.0 Handshake [length 0010], Finished
  854. [peap] TLS_accept: SSLv3 read finished A
  855. [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
  856. [peap] TLS_accept: SSLv3 write change cipher spec A
  857. [peap] >>> TLS 1.0 Handshake [length 0010], Finished
  858. [peap] TLS_accept: SSLv3 write finished A
  859. [peap] TLS_accept: SSLv3 flush data
  860. [peap] (other): SSL negotiation finished successfully
  861. SSL Connection Established
  862. [peap] eaptls_process returned 13
  863. [peap] EAPTLS_HANDLED
  864. ++[eap] returns handled
  865. Sending Access-Challenge of id 235 to 193.62.48.38 port 1814
  866. EAP-Message = 0x0108004119001403010001011603010030d2dcc3ba640af84fb59d76273a2001657f5a8a5c0736190b9a61170fda7b0f58ef63f2010817b5e97e239516ae3f17a2
  867. Message-Authenticator = 0x00000000000000000000000000000000
  868. State = 0x75a766a372af7f726488f389cf8e8ffd
  869. Proxy-State = 0x37
  870. Finished request 7.
  871. Going to the next request
  872. Waking up in 4.9 seconds.
  873. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=57, length=151
  874. User-Name = "anonymous"
  875. NAS-IP-Address = 127.0.0.1
  876. Calling-Station-Id = "02-00-00-00-00-01"
  877. Framed-MTU = 1400
  878. NAS-Port-Type = Wireless-802.11
  879. Connect-Info = "CONNECT 11Mbps 802.11b"
  880. EAP-Message = 0x020800061900
  881. State = 0x75a766a372af7f726488f389cf8e8ffd
  882. Message-Authenticator = 0xb0dc2a3a1148df72ae432e077939ded2
  883. Domain-Name = "WORC.AC.UK"
  884. Proxy-State = 0x38
  885. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  886. +- entering group authorize {...}
  887. ++[preprocess] returns ok
  888. ++[mschap_ad] returns noop
  889. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  890. ++[ntdomain] returns noop
  891. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  892. [suffix] Found realm "NULL"
  893. [suffix] Adding Stripped-User-Name = "anonymous"
  894. [suffix] Adding Realm = "NULL"
  895. [suffix] Authentication realm is LOCAL.
  896. ++[suffix] returns ok
  897. [eap] EAP packet type response id 8 length 6
  898. [eap] Continuing tunnel setup.
  899. ++[eap] returns ok
  900. Found Auth-Type = EAP
  901. # Executing group from file /etc/freeradius/sites-enabled/default
  902. +- entering group EAP {...}
  903. [eap] Request found, released from the list
  904. [eap] EAP/peap
  905. [eap] processing type peap
  906. [peap] processing EAP-TLS
  907. [peap] Received TLS ACK
  908. [peap] ACK handshake is finished
  909. [peap] eaptls_verify returned 3
  910. [peap] eaptls_process returned 3
  911. [peap] EAPTLS_SUCCESS
  912. [peap] Session established. Decoding tunneled attributes.
  913. [peap] Peap state TUNNEL ESTABLISHED
  914. ++[eap] returns handled
  915. Sending Access-Challenge of id 57 to 193.62.48.38 port 1814
  916. EAP-Message = 0x0109002b1900170301002005b674b49951ffca62a27efb22404a7564e6582119d87d5a8294c071172d2108
  917. Message-Authenticator = 0x00000000000000000000000000000000
  918. State = 0x75a766a37dae7f726488f389cf8e8ffd
  919. Proxy-State = 0x38
  920. Finished request 8.
  921. Going to the next request
  922. Waking up in 4.9 seconds.
  923. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=36, length=241
  924. User-Name = "anonymous"
  925. NAS-IP-Address = 127.0.0.1
  926. Calling-Station-Id = "02-00-00-00-00-01"
  927. Framed-MTU = 1400
  928. NAS-Port-Type = Wireless-802.11
  929. Connect-Info = "CONNECT 11Mbps 802.11b"
  930. EAP-Message = 0x02090060190017030100201e148079a45910d97482c4b56dfb20bbe4730b3cea88c0489590bee7c081dde51703010030444bb65de131bae64062300c3af4c9c0f6d86f29ef67daf40f3d724484c00d2331f378b301e668075ccd9cf0a51a4160
  931. State = 0x75a766a37dae7f726488f389cf8e8ffd
  932. Message-Authenticator = 0xf347162e917b8659b93a96704aa5c942
  933. Domain-Name = "WORC.AC.UK"
  934. Proxy-State = 0x39
  935. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  936. +- entering group authorize {...}
  937. ++[preprocess] returns ok
  938. ++[mschap_ad] returns noop
  939. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  940. ++[ntdomain] returns noop
  941. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  942. [suffix] Found realm "NULL"
  943. [suffix] Adding Stripped-User-Name = "anonymous"
  944. [suffix] Adding Realm = "NULL"
  945. [suffix] Authentication realm is LOCAL.
  946. ++[suffix] returns ok
  947. [eap] EAP packet type response id 9 length 96
  948. [eap] Continuing tunnel setup.
  949. ++[eap] returns ok
  950. Found Auth-Type = EAP
  951. # Executing group from file /etc/freeradius/sites-enabled/default
  952. +- entering group EAP {...}
  953. [eap] Request found, released from the list
  954. [eap] EAP/peap
  955. [eap] processing type peap
  956. [peap] processing EAP-TLS
  957. [peap] eaptls_verify returned 7
  958. [peap] Done initial handshake
  959. [peap] eaptls_process returned 7
  960. [peap] EAPTLS_OK
  961. [peap] Session established. Decoding tunneled attributes.
  962. [peap] Peap state WAITING FOR INNER IDENTITY
  963. [peap] Identity - uwjrstest
  964. [peap] Got inner identity 'uwjrstest'
  965. [peap] Setting default EAP type for tunneled EAP session.
  966. [peap] Got tunneled request
  967. EAP-Message = 0x0209000e0175776a727374657374
  968. server {
  969. [peap] Setting User-Name to uwjrstest
  970. Sending tunneled request
  971. EAP-Message = 0x0209000e0175776a727374657374
  972. FreeRADIUS-Proxied-To = 127.0.0.1
  973. User-Name = "uwjrstest"
  974. NAS-IP-Address = 127.0.0.1
  975. Calling-Station-Id = "02-00-00-00-00-01"
  976. Framed-MTU = 1400
  977. NAS-Port-Type = Wireless-802.11
  978. Connect-Info = "CONNECT 11Mbps 802.11b"
  979. Domain-Name = "WORC.AC.UK"
  980. server inner-tunnel {
  981. # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
  982. +- entering group authorize {...}
  983. ++[preprocess] returns ok
  984. ++[chap] returns noop
  985. ++[mschap_ad] returns noop
  986. ++[unix] returns notfound
  987. [ntdomain] No '\' in User-Name = "uwjrstest", skipping NULL due to config.
  988. ++[ntdomain] returns noop
  989. [suffix] No '@' in User-Name = "uwjrstest", looking up realm NULL
  990. [suffix] Found realm "NULL"
  991. [suffix] Adding Stripped-User-Name = "uwjrstest"
  992. [suffix] Adding Realm = "NULL"
  993. [suffix] Authentication realm is LOCAL.
  994. ++[suffix] returns ok
  995. ++[control] returns ok
  996. [eap] EAP packet type response id 9 length 14
  997. [eap] No EAP Start, assuming it's an on-going EAP conversation
  998. ++[eap] returns updated
  999. ++[files] returns noop
  1000. ++[expiration] returns noop
  1001. ++[logintime] returns noop
  1002. ++[pap] returns noop
  1003. Found Auth-Type = EAP
  1004. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  1005. +- entering group authenticate {...}
  1006. [eap] EAP Identity
  1007. [eap] processing type mschapv2
  1008. rlm_eap_mschapv2: Issuing Challenge
  1009. ++[eap] returns handled
  1010. } # server inner-tunnel
  1011. [peap] Got tunneled reply code 11
  1012. EAP-Message = 0x010a00231a010a001e10b5dcfa91af18a0101eb7544396e3cb3575776a727374657374
  1013. Message-Authenticator = 0x00000000000000000000000000000000
  1014. State = 0x78b723cc78bd39444d0f0150ae83c59c
  1015. [peap] Got tunneled reply RADIUS code 11
  1016. EAP-Message = 0x010a00231a010a001e10b5dcfa91af18a0101eb7544396e3cb3575776a727374657374
  1017. Message-Authenticator = 0x00000000000000000000000000000000
  1018. State = 0x78b723cc78bd39444d0f0150ae83c59c
  1019. [peap] Got tunneled Access-Challenge
  1020. ++[eap] returns handled
  1021. Sending Access-Challenge of id 36 to 193.62.48.38 port 1814
  1022. EAP-Message = 0x010a004b19001703010040df13447ce91463d86f57a14b650931a753d23a558b036098a136828563a27b7d4e1f9e4996ef2a1df799d3304b2f1e49e71f5f50159998af10f9bbc51f86b4ea
  1023. Message-Authenticator = 0x00000000000000000000000000000000
  1024. State = 0x75a766a37cad7f726488f389cf8e8ffd
  1025. Proxy-State = 0x39
  1026. Finished request 9.
  1027. Going to the next request
  1028. Waking up in 4.9 seconds.
  1029. rad_recv: Access-Request packet from host 193.62.48.38 port 1814, id=119, length=274
  1030. User-Name = "anonymous"
  1031. NAS-IP-Address = 127.0.0.1
  1032. Calling-Station-Id = "02-00-00-00-00-01"
  1033. Framed-MTU = 1400
  1034. NAS-Port-Type = Wireless-802.11
  1035. Connect-Info = "CONNECT 11Mbps 802.11b"
  1036. EAP-Message = 0x020a008019001703010020979bcaf0d5ec05bad288f27657294f6f20cfa1ef9dec9a578a1f3275d4414013170301005043b3c98497ca72a36f102d95b6e90a3b1d15effd5246855adef6352accc247c7154851859671c86400f4532379294084806307d4e3f3eced3a1448f46aa9578501e49ff6c9becda2c6f5a16778f5a127
  1037. State = 0x75a766a37cad7f726488f389cf8e8ffd
  1038. Message-Authenticator = 0x1382e261b524fdc05df222bba9b35125
  1039. Domain-Name = "WORC.AC.UK"
  1040. Proxy-State = 0x3130
  1041. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  1042. +- entering group authorize {...}
  1043. ++[preprocess] returns ok
  1044. ++[mschap_ad] returns noop
  1045. [ntdomain] No '\' in User-Name = "anonymous", skipping NULL due to config.
  1046. ++[ntdomain] returns noop
  1047. [suffix] No '@' in User-Name = "anonymous", looking up realm NULL
  1048. [suffix] Found realm "NULL"
  1049. [suffix] Adding Stripped-User-Name = "anonymous"
  1050. [suffix] Adding Realm = "NULL"
  1051. [suffix] Authentication realm is LOCAL.
  1052. ++[suffix] returns ok
  1053. [eap] EAP packet type response id 10 length 128
  1054. [eap] Continuing tunnel setup.
  1055. ++[eap] returns ok
  1056. Found Auth-Type = EAP
  1057. # Executing group from file /etc/freeradius/sites-enabled/default
  1058. +- entering group EAP {...}
  1059. [eap] Request found, released from the list
  1060. [eap] EAP/peap
  1061. [eap] processing type peap
  1062. [peap] processing EAP-TLS
  1063. [peap] eaptls_verify returned 7
  1064. [peap] Done initial handshake
  1065. [peap] eaptls_process returned 7
  1066. [peap] EAPTLS_OK
  1067. [peap] Session established. Decoding tunneled attributes.
  1068. [peap] Peap state phase2
  1069. [peap] EAP type mschapv2
  1070. [peap] Got tunneled request
  1071. EAP-Message = 0x020a00441a020a003f313c6612eb8a1d955dcc5fc92e66c766eb00000000000000004619af06b81d1426e5c7921fe751e5f46b7ee3456b3b0c7f0075776a727374657374
  1072. server {
  1073. [peap] Setting User-Name to uwjrstest
  1074. Sending tunneled request
  1075. EAP-Message = 0x020a00441a020a003f313c6612eb8a1d955dcc5fc92e66c766eb00000000000000004619af06b81d1426e5c7921fe751e5f46b7ee3456b3b0c7f0075776a727374657374
  1076. FreeRADIUS-Proxied-To = 127.0.0.1
  1077. User-Name = "uwjrstest"
  1078. State = 0x78b723cc78bd39444d0f0150ae83c59c
  1079. NAS-IP-Address = 127.0.0.1
  1080. Calling-Station-Id = "02-00-00-00-00-01"
  1081. Framed-MTU = 1400
  1082. NAS-Port-Type = Wireless-802.11
  1083. Connect-Info = "CONNECT 11Mbps 802.11b"
  1084. Domain-Name = "WORC.AC.UK"
  1085. server inner-tunnel {
  1086. # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
  1087. +- entering group authorize {...}
  1088. ++[preprocess] returns ok
  1089. ++[chap] returns noop
  1090. ++[mschap_ad] returns noop
  1091. ++[unix] returns notfound
  1092. [ntdomain] No '\' in User-Name = "uwjrstest", skipping NULL due to config.
  1093. ++[ntdomain] returns noop
  1094. [suffix] No '@' in User-Name = "uwjrstest", looking up realm NULL
  1095. [suffix] Found realm "NULL"
  1096. [suffix] Adding Stripped-User-Name = "uwjrstest"
  1097. [suffix] Adding Realm = "NULL"
  1098. [suffix] Authentication realm is LOCAL.
  1099. ++[suffix] returns ok
  1100. ++[control] returns ok
  1101. [eap] EAP packet type response id 10 length 68
  1102. [eap] No EAP Start, assuming it's an on-going EAP conversation
  1103. ++[eap] returns updated
  1104. ++[files] returns noop
  1105. ++[expiration] returns noop
  1106. ++[logintime] returns noop
  1107. ++[pap] returns noop
  1108. Found Auth-Type = EAP
  1109. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  1110. +- entering group authenticate {...}
  1111. [eap] Request found, released from the list
  1112. [eap] EAP/mschapv2
  1113. [eap] processing type mschapv2
  1114. [mschapv2] # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  1115. [mschapv2] +- entering group MS-CHAP {...}
  1116. [mschap_ad] Creating challenge hash with username: uwjrstest
  1117. [mschap_ad] Client is using MS-CHAPv2 for uwjrstest, we need NT-Password
  1118. [mschap_ad] expand: --username=%{Stripped-User-Name:-%{User-Name:-None}} -> --username=uwjrstest
  1119. [mschap_ad] No NT-Domain was found in the User-Name.
  1120. [mschap_ad] expand: %{mschap_ad:NT-Domain} ->
  1121. [mschap_ad] ... expanding second conditional
  1122. [mschap_ad] expand: %{Domain-Name} -> WORC.AC.UK
  1123. [mschap_ad] expand: --domain=%{%{mschap_ad:NT-Domain}:-%{Domain-Name}} -> --domain=WORC.AC.UK
  1124. [mschap_ad] Creating challenge hash with username: uwjrstest
  1125. [mschap_ad] expand: --challenge=%{mschap_ad:Challenge:-00} -> --challenge=eb2123a7a496e886
  1126. [mschap_ad] expand: --nt-response=%{mschap_ad:NT-Response:-00} -> --nt-response=4619af06b81d1426e5c7921fe751e5f46b7ee3456b3b0c7f
  1127. Exec-Program output: NT_KEY: 51C1A08577E4ECDBBD59863E8B0BF5BD
  1128. Exec-Program-Wait: plaintext: NT_KEY: 51C1A08577E4ECDBBD59863E8B0BF5BD
  1129. Exec-Program: returned: 0
  1130. [mschap_ad] adding MS-CHAPv2 MPPE keys
  1131. ++[mschap_ad] returns ok
  1132. MSCHAP Success
  1133. ++[eap] returns handled
  1134. } # server inner-tunnel
  1135. [peap] Got tunneled reply code 11
  1136. EAP-Message = 0x010b00331a030a002e533d34373434464543433834314435314339333134384335383933354130384131324539333345463837
  1137. Message-Authenticator = 0x00000000000000000000000000000000
  1138. State = 0x78b723cc79bc39444d0f0150ae83c59c
  1139. [peap] Got tunneled reply RADIUS code 11
  1140. EAP-Message = 0x010b00331a030a002e533d34373434464543433834314435314339333134384335383933354130384131324539333345463837
  1141. Message-Authenticator = 0x00000000000000000000000000000000
  1142. State = 0x78b723cc79bc39444d0f0150ae83c59c
  1143. [peap] Got tunneled Access-Challenge
  1144. ++[eap] returns handled
  1145. Sending Access-Challenge of id 119 to 193.62.48.38 port 1814
  1146. EAP-Message = 0x010b005b190017030100502a5e9a459c709c372df731510a2b08dbe0c532e2a882b7c7672b0a8efcd699ac0737d4e06d39842d469d8fc14ca08de04dbcbf9f84d3c8d36ec379ea39e69b242942805e9ab40af0c4be640da5feb54d
  1147. Message-Authenticator = 0x00000000000000000000000000000000
  1148. State = 0x75a766a37fac7f726488f389cf8e8ffd
  1149. Proxy-State = 0x3130
  1150. Finished request 10.
  1151. Going to the next request
  1152. Waking up in 4.9 seconds.
  1153. Cleaning up request 0 ID 74 with timestamp +36
  1154. Cleaning up request 1 ID 227 with timestamp +36
  1155. Cleaning up request 2 ID 122 with timestamp +36
  1156. Cleaning up request 3 ID 106 with timestamp +36
  1157. Cleaning up request 4 ID 67 with timestamp +36
  1158. Cleaning up request 5 ID 164 with timestamp +36
  1159. Cleaning up request 6 ID 204 with timestamp +36
  1160. Cleaning up request 7 ID 235 with timestamp +36
  1161. Cleaning up request 8 ID 57 with timestamp +36
  1162. Cleaning up request 9 ID 36 with timestamp +36
  1163. Cleaning up request 10 ID 119 with timestamp +36
  1164. WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  1165. WARNING: !! EAP session for state 0x75a766a37fac7f72 did not finish!
  1166. WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
  1167. WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  1168. Ready to process requests.
  1169. Ready to process requests.
  1170. Signalled to terminate
  1171. Exiting normally.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement