Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Listening on authentication address * port 1812
- Listening on accounting address * port 1813
- Listening on command file /var/run/radiusd/radiusd.sock
- Listening on proxy address * port 1814
- Ready to process requests.
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=57, length=149
- User-Name = "fulano"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x0236000b0166756c616e6f
- Message-Authenticator = 0xd0eddad09c9a1df4a8b4ddbe2b3c830f
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "fulano", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 54 length 11
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- ++[files] returns noop
- [sql] expand: %{User-Name} -> fulano
- [sql] sql_set_user escaped user --> 'fulano'
- rlm_sql (sql): Reserving sql socket id: 3
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'fulano' ORDER BY id
- WARNING: Found User-Password == "...".
- WARNING: Are you sure you don't mean Cleartext-Password?
- WARNING: See "man rlm_pap" for more information.
- [sql] User found in radcheck table
- [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'fulano' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'fulano' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 3
- ++[sql] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- [pap] Found existing Auth-Type, not changing it.
- ++[pap] returns noop
- Found Auth-Type = EAP
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!! Replacing User-Password in config items with Cleartext-Password. !!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!! Please update your configuration so that the "known good" !!!
- !!! clear text password is in Cleartext-Password, and not in User-Password. !!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type md5
- rlm_eap_md5: Issuing Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 57 to 192.168.0.181 port 2050
- EAP-Message = 0x0137001604105dfd7cc934544e50f38e61a8243639d4
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x29eb2b2329dc2f211325e614cda49a4e
- Finished request 0.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=58, length=162
- User-Name = "fulano"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023700060319
- State = 0x29eb2b2329dc2f211325e614cda49a4e
- Message-Authenticator = 0xa609db150f9f02931d4f191e5b0762c4
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "fulano", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 55 length 6
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- ++[files] returns noop
- [sql] expand: %{User-Name} -> fulano
- [sql] sql_set_user escaped user --> 'fulano'
- rlm_sql (sql): Reserving sql socket id: 2
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'fulano' ORDER BY id
- WARNING: Found User-Password == "...".
- WARNING: Are you sure you don't mean Cleartext-Password?
- WARNING: See "man rlm_pap" for more information.
- [sql] User found in radcheck table
- [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'fulano' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'fulano' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 2
- ++[sql] returns ok
- ++[expiration] returns noop
- ++[logintime] returns noop
- [pap] Found existing Auth-Type, not changing it.
- ++[pap] returns noop
- Found Auth-Type = EAP
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!! Replacing User-Password in config items with Cleartext-Password. !!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!! Please update your configuration so that the "known good" !!!
- !!! clear text password is in Cleartext-Password, and not in User-Password. !!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP NAK
- [eap] EAP-NAK asked for EAP-Type/peap
- [eap] processing type tls
- [tls] Initiate
- [tls] Start returned 1
- ++[eap] returns handled
- Sending Access-Challenge of id 58 to 192.168.0.181 port 2050
- EAP-Message = 0x013800061920
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x29eb2b2328d332211325e614cda49a4e
- Finished request 1.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=59, length=276
- User-Name = "fulano"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x0238007819800000006e16030100690100006503014d798fcf204dc33b429fa713f08a6769daab02823a5ddb8815d7ef343ef2836b000018002f00350005000ac013c014c009c00a003200380013000401000024ff010001000000000b000900000666756c616e6f000a0006000400170018000b00020100
- State = 0x29eb2b2328d332211325e614cda49a4e
- Message-Authenticator = 0xe326d3c4fedf3f2619923c1a3e2eaca5
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "fulano", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 56 length 120
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 110
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] (other): before/accept initialization
- [peap] TLS_accept: before/accept initialization
- [peap] <<< TLS 1.0 Handshake [length 0069], ClientHello
- [peap] TLS_accept: SSLv3 read client hello A
- [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello
- [peap] TLS_accept: SSLv3 write server hello A
- [peap] >>> TLS 1.0 Handshake [length 085e], Certificate
- [peap] TLS_accept: SSLv3 write certificate A
- [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
- [peap] TLS_accept: SSLv3 write server done A
- [peap] TLS_accept: SSLv3 flush data
- [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
- In SSL Handshake Phase
- In SSL Accept mode
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 59 to 192.168.0.181 port 2050
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0xe70004ab308204a73082038f
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x29eb2b232bd232211325e614cda49a4e
- Finished request 2.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=60, length=162
- User-Name = "fulano"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023900061900
- State = 0x29eb2b232bd232211325e614cda49a4e
- Message-Authenticator = 0x0ee31b747aed2c32b27b24c741d51dd4
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "fulano", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 57 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 60 to 192.168.0.181 port 2050
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x6b96ed87ba741337
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x29eb2b232ad132211325e614cda49a4e
- Finished request 3.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=61, length=162
- User-Name = "fulano"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023a00061900
- State = 0x29eb2b232ad132211325e614cda49a4e
- Message-Authenticator = 0xba641e54d1f9984ea5fa096191e94d57
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "fulano", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 58 length 6
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] returns handled
- Sending Access-Challenge of id 61 to 192.168.0.181 port 2050
- EAP-Message = 0x013b00bc190019ae2695f394b3523ce915ad987ba2b964690b489bd50616e1e2b1fff42b9ca36c836b9827e2a16b3ed5e5424770c25f984fc5fad47f8f83c8ee214ad863192bb43c235416be45ba489ffcc4810241c446e567bd3bd107441e44219fe8a1f3cbeef18c683c66d3b8c9df7bed2acc5b75f3e794579afb25f269097e7537c321f069eecbe2aab18b4b76d1a3ece523526f939dd714c4f63b45fa11eb3072d68f16be9ae5233f7087fbae67972f6f16030100040e000000
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x29eb2b232dd032211325e614cda49a4e
- Finished request 4.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=62, length=173
- User-Name = "fulano"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023b001119800000000715030100020230
- State = 0x29eb2b232dd032211325e614cda49a4e
- Message-Authenticator = 0xb5be6bc547c2da586816b4a5996e5f28
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "fulano", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 59 length 17
- [eap] Continuing tunnel setup.
- ++[eap] returns ok
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 7
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] <<< TLS 1.0 Alert [length 0002], fatal unknown_ca
- TLS Alert read:fatal:unknown CA
- TLS_accept:failed in SSLv3 read client certificate A
- rlm_eap: SSL error error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown ca
- SSL: SSL_read failed inside of TLS (-1), TLS session fails.
- TLS receive handshake failed during operation
- [peap] eaptls_process returned 4
- [peap] EAPTLS_OTHERS
- [eap] Handler failed in EAP/peap
- [eap] Failed in EAP select
- ++[eap] returns invalid
- Failed to authenticate the user.
- Using Post-Auth-Type Reject
- +- entering group REJECT {...}
- [attr_filter.access_reject] expand: %{User-Name} -> fulano
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] returns updated
- Delaying reject of request 5 for 1 seconds
- Going to the next request
- Waking up in 0.9 seconds.
- Sending delayed reject for request 5
- Sending Access-Reject of id 62 to 192.168.0.181 port 2050
- EAP-Message = 0x043b0004
- Message-Authenticator = 0x00000000000000000000000000000000
- Waking up in 3.8 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2051, id=19, length=167
- User-Name = "ADMINISTRATIVOS"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023a00140141444d494e49535452415449564f53
- Message-Authenticator = 0x22c1734f9a3aeaff6ef8eb6ce26c7b5d
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "ADMINISTRATIVOS", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 58 length 20
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- ++[files] returns noop
- [sql] expand: %{User-Name} -> ADMINISTRATIVOS
- [sql] sql_set_user escaped user --> 'ADMINISTRATIVOS'
- rlm_sql (sql): Reserving sql socket id: 1
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'ADMINISTRATIVOS' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'ADMINISTRATIVOS' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 1
- [sql] User ADMINISTRATIVOS not found
- ++[sql] returns notfound
- ++[expiration] returns noop
- ++[logintime] returns noop
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] returns noop
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type md5
- rlm_eap_md5: Issuing Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 19 to 192.168.0.181 port 2051
- EAP-Message = 0x013b00160410c06c6742aeae9291bd5d5c23e516d3a4
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x5d8e42a15db5462cead871de140542ec
- Finished request 6.
- Going to the next request
- Waking up in 2.5 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2051, id=20, length=171
- User-Name = "ADMINISTRATIVOS"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023b00060311
- State = 0x5d8e42a15db5462cead871de140542ec
- Message-Authenticator = 0x5ffcb10c010ffdae52c67ffae2e226e8
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "ADMINISTRATIVOS", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 59 length 6
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- ++[files] returns noop
- [sql] expand: %{User-Name} -> ADMINISTRATIVOS
- [sql] sql_set_user escaped user --> 'ADMINISTRATIVOS'
- rlm_sql (sql): Reserving sql socket id: 0
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'ADMINISTRATIVOS' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'ADMINISTRATIVOS' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 0
- [sql] User ADMINISTRATIVOS not found
- ++[sql] returns notfound
- ++[expiration] returns noop
- ++[logintime] returns noop
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] returns noop
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP NAK
- [eap] EAP-NAK asked for EAP-Type/leap
- [eap] processing type leap
- rlm_eap_leap: Stage 2
- rlm_eap_leap: Issuing AP Challenge
- rlm_eap_leap: Successfully initiated
- ++[eap] returns handled
- Sending Access-Challenge of id 20 to 192.168.0.181 port 2051
- EAP-Message = 0x013c001f11010008c90b41f8f7d1504041444d494e49535452415449564f53
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x5d8e42a15cb2532cead871de140542ec
- Finished request 7.
- Going to the next request
- Waking up in 2.5 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2050, id=63, length=167
- User-Name = "ADMINISTRATIVOS"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x021500140141444d494e49535452415449564f53
- Message-Authenticator = 0x8bf738e1010c5fa5c9475560e61970f9
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "ADMINISTRATIVOS", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 21 length 20
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- ++[files] returns noop
- [sql] expand: %{User-Name} -> ADMINISTRATIVOS
- [sql] sql_set_user escaped user --> 'ADMINISTRATIVOS'
- rlm_sql (sql): Reserving sql socket id: 4
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'ADMINISTRATIVOS' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'ADMINISTRATIVOS' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 4
- [sql] User ADMINISTRATIVOS not found
- ++[sql] returns notfound
- ++[expiration] returns noop
- ++[logintime] returns noop
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] returns noop
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] EAP Identity
- [eap] processing type md5
- rlm_eap_md5: Issuing Challenge
- ++[eap] returns handled
- Sending Access-Challenge of id 63 to 192.168.0.181 port 2050
- EAP-Message = 0x011600160410571b993ce5c29cd8bb844f135f94acca
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0xaa8dbd57aa9bb9fc313d5e4baa8ce2e9
- Finished request 8.
- Going to the next request
- Waking up in 2.5 seconds.
- rad_recv: Access-Request packet from host 192.168.0.181 port 2051, id=21, length=212
- User-Name = "ADMINISTRATIVOS"
- NAS-IP-Address = 192.168.0.181
- NAS-Port = 0
- Called-Station-Id = "00-15-6D-7E-FA-8F:eneut"
- Calling-Station-Id = "AC-81-12-26-99-97"
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- Connect-Info = "CONNECT 0Mbps 802.11"
- EAP-Message = 0x023c002f1101001885db6a94ec54332fbb56fbe9084d528f9863993287dde24f41444d494e49535452415449564f53
- State = 0x5d8e42a15cb2532cead871de140542ec
- Message-Authenticator = 0x1e2f653edc7d8638b490e83347f0cefc
- +- entering group authorize {...}
- ++[preprocess] returns ok
- ++[chap] returns noop
- ++[mschap] returns noop
- [suffix] No '@' in User-Name = "ADMINISTRATIVOS", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] returns noop
- [eap] EAP packet type response id 60 length 47
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] returns updated
- ++[unix] returns notfound
- ++[files] returns noop
- [sql] expand: %{User-Name} -> ADMINISTRATIVOS
- [sql] sql_set_user escaped user --> 'ADMINISTRATIVOS'
- rlm_sql (sql): Reserving sql socket id: 3
- [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'ADMINISTRATIVOS' ORDER BY id
- [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'ADMINISTRATIVOS' ORDER BY priority
- rlm_sql (sql): Released sql socket id: 3
- [sql] User ADMINISTRATIVOS not found
- ++[sql] returns notfound
- ++[expiration] returns noop
- ++[logintime] returns noop
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] returns noop
- Found Auth-Type = EAP
- +- entering group authenticate {...}
- [eap] Request found, released from the list
- [eap] EAP/leap
- [eap] processing type leap
- rlm_eap_leap: No Cleartext-Password or NT-Password configured for this user
- [eap] Handler failed in EAP/leap
- [eap] Failed in EAP select
- ++[eap] returns invalid
- Failed to authenticate the user.
- Using Post-Auth-Type Reject
- +- entering group REJECT {...}
- [attr_filter.access_reject] expand: %{User-Name} -> ADMINISTRATIVOS
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] returns updated
- Delaying reject of request 9 for 1 seconds
- Going to the next request
- Waking up in 0.9 seconds.
- Sending delayed reject for request 9
- Sending Access-Reject of id 21 to 192.168.0.181 port 2051
- EAP-Message = 0x043c0004
- Message-Authenticator = 0x00000000000000000000000000000000
- Waking up in 1.5 seconds.
- Cleaning up request 0 ID 57 with timestamp +41
- Cleaning up request 1 ID 58 with timestamp +41
- Cleaning up request 2 ID 59 with timestamp +41
- Cleaning up request 3 ID 60 with timestamp +41
- Cleaning up request 4 ID 61 with timestamp +41
- Waking up in 1.0 seconds.
- Cleaning up request 5 ID 62 with timestamp +41
- Waking up in 1.3 seconds.
- Cleaning up request 6 ID 19 with timestamp +43
- Cleaning up request 7 ID 20 with timestamp +43
- Cleaning up request 8 ID 63 with timestamp +43
- Waking up in 1.0 seconds.
- Cleaning up request 9 ID 21 with timestamp +43
- Ready to process requests.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement