Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- freeradius: FreeRADIUS Version 2.2.5, for host x86_64-pc-linux-gnu, built on Oct 24 2014 at 02:05:28
- Copyright (C) 1999-2013 The FreeRADIUS server project and contributors.
- There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
- PARTICULAR PURPOSE.
- You may redistribute copies of FreeRADIUS under the terms of the
- GNU General Public License.
- For more information about these matters, see the file named COPYRIGHT.
- Starting - reading configuration files ...
- including configuration file /etc/freeradius/radiusd.conf
- including configuration file /etc/freeradius/proxy.conf
- including configuration file /etc/freeradius/clients.conf
- including files in directory /etc/freeradius/modules/
- including configuration file /etc/freeradius/modules/mschap
- including configuration file /etc/freeradius/modules/echo
- including configuration file /etc/freeradius/modules/rediswho
- including configuration file /etc/freeradius/modules/pam
- including configuration file /etc/freeradius/modules/acct_unique
- including configuration file /etc/freeradius/modules/dynamic_clients
- including configuration file /etc/freeradius/modules/expr
- including configuration file /etc/freeradius/modules/checkval
- including configuration file /etc/freeradius/modules/replicate
- including configuration file /etc/freeradius/modules/ippool
- including configuration file /etc/freeradius/modules/mac2ip
- including configuration file /etc/freeradius/modules/exec
- including configuration file /etc/freeradius/modules/opendirectory
- including configuration file /etc/freeradius/modules/policy
- including configuration file /etc/freeradius/modules/pap
- including configuration file /etc/freeradius/modules/soh
- including configuration file /etc/freeradius/modules/sql_log
- including configuration file /etc/freeradius/modules/files
- including configuration file /etc/freeradius/modules/smsotp
- including configuration file /etc/freeradius/modules/chap
- including configuration file /etc/freeradius/modules/cache
- including configuration file /etc/freeradius/modules/attr_filter
- including configuration file /etc/freeradius/modules/passwd
- including configuration file /etc/freeradius/modules/counter
- including configuration file /etc/freeradius/modules/digest
- including configuration file /etc/freeradius/modules/mac2vlan
- including configuration file /etc/freeradius/modules/redis
- including configuration file /etc/freeradius/modules/ldap
- including configuration file /etc/freeradius/modules/attr_rewrite
- including configuration file /etc/freeradius/modules/dhcp_sqlippool
- including configuration file /etc/freeradius/modules/cui
- including configuration file /etc/freeradius/modules/wimax
- including configuration file /etc/freeradius/modules/inner-eap
- including configuration file /etc/freeradius/modules/smbpasswd
- including configuration file /etc/freeradius/modules/ntlm_auth
- including configuration file /etc/freeradius/modules/otp
- including configuration file /etc/freeradius/modules/preprocess
- including configuration file /etc/freeradius/modules/radutmp
- including configuration file /etc/freeradius/modules/detail.log
- including configuration file /etc/freeradius/modules/always
- including configuration file /etc/freeradius/modules/krb5
- including configuration file /etc/freeradius/modules/linelog
- including configuration file /etc/freeradius/modules/etc_group
- including configuration file /etc/freeradius/modules/radrelay
- including configuration file /etc/freeradius/modules/unix
- including configuration file /etc/freeradius/modules/logintime
- including configuration file /etc/freeradius/modules/perl
- including configuration file /etc/freeradius/modules/sqlcounter_expire_on_login
- including configuration file /etc/freeradius/modules/detail.example.com
- including configuration file /etc/freeradius/modules/detail
- including configuration file /etc/freeradius/modules/expiration
- including configuration file /etc/freeradius/modules/sradutmp
- including configuration file /etc/freeradius/modules/realm
- including configuration file /etc/freeradius/eap.conf
- including configuration file /etc/freeradius/policy.conf
- including files in directory /etc/freeradius/sites-enabled/
- including configuration file /etc/freeradius/sites-enabled/inner-tunnel
- including configuration file /etc/freeradius/sites-enabled/default
- main {
- user = "freerad"
- group = "freerad"
- allow_core_dumps = no
- }
- including dictionary file /etc/freeradius/dictionary
- main {
- name = "freeradius"
- prefix = "/usr"
- localstatedir = "/var"
- sbindir = "/usr/sbin"
- logdir = "/var/log/freeradius"
- run_dir = "/var/run/freeradius"
- libdir = "/usr/lib/freeradius"
- radacctdir = "/var/log/freeradius/radacct"
- hostname_lookups = no
- max_request_time = 30
- cleanup_delay = 5
- max_requests = 1024
- pidfile = "/var/run/freeradius/freeradius.pid"
- checkrad = "/usr/sbin/checkrad"
- debug_level = 0
- proxy_requests = yes
- log {
- stripped_names = no
- auth = no
- auth_badpass = no
- auth_goodpass = no
- }
- security {
- max_attributes = 200
- reject_delay = 1
- status_server = yes
- allow_vulnerable_openssl = no
- }
- }
- radiusd: #### Loading Realms and Home Servers ####
- proxy server {
- retry_delay = 5
- retry_count = 3
- default_fallback = no
- dead_time = 120
- wake_all_if_all_dead = no
- }
- home_server localhost {
- ipaddr = 127.0.0.1
- port = 1812
- type = "auth"
- secret = "testing123"
- response_window = 20
- max_outstanding = 65536
- require_message_authenticator = yes
- zombie_period = 40
- status_check = "status-server"
- ping_interval = 30
- check_interval = 30
- num_answers_to_alive = 3
- num_pings_to_alive = 3
- revive_interval = 120
- status_check_timeout = 4
- coa {
- irt = 2
- mrt = 16
- mrc = 5
- mrd = 30
- }
- }
- home_server_pool my_auth_failover {
- type = fail-over
- home_server = localhost
- }
- realm example.com {
- auth_pool = my_auth_failover
- }
- realm LOCAL {
- }
- radiusd: #### Loading Clients ####
- client 172.27.0.0/16 {
- require_message_authenticator = no
- secret = "wnam_radius"
- }
- client 10.0.0.0/8 {
- require_message_authenticator = no
- secret = "1iyufjno"
- }
- client 91.233.220.0/22 {
- require_message_authenticator = no
- secret = "1iyufjno"
- }
- client 91.197.104.0/22 {
- require_message_authenticator = no
- secret = "1iyufjno"
- }
- client 127.0.0.1 {
- require_message_authenticator = no
- secret = "secret"
- }
- radiusd: #### Instantiating modules ####
- instantiate {
- Module: Linked to module rlm_exec
- Module: Instantiating module "exec" from file /etc/freeradius/modules/exec
- exec {
- wait = no
- input_pairs = "request"
- shell_escape = yes
- timeout = 10
- }
- Module: Linked to module rlm_expr
- Module: Instantiating module "expr" from file /etc/freeradius/modules/expr
- Module: Linked to module rlm_expiration
- Module: Instantiating module "expiration" from file /etc/freeradius/modules/expiration
- expiration {
- reply-message = "Password Has Expired "
- }
- Module: Linked to module rlm_logintime
- Module: Instantiating module "logintime" from file /etc/freeradius/modules/logintime
- logintime {
- reply-message = "You are calling outside your allowed timespan "
- minimum-timeout = 60
- }
- }
- radiusd: #### Loading Virtual Servers ####
- server { # from file ?
- modules {
- Module: Creating Post-Auth-Type = REJECT
- Module: Checking authenticate {...} for more modules to load
- Module: Linked to module rlm_pap
- Module: Instantiating module "pap" from file /etc/freeradius/modules/pap
- pap {
- encryption_scheme = "auto"
- auto_header = no
- }
- Module: Checking authorize {...} for more modules to load
- Module: Linked to module rlm_preprocess
- Module: Instantiating module "preprocess" from file /etc/freeradius/modules/preprocess
- preprocess {
- huntgroups = "/etc/freeradius/huntgroups"
- hints = "/etc/freeradius/hints"
- with_ascend_hack = no
- ascend_channels_per_line = 23
- with_ntdomain_hack = no
- with_specialix_jetstream_hack = no
- with_cisco_vsa_hack = no
- with_alvarion_vsa_hack = no
- }
- reading pairlist file /etc/freeradius/huntgroups
- reading pairlist file /etc/freeradius/hints
- Module: Linked to module rlm_perl
- Module: Instantiating module "perl" from file /etc/freeradius/modules/perl
- perl {
- module = "/etc/freeradius/wnam-freeradius-bridge.pl"
- func_authorize = "authorize"
- func_authenticate = "authenticate"
- func_accounting = "accounting"
- func_preacct = "preacct"
- func_checksimul = "checksimul"
- func_detach = "detach"
- func_xlat = "xlat"
- func_pre_proxy = "pre_proxy"
- func_post_proxy = "post_proxy"
- func_post_auth = "post_auth"
- func_recv_coa = "recv_coa"
- func_send_coa = "send_coa"
- }
- Module: Checking preacct {...} for more modules to load
- Module: Linked to module rlm_acct_unique
- Module: Instantiating module "acct_unique" from file /etc/freeradius/modules/acct_unique
- acct_unique {
- key = "User-Name, Acct-Session-Id, NAS-IP-Address, NAS-Identifier, NAS-Port"
- }
- Module: Checking accounting {...} for more modules to load
- Module: Linked to module rlm_radutmp
- Module: Instantiating module "radutmp" from file /etc/freeradius/modules/radutmp
- radutmp {
- filename = "/var/log/freeradius/radutmp"
- username = "%{User-Name}"
- case_sensitive = yes
- check_with_nas = yes
- perm = 384
- callerid = yes
- }
- Module: Linked to module rlm_attr_filter
- Module: Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/modules/attr_filter
- attr_filter attr_filter.accounting_response {
- attrsfile = "/etc/freeradius/attrs.accounting_response"
- key = "%{User-Name}"
- relaxed = no
- }
- reading pairlist file /etc/freeradius/attrs.accounting_response
- Module: Checking session {...} for more modules to load
- Module: Checking post-auth {...} for more modules to load
- Module: Instantiating module "attr_filter.access_reject" from file /etc/freeradius/modules/attr_filter
- attr_filter attr_filter.access_reject {
- attrsfile = "/etc/freeradius/attrs.access_reject"
- key = "%{User-Name}"
- relaxed = no
- }
- reading pairlist file /etc/freeradius/attrs.access_reject
- } # modules
- } # server
- server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel
- modules {
- Module: Checking authenticate {...} for more modules to load
- Module: Linked to module rlm_chap
- Module: Instantiating module "chap" from file /etc/freeradius/modules/chap
- Module: Linked to module rlm_mschap
- Module: Instantiating module "mschap" from file /etc/freeradius/modules/mschap
- mschap {
- use_mppe = yes
- require_encryption = no
- require_strong = no
- with_ntdomain_hack = no
- allow_retry = yes
- }
- Module: Linked to module rlm_unix
- Module: Instantiating module "unix" from file /etc/freeradius/modules/unix
- unix {
- radwtmp = "/var/log/freeradius/radwtmp"
- }
- Module: Linked to module rlm_eap
- Module: Instantiating module "eap" from file /etc/freeradius/eap.conf
- eap {
- default_eap_type = "md5"
- timer_expire = 60
- ignore_unknown_eap_types = no
- cisco_accounting_username_bug = no
- max_sessions = 1024
- }
- Module: Linked to sub-module rlm_eap_md5
- Module: Instantiating eap-md5
- Module: Linked to sub-module rlm_eap_leap
- Module: Instantiating eap-leap
- Module: Linked to sub-module rlm_eap_gtc
- Module: Instantiating eap-gtc
- gtc {
- challenge = "Password: "
- auth_type = "PAP"
- }
- Module: Linked to sub-module rlm_eap_tls
- Module: Instantiating eap-tls
- tls {
- rsa_key_exchange = no
- dh_key_exchange = yes
- rsa_key_length = 512
- dh_key_length = 512
- verify_depth = 0
- CA_path = "/etc/freeradius/certs"
- pem_file_type = yes
- private_key_file = "/etc/freeradius/certs/server.key"
- certificate_file = "/etc/freeradius/certs/server.pem"
- CA_file = "/etc/freeradius/certs/ca.pem"
- private_key_password = "whatever"
- dh_file = "/etc/freeradius/certs/dh"
- random_file = "/dev/urandom"
- fragment_size = 1024
- include_length = yes
- check_crl = no
- cipher_list = "DEFAULT"
- make_cert_command = "/etc/freeradius/certs/bootstrap"
- ecdh_curve = "prime256v1"
- cache {
- enable = no
- lifetime = 24
- max_entries = 255
- }
- verify {
- }
- ocsp {
- enable = no
- override_cert_url = yes
- url = "http://127.0.0.1/ocsp/"
- use_nonce = yes
- timeout = 0
- softfail = no
- }
- }
- Module: Linked to sub-module rlm_eap_ttls
- Module: Instantiating eap-ttls
- ttls {
- default_eap_type = "md5"
- copy_request_to_tunnel = no
- use_tunneled_reply = no
- virtual_server = "inner-tunnel"
- include_length = yes
- }
- Module: Linked to sub-module rlm_eap_peap
- Module: Instantiating eap-peap
- peap {
- default_eap_type = "mschapv2"
- copy_request_to_tunnel = no
- use_tunneled_reply = no
- proxy_tunneled_request_as_eap = yes
- virtual_server = "inner-tunnel"
- soh = no
- }
- Module: Linked to sub-module rlm_eap_mschapv2
- Module: Instantiating eap-mschapv2
- mschapv2 {
- with_ntdomain_hack = no
- send_error = no
- }
- Module: Checking authorize {...} for more modules to load
- Module: Linked to module rlm_realm
- Module: Instantiating module "suffix" from file /etc/freeradius/modules/realm
- realm suffix {
- format = "suffix"
- delimiter = "@"
- ignore_default = no
- ignore_null = no
- }
- Module: Linked to module rlm_files
- Module: Instantiating module "files" from file /etc/freeradius/modules/files
- files {
- usersfile = "/etc/freeradius/users"
- acctusersfile = "/etc/freeradius/acct_users"
- preproxy_usersfile = "/etc/freeradius/preproxy_users"
- compat = "no"
- }
- reading pairlist file /etc/freeradius/users
- reading pairlist file /etc/freeradius/acct_users
- reading pairlist file /etc/freeradius/preproxy_users
- Module: Checking session {...} for more modules to load
- Module: Checking post-proxy {...} for more modules to load
- Module: Checking post-auth {...} for more modules to load
- } # modules
- } # server
- radiusd: #### Opening IP addresses and Ports ####
- listen {
- type = "auth"
- ipaddr = *
- port = 0
- }
- listen {
- type = "acct"
- ipaddr = *
- port = 0
- }
- listen {
- type = "auth"
- ipaddr = 127.0.0.1
- port = 18120
- }
- ... adding new socket proxy address * port 39071
- Listening on authentication address * port 1812
- Listening on accounting address * port 1813
- Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel
- Listening on proxy address * port 1814
- Ready to process requests.
- rad_recv: Access-Request packet from host 91.233.220.10 port 47367, id=144, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "70:14:A6:5C:2C:81"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "70:14:A6:5C:2C:81"
- NAS-Port = 2161115136
- Acct-Session-Id = "80d00000"
- Framed-IP-Address = 192.168.64.184
- Mikrotik-Host-IP = 192.168.64.184
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00000
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 70:14:A6:5C:2C:81
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.64.184
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.184
- rlm_perl: Added pair NAS-Port = 2161115136
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 70:14:A6:5C:2C:81
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 70:14:A6:5C:2C:81
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 0 for 1 seconds
- Going to the next request
- Waking up in 0.9 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 47367, id=144, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 47367 - ID: 144
- Waking up in 0.6 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 55628, id=145, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "00:13:E8:9C:6B:D5"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "00:13:E8:9C:6B:D5"
- NAS-Port = 2161115137
- Acct-Session-Id = "80d00001"
- Framed-IP-Address = 192.168.91.120
- Mikrotik-Host-IP = 192.168.91.120
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00001
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 00:13:E8:9C:6B:D5
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.91.120
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.91.120
- rlm_perl: Added pair NAS-Port = 2161115137
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 00:13:E8:9C:6B:D5
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 00:13:E8:9C:6B:D5
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 1 for 1 seconds
- Going to the next request
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 47367, id=144, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 47367 - ID: 144
- Waking up in 0.3 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 58301, id=146, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "C4:46:19:88:81:8A"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "C4:46:19:88:81:8A"
- NAS-Port = 2161115138
- Acct-Session-Id = "80d00002"
- Framed-IP-Address = 192.168.67.165
- Mikrotik-Host-IP = 192.168.67.165
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00002
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = C4:46:19:88:81:8A
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.67.165
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.165
- rlm_perl: Added pair NAS-Port = 2161115138
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = C4:46:19:88:81:8A
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> C4:46:19:88:81:8A
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 2 for 1 seconds
- Going to the next request
- Waking up in 0.3 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 35016, id=147, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "34:8A:7B:17:EC:FE"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "34:8A:7B:17:EC:FE"
- NAS-Port = 2161115139
- Acct-Session-Id = "80d00003"
- Framed-IP-Address = 192.168.67.214
- Mikrotik-Host-IP = 192.168.67.214
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00003
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 34:8A:7B:17:EC:FE
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.67.214
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.214
- rlm_perl: Added pair NAS-Port = 2161115139
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 34:8A:7B:17:EC:FE
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 34:8A:7B:17:EC:FE
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 3 for 1 seconds
- Going to the next request
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 39247, id=148, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "00:29:99:10:22:75"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "00:29:99:10:22:75"
- NAS-Port = 2161115140
- Acct-Session-Id = "80d00004"
- Framed-IP-Address = 192.168.64.230
- Mikrotik-Host-IP = 192.168.64.230
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00004
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 00:29:99:10:22:75
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.64.230
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.230
- rlm_perl: Added pair NAS-Port = 2161115140
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 00:29:99:10:22:75
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 00:29:99:10:22:75
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 4 for 1 seconds
- Going to the next request
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 47863, id=149, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "C8:B5:B7:ED:24:BA"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "C8:B5:B7:ED:24:BA"
- NAS-Port = 2161115141
- Acct-Session-Id = "80d00005"
- Framed-IP-Address = 192.168.67.157
- Mikrotik-Host-IP = 192.168.67.157
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00005
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = C8:B5:B7:ED:24:BA
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.67.157
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.157
- rlm_perl: Added pair NAS-Port = 2161115141
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = C8:B5:B7:ED:24:BA
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> C8:B5:B7:ED:24:BA
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 5 for 1 seconds
- Going to the next request
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 55628, id=145, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 55628 - ID: 145
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 56233, id=150, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "DC:85:DE:03:3F:DE"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "DC:85:DE:03:3F:DE"
- NAS-Port = 2161115142
- Acct-Session-Id = "80d00006"
- Framed-IP-Address = 192.168.67.184
- Mikrotik-Host-IP = 192.168.67.184
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00006
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = DC:85:DE:03:3F:DE
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.67.184
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.184
- rlm_perl: Added pair NAS-Port = 2161115142
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = DC:85:DE:03:3F:DE
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> DC:85:DE:03:3F:DE
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 6 for 1 seconds
- Going to the next request
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 58301, id=146, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 58301 - ID: 146
- Sending delayed reject for request 0
- Sending Access-Reject of id 144 to 91.233.220.10 port 47367
- Waking up in 0.5 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 35016, id=147, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 35016 - ID: 147
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 39247, id=148, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 39247 - ID: 148
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 47863, id=149, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 47863 - ID: 149
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 56233, id=150, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 56233 - ID: 150
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 55628, id=145, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 55628 - ID: 145
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 58301, id=146, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 58301 - ID: 146
- Waking up in 0.3 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 41917, id=151, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "28:BE:03:38:5C:90"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "28:BE:03:38:5C:90"
- NAS-Port = 2161115143
- Acct-Session-Id = "80d00007"
- Framed-IP-Address = 192.168.64.156
- Mikrotik-Host-IP = 192.168.64.156
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00007
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 28:BE:03:38:5C:90
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.64.156
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.156
- rlm_perl: Added pair NAS-Port = 2161115143
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 28:BE:03:38:5C:90
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 28:BE:03:38:5C:90
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 7 for 1 seconds
- Going to the next request
- Waking up in 0.2 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 35016, id=147, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 35016 - ID: 147
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 39247, id=148, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 39247 - ID: 148
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 47863, id=149, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 47863 - ID: 149
- Waking up in 0.1 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 56233, id=150, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 56233 - ID: 150
- rad_recv: Access-Request packet from host 91.233.220.10 port 41917, id=151, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 41917 - ID: 151
- Sending delayed reject for request 1
- Sending Access-Reject of id 145 to 91.233.220.10 port 55628
- Sending delayed reject for request 2
- Sending Access-Reject of id 146 to 91.233.220.10 port 58301
- Waking up in 0.1 seconds.
- Sending delayed reject for request 3
- Sending Access-Reject of id 147 to 91.233.220.10 port 35016
- Sending delayed reject for request 4
- Sending Access-Reject of id 148 to 91.233.220.10 port 39247
- Sending delayed reject for request 5
- Sending Access-Reject of id 149 to 91.233.220.10 port 47863
- rad_recv: Access-Request packet from host 91.233.220.10 port 41917, id=151, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 41917 - ID: 151
- Sending delayed reject for request 6
- Sending Access-Reject of id 150 to 91.233.220.10 port 56233
- Waking up in 0.3 seconds.
- Sending delayed reject for request 7
- Sending Access-Reject of id 151 to 91.233.220.10 port 41917
- Waking up in 3.7 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 41102, id=152, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "60:FE:1E:B7:1E:2F"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "60:FE:1E:B7:1E:2F"
- NAS-Port = 2161115144
- Acct-Session-Id = "80d00008"
- Framed-IP-Address = 192.168.77.77
- Mikrotik-Host-IP = 192.168.77.77
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00008
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 60:FE:1E:B7:1E:2F
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.77.77
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.77.77
- rlm_perl: Added pair NAS-Port = 2161115144
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 60:FE:1E:B7:1E:2F
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 60:FE:1E:B7:1E:2F
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 8 for 1 seconds
- Going to the next request
- Waking up in 0.9 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 41102, id=152, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 41102 - ID: 152
- Waking up in 0.7 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 41102, id=152, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 41102 - ID: 152
- Waking up in 0.4 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 58729, id=153, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "D0:C5:F3:6E:14:AA"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "D0:C5:F3:6E:14:AA"
- NAS-Port = 2161115145
- Acct-Session-Id = "80d00009"
- Framed-IP-Address = 192.168.64.218
- Mikrotik-Host-IP = 192.168.64.218
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d00009
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = D0:C5:F3:6E:14:AA
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.64.218
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.218
- rlm_perl: Added pair NAS-Port = 2161115145
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = D0:C5:F3:6E:14:AA
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> D0:C5:F3:6E:14:AA
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 9 for 1 seconds
- Going to the next request
- Waking up in 0.3 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 60067, id=154, length=214
- NAS-Port-Type = Wireless-802.11
- Calling-Station-Id = "40:4D:7F:67:8C:A6"
- Called-Station-Id = "server1"
- NAS-Port-Id = "bridge-internal-clients"
- User-Name = "40:4D:7F:67:8C:A6"
- NAS-Port = 2161115146
- Acct-Session-Id = "80d0000a"
- Framed-IP-Address = 192.168.64.173
- Mikrotik-Host-IP = 192.168.64.173
- WISPr-Location-ID = "2"
- User-Password = "password"
- Service-Type = Login-User
- WISPr-Logoff-URL = "http://192.168.64.1/logout"
- NAS-Identifier = "ph-wifi"
- NAS-IP-Address = 91.233.220.10
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
- ++[pap] = noop
- rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
- rlm_perl: Added pair Acct-Session-Id = 80d0000a
- rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
- rlm_perl: Added pair Called-Station-Id = server1
- rlm_perl: Added pair User-Name = 40:4D:7F:67:8C:A6
- rlm_perl: Added pair NAS-Identifier = ph-wifi
- rlm_perl: Added pair Framed-IP-Address = 192.168.64.173
- rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
- rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
- rlm_perl: Added pair Service-Type = Login-User
- rlm_perl: Added pair User-Password = password
- rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.173
- rlm_perl: Added pair NAS-Port = 2161115146
- rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
- rlm_perl: Added pair WISPr-Location-ID = 2
- rlm_perl: Added pair Calling-Station-Id = 40:4D:7F:67:8C:A6
- ++[perl] = ok
- +} # group authorize = ok
- ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
- Failed to authenticate the user.
- Using Post-Auth-Type REJECT
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group REJECT {
- [attr_filter.access_reject] expand: %{User-Name} -> 40:4D:7F:67:8C:A6
- attr_filter: Matched entry DEFAULT at line 11
- ++[attr_filter.access_reject] = updated
- +} # group REJECT = updated
- Delaying reject of request 10 for 1 seconds
- Going to the next request
- Waking up in 0.2 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 58729, id=153, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 58729 - ID: 153
- Sending delayed reject for request 8
- Sending Access-Reject of id 152 to 91.233.220.10 port 41102
- Waking up in 0.6 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 60067, id=154, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 60067 - ID: 154
- Waking up in 0.6 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 58729, id=153, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 58729 - ID: 153
- Waking up in 0.3 seconds.
- rad_recv: Access-Request packet from host 91.233.220.10 port 60067, id=154, length=214
- Waiting to send Access-Reject to client 91.233.220.0/22 port 60067 - ID: 154
- Waking up in 0.3 seconds.
- Sending delayed reject for request 9
- Sending Access-Reject of id 153 to 91.233.220.10 port 58729
- Sending delayed reject for request 10
- Sending Access-Reject of id 154 to 91.233.220.10 port 60067
- Waking up in 1.8 seconds.
- Cleaning up request 0 ID 144 with timestamp +20
- Waking up in 0.5 seconds.
- Cleaning up request 1 ID 145 with timestamp +21
- Cleaning up request 2 ID 146 with timestamp +21
- Waking up in 0.1 seconds.
- Cleaning up request 3 ID 147 with timestamp +21
- Cleaning up request 4 ID 148 with timestamp +21
- Cleaning up request 5 ID 149 with timestamp +21
- Cleaning up request 6 ID 150 with timestamp +21
- Waking up in 0.3 seconds.
- Cleaning up request 7 ID 151 with timestamp +21
- Waking up in 1.0 seconds.
- Cleaning up request 8 ID 152 with timestamp +22
- Waking up in 0.6 seconds.
- Cleaning up request 9 ID 153 with timestamp +23
- Cleaning up request 10 ID 154 with timestamp +23
- Ready to process requests.
- ^C
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement