Advertisement
Guest User

Untitled

a guest
May 11th, 2017
87
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 46.35 KB | None | 0 0
  1. freeradius: FreeRADIUS Version 2.2.5, for host x86_64-pc-linux-gnu, built on Oct 24 2014 at 02:05:28
  2. Copyright (C) 1999-2013 The FreeRADIUS server project and contributors.
  3. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
  4. PARTICULAR PURPOSE.
  5. You may redistribute copies of FreeRADIUS under the terms of the
  6. GNU General Public License.
  7. For more information about these matters, see the file named COPYRIGHT.
  8. Starting - reading configuration files ...
  9. including configuration file /etc/freeradius/radiusd.conf
  10. including configuration file /etc/freeradius/proxy.conf
  11. including configuration file /etc/freeradius/clients.conf
  12. including files in directory /etc/freeradius/modules/
  13. including configuration file /etc/freeradius/modules/mschap
  14. including configuration file /etc/freeradius/modules/echo
  15. including configuration file /etc/freeradius/modules/rediswho
  16. including configuration file /etc/freeradius/modules/pam
  17. including configuration file /etc/freeradius/modules/acct_unique
  18. including configuration file /etc/freeradius/modules/dynamic_clients
  19. including configuration file /etc/freeradius/modules/expr
  20. including configuration file /etc/freeradius/modules/checkval
  21. including configuration file /etc/freeradius/modules/replicate
  22. including configuration file /etc/freeradius/modules/ippool
  23. including configuration file /etc/freeradius/modules/mac2ip
  24. including configuration file /etc/freeradius/modules/exec
  25. including configuration file /etc/freeradius/modules/opendirectory
  26. including configuration file /etc/freeradius/modules/policy
  27. including configuration file /etc/freeradius/modules/pap
  28. including configuration file /etc/freeradius/modules/soh
  29. including configuration file /etc/freeradius/modules/sql_log
  30. including configuration file /etc/freeradius/modules/files
  31. including configuration file /etc/freeradius/modules/smsotp
  32. including configuration file /etc/freeradius/modules/chap
  33. including configuration file /etc/freeradius/modules/cache
  34. including configuration file /etc/freeradius/modules/attr_filter
  35. including configuration file /etc/freeradius/modules/passwd
  36. including configuration file /etc/freeradius/modules/counter
  37. including configuration file /etc/freeradius/modules/digest
  38. including configuration file /etc/freeradius/modules/mac2vlan
  39. including configuration file /etc/freeradius/modules/redis
  40. including configuration file /etc/freeradius/modules/ldap
  41. including configuration file /etc/freeradius/modules/attr_rewrite
  42. including configuration file /etc/freeradius/modules/dhcp_sqlippool
  43. including configuration file /etc/freeradius/modules/cui
  44. including configuration file /etc/freeradius/modules/wimax
  45. including configuration file /etc/freeradius/modules/inner-eap
  46. including configuration file /etc/freeradius/modules/smbpasswd
  47. including configuration file /etc/freeradius/modules/ntlm_auth
  48. including configuration file /etc/freeradius/modules/otp
  49. including configuration file /etc/freeradius/modules/preprocess
  50. including configuration file /etc/freeradius/modules/radutmp
  51. including configuration file /etc/freeradius/modules/detail.log
  52. including configuration file /etc/freeradius/modules/always
  53. including configuration file /etc/freeradius/modules/krb5
  54. including configuration file /etc/freeradius/modules/linelog
  55. including configuration file /etc/freeradius/modules/etc_group
  56. including configuration file /etc/freeradius/modules/radrelay
  57. including configuration file /etc/freeradius/modules/unix
  58. including configuration file /etc/freeradius/modules/logintime
  59. including configuration file /etc/freeradius/modules/perl
  60. including configuration file /etc/freeradius/modules/sqlcounter_expire_on_login
  61. including configuration file /etc/freeradius/modules/detail.example.com
  62. including configuration file /etc/freeradius/modules/detail
  63. including configuration file /etc/freeradius/modules/expiration
  64. including configuration file /etc/freeradius/modules/sradutmp
  65. including configuration file /etc/freeradius/modules/realm
  66. including configuration file /etc/freeradius/eap.conf
  67. including configuration file /etc/freeradius/policy.conf
  68. including files in directory /etc/freeradius/sites-enabled/
  69. including configuration file /etc/freeradius/sites-enabled/inner-tunnel
  70. including configuration file /etc/freeradius/sites-enabled/default
  71. main {
  72. user = "freerad"
  73. group = "freerad"
  74. allow_core_dumps = no
  75. }
  76. including dictionary file /etc/freeradius/dictionary
  77. main {
  78. name = "freeradius"
  79. prefix = "/usr"
  80. localstatedir = "/var"
  81. sbindir = "/usr/sbin"
  82. logdir = "/var/log/freeradius"
  83. run_dir = "/var/run/freeradius"
  84. libdir = "/usr/lib/freeradius"
  85. radacctdir = "/var/log/freeradius/radacct"
  86. hostname_lookups = no
  87. max_request_time = 30
  88. cleanup_delay = 5
  89. max_requests = 1024
  90. pidfile = "/var/run/freeradius/freeradius.pid"
  91. checkrad = "/usr/sbin/checkrad"
  92. debug_level = 0
  93. proxy_requests = yes
  94. log {
  95. stripped_names = no
  96. auth = no
  97. auth_badpass = no
  98. auth_goodpass = no
  99. }
  100. security {
  101. max_attributes = 200
  102. reject_delay = 1
  103. status_server = yes
  104. allow_vulnerable_openssl = no
  105. }
  106. }
  107. radiusd: #### Loading Realms and Home Servers ####
  108. proxy server {
  109. retry_delay = 5
  110. retry_count = 3
  111. default_fallback = no
  112. dead_time = 120
  113. wake_all_if_all_dead = no
  114. }
  115. home_server localhost {
  116. ipaddr = 127.0.0.1
  117. port = 1812
  118. type = "auth"
  119. secret = "testing123"
  120. response_window = 20
  121. max_outstanding = 65536
  122. require_message_authenticator = yes
  123. zombie_period = 40
  124. status_check = "status-server"
  125. ping_interval = 30
  126. check_interval = 30
  127. num_answers_to_alive = 3
  128. num_pings_to_alive = 3
  129. revive_interval = 120
  130. status_check_timeout = 4
  131. coa {
  132. irt = 2
  133. mrt = 16
  134. mrc = 5
  135. mrd = 30
  136. }
  137. }
  138. home_server_pool my_auth_failover {
  139. type = fail-over
  140. home_server = localhost
  141. }
  142. realm example.com {
  143. auth_pool = my_auth_failover
  144. }
  145. realm LOCAL {
  146. }
  147. radiusd: #### Loading Clients ####
  148. client 172.27.0.0/16 {
  149. require_message_authenticator = no
  150. secret = "wnam_radius"
  151. }
  152. client 10.0.0.0/8 {
  153. require_message_authenticator = no
  154. secret = "1iyufjno"
  155. }
  156. client 91.233.220.0/22 {
  157. require_message_authenticator = no
  158. secret = "1iyufjno"
  159. }
  160. client 91.197.104.0/22 {
  161. require_message_authenticator = no
  162. secret = "1iyufjno"
  163. }
  164. client 127.0.0.1 {
  165. require_message_authenticator = no
  166. secret = "secret"
  167. }
  168. radiusd: #### Instantiating modules ####
  169. instantiate {
  170. Module: Linked to module rlm_exec
  171. Module: Instantiating module "exec" from file /etc/freeradius/modules/exec
  172. exec {
  173. wait = no
  174. input_pairs = "request"
  175. shell_escape = yes
  176. timeout = 10
  177. }
  178. Module: Linked to module rlm_expr
  179. Module: Instantiating module "expr" from file /etc/freeradius/modules/expr
  180. Module: Linked to module rlm_expiration
  181. Module: Instantiating module "expiration" from file /etc/freeradius/modules/expiration
  182. expiration {
  183. reply-message = "Password Has Expired "
  184. }
  185. Module: Linked to module rlm_logintime
  186. Module: Instantiating module "logintime" from file /etc/freeradius/modules/logintime
  187. logintime {
  188. reply-message = "You are calling outside your allowed timespan "
  189. minimum-timeout = 60
  190. }
  191. }
  192. radiusd: #### Loading Virtual Servers ####
  193. server { # from file ?
  194. modules {
  195. Module: Creating Post-Auth-Type = REJECT
  196. Module: Checking authenticate {...} for more modules to load
  197. Module: Linked to module rlm_pap
  198. Module: Instantiating module "pap" from file /etc/freeradius/modules/pap
  199. pap {
  200. encryption_scheme = "auto"
  201. auto_header = no
  202. }
  203. Module: Checking authorize {...} for more modules to load
  204. Module: Linked to module rlm_preprocess
  205. Module: Instantiating module "preprocess" from file /etc/freeradius/modules/preprocess
  206. preprocess {
  207. huntgroups = "/etc/freeradius/huntgroups"
  208. hints = "/etc/freeradius/hints"
  209. with_ascend_hack = no
  210. ascend_channels_per_line = 23
  211. with_ntdomain_hack = no
  212. with_specialix_jetstream_hack = no
  213. with_cisco_vsa_hack = no
  214. with_alvarion_vsa_hack = no
  215. }
  216. reading pairlist file /etc/freeradius/huntgroups
  217. reading pairlist file /etc/freeradius/hints
  218. Module: Linked to module rlm_perl
  219. Module: Instantiating module "perl" from file /etc/freeradius/modules/perl
  220. perl {
  221. module = "/etc/freeradius/wnam-freeradius-bridge.pl"
  222. func_authorize = "authorize"
  223. func_authenticate = "authenticate"
  224. func_accounting = "accounting"
  225. func_preacct = "preacct"
  226. func_checksimul = "checksimul"
  227. func_detach = "detach"
  228. func_xlat = "xlat"
  229. func_pre_proxy = "pre_proxy"
  230. func_post_proxy = "post_proxy"
  231. func_post_auth = "post_auth"
  232. func_recv_coa = "recv_coa"
  233. func_send_coa = "send_coa"
  234. }
  235. Module: Checking preacct {...} for more modules to load
  236. Module: Linked to module rlm_acct_unique
  237. Module: Instantiating module "acct_unique" from file /etc/freeradius/modules/acct_unique
  238. acct_unique {
  239. key = "User-Name, Acct-Session-Id, NAS-IP-Address, NAS-Identifier, NAS-Port"
  240. }
  241. Module: Checking accounting {...} for more modules to load
  242. Module: Linked to module rlm_radutmp
  243. Module: Instantiating module "radutmp" from file /etc/freeradius/modules/radutmp
  244. radutmp {
  245. filename = "/var/log/freeradius/radutmp"
  246. username = "%{User-Name}"
  247. case_sensitive = yes
  248. check_with_nas = yes
  249. perm = 384
  250. callerid = yes
  251. }
  252. Module: Linked to module rlm_attr_filter
  253. Module: Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/modules/attr_filter
  254. attr_filter attr_filter.accounting_response {
  255. attrsfile = "/etc/freeradius/attrs.accounting_response"
  256. key = "%{User-Name}"
  257. relaxed = no
  258. }
  259. reading pairlist file /etc/freeradius/attrs.accounting_response
  260. Module: Checking session {...} for more modules to load
  261. Module: Checking post-auth {...} for more modules to load
  262. Module: Instantiating module "attr_filter.access_reject" from file /etc/freeradius/modules/attr_filter
  263. attr_filter attr_filter.access_reject {
  264. attrsfile = "/etc/freeradius/attrs.access_reject"
  265. key = "%{User-Name}"
  266. relaxed = no
  267. }
  268. reading pairlist file /etc/freeradius/attrs.access_reject
  269. } # modules
  270. } # server
  271. server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel
  272. modules {
  273. Module: Checking authenticate {...} for more modules to load
  274. Module: Linked to module rlm_chap
  275. Module: Instantiating module "chap" from file /etc/freeradius/modules/chap
  276. Module: Linked to module rlm_mschap
  277. Module: Instantiating module "mschap" from file /etc/freeradius/modules/mschap
  278. mschap {
  279. use_mppe = yes
  280. require_encryption = no
  281. require_strong = no
  282. with_ntdomain_hack = no
  283. allow_retry = yes
  284. }
  285. Module: Linked to module rlm_unix
  286. Module: Instantiating module "unix" from file /etc/freeradius/modules/unix
  287. unix {
  288. radwtmp = "/var/log/freeradius/radwtmp"
  289. }
  290. Module: Linked to module rlm_eap
  291. Module: Instantiating module "eap" from file /etc/freeradius/eap.conf
  292. eap {
  293. default_eap_type = "md5"
  294. timer_expire = 60
  295. ignore_unknown_eap_types = no
  296. cisco_accounting_username_bug = no
  297. max_sessions = 1024
  298. }
  299. Module: Linked to sub-module rlm_eap_md5
  300. Module: Instantiating eap-md5
  301. Module: Linked to sub-module rlm_eap_leap
  302. Module: Instantiating eap-leap
  303. Module: Linked to sub-module rlm_eap_gtc
  304. Module: Instantiating eap-gtc
  305. gtc {
  306. challenge = "Password: "
  307. auth_type = "PAP"
  308. }
  309. Module: Linked to sub-module rlm_eap_tls
  310. Module: Instantiating eap-tls
  311. tls {
  312. rsa_key_exchange = no
  313. dh_key_exchange = yes
  314. rsa_key_length = 512
  315. dh_key_length = 512
  316. verify_depth = 0
  317. CA_path = "/etc/freeradius/certs"
  318. pem_file_type = yes
  319. private_key_file = "/etc/freeradius/certs/server.key"
  320. certificate_file = "/etc/freeradius/certs/server.pem"
  321. CA_file = "/etc/freeradius/certs/ca.pem"
  322. private_key_password = "whatever"
  323. dh_file = "/etc/freeradius/certs/dh"
  324. random_file = "/dev/urandom"
  325. fragment_size = 1024
  326. include_length = yes
  327. check_crl = no
  328. cipher_list = "DEFAULT"
  329. make_cert_command = "/etc/freeradius/certs/bootstrap"
  330. ecdh_curve = "prime256v1"
  331. cache {
  332. enable = no
  333. lifetime = 24
  334. max_entries = 255
  335. }
  336. verify {
  337. }
  338. ocsp {
  339. enable = no
  340. override_cert_url = yes
  341. url = "http://127.0.0.1/ocsp/"
  342. use_nonce = yes
  343. timeout = 0
  344. softfail = no
  345. }
  346. }
  347. Module: Linked to sub-module rlm_eap_ttls
  348. Module: Instantiating eap-ttls
  349. ttls {
  350. default_eap_type = "md5"
  351. copy_request_to_tunnel = no
  352. use_tunneled_reply = no
  353. virtual_server = "inner-tunnel"
  354. include_length = yes
  355. }
  356. Module: Linked to sub-module rlm_eap_peap
  357. Module: Instantiating eap-peap
  358. peap {
  359. default_eap_type = "mschapv2"
  360. copy_request_to_tunnel = no
  361. use_tunneled_reply = no
  362. proxy_tunneled_request_as_eap = yes
  363. virtual_server = "inner-tunnel"
  364. soh = no
  365. }
  366. Module: Linked to sub-module rlm_eap_mschapv2
  367. Module: Instantiating eap-mschapv2
  368. mschapv2 {
  369. with_ntdomain_hack = no
  370. send_error = no
  371. }
  372. Module: Checking authorize {...} for more modules to load
  373. Module: Linked to module rlm_realm
  374. Module: Instantiating module "suffix" from file /etc/freeradius/modules/realm
  375. realm suffix {
  376. format = "suffix"
  377. delimiter = "@"
  378. ignore_default = no
  379. ignore_null = no
  380. }
  381. Module: Linked to module rlm_files
  382. Module: Instantiating module "files" from file /etc/freeradius/modules/files
  383. files {
  384. usersfile = "/etc/freeradius/users"
  385. acctusersfile = "/etc/freeradius/acct_users"
  386. preproxy_usersfile = "/etc/freeradius/preproxy_users"
  387. compat = "no"
  388. }
  389. reading pairlist file /etc/freeradius/users
  390. reading pairlist file /etc/freeradius/acct_users
  391. reading pairlist file /etc/freeradius/preproxy_users
  392. Module: Checking session {...} for more modules to load
  393. Module: Checking post-proxy {...} for more modules to load
  394. Module: Checking post-auth {...} for more modules to load
  395. } # modules
  396. } # server
  397. radiusd: #### Opening IP addresses and Ports ####
  398. listen {
  399. type = "auth"
  400. ipaddr = *
  401. port = 0
  402. }
  403. listen {
  404. type = "acct"
  405. ipaddr = *
  406. port = 0
  407. }
  408. listen {
  409. type = "auth"
  410. ipaddr = 127.0.0.1
  411. port = 18120
  412. }
  413. ... adding new socket proxy address * port 39071
  414. Listening on authentication address * port 1812
  415. Listening on accounting address * port 1813
  416. Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel
  417. Listening on proxy address * port 1814
  418. Ready to process requests.
  419. rad_recv: Access-Request packet from host 91.233.220.10 port 47367, id=144, length=214
  420. NAS-Port-Type = Wireless-802.11
  421. Calling-Station-Id = "70:14:A6:5C:2C:81"
  422. Called-Station-Id = "server1"
  423. NAS-Port-Id = "bridge-internal-clients"
  424. User-Name = "70:14:A6:5C:2C:81"
  425. NAS-Port = 2161115136
  426. Acct-Session-Id = "80d00000"
  427. Framed-IP-Address = 192.168.64.184
  428. Mikrotik-Host-IP = 192.168.64.184
  429. WISPr-Location-ID = "2"
  430. User-Password = "password"
  431. Service-Type = Login-User
  432. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  433. NAS-Identifier = "ph-wifi"
  434. NAS-IP-Address = 91.233.220.10
  435. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  436. +group authorize {
  437. ++[preprocess] = ok
  438. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  439. ++[pap] = noop
  440. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  441. rlm_perl: Added pair Acct-Session-Id = 80d00000
  442. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  443. rlm_perl: Added pair Called-Station-Id = server1
  444. rlm_perl: Added pair User-Name = 70:14:A6:5C:2C:81
  445. rlm_perl: Added pair NAS-Identifier = ph-wifi
  446. rlm_perl: Added pair Framed-IP-Address = 192.168.64.184
  447. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  448. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  449. rlm_perl: Added pair Service-Type = Login-User
  450. rlm_perl: Added pair User-Password = password
  451. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.184
  452. rlm_perl: Added pair NAS-Port = 2161115136
  453. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  454. rlm_perl: Added pair WISPr-Location-ID = 2
  455. rlm_perl: Added pair Calling-Station-Id = 70:14:A6:5C:2C:81
  456. ++[perl] = ok
  457. +} # group authorize = ok
  458. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  459. Failed to authenticate the user.
  460. Using Post-Auth-Type REJECT
  461. # Executing group from file /etc/freeradius/sites-enabled/default
  462. +group REJECT {
  463. [attr_filter.access_reject] expand: %{User-Name} -> 70:14:A6:5C:2C:81
  464. attr_filter: Matched entry DEFAULT at line 11
  465. ++[attr_filter.access_reject] = updated
  466. +} # group REJECT = updated
  467. Delaying reject of request 0 for 1 seconds
  468. Going to the next request
  469. Waking up in 0.9 seconds.
  470. rad_recv: Access-Request packet from host 91.233.220.10 port 47367, id=144, length=214
  471. Waiting to send Access-Reject to client 91.233.220.0/22 port 47367 - ID: 144
  472. Waking up in 0.6 seconds.
  473. rad_recv: Access-Request packet from host 91.233.220.10 port 55628, id=145, length=214
  474. NAS-Port-Type = Wireless-802.11
  475. Calling-Station-Id = "00:13:E8:9C:6B:D5"
  476. Called-Station-Id = "server1"
  477. NAS-Port-Id = "bridge-internal-clients"
  478. User-Name = "00:13:E8:9C:6B:D5"
  479. NAS-Port = 2161115137
  480. Acct-Session-Id = "80d00001"
  481. Framed-IP-Address = 192.168.91.120
  482. Mikrotik-Host-IP = 192.168.91.120
  483. WISPr-Location-ID = "2"
  484. User-Password = "password"
  485. Service-Type = Login-User
  486. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  487. NAS-Identifier = "ph-wifi"
  488. NAS-IP-Address = 91.233.220.10
  489. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  490. +group authorize {
  491. ++[preprocess] = ok
  492. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  493. ++[pap] = noop
  494. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  495. rlm_perl: Added pair Acct-Session-Id = 80d00001
  496. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  497. rlm_perl: Added pair Called-Station-Id = server1
  498. rlm_perl: Added pair User-Name = 00:13:E8:9C:6B:D5
  499. rlm_perl: Added pair NAS-Identifier = ph-wifi
  500. rlm_perl: Added pair Framed-IP-Address = 192.168.91.120
  501. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  502. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  503. rlm_perl: Added pair Service-Type = Login-User
  504. rlm_perl: Added pair User-Password = password
  505. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.91.120
  506. rlm_perl: Added pair NAS-Port = 2161115137
  507. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  508. rlm_perl: Added pair WISPr-Location-ID = 2
  509. rlm_perl: Added pair Calling-Station-Id = 00:13:E8:9C:6B:D5
  510. ++[perl] = ok
  511. +} # group authorize = ok
  512. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  513. Failed to authenticate the user.
  514. Using Post-Auth-Type REJECT
  515. # Executing group from file /etc/freeradius/sites-enabled/default
  516. +group REJECT {
  517. [attr_filter.access_reject] expand: %{User-Name} -> 00:13:E8:9C:6B:D5
  518. attr_filter: Matched entry DEFAULT at line 11
  519. ++[attr_filter.access_reject] = updated
  520. +} # group REJECT = updated
  521. Delaying reject of request 1 for 1 seconds
  522. Going to the next request
  523. Waking up in 0.4 seconds.
  524. rad_recv: Access-Request packet from host 91.233.220.10 port 47367, id=144, length=214
  525. Waiting to send Access-Reject to client 91.233.220.0/22 port 47367 - ID: 144
  526. Waking up in 0.3 seconds.
  527. rad_recv: Access-Request packet from host 91.233.220.10 port 58301, id=146, length=214
  528. NAS-Port-Type = Wireless-802.11
  529. Calling-Station-Id = "C4:46:19:88:81:8A"
  530. Called-Station-Id = "server1"
  531. NAS-Port-Id = "bridge-internal-clients"
  532. User-Name = "C4:46:19:88:81:8A"
  533. NAS-Port = 2161115138
  534. Acct-Session-Id = "80d00002"
  535. Framed-IP-Address = 192.168.67.165
  536. Mikrotik-Host-IP = 192.168.67.165
  537. WISPr-Location-ID = "2"
  538. User-Password = "password"
  539. Service-Type = Login-User
  540. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  541. NAS-Identifier = "ph-wifi"
  542. NAS-IP-Address = 91.233.220.10
  543. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  544. +group authorize {
  545. ++[preprocess] = ok
  546. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  547. ++[pap] = noop
  548. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  549. rlm_perl: Added pair Acct-Session-Id = 80d00002
  550. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  551. rlm_perl: Added pair Called-Station-Id = server1
  552. rlm_perl: Added pair User-Name = C4:46:19:88:81:8A
  553. rlm_perl: Added pair NAS-Identifier = ph-wifi
  554. rlm_perl: Added pair Framed-IP-Address = 192.168.67.165
  555. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  556. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  557. rlm_perl: Added pair Service-Type = Login-User
  558. rlm_perl: Added pair User-Password = password
  559. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.165
  560. rlm_perl: Added pair NAS-Port = 2161115138
  561. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  562. rlm_perl: Added pair WISPr-Location-ID = 2
  563. rlm_perl: Added pair Calling-Station-Id = C4:46:19:88:81:8A
  564. ++[perl] = ok
  565. +} # group authorize = ok
  566. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  567. Failed to authenticate the user.
  568. Using Post-Auth-Type REJECT
  569. # Executing group from file /etc/freeradius/sites-enabled/default
  570. +group REJECT {
  571. [attr_filter.access_reject] expand: %{User-Name} -> C4:46:19:88:81:8A
  572. attr_filter: Matched entry DEFAULT at line 11
  573. ++[attr_filter.access_reject] = updated
  574. +} # group REJECT = updated
  575. Delaying reject of request 2 for 1 seconds
  576. Going to the next request
  577. Waking up in 0.3 seconds.
  578. rad_recv: Access-Request packet from host 91.233.220.10 port 35016, id=147, length=214
  579. NAS-Port-Type = Wireless-802.11
  580. Calling-Station-Id = "34:8A:7B:17:EC:FE"
  581. Called-Station-Id = "server1"
  582. NAS-Port-Id = "bridge-internal-clients"
  583. User-Name = "34:8A:7B:17:EC:FE"
  584. NAS-Port = 2161115139
  585. Acct-Session-Id = "80d00003"
  586. Framed-IP-Address = 192.168.67.214
  587. Mikrotik-Host-IP = 192.168.67.214
  588. WISPr-Location-ID = "2"
  589. User-Password = "password"
  590. Service-Type = Login-User
  591. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  592. NAS-Identifier = "ph-wifi"
  593. NAS-IP-Address = 91.233.220.10
  594. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  595. +group authorize {
  596. ++[preprocess] = ok
  597. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  598. ++[pap] = noop
  599. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  600. rlm_perl: Added pair Acct-Session-Id = 80d00003
  601. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  602. rlm_perl: Added pair Called-Station-Id = server1
  603. rlm_perl: Added pair User-Name = 34:8A:7B:17:EC:FE
  604. rlm_perl: Added pair NAS-Identifier = ph-wifi
  605. rlm_perl: Added pair Framed-IP-Address = 192.168.67.214
  606. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  607. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  608. rlm_perl: Added pair Service-Type = Login-User
  609. rlm_perl: Added pair User-Password = password
  610. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.214
  611. rlm_perl: Added pair NAS-Port = 2161115139
  612. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  613. rlm_perl: Added pair WISPr-Location-ID = 2
  614. rlm_perl: Added pair Calling-Station-Id = 34:8A:7B:17:EC:FE
  615. ++[perl] = ok
  616. +} # group authorize = ok
  617. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  618. Failed to authenticate the user.
  619. Using Post-Auth-Type REJECT
  620. # Executing group from file /etc/freeradius/sites-enabled/default
  621. +group REJECT {
  622. [attr_filter.access_reject] expand: %{User-Name} -> 34:8A:7B:17:EC:FE
  623. attr_filter: Matched entry DEFAULT at line 11
  624. ++[attr_filter.access_reject] = updated
  625. +} # group REJECT = updated
  626. Delaying reject of request 3 for 1 seconds
  627. Going to the next request
  628. Waking up in 0.1 seconds.
  629. rad_recv: Access-Request packet from host 91.233.220.10 port 39247, id=148, length=214
  630. NAS-Port-Type = Wireless-802.11
  631. Calling-Station-Id = "00:29:99:10:22:75"
  632. Called-Station-Id = "server1"
  633. NAS-Port-Id = "bridge-internal-clients"
  634. User-Name = "00:29:99:10:22:75"
  635. NAS-Port = 2161115140
  636. Acct-Session-Id = "80d00004"
  637. Framed-IP-Address = 192.168.64.230
  638. Mikrotik-Host-IP = 192.168.64.230
  639. WISPr-Location-ID = "2"
  640. User-Password = "password"
  641. Service-Type = Login-User
  642. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  643. NAS-Identifier = "ph-wifi"
  644. NAS-IP-Address = 91.233.220.10
  645. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  646. +group authorize {
  647. ++[preprocess] = ok
  648. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  649. ++[pap] = noop
  650. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  651. rlm_perl: Added pair Acct-Session-Id = 80d00004
  652. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  653. rlm_perl: Added pair Called-Station-Id = server1
  654. rlm_perl: Added pair User-Name = 00:29:99:10:22:75
  655. rlm_perl: Added pair NAS-Identifier = ph-wifi
  656. rlm_perl: Added pair Framed-IP-Address = 192.168.64.230
  657. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  658. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  659. rlm_perl: Added pair Service-Type = Login-User
  660. rlm_perl: Added pair User-Password = password
  661. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.230
  662. rlm_perl: Added pair NAS-Port = 2161115140
  663. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  664. rlm_perl: Added pair WISPr-Location-ID = 2
  665. rlm_perl: Added pair Calling-Station-Id = 00:29:99:10:22:75
  666. ++[perl] = ok
  667. +} # group authorize = ok
  668. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  669. Failed to authenticate the user.
  670. Using Post-Auth-Type REJECT
  671. # Executing group from file /etc/freeradius/sites-enabled/default
  672. +group REJECT {
  673. [attr_filter.access_reject] expand: %{User-Name} -> 00:29:99:10:22:75
  674. attr_filter: Matched entry DEFAULT at line 11
  675. ++[attr_filter.access_reject] = updated
  676. +} # group REJECT = updated
  677. Delaying reject of request 4 for 1 seconds
  678. Going to the next request
  679. Waking up in 0.1 seconds.
  680. rad_recv: Access-Request packet from host 91.233.220.10 port 47863, id=149, length=214
  681. NAS-Port-Type = Wireless-802.11
  682. Calling-Station-Id = "C8:B5:B7:ED:24:BA"
  683. Called-Station-Id = "server1"
  684. NAS-Port-Id = "bridge-internal-clients"
  685. User-Name = "C8:B5:B7:ED:24:BA"
  686. NAS-Port = 2161115141
  687. Acct-Session-Id = "80d00005"
  688. Framed-IP-Address = 192.168.67.157
  689. Mikrotik-Host-IP = 192.168.67.157
  690. WISPr-Location-ID = "2"
  691. User-Password = "password"
  692. Service-Type = Login-User
  693. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  694. NAS-Identifier = "ph-wifi"
  695. NAS-IP-Address = 91.233.220.10
  696. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  697. +group authorize {
  698. ++[preprocess] = ok
  699. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  700. ++[pap] = noop
  701. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  702. rlm_perl: Added pair Acct-Session-Id = 80d00005
  703. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  704. rlm_perl: Added pair Called-Station-Id = server1
  705. rlm_perl: Added pair User-Name = C8:B5:B7:ED:24:BA
  706. rlm_perl: Added pair NAS-Identifier = ph-wifi
  707. rlm_perl: Added pair Framed-IP-Address = 192.168.67.157
  708. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  709. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  710. rlm_perl: Added pair Service-Type = Login-User
  711. rlm_perl: Added pair User-Password = password
  712. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.157
  713. rlm_perl: Added pair NAS-Port = 2161115141
  714. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  715. rlm_perl: Added pair WISPr-Location-ID = 2
  716. rlm_perl: Added pair Calling-Station-Id = C8:B5:B7:ED:24:BA
  717. ++[perl] = ok
  718. +} # group authorize = ok
  719. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  720. Failed to authenticate the user.
  721. Using Post-Auth-Type REJECT
  722. # Executing group from file /etc/freeradius/sites-enabled/default
  723. +group REJECT {
  724. [attr_filter.access_reject] expand: %{User-Name} -> C8:B5:B7:ED:24:BA
  725. attr_filter: Matched entry DEFAULT at line 11
  726. ++[attr_filter.access_reject] = updated
  727. +} # group REJECT = updated
  728. Delaying reject of request 5 for 1 seconds
  729. Going to the next request
  730. Waking up in 0.1 seconds.
  731. rad_recv: Access-Request packet from host 91.233.220.10 port 55628, id=145, length=214
  732. Waiting to send Access-Reject to client 91.233.220.0/22 port 55628 - ID: 145
  733. Waking up in 0.1 seconds.
  734. rad_recv: Access-Request packet from host 91.233.220.10 port 56233, id=150, length=214
  735. NAS-Port-Type = Wireless-802.11
  736. Calling-Station-Id = "DC:85:DE:03:3F:DE"
  737. Called-Station-Id = "server1"
  738. NAS-Port-Id = "bridge-internal-clients"
  739. User-Name = "DC:85:DE:03:3F:DE"
  740. NAS-Port = 2161115142
  741. Acct-Session-Id = "80d00006"
  742. Framed-IP-Address = 192.168.67.184
  743. Mikrotik-Host-IP = 192.168.67.184
  744. WISPr-Location-ID = "2"
  745. User-Password = "password"
  746. Service-Type = Login-User
  747. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  748. NAS-Identifier = "ph-wifi"
  749. NAS-IP-Address = 91.233.220.10
  750. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  751. +group authorize {
  752. ++[preprocess] = ok
  753. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  754. ++[pap] = noop
  755. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  756. rlm_perl: Added pair Acct-Session-Id = 80d00006
  757. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  758. rlm_perl: Added pair Called-Station-Id = server1
  759. rlm_perl: Added pair User-Name = DC:85:DE:03:3F:DE
  760. rlm_perl: Added pair NAS-Identifier = ph-wifi
  761. rlm_perl: Added pair Framed-IP-Address = 192.168.67.184
  762. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  763. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  764. rlm_perl: Added pair Service-Type = Login-User
  765. rlm_perl: Added pair User-Password = password
  766. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.67.184
  767. rlm_perl: Added pair NAS-Port = 2161115142
  768. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  769. rlm_perl: Added pair WISPr-Location-ID = 2
  770. rlm_perl: Added pair Calling-Station-Id = DC:85:DE:03:3F:DE
  771. ++[perl] = ok
  772. +} # group authorize = ok
  773. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  774. Failed to authenticate the user.
  775. Using Post-Auth-Type REJECT
  776. # Executing group from file /etc/freeradius/sites-enabled/default
  777. +group REJECT {
  778. [attr_filter.access_reject] expand: %{User-Name} -> DC:85:DE:03:3F:DE
  779. attr_filter: Matched entry DEFAULT at line 11
  780. ++[attr_filter.access_reject] = updated
  781. +} # group REJECT = updated
  782. Delaying reject of request 6 for 1 seconds
  783. Going to the next request
  784. Waking up in 0.1 seconds.
  785. rad_recv: Access-Request packet from host 91.233.220.10 port 58301, id=146, length=214
  786. Waiting to send Access-Reject to client 91.233.220.0/22 port 58301 - ID: 146
  787. Sending delayed reject for request 0
  788. Sending Access-Reject of id 144 to 91.233.220.10 port 47367
  789. Waking up in 0.5 seconds.
  790. rad_recv: Access-Request packet from host 91.233.220.10 port 35016, id=147, length=214
  791. Waiting to send Access-Reject to client 91.233.220.0/22 port 35016 - ID: 147
  792. Waking up in 0.4 seconds.
  793. rad_recv: Access-Request packet from host 91.233.220.10 port 39247, id=148, length=214
  794. Waiting to send Access-Reject to client 91.233.220.0/22 port 39247 - ID: 148
  795. Waking up in 0.4 seconds.
  796. rad_recv: Access-Request packet from host 91.233.220.10 port 47863, id=149, length=214
  797. Waiting to send Access-Reject to client 91.233.220.0/22 port 47863 - ID: 149
  798. Waking up in 0.4 seconds.
  799. rad_recv: Access-Request packet from host 91.233.220.10 port 56233, id=150, length=214
  800. Waiting to send Access-Reject to client 91.233.220.0/22 port 56233 - ID: 150
  801. Waking up in 0.4 seconds.
  802. rad_recv: Access-Request packet from host 91.233.220.10 port 55628, id=145, length=214
  803. Waiting to send Access-Reject to client 91.233.220.0/22 port 55628 - ID: 145
  804. Waking up in 0.4 seconds.
  805. rad_recv: Access-Request packet from host 91.233.220.10 port 58301, id=146, length=214
  806. Waiting to send Access-Reject to client 91.233.220.0/22 port 58301 - ID: 146
  807. Waking up in 0.3 seconds.
  808. rad_recv: Access-Request packet from host 91.233.220.10 port 41917, id=151, length=214
  809. NAS-Port-Type = Wireless-802.11
  810. Calling-Station-Id = "28:BE:03:38:5C:90"
  811. Called-Station-Id = "server1"
  812. NAS-Port-Id = "bridge-internal-clients"
  813. User-Name = "28:BE:03:38:5C:90"
  814. NAS-Port = 2161115143
  815. Acct-Session-Id = "80d00007"
  816. Framed-IP-Address = 192.168.64.156
  817. Mikrotik-Host-IP = 192.168.64.156
  818. WISPr-Location-ID = "2"
  819. User-Password = "password"
  820. Service-Type = Login-User
  821. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  822. NAS-Identifier = "ph-wifi"
  823. NAS-IP-Address = 91.233.220.10
  824. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  825. +group authorize {
  826. ++[preprocess] = ok
  827. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  828. ++[pap] = noop
  829. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  830. rlm_perl: Added pair Acct-Session-Id = 80d00007
  831. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  832. rlm_perl: Added pair Called-Station-Id = server1
  833. rlm_perl: Added pair User-Name = 28:BE:03:38:5C:90
  834. rlm_perl: Added pair NAS-Identifier = ph-wifi
  835. rlm_perl: Added pair Framed-IP-Address = 192.168.64.156
  836. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  837. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  838. rlm_perl: Added pair Service-Type = Login-User
  839. rlm_perl: Added pair User-Password = password
  840. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.156
  841. rlm_perl: Added pair NAS-Port = 2161115143
  842. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  843. rlm_perl: Added pair WISPr-Location-ID = 2
  844. rlm_perl: Added pair Calling-Station-Id = 28:BE:03:38:5C:90
  845. ++[perl] = ok
  846. +} # group authorize = ok
  847. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  848. Failed to authenticate the user.
  849. Using Post-Auth-Type REJECT
  850. # Executing group from file /etc/freeradius/sites-enabled/default
  851. +group REJECT {
  852. [attr_filter.access_reject] expand: %{User-Name} -> 28:BE:03:38:5C:90
  853. attr_filter: Matched entry DEFAULT at line 11
  854. ++[attr_filter.access_reject] = updated
  855. +} # group REJECT = updated
  856. Delaying reject of request 7 for 1 seconds
  857. Going to the next request
  858. Waking up in 0.2 seconds.
  859. rad_recv: Access-Request packet from host 91.233.220.10 port 35016, id=147, length=214
  860. Waiting to send Access-Reject to client 91.233.220.0/22 port 35016 - ID: 147
  861. Waking up in 0.1 seconds.
  862. rad_recv: Access-Request packet from host 91.233.220.10 port 39247, id=148, length=214
  863. Waiting to send Access-Reject to client 91.233.220.0/22 port 39247 - ID: 148
  864. Waking up in 0.1 seconds.
  865. rad_recv: Access-Request packet from host 91.233.220.10 port 47863, id=149, length=214
  866. Waiting to send Access-Reject to client 91.233.220.0/22 port 47863 - ID: 149
  867. Waking up in 0.1 seconds.
  868. rad_recv: Access-Request packet from host 91.233.220.10 port 56233, id=150, length=214
  869. Waiting to send Access-Reject to client 91.233.220.0/22 port 56233 - ID: 150
  870. rad_recv: Access-Request packet from host 91.233.220.10 port 41917, id=151, length=214
  871. Waiting to send Access-Reject to client 91.233.220.0/22 port 41917 - ID: 151
  872. Sending delayed reject for request 1
  873. Sending Access-Reject of id 145 to 91.233.220.10 port 55628
  874. Sending delayed reject for request 2
  875. Sending Access-Reject of id 146 to 91.233.220.10 port 58301
  876. Waking up in 0.1 seconds.
  877. Sending delayed reject for request 3
  878. Sending Access-Reject of id 147 to 91.233.220.10 port 35016
  879. Sending delayed reject for request 4
  880. Sending Access-Reject of id 148 to 91.233.220.10 port 39247
  881. Sending delayed reject for request 5
  882. Sending Access-Reject of id 149 to 91.233.220.10 port 47863
  883. rad_recv: Access-Request packet from host 91.233.220.10 port 41917, id=151, length=214
  884. Waiting to send Access-Reject to client 91.233.220.0/22 port 41917 - ID: 151
  885. Sending delayed reject for request 6
  886. Sending Access-Reject of id 150 to 91.233.220.10 port 56233
  887. Waking up in 0.3 seconds.
  888. Sending delayed reject for request 7
  889. Sending Access-Reject of id 151 to 91.233.220.10 port 41917
  890. Waking up in 3.7 seconds.
  891. rad_recv: Access-Request packet from host 91.233.220.10 port 41102, id=152, length=214
  892. NAS-Port-Type = Wireless-802.11
  893. Calling-Station-Id = "60:FE:1E:B7:1E:2F"
  894. Called-Station-Id = "server1"
  895. NAS-Port-Id = "bridge-internal-clients"
  896. User-Name = "60:FE:1E:B7:1E:2F"
  897. NAS-Port = 2161115144
  898. Acct-Session-Id = "80d00008"
  899. Framed-IP-Address = 192.168.77.77
  900. Mikrotik-Host-IP = 192.168.77.77
  901. WISPr-Location-ID = "2"
  902. User-Password = "password"
  903. Service-Type = Login-User
  904. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  905. NAS-Identifier = "ph-wifi"
  906. NAS-IP-Address = 91.233.220.10
  907. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  908. +group authorize {
  909. ++[preprocess] = ok
  910. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  911. ++[pap] = noop
  912. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  913. rlm_perl: Added pair Acct-Session-Id = 80d00008
  914. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  915. rlm_perl: Added pair Called-Station-Id = server1
  916. rlm_perl: Added pair User-Name = 60:FE:1E:B7:1E:2F
  917. rlm_perl: Added pair NAS-Identifier = ph-wifi
  918. rlm_perl: Added pair Framed-IP-Address = 192.168.77.77
  919. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  920. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  921. rlm_perl: Added pair Service-Type = Login-User
  922. rlm_perl: Added pair User-Password = password
  923. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.77.77
  924. rlm_perl: Added pair NAS-Port = 2161115144
  925. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  926. rlm_perl: Added pair WISPr-Location-ID = 2
  927. rlm_perl: Added pair Calling-Station-Id = 60:FE:1E:B7:1E:2F
  928. ++[perl] = ok
  929. +} # group authorize = ok
  930. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  931. Failed to authenticate the user.
  932. Using Post-Auth-Type REJECT
  933. # Executing group from file /etc/freeradius/sites-enabled/default
  934. +group REJECT {
  935. [attr_filter.access_reject] expand: %{User-Name} -> 60:FE:1E:B7:1E:2F
  936. attr_filter: Matched entry DEFAULT at line 11
  937. ++[attr_filter.access_reject] = updated
  938. +} # group REJECT = updated
  939. Delaying reject of request 8 for 1 seconds
  940. Going to the next request
  941. Waking up in 0.9 seconds.
  942. rad_recv: Access-Request packet from host 91.233.220.10 port 41102, id=152, length=214
  943. Waiting to send Access-Reject to client 91.233.220.0/22 port 41102 - ID: 152
  944. Waking up in 0.7 seconds.
  945. rad_recv: Access-Request packet from host 91.233.220.10 port 41102, id=152, length=214
  946. Waiting to send Access-Reject to client 91.233.220.0/22 port 41102 - ID: 152
  947. Waking up in 0.4 seconds.
  948. rad_recv: Access-Request packet from host 91.233.220.10 port 58729, id=153, length=214
  949. NAS-Port-Type = Wireless-802.11
  950. Calling-Station-Id = "D0:C5:F3:6E:14:AA"
  951. Called-Station-Id = "server1"
  952. NAS-Port-Id = "bridge-internal-clients"
  953. User-Name = "D0:C5:F3:6E:14:AA"
  954. NAS-Port = 2161115145
  955. Acct-Session-Id = "80d00009"
  956. Framed-IP-Address = 192.168.64.218
  957. Mikrotik-Host-IP = 192.168.64.218
  958. WISPr-Location-ID = "2"
  959. User-Password = "password"
  960. Service-Type = Login-User
  961. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  962. NAS-Identifier = "ph-wifi"
  963. NAS-IP-Address = 91.233.220.10
  964. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  965. +group authorize {
  966. ++[preprocess] = ok
  967. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  968. ++[pap] = noop
  969. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  970. rlm_perl: Added pair Acct-Session-Id = 80d00009
  971. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  972. rlm_perl: Added pair Called-Station-Id = server1
  973. rlm_perl: Added pair User-Name = D0:C5:F3:6E:14:AA
  974. rlm_perl: Added pair NAS-Identifier = ph-wifi
  975. rlm_perl: Added pair Framed-IP-Address = 192.168.64.218
  976. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  977. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  978. rlm_perl: Added pair Service-Type = Login-User
  979. rlm_perl: Added pair User-Password = password
  980. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.218
  981. rlm_perl: Added pair NAS-Port = 2161115145
  982. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  983. rlm_perl: Added pair WISPr-Location-ID = 2
  984. rlm_perl: Added pair Calling-Station-Id = D0:C5:F3:6E:14:AA
  985. ++[perl] = ok
  986. +} # group authorize = ok
  987. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  988. Failed to authenticate the user.
  989. Using Post-Auth-Type REJECT
  990. # Executing group from file /etc/freeradius/sites-enabled/default
  991. +group REJECT {
  992. [attr_filter.access_reject] expand: %{User-Name} -> D0:C5:F3:6E:14:AA
  993. attr_filter: Matched entry DEFAULT at line 11
  994. ++[attr_filter.access_reject] = updated
  995. +} # group REJECT = updated
  996. Delaying reject of request 9 for 1 seconds
  997. Going to the next request
  998. Waking up in 0.3 seconds.
  999. rad_recv: Access-Request packet from host 91.233.220.10 port 60067, id=154, length=214
  1000. NAS-Port-Type = Wireless-802.11
  1001. Calling-Station-Id = "40:4D:7F:67:8C:A6"
  1002. Called-Station-Id = "server1"
  1003. NAS-Port-Id = "bridge-internal-clients"
  1004. User-Name = "40:4D:7F:67:8C:A6"
  1005. NAS-Port = 2161115146
  1006. Acct-Session-Id = "80d0000a"
  1007. Framed-IP-Address = 192.168.64.173
  1008. Mikrotik-Host-IP = 192.168.64.173
  1009. WISPr-Location-ID = "2"
  1010. User-Password = "password"
  1011. Service-Type = Login-User
  1012. WISPr-Logoff-URL = "http://192.168.64.1/logout"
  1013. NAS-Identifier = "ph-wifi"
  1014. NAS-IP-Address = 91.233.220.10
  1015. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  1016. +group authorize {
  1017. ++[preprocess] = ok
  1018. [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
  1019. ++[pap] = noop
  1020. rlm_perl: RECV: IO::Socket::INET=GLOB(0x19d9178)
  1021. rlm_perl: Added pair Acct-Session-Id = 80d0000a
  1022. rlm_perl: Added pair WISPr-Logoff-URL = http://192.168.64.1/logout
  1023. rlm_perl: Added pair Called-Station-Id = server1
  1024. rlm_perl: Added pair User-Name = 40:4D:7F:67:8C:A6
  1025. rlm_perl: Added pair NAS-Identifier = ph-wifi
  1026. rlm_perl: Added pair Framed-IP-Address = 192.168.64.173
  1027. rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
  1028. rlm_perl: Added pair NAS-IP-Address = 91.233.220.10
  1029. rlm_perl: Added pair Service-Type = Login-User
  1030. rlm_perl: Added pair User-Password = password
  1031. rlm_perl: Added pair Mikrotik-Host-IP = 192.168.64.173
  1032. rlm_perl: Added pair NAS-Port = 2161115146
  1033. rlm_perl: Added pair NAS-Port-Id = bridge-internal-clients
  1034. rlm_perl: Added pair WISPr-Location-ID = 2
  1035. rlm_perl: Added pair Calling-Station-Id = 40:4D:7F:67:8C:A6
  1036. ++[perl] = ok
  1037. +} # group authorize = ok
  1038. ERROR: No authenticate method (Auth-Type) found for the request: Rejecting the user
  1039. Failed to authenticate the user.
  1040. Using Post-Auth-Type REJECT
  1041. # Executing group from file /etc/freeradius/sites-enabled/default
  1042. +group REJECT {
  1043. [attr_filter.access_reject] expand: %{User-Name} -> 40:4D:7F:67:8C:A6
  1044. attr_filter: Matched entry DEFAULT at line 11
  1045. ++[attr_filter.access_reject] = updated
  1046. +} # group REJECT = updated
  1047. Delaying reject of request 10 for 1 seconds
  1048. Going to the next request
  1049. Waking up in 0.2 seconds.
  1050. rad_recv: Access-Request packet from host 91.233.220.10 port 58729, id=153, length=214
  1051. Waiting to send Access-Reject to client 91.233.220.0/22 port 58729 - ID: 153
  1052. Sending delayed reject for request 8
  1053. Sending Access-Reject of id 152 to 91.233.220.10 port 41102
  1054. Waking up in 0.6 seconds.
  1055. rad_recv: Access-Request packet from host 91.233.220.10 port 60067, id=154, length=214
  1056. Waiting to send Access-Reject to client 91.233.220.0/22 port 60067 - ID: 154
  1057. Waking up in 0.6 seconds.
  1058. rad_recv: Access-Request packet from host 91.233.220.10 port 58729, id=153, length=214
  1059. Waiting to send Access-Reject to client 91.233.220.0/22 port 58729 - ID: 153
  1060. Waking up in 0.3 seconds.
  1061. rad_recv: Access-Request packet from host 91.233.220.10 port 60067, id=154, length=214
  1062. Waiting to send Access-Reject to client 91.233.220.0/22 port 60067 - ID: 154
  1063. Waking up in 0.3 seconds.
  1064. Sending delayed reject for request 9
  1065. Sending Access-Reject of id 153 to 91.233.220.10 port 58729
  1066. Sending delayed reject for request 10
  1067. Sending Access-Reject of id 154 to 91.233.220.10 port 60067
  1068. Waking up in 1.8 seconds.
  1069. Cleaning up request 0 ID 144 with timestamp +20
  1070. Waking up in 0.5 seconds.
  1071. Cleaning up request 1 ID 145 with timestamp +21
  1072. Cleaning up request 2 ID 146 with timestamp +21
  1073. Waking up in 0.1 seconds.
  1074. Cleaning up request 3 ID 147 with timestamp +21
  1075. Cleaning up request 4 ID 148 with timestamp +21
  1076. Cleaning up request 5 ID 149 with timestamp +21
  1077. Cleaning up request 6 ID 150 with timestamp +21
  1078. Waking up in 0.3 seconds.
  1079. Cleaning up request 7 ID 151 with timestamp +21
  1080. Waking up in 1.0 seconds.
  1081. Cleaning up request 8 ID 152 with timestamp +22
  1082. Waking up in 0.6 seconds.
  1083. Cleaning up request 9 ID 153 with timestamp +23
  1084. Cleaning up request 10 ID 154 with timestamp +23
  1085. Ready to process requests.
  1086. ^C
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement