Advertisement
Guest User

Untitled

a guest
Jan 8th, 2017
124
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.60 KB | None | 0 0
  1.  
  2. Ready to process requests.
  3. rad_recv: Access-Request packet from host 137.74.46.59 port 50096, id=31, length=123
  4. User-Name = "Admin"
  5. User-Password = "admin"
  6. NAS-Identifier = "SoftEther VPN Server"
  7. Service-Type = Framed-User
  8. NAS-Port-Type = Virtual
  9. Tunnel-Type:0 = PPTP
  10. Tunnel-Medium-Type:0 = IPv4
  11. Calling-Station-Id = "86.153.199.193"
  12. Tunnel-Client-Endpoint:0 = "86.153.199.193"
  13. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  14. +- entering group authorize {...}
  15. ++[preprocess] returns ok
  16. ++[chap] returns noop
  17. ++[mschap] returns noop
  18. ++[digest] returns noop
  19. [suffix] No '@' in User-Name = "Admin", looking up realm NULL
  20. [suffix] No such realm "NULL"
  21. ++[suffix] returns noop
  22. [eap] No EAP-Message, not doing EAP
  23. ++[eap] returns noop
  24. ++[files] returns noop
  25. [sql] expand: %{User-Name} -> Admin
  26. [sql] sql_set_user escaped user --> 'Admin'
  27. rlm_sql (sql): Reserving sql socket id: 1
  28. [sql] expand: SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'Admin' ORDER BY id
  29. [sql] User found in radcheck table
  30. [sql] expand: SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id -> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'Admin' ORDER BY id
  31. [sql] expand: SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority -> SELECT groupname FROM radusergroup WHERE username = 'Admin' ORDER BY priority
  32. rlm_sql (sql): Released sql socket id: 1
  33. ++[sql] returns ok
  34. ++[expiration] returns noop
  35. ++[logintime] returns noop
  36. ++[pap] returns updated
  37. Found Auth-Type = PAP
  38. # Executing group from file /etc/freeradius/sites-enabled/default
  39. +- entering group PAP {...}
  40. [pap] login attempt with password "admin"
  41. [pap] Using clear text password "admin"
  42. [pap] User authenticated successfully
  43. ++[pap] returns ok
  44. # Executing section post-auth from file /etc/freeradius/sites-enabled/default
  45. +- entering group post-auth {...}
  46. [sql] expand: %{User-Name} -> Admin
  47. [sql] sql_set_user escaped user --> 'Admin'
  48. [sql] expand: %{User-Password} -> admin
  49. [sql] expand: INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') -> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'Admin', 'admin', 'Access-Accept', '2017-01-08 16:45:37')
  50. rlm_sql (sql) in sql_postauth: query is INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'Admin', 'admin', 'Access-Accept', '2017-01-08 16:45:37')
  51. rlm_sql (sql): Reserving sql socket id: 0
  52. rlm_sql (sql): Released sql socket id: 0
  53. ++[sql] returns ok
  54. ++[exec] returns noop
  55. Sending Access-Accept of id 31 to 137.74.46.59 port 50096
  56. Finished request 1.
  57. Going to the next request
  58. Waking up in 4.9 seconds.
  59. Cleaning up request 1 ID 31 with timestamp +219
  60. Ready to process requests.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement