Advertisement
Guest User

Untitled

a guest
Oct 11th, 2017
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 29.97 KB | None | 0 0
  1. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=70, length=125
  2. User-Name = "dolfin"
  3. NAS-IP-Address = 192.168.0.1
  4. Called-Station-Id = "506a037b0d64"
  5. Calling-Station-Id = "dcefcae47b8c"
  6. NAS-Identifier = "506a037b0d64"
  7. NAS-Port = 19
  8. Framed-MTU = 1400
  9. NAS-Port-Type = Wireless-802.11
  10. EAP-Message = 0x0200000b01646f6c66696e
  11. Message-Authenticator = 0xa71c945fa8fde51e719d8f084a977203
  12. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  13. +group authorize {
  14. ++[preprocess] = ok
  15. ++[chap] = noop
  16. ++[mschap] = noop
  17. ++[digest] = noop
  18. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  19. [suffix] No such realm "NULL"
  20. ++[suffix] = noop
  21. [eap] EAP packet type response id 0 length 11
  22. [eap] No EAP Start, assuming it's an on-going EAP conversation
  23. ++[eap] = updated
  24. [files] users: Matched entry dolfin at line 204
  25. ++[files] = ok
  26. ++[expiration] = noop
  27. ++[logintime] = noop
  28. [pap] WARNING: Auth-Type already set. Not setting to PAP
  29. ++[pap] = noop
  30. +} # group authorize = updated
  31. Found Auth-Type = EAP
  32. # Executing group from file /etc/freeradius/sites-enabled/default
  33. +group authenticate {
  34. [eap] EAP Identity
  35. [eap] processing type tls
  36. [tls] Initiate
  37. [tls] Start returned 1
  38. ++[eap] = handled
  39. +} # group authenticate = handled
  40. Sending Access-Challenge of id 70 to 192.168.0.1 port 1824
  41. EAP-Message = 0x010100061520
  42. Message-Authenticator = 0x00000000000000000000000000000000
  43. State = 0x8dcf24548dce311b6170afe8a3046595
  44. Finished request 1.
  45. Going to the next request
  46. Waking up in 4.9 seconds.
  47. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=71, length=138
  48. User-Name = "dolfin"
  49. NAS-IP-Address = 192.168.0.1
  50. Called-Station-Id = "506a037b0d64"
  51. Calling-Station-Id = "dcefcae47b8c"
  52. NAS-Identifier = "506a037b0d64"
  53. NAS-Port = 19
  54. Framed-MTU = 1400
  55. State = 0x8dcf24548dce311b6170afe8a3046595
  56. NAS-Port-Type = Wireless-802.11
  57. EAP-Message = 0x020100060319
  58. Message-Authenticator = 0xf5af8d115dbd17b1273b5cf3460a0e1f
  59. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  60. +group authorize {
  61. ++[preprocess] = ok
  62. ++[chap] = noop
  63. ++[mschap] = noop
  64. ++[digest] = noop
  65. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  66. [suffix] No such realm "NULL"
  67. ++[suffix] = noop
  68. [eap] EAP packet type response id 1 length 6
  69. [eap] No EAP Start, assuming it's an on-going EAP conversation
  70. ++[eap] = updated
  71. [files] users: Matched entry dolfin at line 204
  72. ++[files] = ok
  73. ++[expiration] = noop
  74. ++[logintime] = noop
  75. [pap] WARNING: Auth-Type already set. Not setting to PAP
  76. ++[pap] = noop
  77. +} # group authorize = updated
  78. Found Auth-Type = EAP
  79. # Executing group from file /etc/freeradius/sites-enabled/default
  80. +group authenticate {
  81. [eap] Request found, released from the list
  82. [eap] EAP NAK
  83. [eap] EAP-NAK asked for EAP-Type/peap
  84. [eap] processing type tls
  85. [tls] Initiate
  86. [tls] Start returned 1
  87. ++[eap] = handled
  88. +} # group authenticate = handled
  89. Sending Access-Challenge of id 71 to 192.168.0.1 port 1824
  90. EAP-Message = 0x010200061920
  91. Message-Authenticator = 0x00000000000000000000000000000000
  92. State = 0x8dcf24548ccd3d1b6170afe8a3046595
  93. Finished request 2.
  94. Going to the next request
  95. Waking up in 4.9 seconds.
  96. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=72, length=307
  97. User-Name = "dolfin"
  98. NAS-IP-Address = 192.168.0.1
  99. Called-Station-Id = "506a037b0d64"
  100. Calling-Station-Id = "dcefcae47b8c"
  101. NAS-Identifier = "506a037b0d64"
  102. NAS-Port = 19
  103. Framed-MTU = 1400
  104. State = 0x8dcf24548ccd3d1b6170afe8a3046595
  105. NAS-Port-Type = Wireless-802.11
  106. EAP-Message = 0x020200af1980000000a516030100a00100009c0303391f09bfa37b28141a28a2f682ace7fba3b32a88afbca524974bca1d8b3e5c9e00003ec02cc030009fc02bc02f009ecca9cca8c00ac024c014c0280039006bc009c023c013c02700330067c007c011009d009c0035003d002f003c00050004000a01000035ff0100010000170000000d001600140601060305010503040104030301030302010203000b00020100000a00080006001700180019
  107. Message-Authenticator = 0x98bfe0e1a824d5eb75bde226aa44fe3c
  108. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  109. +group authorize {
  110. ++[preprocess] = ok
  111. ++[chap] = noop
  112. ++[mschap] = noop
  113. ++[digest] = noop
  114. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  115. [suffix] No such realm "NULL"
  116. ++[suffix] = noop
  117. [eap] EAP packet type response id 2 length 175
  118. [eap] Continuing tunnel setup.
  119. ++[eap] = ok
  120. +} # group authorize = ok
  121. Found Auth-Type = EAP
  122. # Executing group from file /etc/freeradius/sites-enabled/default
  123. +group authenticate {
  124. [eap] Request found, released from the list
  125. [eap] EAP/peap
  126. [eap] processing type peap
  127. [peap] processing EAP-TLS
  128. TLS Length 165
  129. [peap] Length Included
  130. [peap] eaptls_verify returned 11
  131. [peap] (other): before/accept initialization
  132. [peap] TLS_accept: before/accept initialization
  133. [peap] <<< Unknown TLS version [length 0005]
  134. [peap] <<< Unknown TLS version [length 00a0]
  135. [peap] TLS_accept: unknown state
  136. [peap] >>> Unknown TLS version [length 0005]
  137. [peap] >>> Unknown TLS version [length 0039]
  138. [peap] TLS_accept: unknown state
  139. [peap] >>> Unknown TLS version [length 0005]
  140. [peap] >>> Unknown TLS version [length 02c0]
  141. [peap] TLS_accept: unknown state
  142. [peap] >>> Unknown TLS version [length 0005]
  143. [peap] >>> Unknown TLS version [length 014d]
  144. [peap] TLS_accept: unknown state
  145. [peap] >>> Unknown TLS version [length 0005]
  146. [peap] >>> Unknown TLS version [length 0004]
  147. [peap] TLS_accept: unknown state
  148. [peap] TLS_accept: unknown state
  149. [peap] TLS_accept: unknown state
  150. [peap] TLS_accept: Need to read more data: unknown state
  151. [peap] TLS_accept: Need to read more data: unknown state
  152. In SSL Handshake Phase
  153. In SSL Accept mode
  154. [peap] eaptls_process returned 13
  155. [peap] EAPTLS_HANDLED
  156. ++[eap] = handled
  157. +} # group authenticate = handled
  158. Sending Access-Challenge of id 72 to 192.168.0.1 port 1824
  159. EAP-Message = 0x0103040019c00000045e16030300390200003503039d083ac326ab5e1aab6bf596a2c81c0f8bb7be9ce775d301e70143e03e14c65500c03000000dff01000100000b00040300010216030302c00b0002bc0002b90002b6308202b23082019aa003020102020900ec8bd9cffa8d5b02300d06092a864886f70d01010b05003011310f300d06035504030c067562756e7475301e170d3137303731323032343734345a170d3237303731303032343734345a3011310f300d06035504030c067562756e747530820122300d06092a864886f70d01010105000382010f003082010a0282010100d9ad80ca806a0644078f9a0299b8e23730379e37b76ae521
  160. EAP-Message = 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
  161. EAP-Message = 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
  162. EAP-Message = 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
  163. EAP-Message = 0x8d0e334eaf70fcbe93478c8f
  164. Message-Authenticator = 0x00000000000000000000000000000000
  165. State = 0x8dcf24548fcc3d1b6170afe8a3046595
  166. Finished request 3.
  167. Going to the next request
  168. Waking up in 4.9 seconds.
  169. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=73, length=138
  170. User-Name = "dolfin"
  171. NAS-IP-Address = 192.168.0.1
  172. Called-Station-Id = "506a037b0d64"
  173. Calling-Station-Id = "dcefcae47b8c"
  174. NAS-Identifier = "506a037b0d64"
  175. NAS-Port = 19
  176. Framed-MTU = 1400
  177. State = 0x8dcf24548fcc3d1b6170afe8a3046595
  178. NAS-Port-Type = Wireless-802.11
  179. EAP-Message = 0x020300061900
  180. Message-Authenticator = 0x0659f5cb5ed3848bf7a22b0ab50849b4
  181. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  182. +group authorize {
  183. ++[preprocess] = ok
  184. ++[chap] = noop
  185. ++[mschap] = noop
  186. ++[digest] = noop
  187. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  188. [suffix] No such realm "NULL"
  189. ++[suffix] = noop
  190. [eap] EAP packet type response id 3 length 6
  191. [eap] Continuing tunnel setup.
  192. ++[eap] = ok
  193. +} # group authorize = ok
  194. Found Auth-Type = EAP
  195. # Executing group from file /etc/freeradius/sites-enabled/default
  196. +group authenticate {
  197. [eap] Request found, released from the list
  198. [eap] EAP/peap
  199. [eap] processing type peap
  200. [peap] processing EAP-TLS
  201. [peap] Received TLS ACK
  202. [peap] ACK handshake fragment handler
  203. [peap] eaptls_verify returned 1
  204. [peap] eaptls_process returned 13
  205. [peap] EAPTLS_HANDLED
  206. ++[eap] = handled
  207. +} # group authenticate = handled
  208. Sending Access-Challenge of id 73 to 192.168.0.1 port 1824
  209. EAP-Message = 0x0104006e190065ef71208431f64416312092576a21f6cb2a2f0a893fc0af86a548fbc59ff79b82c45d49a5e94888fc0e03a0177f33a610c471589bd94f99f3e186bf8f9d8231bb21637db46ac9328f6914d45ff6be911609ce55047c0935b7c42f9abe8df516030300040e000000
  210. Message-Authenticator = 0x00000000000000000000000000000000
  211. State = 0x8dcf24548ecb3d1b6170afe8a3046595
  212. Finished request 4.
  213. Going to the next request
  214. Waking up in 4.8 seconds.
  215. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=74, length=268
  216. User-Name = "dolfin"
  217. NAS-IP-Address = 192.168.0.1
  218. Called-Station-Id = "506a037b0d64"
  219. Calling-Station-Id = "dcefcae47b8c"
  220. NAS-Identifier = "506a037b0d64"
  221. NAS-Port = 19
  222. Framed-MTU = 1400
  223. State = 0x8dcf24548ecb3d1b6170afe8a3046595
  224. NAS-Port-Type = Wireless-802.11
  225. EAP-Message = 0x0204008819800000007e16030300461000004241049c2692fd6293ee4edc3ac6fcd06cb6677eb9cefd8cd0e8b99fb445c6306a6e1cafc78630e43d8979119c672b4102026bdb24d0093bb4288a1216ab2e6e1f216e14030300010116030300280000000000000000294d6d281d4e7114abe638ceb299f01958b50fd5ae9b26987841cf913036784f
  226. Message-Authenticator = 0x19b3758e6a18d7b2d97bee173417b08b
  227. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  228. +group authorize {
  229. ++[preprocess] = ok
  230. ++[chap] = noop
  231. ++[mschap] = noop
  232. ++[digest] = noop
  233. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  234. [suffix] No such realm "NULL"
  235. ++[suffix] = noop
  236. [eap] EAP packet type response id 4 length 136
  237. [eap] Continuing tunnel setup.
  238. ++[eap] = ok
  239. +} # group authorize = ok
  240. Found Auth-Type = EAP
  241. # Executing group from file /etc/freeradius/sites-enabled/default
  242. +group authenticate {
  243. [eap] Request found, released from the list
  244. [eap] EAP/peap
  245. [eap] processing type peap
  246. [peap] processing EAP-TLS
  247. TLS Length 126
  248. [peap] Length Included
  249. [peap] eaptls_verify returned 11
  250. [peap] <<< Unknown TLS version [length 0005]
  251. [peap] <<< Unknown TLS version [length 0046]
  252. [peap] TLS_accept: unknown state
  253. [peap] TLS_accept: unknown state
  254. [peap] <<< Unknown TLS version [length 0005]
  255. [peap] <<< Unknown TLS version [length 0001]
  256. [peap] <<< Unknown TLS version [length 0005]
  257. [peap] <<< Unknown TLS version [length 0010]
  258. [peap] TLS_accept: unknown state
  259. [peap] >>> Unknown TLS version [length 0005]
  260. [peap] >>> Unknown TLS version [length 0001]
  261. [peap] TLS_accept: unknown state
  262. [peap] >>> Unknown TLS version [length 0005]
  263. [peap] >>> Unknown TLS version [length 0010]
  264. [peap] TLS_accept: unknown state
  265. [peap] TLS_accept: unknown state
  266. [peap] (other): SSL negotiation finished successfully
  267. SSL Connection Established
  268. [peap] eaptls_process returned 13
  269. [peap] EAPTLS_HANDLED
  270. ++[eap] = handled
  271. +} # group authenticate = handled
  272. Sending Access-Challenge of id 74 to 192.168.0.1 port 1824
  273. EAP-Message = 0x010500391900140303000101160303002803fb2ff06fb6912c9932f2c656c7bd5e5dc0db5207b5b1850ba93f89747ce084fd2f84a590ccfed7
  274. Message-Authenticator = 0x00000000000000000000000000000000
  275. State = 0x8dcf245489ca3d1b6170afe8a3046595
  276. Finished request 5.
  277. Going to the next request
  278. Waking up in 4.8 seconds.
  279. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=75, length=138
  280. User-Name = "dolfin"
  281. NAS-IP-Address = 192.168.0.1
  282. Called-Station-Id = "506a037b0d64"
  283. Calling-Station-Id = "dcefcae47b8c"
  284. NAS-Identifier = "506a037b0d64"
  285. NAS-Port = 19
  286. Framed-MTU = 1400
  287. State = 0x8dcf245489ca3d1b6170afe8a3046595
  288. NAS-Port-Type = Wireless-802.11
  289. EAP-Message = 0x020500061900
  290. Message-Authenticator = 0xf57b32b8405ecc1d6b9cce3816e5b6da
  291. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  292. +group authorize {
  293. ++[preprocess] = ok
  294. ++[chap] = noop
  295. ++[mschap] = noop
  296. ++[digest] = noop
  297. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  298. [suffix] No such realm "NULL"
  299. ++[suffix] = noop
  300. [eap] EAP packet type response id 5 length 6
  301. [eap] Continuing tunnel setup.
  302. ++[eap] = ok
  303. +} # group authorize = ok
  304. Found Auth-Type = EAP
  305. # Executing group from file /etc/freeradius/sites-enabled/default
  306. +group authenticate {
  307. [eap] Request found, released from the list
  308. [eap] EAP/peap
  309. [eap] processing type peap
  310. [peap] processing EAP-TLS
  311. [peap] Received TLS ACK
  312. [peap] ACK handshake is finished
  313. [peap] eaptls_verify returned 3
  314. [peap] eaptls_process returned 3
  315. [peap] EAPTLS_SUCCESS
  316. [peap] Session established. Decoding tunneled attributes.
  317. [peap] Peap state TUNNEL ESTABLISHED
  318. [peap] >>> Unknown TLS version [length 0005]
  319. ++[eap] = handled
  320. +} # group authenticate = handled
  321. Sending Access-Challenge of id 75 to 192.168.0.1 port 1824
  322. EAP-Message = 0x010600281900170303001d03fb2ff06fb6912dae7ee248bf4760ae1ff1f1ddb9a34f29452d575183
  323. Message-Authenticator = 0x00000000000000000000000000000000
  324. State = 0x8dcf245488c93d1b6170afe8a3046595
  325. Finished request 6.
  326. Going to the next request
  327. Waking up in 4.8 seconds.
  328. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=76, length=174
  329. User-Name = "dolfin"
  330. NAS-IP-Address = 192.168.0.1
  331. Called-Station-Id = "506a037b0d64"
  332. Calling-Station-Id = "dcefcae47b8c"
  333. NAS-Identifier = "506a037b0d64"
  334. NAS-Port = 19
  335. Framed-MTU = 1400
  336. State = 0x8dcf245488c93d1b6170afe8a3046595
  337. NAS-Port-Type = Wireless-802.11
  338. EAP-Message = 0x0206002a1900170303001f000000000000000194c8c64796ce78d160f674df6aed935a260006ceadc87b
  339. Message-Authenticator = 0x0c7b616fe1868b331512cb2ad8c37892
  340. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  341. +group authorize {
  342. ++[preprocess] = ok
  343. ++[chap] = noop
  344. ++[mschap] = noop
  345. ++[digest] = noop
  346. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  347. [suffix] No such realm "NULL"
  348. ++[suffix] = noop
  349. [eap] EAP packet type response id 6 length 42
  350. [eap] Continuing tunnel setup.
  351. ++[eap] = ok
  352. +} # group authorize = ok
  353. Found Auth-Type = EAP
  354. # Executing group from file /etc/freeradius/sites-enabled/default
  355. +group authenticate {
  356. [eap] Request found, released from the list
  357. [eap] EAP/peap
  358. [eap] processing type peap
  359. [peap] processing EAP-TLS
  360. [peap] eaptls_verify returned 7
  361. [peap] Done initial handshake
  362. [peap] <<< Unknown TLS version [length 0005]
  363. [peap] eaptls_process returned 7
  364. [peap] EAPTLS_OK
  365. [peap] Session established. Decoding tunneled attributes.
  366. [peap] Peap state WAITING FOR INNER IDENTITY
  367. [peap] Identity - dolfin
  368. [peap] Got inner identity 'dolfin'
  369. [peap] Setting default EAP type for tunneled EAP session.
  370. [peap] Got tunneled request
  371. EAP-Message = 0x0206000b01646f6c66696e
  372. server {
  373. [peap] Setting User-Name to dolfin
  374. Sending tunneled request
  375. EAP-Message = 0x0206000b01646f6c66696e
  376. FreeRADIUS-Proxied-To = 127.0.0.1
  377. User-Name = "dolfin"
  378. server inner-tunnel {
  379. # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
  380. +group authorize {
  381. ++[chap] = noop
  382. ++[mschap] = noop
  383. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  384. [suffix] No such realm "NULL"
  385. ++[suffix] = noop
  386. ++update control {
  387. ++} # update control = noop
  388. [eap] EAP packet type response id 6 length 11
  389. [eap] No EAP Start, assuming it's an on-going EAP conversation
  390. ++[eap] = updated
  391. [files] users: Matched entry dolfin at line 204
  392. ++[files] = ok
  393. ++[expiration] = noop
  394. ++[logintime] = noop
  395. [pap] WARNING: Auth-Type already set. Not setting to PAP
  396. ++[pap] = noop
  397. +} # group authorize = updated
  398. Found Auth-Type = EAP
  399. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  400. +group authenticate {
  401. [eap] EAP Identity
  402. [eap] processing type mschapv2
  403. rlm_eap_mschapv2: Issuing Challenge
  404. ++[eap] = handled
  405. +} # group authenticate = handled
  406. } # server inner-tunnel
  407. [peap] Got tunneled reply code 11
  408. EAP-Message = 0x010700201a0107001b1026653a8466eb88a0d9fe804e7f972fe0646f6c66696e
  409. Message-Authenticator = 0x00000000000000000000000000000000
  410. State = 0x36c4ffb536c3e5fe83f8514ef9adf38e
  411. [peap] Got tunneled reply RADIUS code Access-Challenge
  412. EAP-Message = 0x010700201a0107001b1026653a8466eb88a0d9fe804e7f972fe0646f6c66696e
  413. Message-Authenticator = 0x00000000000000000000000000000000
  414. State = 0x36c4ffb536c3e5fe83f8514ef9adf38e
  415. [peap] Got tunneled Access-Challenge
  416. [peap] >>> Unknown TLS version [length 0005]
  417. ++[eap] = handled
  418. +} # group authenticate = handled
  419. Sending Access-Challenge of id 76 to 192.168.0.1 port 1824
  420. EAP-Message = 0x0107003f1900170303003403fb2ff06fb6912ef30f8acc91d807ba427eed7fe6836e0893d0dbbfc76c4de50c5993e9964431cc1b96fa7a958fe6a25ef058cb
  421. Message-Authenticator = 0x00000000000000000000000000000000
  422. State = 0x8dcf24548bc83d1b6170afe8a3046595
  423. Finished request 7.
  424. Going to the next request
  425. Waking up in 4.7 seconds.
  426. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=77, length=228
  427. User-Name = "dolfin"
  428. NAS-IP-Address = 192.168.0.1
  429. Called-Station-Id = "506a037b0d64"
  430. Calling-Station-Id = "dcefcae47b8c"
  431. NAS-Identifier = "506a037b0d64"
  432. NAS-Port = 19
  433. Framed-MTU = 1400
  434. State = 0x8dcf24548bc83d1b6170afe8a3046595
  435. NAS-Port-Type = Wireless-802.11
  436. EAP-Message = 0x020700601900170303005500000000000000023a846d6ca08ab3fc4ce23a4a63693382e7539fb1df76a6821b0bf13e6db995aca4a38b8f3953896291f6516808fbec7d4d3efcb5fc06e335f3067b80972faa36b4623f7a09e4e0520f9dbb4c3a
  437. Message-Authenticator = 0x6ad9a4c43058a80de30816822b42e17a
  438. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  439. +group authorize {
  440. ++[preprocess] = ok
  441. ++[chap] = noop
  442. ++[mschap] = noop
  443. ++[digest] = noop
  444. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  445. [suffix] No such realm "NULL"
  446. ++[suffix] = noop
  447. [eap] EAP packet type response id 7 length 96
  448. [eap] Continuing tunnel setup.
  449. ++[eap] = ok
  450. +} # group authorize = ok
  451. Found Auth-Type = EAP
  452. # Executing group from file /etc/freeradius/sites-enabled/default
  453. +group authenticate {
  454. [eap] Request found, released from the list
  455. [eap] EAP/peap
  456. [eap] processing type peap
  457. [peap] processing EAP-TLS
  458. [peap] eaptls_verify returned 7
  459. [peap] Done initial handshake
  460. [peap] <<< Unknown TLS version [length 0005]
  461. [peap] eaptls_process returned 7
  462. [peap] EAPTLS_OK
  463. [peap] Session established. Decoding tunneled attributes.
  464. [peap] Peap state phase2
  465. [peap] EAP type mschapv2
  466. [peap] Got tunneled request
  467. EAP-Message = 0x020700411a0207003c31d94f989453dc9fca53bad5b944eb435d00000000000000000616304f26517feb2bd2a16cb51b097cc5cc8619edd2acd200646f6c66696e
  468. server {
  469. [peap] Setting User-Name to dolfin
  470. Sending tunneled request
  471. EAP-Message = 0x020700411a0207003c31d94f989453dc9fca53bad5b944eb435d00000000000000000616304f26517feb2bd2a16cb51b097cc5cc8619edd2acd200646f6c66696e
  472. FreeRADIUS-Proxied-To = 127.0.0.1
  473. User-Name = "dolfin"
  474. State = 0x36c4ffb536c3e5fe83f8514ef9adf38e
  475. server inner-tunnel {
  476. # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
  477. +group authorize {
  478. ++[chap] = noop
  479. ++[mschap] = noop
  480. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  481. [suffix] No such realm "NULL"
  482. ++[suffix] = noop
  483. ++update control {
  484. ++} # update control = noop
  485. [eap] EAP packet type response id 7 length 65
  486. [eap] No EAP Start, assuming it's an on-going EAP conversation
  487. ++[eap] = updated
  488. [files] users: Matched entry dolfin at line 204
  489. ++[files] = ok
  490. ++[expiration] = noop
  491. ++[logintime] = noop
  492. [pap] WARNING: Auth-Type already set. Not setting to PAP
  493. ++[pap] = noop
  494. +} # group authorize = updated
  495. Found Auth-Type = EAP
  496. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  497. +group authenticate {
  498. [eap] Request found, released from the list
  499. [eap] EAP/mschapv2
  500. [eap] processing type mschapv2
  501. [mschapv2] # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  502. [mschapv2] +group MS-CHAP {
  503. [mschap] Creating challenge hash with username: dolfin
  504. [mschap] Client is using MS-CHAPv2 for dolfin, we need NT-Password
  505. [mschap] adding MS-CHAPv2 MPPE keys
  506. ++[mschap] = ok
  507. +} # group MS-CHAP = ok
  508. MSCHAP Success
  509. ++[eap] = handled
  510. +} # group authenticate = handled
  511. } # server inner-tunnel
  512. [peap] Got tunneled reply code 11
  513. EAP-Message = 0x010800331a0307002e533d42303343393741343745424541443032303643363530313338304236424342344331344235463636
  514. Message-Authenticator = 0x00000000000000000000000000000000
  515. State = 0x36c4ffb537cce5fe83f8514ef9adf38e
  516. [peap] Got tunneled reply RADIUS code Access-Challenge
  517. EAP-Message = 0x010800331a0307002e533d42303343393741343745424541443032303643363530313338304236424342344331344235463636
  518. Message-Authenticator = 0x00000000000000000000000000000000
  519. State = 0x36c4ffb537cce5fe83f8514ef9adf38e
  520. [peap] Got tunneled Access-Challenge
  521. [peap] >>> Unknown TLS version [length 0005]
  522. ++[eap] = handled
  523. +} # group authenticate = handled
  524. Sending Access-Challenge of id 77 to 192.168.0.1 port 1824
  525. EAP-Message = 0x010800521900170303004703fb2ff06fb6912f3fb3e828dd977a193b7677f1a15e5c57b8612990ce717521e57082c621c37893382614fc22fad2638ba49624ede51487d8d6df5a9444755d06d736d43ae849
  526. Message-Authenticator = 0x00000000000000000000000000000000
  527. State = 0x8dcf24548ac73d1b6170afe8a3046595
  528. Finished request 8.
  529. Going to the next request
  530. Waking up in 4.7 seconds.
  531. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=78, length=169
  532. User-Name = "dolfin"
  533. NAS-IP-Address = 192.168.0.1
  534. Called-Station-Id = "506a037b0d64"
  535. Calling-Station-Id = "dcefcae47b8c"
  536. NAS-Identifier = "506a037b0d64"
  537. NAS-Port = 19
  538. Framed-MTU = 1400
  539. State = 0x8dcf24548ac73d1b6170afe8a3046595
  540. NAS-Port-Type = Wireless-802.11
  541. EAP-Message = 0x020800251900170303001a0000000000000003fd7cae6980454565f6863b4a8157b1814fe1
  542. Message-Authenticator = 0x48aa79cc9c3cc3e50aac66f4fdc25dc0
  543. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  544. +group authorize {
  545. ++[preprocess] = ok
  546. ++[chap] = noop
  547. ++[mschap] = noop
  548. ++[digest] = noop
  549. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  550. [suffix] No such realm "NULL"
  551. ++[suffix] = noop
  552. [eap] EAP packet type response id 8 length 37
  553. [eap] Continuing tunnel setup.
  554. ++[eap] = ok
  555. +} # group authorize = ok
  556. Found Auth-Type = EAP
  557. # Executing group from file /etc/freeradius/sites-enabled/default
  558. +group authenticate {
  559. [eap] Request found, released from the list
  560. [eap] EAP/peap
  561. [eap] processing type peap
  562. [peap] processing EAP-TLS
  563. [peap] eaptls_verify returned 7
  564. [peap] Done initial handshake
  565. [peap] <<< Unknown TLS version [length 0005]
  566. [peap] eaptls_process returned 7
  567. [peap] EAPTLS_OK
  568. [peap] Session established. Decoding tunneled attributes.
  569. [peap] Peap state phase2
  570. [peap] EAP type mschapv2
  571. [peap] Got tunneled request
  572. EAP-Message = 0x020800061a03
  573. server {
  574. [peap] Setting User-Name to dolfin
  575. Sending tunneled request
  576. EAP-Message = 0x020800061a03
  577. FreeRADIUS-Proxied-To = 127.0.0.1
  578. User-Name = "dolfin"
  579. State = 0x36c4ffb537cce5fe83f8514ef9adf38e
  580. server inner-tunnel {
  581. # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
  582. +group authorize {
  583. ++[chap] = noop
  584. ++[mschap] = noop
  585. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  586. [suffix] No such realm "NULL"
  587. ++[suffix] = noop
  588. ++update control {
  589. ++} # update control = noop
  590. [eap] EAP packet type response id 8 length 6
  591. [eap] No EAP Start, assuming it's an on-going EAP conversation
  592. ++[eap] = updated
  593. [files] users: Matched entry dolfin at line 204
  594. ++[files] = ok
  595. ++[expiration] = noop
  596. ++[logintime] = noop
  597. [pap] WARNING: Auth-Type already set. Not setting to PAP
  598. ++[pap] = noop
  599. +} # group authorize = updated
  600. Found Auth-Type = EAP
  601. # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
  602. +group authenticate {
  603. [eap] Request found, released from the list
  604. [eap] EAP/mschapv2
  605. [eap] processing type mschapv2
  606. [eap] Freeing handler
  607. ++[eap] = ok
  608. +} # group authenticate = ok
  609. WARNING: Empty post-auth section. Using default return values.
  610. # Executing section post-auth from file /etc/freeradius/sites-enabled/inner-tunnel
  611. } # server inner-tunnel
  612. [peap] Got tunneled reply code 2
  613. MS-MPPE-Encryption-Policy = 0x00000001
  614. MS-MPPE-Encryption-Types = 0x00000006
  615. MS-MPPE-Send-Key = 0x8b087c5987bd86c446247fcce45f8883
  616. MS-MPPE-Recv-Key = 0xdb590e0a25c47c87b7edac62296521b0
  617. EAP-Message = 0x03080004
  618. Message-Authenticator = 0x00000000000000000000000000000000
  619. User-Name = "dolfin"
  620. [peap] Got tunneled reply RADIUS code Access-Accept
  621. MS-MPPE-Encryption-Policy = 0x00000001
  622. MS-MPPE-Encryption-Types = 0x00000006
  623. MS-MPPE-Send-Key = 0x8b087c5987bd86c446247fcce45f8883
  624. MS-MPPE-Recv-Key = 0xdb590e0a25c47c87b7edac62296521b0
  625. EAP-Message = 0x03080004
  626. Message-Authenticator = 0x00000000000000000000000000000000
  627. User-Name = "dolfin"
  628. [peap] Tunneled authentication was successful.
  629. [peap] SUCCESS
  630. [peap] >>> Unknown TLS version [length 0005]
  631. ++[eap] = handled
  632. +} # group authenticate = handled
  633. Sending Access-Challenge of id 78 to 192.168.0.1 port 1824
  634. EAP-Message = 0x0109002e1900170303002303fb2ff06fb6913042b1ce102906cf92e2289034c0633e66f9d5d75ee2c1b6c07c2d68
  635. Message-Authenticator = 0x00000000000000000000000000000000
  636. State = 0x8dcf245485c63d1b6170afe8a3046595
  637. Finished request 9.
  638. Going to the next request
  639. Waking up in 4.6 seconds.
  640. rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=79, length=178
  641. User-Name = "dolfin"
  642. NAS-IP-Address = 192.168.0.1
  643. Called-Station-Id = "506a037b0d64"
  644. Calling-Station-Id = "dcefcae47b8c"
  645. NAS-Identifier = "506a037b0d64"
  646. NAS-Port = 19
  647. Framed-MTU = 1400
  648. State = 0x8dcf245485c63d1b6170afe8a3046595
  649. NAS-Port-Type = Wireless-802.11
  650. EAP-Message = 0x0209002e1900170303002300000000000000048383c7efa1d72eaee82ca743d33b97e60528d650b7432ccc034263
  651. Message-Authenticator = 0x3093e08050c0b640a7fb6e7c7335ad96
  652. # Executing section authorize from file /etc/freeradius/sites-enabled/default
  653. +group authorize {
  654. ++[preprocess] = ok
  655. ++[chap] = noop
  656. ++[mschap] = noop
  657. ++[digest] = noop
  658. [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
  659. [suffix] No such realm "NULL"
  660. ++[suffix] = noop
  661. [eap] EAP packet type response id 9 length 46
  662. [eap] Continuing tunnel setup.
  663. ++[eap] = ok
  664. +} # group authorize = ok
  665. Found Auth-Type = EAP
  666. # Executing group from file /etc/freeradius/sites-enabled/default
  667. +group authenticate {
  668. [eap] Request found, released from the list
  669. [eap] EAP/peap
  670. [eap] processing type peap
  671. [peap] processing EAP-TLS
  672. [peap] eaptls_verify returned 7
  673. [peap] Done initial handshake
  674. [peap] <<< Unknown TLS version [length 0005]
  675. [peap] eaptls_process returned 7
  676. [peap] EAPTLS_OK
  677. [peap] Session established. Decoding tunneled attributes.
  678. [peap] Peap state send tlv success
  679. [peap] Received EAP-TLV response.
  680. [peap] Success
  681. [eap] Freeing handler
  682. ++[eap] = ok
  683. +} # group authenticate = ok
  684. # Executing section post-auth from file /etc/freeradius/sites-enabled/default
  685. +group post-auth {
  686. ++[exec] = noop
  687. +} # group post-auth = noop
  688. Sending Access-Accept of id 79 to 192.168.0.1 port 1824
  689. MS-MPPE-Recv-Key = 0xbe1384c1e3eeb93537926b20da0780e154083010609906ca488a1bd84fe5a7dc
  690. MS-MPPE-Send-Key = 0x25feaf6de7c498e819cd5063309887b0a5a8d40fce9d02336edbc642f3e901d2
  691. EAP-Message = 0x03090004
  692. Message-Authenticator = 0x00000000000000000000000000000000
  693. User-Name = "dolfin"
  694. Finished request 10.
  695. Going to the next request
  696. Waking up in 4.6 seconds.
  697. Cleaning up request 1 ID 70 with timestamp +147
  698. Cleaning up request 2 ID 71 with timestamp +147
  699. Cleaning up request 3 ID 72 with timestamp +147
  700. Cleaning up request 4 ID 73 with timestamp +147
  701. Cleaning up request 5 ID 74 with timestamp +147
  702. Cleaning up request 6 ID 75 with timestamp +147
  703. Cleaning up request 7 ID 76 with timestamp +147
  704. Cleaning up request 8 ID 77 with timestamp +147
  705. Cleaning up request 9 ID 78 with timestamp +147
  706. Cleaning up request 10 ID 79 with timestamp +147
  707. Ready to process requests.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement