Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=70, length=125
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x0200000b01646f6c66696e
- Message-Authenticator = 0xa71c945fa8fde51e719d8f084a977203
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 0 length 11
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] = updated
- [files] users: Matched entry dolfin at line 204
- ++[files] = ok
- ++[expiration] = noop
- ++[logintime] = noop
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] = noop
- +} # group authorize = updated
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] EAP Identity
- [eap] processing type tls
- [tls] Initiate
- [tls] Start returned 1
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 70 to 192.168.0.1 port 1824
- EAP-Message = 0x010100061520
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf24548dce311b6170afe8a3046595
- Finished request 1.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=71, length=138
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf24548dce311b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020100060319
- Message-Authenticator = 0xf5af8d115dbd17b1273b5cf3460a0e1f
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 1 length 6
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] = updated
- [files] users: Matched entry dolfin at line 204
- ++[files] = ok
- ++[expiration] = noop
- ++[logintime] = noop
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] = noop
- +} # group authorize = updated
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP NAK
- [eap] EAP-NAK asked for EAP-Type/peap
- [eap] processing type tls
- [tls] Initiate
- [tls] Start returned 1
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 71 to 192.168.0.1 port 1824
- EAP-Message = 0x010200061920
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf24548ccd3d1b6170afe8a3046595
- Finished request 2.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=72, length=307
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf24548ccd3d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020200af1980000000a516030100a00100009c0303391f09bfa37b28141a28a2f682ace7fba3b32a88afbca524974bca1d8b3e5c9e00003ec02cc030009fc02bc02f009ecca9cca8c00ac024c014c0280039006bc009c023c013c02700330067c007c011009d009c0035003d002f003c00050004000a01000035ff0100010000170000000d001600140601060305010503040104030301030302010203000b00020100000a00080006001700180019
- Message-Authenticator = 0x98bfe0e1a824d5eb75bde226aa44fe3c
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 2 length 175
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 165
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] (other): before/accept initialization
- [peap] TLS_accept: before/accept initialization
- [peap] <<< Unknown TLS version [length 0005]
- [peap] <<< Unknown TLS version [length 00a0]
- [peap] TLS_accept: unknown state
- [peap] >>> Unknown TLS version [length 0005]
- [peap] >>> Unknown TLS version [length 0039]
- [peap] TLS_accept: unknown state
- [peap] >>> Unknown TLS version [length 0005]
- [peap] >>> Unknown TLS version [length 02c0]
- [peap] TLS_accept: unknown state
- [peap] >>> Unknown TLS version [length 0005]
- [peap] >>> Unknown TLS version [length 014d]
- [peap] TLS_accept: unknown state
- [peap] >>> Unknown TLS version [length 0005]
- [peap] >>> Unknown TLS version [length 0004]
- [peap] TLS_accept: unknown state
- [peap] TLS_accept: unknown state
- [peap] TLS_accept: unknown state
- [peap] TLS_accept: Need to read more data: unknown state
- [peap] TLS_accept: Need to read more data: unknown state
- In SSL Handshake Phase
- In SSL Accept mode
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 72 to 192.168.0.1 port 1824
- EAP-Message = 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
- EAP-Message = 0xd216cd1a2b85a50ebb2614d5f61cda58dd2fa72589b9ee2335a9a90316db953dbbcdca0f50c8dd45d6e7dc4ce8460cb49242f56e5da81b1f53f5eeca86c90d4e37f16b59e66898429cdd59678a41d954adc024b11377b999604299db30ffc02752e667b1840ae9c9edfd25022ac7f67eb7d5e37e8d631d13be410e549ffdea2bd04881fa6bb8ca3da5e45695570cf72bca997a17444f75d7aa98fc5baf97e54c09017747ee422e7a7efc2b49ef9302011a240621a57dee54757344f00b294b1e1a13ffc9764c0a3e515867f4f02eb5a3d388e9fd2eab15381be95c9ef676fb938f781690bb15fb550203010001a30d300b30090603551d130402300030
- EAP-Message = 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
- EAP-Message = 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
- EAP-Message = 0x8d0e334eaf70fcbe93478c8f
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf24548fcc3d1b6170afe8a3046595
- Finished request 3.
- Going to the next request
- Waking up in 4.9 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=73, length=138
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf24548fcc3d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020300061900
- Message-Authenticator = 0x0659f5cb5ed3848bf7a22b0ab50849b4
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 3 length 6
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake fragment handler
- [peap] eaptls_verify returned 1
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 73 to 192.168.0.1 port 1824
- EAP-Message = 0x0104006e190065ef71208431f64416312092576a21f6cb2a2f0a893fc0af86a548fbc59ff79b82c45d49a5e94888fc0e03a0177f33a610c471589bd94f99f3e186bf8f9d8231bb21637db46ac9328f6914d45ff6be911609ce55047c0935b7c42f9abe8df516030300040e000000
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf24548ecb3d1b6170afe8a3046595
- Finished request 4.
- Going to the next request
- Waking up in 4.8 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=74, length=268
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf24548ecb3d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x0204008819800000007e16030300461000004241049c2692fd6293ee4edc3ac6fcd06cb6677eb9cefd8cd0e8b99fb445c6306a6e1cafc78630e43d8979119c672b4102026bdb24d0093bb4288a1216ab2e6e1f216e14030300010116030300280000000000000000294d6d281d4e7114abe638ceb299f01958b50fd5ae9b26987841cf913036784f
- Message-Authenticator = 0x19b3758e6a18d7b2d97bee173417b08b
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 4 length 136
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- TLS Length 126
- [peap] Length Included
- [peap] eaptls_verify returned 11
- [peap] <<< Unknown TLS version [length 0005]
- [peap] <<< Unknown TLS version [length 0046]
- [peap] TLS_accept: unknown state
- [peap] TLS_accept: unknown state
- [peap] <<< Unknown TLS version [length 0005]
- [peap] <<< Unknown TLS version [length 0001]
- [peap] <<< Unknown TLS version [length 0005]
- [peap] <<< Unknown TLS version [length 0010]
- [peap] TLS_accept: unknown state
- [peap] >>> Unknown TLS version [length 0005]
- [peap] >>> Unknown TLS version [length 0001]
- [peap] TLS_accept: unknown state
- [peap] >>> Unknown TLS version [length 0005]
- [peap] >>> Unknown TLS version [length 0010]
- [peap] TLS_accept: unknown state
- [peap] TLS_accept: unknown state
- [peap] (other): SSL negotiation finished successfully
- SSL Connection Established
- [peap] eaptls_process returned 13
- [peap] EAPTLS_HANDLED
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 74 to 192.168.0.1 port 1824
- EAP-Message = 0x010500391900140303000101160303002803fb2ff06fb6912c9932f2c656c7bd5e5dc0db5207b5b1850ba93f89747ce084fd2f84a590ccfed7
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf245489ca3d1b6170afe8a3046595
- Finished request 5.
- Going to the next request
- Waking up in 4.8 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=75, length=138
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf245489ca3d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020500061900
- Message-Authenticator = 0xf57b32b8405ecc1d6b9cce3816e5b6da
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 5 length 6
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] Received TLS ACK
- [peap] ACK handshake is finished
- [peap] eaptls_verify returned 3
- [peap] eaptls_process returned 3
- [peap] EAPTLS_SUCCESS
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state TUNNEL ESTABLISHED
- [peap] >>> Unknown TLS version [length 0005]
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 75 to 192.168.0.1 port 1824
- EAP-Message = 0x010600281900170303001d03fb2ff06fb6912dae7ee248bf4760ae1ff1f1ddb9a34f29452d575183
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf245488c93d1b6170afe8a3046595
- Finished request 6.
- Going to the next request
- Waking up in 4.8 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=76, length=174
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf245488c93d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x0206002a1900170303001f000000000000000194c8c64796ce78d160f674df6aed935a260006ceadc87b
- Message-Authenticator = 0x0c7b616fe1868b331512cb2ad8c37892
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 6 length 42
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] <<< Unknown TLS version [length 0005]
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state WAITING FOR INNER IDENTITY
- [peap] Identity - dolfin
- [peap] Got inner identity 'dolfin'
- [peap] Setting default EAP type for tunneled EAP session.
- [peap] Got tunneled request
- EAP-Message = 0x0206000b01646f6c66696e
- server {
- [peap] Setting User-Name to dolfin
- Sending tunneled request
- EAP-Message = 0x0206000b01646f6c66696e
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "dolfin"
- server inner-tunnel {
- # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
- +group authorize {
- ++[chap] = noop
- ++[mschap] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- ++update control {
- ++} # update control = noop
- [eap] EAP packet type response id 6 length 11
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] = updated
- [files] users: Matched entry dolfin at line 204
- ++[files] = ok
- ++[expiration] = noop
- ++[logintime] = noop
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] = noop
- +} # group authorize = updated
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- +group authenticate {
- [eap] EAP Identity
- [eap] processing type mschapv2
- rlm_eap_mschapv2: Issuing Challenge
- ++[eap] = handled
- +} # group authenticate = handled
- } # server inner-tunnel
- [peap] Got tunneled reply code 11
- EAP-Message = 0x010700201a0107001b1026653a8466eb88a0d9fe804e7f972fe0646f6c66696e
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x36c4ffb536c3e5fe83f8514ef9adf38e
- [peap] Got tunneled reply RADIUS code Access-Challenge
- EAP-Message = 0x010700201a0107001b1026653a8466eb88a0d9fe804e7f972fe0646f6c66696e
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x36c4ffb536c3e5fe83f8514ef9adf38e
- [peap] Got tunneled Access-Challenge
- [peap] >>> Unknown TLS version [length 0005]
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 76 to 192.168.0.1 port 1824
- EAP-Message = 0x0107003f1900170303003403fb2ff06fb6912ef30f8acc91d807ba427eed7fe6836e0893d0dbbfc76c4de50c5993e9964431cc1b96fa7a958fe6a25ef058cb
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf24548bc83d1b6170afe8a3046595
- Finished request 7.
- Going to the next request
- Waking up in 4.7 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=77, length=228
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf24548bc83d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020700601900170303005500000000000000023a846d6ca08ab3fc4ce23a4a63693382e7539fb1df76a6821b0bf13e6db995aca4a38b8f3953896291f6516808fbec7d4d3efcb5fc06e335f3067b80972faa36b4623f7a09e4e0520f9dbb4c3a
- Message-Authenticator = 0x6ad9a4c43058a80de30816822b42e17a
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 7 length 96
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] <<< Unknown TLS version [length 0005]
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state phase2
- [peap] EAP type mschapv2
- [peap] Got tunneled request
- EAP-Message = 0x020700411a0207003c31d94f989453dc9fca53bad5b944eb435d00000000000000000616304f26517feb2bd2a16cb51b097cc5cc8619edd2acd200646f6c66696e
- server {
- [peap] Setting User-Name to dolfin
- Sending tunneled request
- EAP-Message = 0x020700411a0207003c31d94f989453dc9fca53bad5b944eb435d00000000000000000616304f26517feb2bd2a16cb51b097cc5cc8619edd2acd200646f6c66696e
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "dolfin"
- State = 0x36c4ffb536c3e5fe83f8514ef9adf38e
- server inner-tunnel {
- # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
- +group authorize {
- ++[chap] = noop
- ++[mschap] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- ++update control {
- ++} # update control = noop
- [eap] EAP packet type response id 7 length 65
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] = updated
- [files] users: Matched entry dolfin at line 204
- ++[files] = ok
- ++[expiration] = noop
- ++[logintime] = noop
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] = noop
- +} # group authorize = updated
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/mschapv2
- [eap] processing type mschapv2
- [mschapv2] # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- [mschapv2] +group MS-CHAP {
- [mschap] Creating challenge hash with username: dolfin
- [mschap] Client is using MS-CHAPv2 for dolfin, we need NT-Password
- [mschap] adding MS-CHAPv2 MPPE keys
- ++[mschap] = ok
- +} # group MS-CHAP = ok
- MSCHAP Success
- ++[eap] = handled
- +} # group authenticate = handled
- } # server inner-tunnel
- [peap] Got tunneled reply code 11
- EAP-Message = 0x010800331a0307002e533d42303343393741343745424541443032303643363530313338304236424342344331344235463636
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x36c4ffb537cce5fe83f8514ef9adf38e
- [peap] Got tunneled reply RADIUS code Access-Challenge
- EAP-Message = 0x010800331a0307002e533d42303343393741343745424541443032303643363530313338304236424342344331344235463636
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x36c4ffb537cce5fe83f8514ef9adf38e
- [peap] Got tunneled Access-Challenge
- [peap] >>> Unknown TLS version [length 0005]
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 77 to 192.168.0.1 port 1824
- EAP-Message = 0x010800521900170303004703fb2ff06fb6912f3fb3e828dd977a193b7677f1a15e5c57b8612990ce717521e57082c621c37893382614fc22fad2638ba49624ede51487d8d6df5a9444755d06d736d43ae849
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf24548ac73d1b6170afe8a3046595
- Finished request 8.
- Going to the next request
- Waking up in 4.7 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=78, length=169
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf24548ac73d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x020800251900170303001a0000000000000003fd7cae6980454565f6863b4a8157b1814fe1
- Message-Authenticator = 0x48aa79cc9c3cc3e50aac66f4fdc25dc0
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 8 length 37
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] <<< Unknown TLS version [length 0005]
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state phase2
- [peap] EAP type mschapv2
- [peap] Got tunneled request
- EAP-Message = 0x020800061a03
- server {
- [peap] Setting User-Name to dolfin
- Sending tunneled request
- EAP-Message = 0x020800061a03
- FreeRADIUS-Proxied-To = 127.0.0.1
- User-Name = "dolfin"
- State = 0x36c4ffb537cce5fe83f8514ef9adf38e
- server inner-tunnel {
- # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel
- +group authorize {
- ++[chap] = noop
- ++[mschap] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- ++update control {
- ++} # update control = noop
- [eap] EAP packet type response id 8 length 6
- [eap] No EAP Start, assuming it's an on-going EAP conversation
- ++[eap] = updated
- [files] users: Matched entry dolfin at line 204
- ++[files] = ok
- ++[expiration] = noop
- ++[logintime] = noop
- [pap] WARNING: Auth-Type already set. Not setting to PAP
- ++[pap] = noop
- +} # group authorize = updated
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/mschapv2
- [eap] processing type mschapv2
- [eap] Freeing handler
- ++[eap] = ok
- +} # group authenticate = ok
- WARNING: Empty post-auth section. Using default return values.
- # Executing section post-auth from file /etc/freeradius/sites-enabled/inner-tunnel
- } # server inner-tunnel
- [peap] Got tunneled reply code 2
- MS-MPPE-Encryption-Policy = 0x00000001
- MS-MPPE-Encryption-Types = 0x00000006
- MS-MPPE-Send-Key = 0x8b087c5987bd86c446247fcce45f8883
- MS-MPPE-Recv-Key = 0xdb590e0a25c47c87b7edac62296521b0
- EAP-Message = 0x03080004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "dolfin"
- [peap] Got tunneled reply RADIUS code Access-Accept
- MS-MPPE-Encryption-Policy = 0x00000001
- MS-MPPE-Encryption-Types = 0x00000006
- MS-MPPE-Send-Key = 0x8b087c5987bd86c446247fcce45f8883
- MS-MPPE-Recv-Key = 0xdb590e0a25c47c87b7edac62296521b0
- EAP-Message = 0x03080004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "dolfin"
- [peap] Tunneled authentication was successful.
- [peap] SUCCESS
- [peap] >>> Unknown TLS version [length 0005]
- ++[eap] = handled
- +} # group authenticate = handled
- Sending Access-Challenge of id 78 to 192.168.0.1 port 1824
- EAP-Message = 0x0109002e1900170303002303fb2ff06fb6913042b1ce102906cf92e2289034c0633e66f9d5d75ee2c1b6c07c2d68
- Message-Authenticator = 0x00000000000000000000000000000000
- State = 0x8dcf245485c63d1b6170afe8a3046595
- Finished request 9.
- Going to the next request
- Waking up in 4.6 seconds.
- rad_recv: Access-Request packet from host 192.168.0.1 port 1824, id=79, length=178
- User-Name = "dolfin"
- NAS-IP-Address = 192.168.0.1
- Called-Station-Id = "506a037b0d64"
- Calling-Station-Id = "dcefcae47b8c"
- NAS-Identifier = "506a037b0d64"
- NAS-Port = 19
- Framed-MTU = 1400
- State = 0x8dcf245485c63d1b6170afe8a3046595
- NAS-Port-Type = Wireless-802.11
- EAP-Message = 0x0209002e1900170303002300000000000000048383c7efa1d72eaee82ca743d33b97e60528d650b7432ccc034263
- Message-Authenticator = 0x3093e08050c0b640a7fb6e7c7335ad96
- # Executing section authorize from file /etc/freeradius/sites-enabled/default
- +group authorize {
- ++[preprocess] = ok
- ++[chap] = noop
- ++[mschap] = noop
- ++[digest] = noop
- [suffix] No '@' in User-Name = "dolfin", looking up realm NULL
- [suffix] No such realm "NULL"
- ++[suffix] = noop
- [eap] EAP packet type response id 9 length 46
- [eap] Continuing tunnel setup.
- ++[eap] = ok
- +} # group authorize = ok
- Found Auth-Type = EAP
- # Executing group from file /etc/freeradius/sites-enabled/default
- +group authenticate {
- [eap] Request found, released from the list
- [eap] EAP/peap
- [eap] processing type peap
- [peap] processing EAP-TLS
- [peap] eaptls_verify returned 7
- [peap] Done initial handshake
- [peap] <<< Unknown TLS version [length 0005]
- [peap] eaptls_process returned 7
- [peap] EAPTLS_OK
- [peap] Session established. Decoding tunneled attributes.
- [peap] Peap state send tlv success
- [peap] Received EAP-TLV response.
- [peap] Success
- [eap] Freeing handler
- ++[eap] = ok
- +} # group authenticate = ok
- # Executing section post-auth from file /etc/freeradius/sites-enabled/default
- +group post-auth {
- ++[exec] = noop
- +} # group post-auth = noop
- Sending Access-Accept of id 79 to 192.168.0.1 port 1824
- MS-MPPE-Recv-Key = 0xbe1384c1e3eeb93537926b20da0780e154083010609906ca488a1bd84fe5a7dc
- MS-MPPE-Send-Key = 0x25feaf6de7c498e819cd5063309887b0a5a8d40fce9d02336edbc642f3e901d2
- EAP-Message = 0x03090004
- Message-Authenticator = 0x00000000000000000000000000000000
- User-Name = "dolfin"
- Finished request 10.
- Going to the next request
- Waking up in 4.6 seconds.
- Cleaning up request 1 ID 70 with timestamp +147
- Cleaning up request 2 ID 71 with timestamp +147
- Cleaning up request 3 ID 72 with timestamp +147
- Cleaning up request 4 ID 73 with timestamp +147
- Cleaning up request 5 ID 74 with timestamp +147
- Cleaning up request 6 ID 75 with timestamp +147
- Cleaning up request 7 ID 76 with timestamp +147
- Cleaning up request 8 ID 77 with timestamp +147
- Cleaning up request 9 ID 78 with timestamp +147
- Cleaning up request 10 ID 79 with timestamp +147
- Ready to process requests.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement