Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- FreeRADIUS Version 3.2.3
- Copyright (C) 1999-2022 The FreeRADIUS server project and contributors
- There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
- PARTICULAR PURPOSE
- You may redistribute copies of FreeRADIUS under the terms of the
- GNU General Public License
- For more information about these matters, see the file named COPYRIGHT
- Starting - reading configuration files ...
- including dictionary file /usr/share/freeradius/dictionary
- including dictionary file /usr/share/freeradius/dictionary.dhcp
- including dictionary file /usr/share/freeradius/dictionary.vqp
- including dictionary file /etc/raddb/dictionary
- including configuration file /etc/raddb/radiusd.conf
- including configuration file /etc/raddb/proxy.conf
- including configuration file /etc/raddb/clients.conf
- including files in directory /etc/raddb/mods-enabled/
- including configuration file /etc/raddb/mods-enabled/always
- including configuration file /etc/raddb/mods-enabled/attr_filter
- including configuration file /etc/raddb/mods-enabled/chap
- including configuration file /etc/raddb/mods-enabled/date
- including configuration file /etc/raddb/mods-enabled/detail
- including configuration file /etc/raddb/mods-enabled/detail.log
- including configuration file /etc/raddb/mods-enabled/digest
- including configuration file /etc/raddb/mods-enabled/dynamic_clients
- including configuration file /etc/raddb/mods-enabled/eap
- including configuration file /etc/raddb/mods-enabled/echo
- including configuration file /etc/raddb/mods-enabled/exec
- including configuration file /etc/raddb/mods-enabled/expiration
- including configuration file /etc/raddb/mods-enabled/expr
- including configuration file /etc/raddb/mods-enabled/files
- including configuration file /etc/raddb/mods-enabled/linelog
- including configuration file /etc/raddb/mods-enabled/logintime
- including configuration file /etc/raddb/mods-enabled/mschap
- including configuration file /etc/raddb/mods-enabled/ntlm_auth
- including configuration file /etc/raddb/mods-enabled/pap
- including configuration file /etc/raddb/mods-enabled/passwd
- including configuration file /etc/raddb/mods-enabled/preprocess
- including configuration file /etc/raddb/mods-enabled/radutmp
- including configuration file /etc/raddb/mods-enabled/realm
- including configuration file /etc/raddb/mods-enabled/replicate
- including configuration file /etc/raddb/mods-enabled/soh
- including configuration file /etc/raddb/mods-enabled/sradutmp
- including configuration file /etc/raddb/mods-enabled/unix
- including configuration file /etc/raddb/mods-enabled/unpack
- including configuration file /etc/raddb/mods-enabled/utf8
- including configuration file /etc/raddb/mods-enabled/totp
- including files in directory /etc/raddb/policy.d/
- including configuration file /etc/raddb/policy.d/accounting
- including configuration file /etc/raddb/policy.d/canonicalization
- including configuration file /etc/raddb/policy.d/control
- including configuration file /etc/raddb/policy.d/cui
- including configuration file /etc/raddb/policy.d/debug
- including configuration file /etc/raddb/policy.d/dhcp
- including configuration file /etc/raddb/policy.d/eap
- including configuration file /etc/raddb/policy.d/filter
- including configuration file /etc/raddb/policy.d/operator-name
- including configuration file /etc/raddb/policy.d/rfc7542
- including configuration file /etc/raddb/policy.d/abfab-tr
- including configuration file /etc/raddb/policy.d/moonshot-targeted-ids
- including files in directory /etc/raddb/sites-enabled/
- including configuration file /etc/raddb/sites-enabled/default
- including configuration file /etc/raddb/sites-enabled/inner-tunnel
- main {
- security {
- user = "radiusd"
- group = "radiusd"
- allow_core_dumps = no
- }
- name = "radiusd"
- prefix = "/usr"
- localstatedir = "/var"
- logdir = "/var/log/radius"
- run_dir = "/var/run/radiusd"
- }
- main {
- name = "radiusd"
- prefix = "/usr"
- localstatedir = "/var"
- sbindir = "/usr/sbin"
- logdir = "/var/log/radius"
- run_dir = "/var/run/radiusd"
- libdir = "/usr/lib64/freeradius"
- radacctdir = "/var/log/radius/radacct"
- hostname_lookups = no
- max_request_time = 30
- cleanup_delay = 5
- max_requests = 16384
- postauth_client_lost = no
- pidfile = "/var/run/radiusd/radiusd.pid"
- checkrad = "/usr/sbin/checkrad"
- debug_level = 0
- proxy_requests = no
- log {
- stripped_names = no
- auth = yes
- auth_accept = yes
- auth_reject = yes
- auth_badpass = yes
- auth_goodpass = yes
- colourise = yes
- msg_denied = "You are already logged in - access denied"
- }
- resources {
- }
- security {
- max_attributes = 200
- reject_delay = 1.000000
- status_server = yes
- allow_vulnerable_openssl = "no"
- }
- }
- radiusd: #### Loading Realms and Home Servers ####
- proxy server {
- retry_delay = 5
- retry_count = 3
- default_fallback = no
- dead_time = 120
- wake_all_if_all_dead = no
- }
- home_server localhost {
- nonblock = no
- ipaddr = 127.0.0.1
- port = 1812
- type = "auth"
- secret = <<< secret >>>
- response_window = 20.000000
- response_timeouts = 1
- max_outstanding = 65536
- zombie_period = 40
- status_check = "status-server"
- ping_interval = 30
- check_interval = 30
- check_timeout = 4
- num_answers_to_alive = 3
- revive_interval = 120
- limit {
- max_connections = 16
- max_requests = 0
- lifetime = 0
- idle_timeout = 0
- }
- coa {
- irt = 2
- mrt = 16
- mrc = 5
- mrd = 30
- }
- recv_coa {
- }
- }
- realm LOCAL {
- }
- realm NULL {
- }
- home_server_pool my_auth_failover {
- type = fail-over
- home_server = localhost
- }
- radiusd: #### Loading Clients ####
- client localhost {
- ipaddr = 127.0.0.1
- require_message_authenticator = no
- secret = <<< secret >>>
- nas_type = "other"
- proto = "*"
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- client localhost_ipv6 {
- ipv6addr = ::1
- require_message_authenticator = no
- secret = <<< secret >>>
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- client private-network-2 {
- ipaddr = 192.168.0.0/16
- require_message_authenticator = no
- secret = <<< secret >>>
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- Debugger not attached
- systemd watchdog is disabled
- # Creating Auth-Type = mschap
- # Creating Auth-Type = digest
- # Creating Auth-Type = eap
- # Creating Auth-Type = PAP
- # Creating Auth-Type = CHAP
- # Creating Auth-Type = MS-CHAP
- # Creating Autz-Type = New-TLS-Connection
- radiusd: #### Instantiating modules ####
- modules {
- # Loaded module rlm_always
- # Loading module "reject" from file /etc/raddb/mods-enabled/always
- always reject {
- rcode = "reject"
- simulcount = 0
- mpp = no
- }
- # Loading module "fail" from file /etc/raddb/mods-enabled/always
- always fail {
- rcode = "fail"
- simulcount = 0
- mpp = no
- }
- # Loading module "ok" from file /etc/raddb/mods-enabled/always
- always ok {
- rcode = "ok"
- simulcount = 0
- mpp = no
- }
- # Loading module "handled" from file /etc/raddb/mods-enabled/always
- always handled {
- rcode = "handled"
- simulcount = 0
- mpp = no
- }
- # Loading module "invalid" from file /etc/raddb/mods-enabled/always
- always invalid {
- rcode = "invalid"
- simulcount = 0
- mpp = no
- }
- # Loading module "userlock" from file /etc/raddb/mods-enabled/always
- always userlock {
- rcode = "userlock"
- simulcount = 0
- mpp = no
- }
- # Loading module "notfound" from file /etc/raddb/mods-enabled/always
- always notfound {
- rcode = "notfound"
- simulcount = 0
- mpp = no
- }
- # Loading module "noop" from file /etc/raddb/mods-enabled/always
- always noop {
- rcode = "noop"
- simulcount = 0
- mpp = no
- }
- # Loading module "updated" from file /etc/raddb/mods-enabled/always
- always updated {
- rcode = "updated"
- simulcount = 0
- mpp = no
- }
- # Loaded module rlm_attr_filter
- # Loading module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter
- attr_filter attr_filter.post-proxy {
- filename = "/etc/raddb/mods-config/attr_filter/post-proxy"
- key = "%{Realm}"
- relaxed = no
- }
- # Loading module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter
- attr_filter attr_filter.pre-proxy {
- filename = "/etc/raddb/mods-config/attr_filter/pre-proxy"
- key = "%{Realm}"
- relaxed = no
- }
- # Loading module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter
- attr_filter attr_filter.access_reject {
- filename = "/etc/raddb/mods-config/attr_filter/access_reject"
- key = "%{User-Name}"
- relaxed = no
- }
- # Loading module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter
- attr_filter attr_filter.access_challenge {
- filename = "/etc/raddb/mods-config/attr_filter/access_challenge"
- key = "%{User-Name}"
- relaxed = no
- }
- # Loading module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter
- attr_filter attr_filter.accounting_response {
- filename = "/etc/raddb/mods-config/attr_filter/accounting_response"
- key = "%{User-Name}"
- relaxed = no
- }
- # Loading module "attr_filter.coa" from file /etc/raddb/mods-enabled/attr_filter
- attr_filter attr_filter.coa {
- filename = "/etc/raddb/mods-config/attr_filter/coa"
- key = "%{User-Name}"
- relaxed = no
- }
- # Loaded module rlm_chap
- # Loading module "chap" from file /etc/raddb/mods-enabled/chap
- # Loaded module rlm_date
- # Loading module "date" from file /etc/raddb/mods-enabled/date
- date {
- format = "%b %e %Y %H:%M:%S %Z"
- utc = no
- }
- # Loading module "wispr2date" from file /etc/raddb/mods-enabled/date
- date wispr2date {
- format = "%Y-%m-%dT%H:%M:%S"
- utc = no
- }
- # Loaded module rlm_detail
- # Loading module "detail" from file /etc/raddb/mods-enabled/detail
- detail {
- filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
- header = "%t"
- permissions = 384
- locking = no
- escape_filenames = no
- log_packet_header = no
- }
- # Loading module "auth_log" from file /etc/raddb/mods-enabled/detail.log
- detail auth_log {
- filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
- header = "%t"
- permissions = 384
- locking = no
- escape_filenames = no
- log_packet_header = no
- }
- # Loading module "reply_log" from file /etc/raddb/mods-enabled/detail.log
- detail reply_log {
- filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
- header = "%t"
- permissions = 384
- locking = no
- escape_filenames = no
- log_packet_header = no
- }
- # Loading module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log
- detail pre_proxy_log {
- filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
- header = "%t"
- permissions = 384
- locking = no
- escape_filenames = no
- log_packet_header = no
- }
- # Loading module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log
- detail post_proxy_log {
- filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
- header = "%t"
- permissions = 384
- locking = no
- escape_filenames = no
- log_packet_header = no
- }
- # Loaded module rlm_digest
- # Loading module "digest" from file /etc/raddb/mods-enabled/digest
- # Loaded module rlm_dynamic_clients
- # Loading module "dynamic_clients" from file /etc/raddb/mods-enabled/dynamic_clients
- # Loaded module rlm_eap
- # Loading module "eap" from file /etc/raddb/mods-enabled/eap
- eap {
- default_eap_type = "tls"
- timer_expire = 60
- max_eap_type = 52
- ignore_unknown_eap_types = no
- cisco_accounting_username_bug = no
- max_sessions = 16384
- }
- # Loaded module rlm_exec
- # Loading module "echo" from file /etc/raddb/mods-enabled/echo
- exec echo {
- wait = yes
- program = "/bin/echo %{User-Name}"
- input_pairs = "request"
- output_pairs = "reply"
- shell_escape = yes
- }
- # Loading module "exec" from file /etc/raddb/mods-enabled/exec
- exec {
- wait = no
- input_pairs = "request"
- shell_escape = yes
- timeout = 10
- }
- # Loaded module rlm_expiration
- # Loading module "expiration" from file /etc/raddb/mods-enabled/expiration
- # Loaded module rlm_expr
- # Loading module "expr" from file /etc/raddb/mods-enabled/expr
- expr {
- safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
- }
- # Loaded module rlm_files
- # Loading module "files" from file /etc/raddb/mods-enabled/files
- files {
- filename = "/etc/raddb/mods-config/files/authorize"
- acctusersfile = "/etc/raddb/mods-config/files/accounting"
- preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy"
- }
- # Loaded module rlm_linelog
- # Loading module "linelog" from file /etc/raddb/mods-enabled/linelog
- linelog {
- filename = "/var/log/radius/linelog"
- escape_filenames = no
- syslog_severity = "info"
- permissions = 384
- format = "This is a log message for %{User-Name}"
- reference = "messages.%{%{reply:Packet-Type}:-default}"
- }
- # Loading module "log_accounting" from file /etc/raddb/mods-enabled/linelog
- linelog log_accounting {
- filename = "/var/log/radius/linelog-accounting"
- escape_filenames = no
- syslog_severity = "info"
- permissions = 384
- format = ""
- reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
- }
- # Loaded module rlm_logintime
- # Loading module "logintime" from file /etc/raddb/mods-enabled/logintime
- logintime {
- minimum_timeout = 60
- }
- # Loaded module rlm_mschap
- # Loading module "mschap" from file /etc/raddb/mods-enabled/mschap
- mschap {
- use_mppe = yes
- require_encryption = no
- require_strong = no
- with_ntdomain_hack = yes
- passchange {
- }
- allow_retry = yes
- winbind_retry_with_normalised_username = no
- }
- # Loading module "ntlm_auth" from file /etc/raddb/mods-enabled/ntlm_auth
- exec ntlm_auth {
- wait = yes
- program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
- shell_escape = yes
- }
- # Loaded module rlm_pap
- # Loading module "pap" from file /etc/raddb/mods-enabled/pap
- pap {
- normalise = yes
- }
- # Loaded module rlm_passwd
- # Loading module "etc_passwd" from file /etc/raddb/mods-enabled/passwd
- passwd etc_passwd {
- filename = "/etc/passwd"
- format = "*User-Name:Crypt-Password:"
- delimiter = ":"
- ignore_nislike = no
- ignore_empty = yes
- allow_multiple_keys = no
- hash_size = 100
- }
- # Loaded module rlm_preprocess
- # Loading module "preprocess" from file /etc/raddb/mods-enabled/preprocess
- preprocess {
- huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups"
- hints = "/etc/raddb/mods-config/preprocess/hints"
- with_ascend_hack = no
- ascend_channels_per_line = 23
- with_ntdomain_hack = no
- with_specialix_jetstream_hack = no
- with_cisco_vsa_hack = no
- with_alvarion_vsa_hack = no
- }
- # Loaded module rlm_radutmp
- # Loading module "radutmp" from file /etc/raddb/mods-enabled/radutmp
- radutmp {
- filename = "/var/log/radius/radutmp"
- username = "%{User-Name}"
- case_sensitive = yes
- check_with_nas = yes
- permissions = 384
- caller_id = yes
- }
- # Loaded module rlm_realm
- # Loading module "IPASS" from file /etc/raddb/mods-enabled/realm
- realm IPASS {
- format = "prefix"
- delimiter = "/"
- ignore_default = no
- ignore_null = no
- }
- # Loading module "suffix" from file /etc/raddb/mods-enabled/realm
- realm suffix {
- format = "suffix"
- delimiter = "@"
- ignore_default = no
- ignore_null = no
- }
- # Loading module "bangpath" from file /etc/raddb/mods-enabled/realm
- realm bangpath {
- format = "prefix"
- delimiter = "!"
- ignore_default = no
- ignore_null = no
- }
- # Loading module "realmpercent" from file /etc/raddb/mods-enabled/realm
- realm realmpercent {
- format = "suffix"
- delimiter = "%"
- ignore_default = no
- ignore_null = no
- }
- # Loading module "ntdomain" from file /etc/raddb/mods-enabled/realm
- realm ntdomain {
- format = "prefix"
- delimiter = "\\"
- ignore_default = no
- ignore_null = no
- }
- # Loaded module rlm_replicate
- # Loading module "replicate" from file /etc/raddb/mods-enabled/replicate
- # Loaded module rlm_soh
- # Loading module "soh" from file /etc/raddb/mods-enabled/soh
- soh {
- dhcp = yes
- }
- # Loading module "sradutmp" from file /etc/raddb/mods-enabled/sradutmp
- radutmp sradutmp {
- filename = "/var/log/radius/sradutmp"
- username = "%{User-Name}"
- case_sensitive = yes
- check_with_nas = yes
- permissions = 420
- caller_id = no
- }
- # Loaded module rlm_unix
- # Loading module "unix" from file /etc/raddb/mods-enabled/unix
- unix {
- radwtmp = "/var/log/radius/radwtmp"
- }
- Creating attribute Unix-Group
- # Loaded module rlm_unpack
- # Loading module "unpack" from file /etc/raddb/mods-enabled/unpack
- # Loaded module rlm_utf8
- # Loading module "utf8" from file /etc/raddb/mods-enabled/utf8
- # Loaded module rlm_totp
- # Loading module "totp" from file /etc/raddb/mods-enabled/totp
- instantiate {
- }
- # Instantiating module "reject" from file /etc/raddb/mods-enabled/always
- # Instantiating module "fail" from file /etc/raddb/mods-enabled/always
- # Instantiating module "ok" from file /etc/raddb/mods-enabled/always
- # Instantiating module "handled" from file /etc/raddb/mods-enabled/always
- # Instantiating module "invalid" from file /etc/raddb/mods-enabled/always
- # Instantiating module "userlock" from file /etc/raddb/mods-enabled/always
- # Instantiating module "notfound" from file /etc/raddb/mods-enabled/always
- # Instantiating module "noop" from file /etc/raddb/mods-enabled/always
- # Instantiating module "updated" from file /etc/raddb/mods-enabled/always
- # Instantiating module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter
- reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy
- # Instantiating module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter
- reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy
- # Instantiating module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter
- reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject
- # Instantiating module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter
- reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge
- # Instantiating module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter
- reading pairlist file /etc/raddb/mods-config/attr_filter/accounting_response
- # Instantiating module "attr_filter.coa" from file /etc/raddb/mods-enabled/attr_filter
- reading pairlist file /etc/raddb/mods-config/attr_filter/coa
- # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail
- # Instantiating module "auth_log" from file /etc/raddb/mods-enabled/detail.log
- rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
- # Instantiating module "reply_log" from file /etc/raddb/mods-enabled/detail.log
- # Instantiating module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log
- # Instantiating module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log
- # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap
- # Linked to sub-module rlm_eap_md5
- # Linked to sub-module rlm_eap_gtc
- gtc {
- challenge = "Password: "
- auth_type = "PAP"
- }
- # Linked to sub-module rlm_eap_tls
- tls {
- tls = "tls-common"
- }
- tls-config tls-common {
- verify_depth = 0
- ca_path = "/etc/raddb/certs"
- pem_file_type = yes
- private_key_file = "/etc/raddb/certs/private-example-key.pem"
- certificate_file = "/etc/raddb/certs/private-example-cert.pem"
- ca_file = "/etc/raddb/certs/private-ca-cert.pem"
- private_key_password = <<< secret >>>
- fragment_size = 1024
- include_length = yes
- auto_chain = yes
- check_crl = no
- check_all_crl = no
- ca_path_reload_interval = 0
- cipher_list = "DEFAULT"
- cipher_server_preference = no
- reject_unknown_intermediate_ca = no
- ecdh_curve = "prime256v1"
- tls_max_version = "1.2"
- tls_min_version = "1.2"
- cache {
- enable = yes
- lifetime = 24
- name = "EAP-TLS"
- max_entries = 255
- }
- verify {
- skip_if_ocsp_ok = no
- }
- ocsp {
- enable = no
- override_cert_url = yes
- url = "http://127.0.0.1/ocsp/"
- use_nonce = yes
- timeout = 0
- softfail = no
- }
- }
- # Linked to sub-module rlm_eap_ttls
- ttls {
- tls = "tls-peap"
- default_eap_type = "md5"
- copy_request_to_tunnel = no
- use_tunneled_reply = no
- virtual_server = "inner-tunnel"
- include_length = yes
- require_client_cert = no
- }
- tls-config tls-peap {
- verify_depth = 0
- ca_path = "/etc/raddb/certs"
- pem_file_type = yes
- private_key_file = "/etc/raddb/certs/public-example-key.pem"
- certificate_file = "/etc/raddb/certs/public-example-cert.pem"
- ca_file = "/etc/raddb/certs/public-ca-cert.pem"
- private_key_password = <<< secret >>>
- fragment_size = 1024
- include_length = yes
- auto_chain = yes
- check_crl = no
- check_all_crl = no
- ca_path_reload_interval = 0
- cipher_list = "TLSv1.2"
- cipher_server_preference = no
- reject_unknown_intermediate_ca = no
- ecdh_curve = "prime256v1"
- tls_max_version = "1.2"
- tls_min_version = "1.2"
- cache {
- enable = yes
- lifetime = 24
- name = "EAP-PEAP"
- max_entries = 255
- }
- verify {
- skip_if_ocsp_ok = no
- }
- ocsp {
- enable = no
- override_cert_url = yes
- url = "http://127.0.0.1/ocsp/"
- use_nonce = yes
- timeout = 0
- softfail = no
- }
- }
- # Linked to sub-module rlm_eap_peap
- peap {
- tls = "tls-peap"
- default_eap_type = "mschapv2"
- copy_request_to_tunnel = no
- use_tunneled_reply = no
- proxy_tunneled_request_as_eap = yes
- virtual_server = "inner-tunnel"
- soh = no
- require_client_cert = no
- }
- tls: Using cached TLS configuration from previous invocation
- # Linked to sub-module rlm_eap_mschapv2
- mschapv2 {
- with_ntdomain_hack = no
- send_error = no
- }
- # Instantiating module "expiration" from file /etc/raddb/mods-enabled/expiration
- # Instantiating module "files" from file /etc/raddb/mods-enabled/files
- reading pairlist file /etc/raddb/mods-config/files/authorize
- reading pairlist file /etc/raddb/mods-config/files/accounting
- reading pairlist file /etc/raddb/mods-config/files/pre-proxy
- # Instantiating module "linelog" from file /etc/raddb/mods-enabled/linelog
- # Instantiating module "log_accounting" from file /etc/raddb/mods-enabled/linelog
- # Instantiating module "logintime" from file /etc/raddb/mods-enabled/logintime
- # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap
- rlm_mschap (mschap): using internal authentication
- # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap
- # Instantiating module "etc_passwd" from file /etc/raddb/mods-enabled/passwd
- rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
- # Instantiating module "preprocess" from file /etc/raddb/mods-enabled/preprocess
- reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups
- reading pairlist file /etc/raddb/mods-config/preprocess/hints
- # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm
- # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm
- # Instantiating module "bangpath" from file /etc/raddb/mods-enabled/realm
- # Instantiating module "realmpercent" from file /etc/raddb/mods-enabled/realm
- # Instantiating module "ntdomain" from file /etc/raddb/mods-enabled/realm
- } # modules
- radiusd: #### Loading Virtual Servers ####
- server { # from file /etc/raddb/radiusd.conf
- } # server
- server default { # from file /etc/raddb/sites-enabled/default
- # Loading authenticate {...}
- Compiling Auth-Type PAP for attr Auth-Type
- Compiling Auth-Type CHAP for attr Auth-Type
- Compiling Auth-Type MS-CHAP for attr Auth-Type
- # Loading authorize {...}
- Ignoring "sql" (see raddb/mods-available/README.rst)
- Ignoring "ldap" (see raddb/mods-available/README.rst)
- Compiling Autz-Type New-TLS-Connection for attr Autz-Type
- # Loading preacct {...}
- # Loading accounting {...}
- # Loading post-auth {...}
- Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
- Compiling Post-Auth-Type Challenge for attr Post-Auth-Type
- Compiling Post-Auth-Type Client-Lost for attr Post-Auth-Type
- } # server default
- server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel
- # Loading authenticate {...}
- Compiling Auth-Type PAP for attr Auth-Type
- Compiling Auth-Type CHAP for attr Auth-Type
- Compiling Auth-Type MS-CHAP for attr Auth-Type
- # Loading authorize {...}
- # Loading session {...}
- # Loading post-auth {...}
- # Skipping contents of 'if' as it is always 'false' -- /etc/raddb/sites-enabled/inner-tunnel:366
- Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
- } # server inner-tunnel
- radiusd: #### Opening IP addresses and Ports ####
- listen {
- type = "auth"
- ipaddr = *
- port = 0
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- listen {
- type = "acct"
- ipaddr = *
- port = 0
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- listen {
- type = "auth"
- ipv6addr = ::
- port = 0
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- listen {
- type = "acct"
- ipv6addr = ::
- port = 0
- limit {
- max_connections = 16
- lifetime = 0
- idle_timeout = 30
- }
- }
- listen {
- type = "auth"
- ipaddr = 127.0.0.1
- port = 18120
- }
- Listening on auth address * port 1812 bound to server default
- Listening on acct address * port 1813 bound to server default
- Listening on auth address :: port 1812 bound to server default
- Listening on acct address :: port 1813 bound to server default
- Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
- Ready to process requests
- (0) Received Access-Request Id 0 from 192.168.1.2:52174 to 192.168.1.2:1812 length 128
- (0) User-Name = "johndoe"
- (0) NAS-IP-Address = 127.0.0.1
- (0) Calling-Station-Id = "02-00-00-00-00-01"
- (0) Framed-MTU = 1400
- (0) NAS-Port-Type = Wireless-802.11
- (0) Service-Type = Framed-User
- (0) Connect-Info = "CONNECT 11Mbps 802.11b"
- (0) EAP-Message = 0x02c8000c016a6f686e646f65
- (0) Message-Authenticator = 0x716f1e4b43a19bac613db78a0509acdf
- (0) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (0) authorize {
- (0) policy filter_username {
- (0) if (&User-Name) {
- (0) if (&User-Name) -> TRUE
- (0) if (&User-Name) {
- (0) if (&User-Name =~ / /) {
- (0) if (&User-Name =~ / /) -> FALSE
- (0) if (&User-Name =~ /@[^@]*@/ ) {
- (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (0) if (&User-Name =~ /\.\./ ) {
- (0) if (&User-Name =~ /\.\./ ) -> FALSE
- (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (0) if (&User-Name =~ /\.$/) {
- (0) if (&User-Name =~ /\.$/) -> FALSE
- (0) if (&User-Name =~ /@\./) {
- (0) if (&User-Name =~ /@\./) -> FALSE
- (0) } # if (&User-Name) = notfound
- (0) } # policy filter_username = notfound
- (0) [preprocess] = ok
- (0) [chap] = noop
- (0) [mschap] = noop
- (0) [digest] = noop
- (0) suffix: Checking for suffix after "@"
- (0) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (0) suffix: Found realm "NULL"
- (0) suffix: Adding Stripped-User-Name = "johndoe"
- (0) suffix: Adding Realm = "NULL"
- (0) suffix: Authentication realm is LOCAL
- (0) [suffix] = ok
- (0) eap: Peer sent EAP Response (code 2) ID 200 length 12
- (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
- (0) [eap] = ok
- (0) } # authorize = ok
- (0) Found Auth-Type = eap
- (0) # Executing group from file /etc/raddb/sites-enabled/default
- (0) authenticate {
- (0) eap: Peer sent packet with method EAP Identity (1)
- (0) eap: Calling submodule eap_tls to process data
- (0) eap_tls: (TLS) Initiating new session
- (0) eap_tls: (TLS) Setting verify mode to require certificate from client
- (0) eap: Sending EAP Request (code 1) ID 201 length 6
- (0) eap: EAP session adding &reply:State = 0xadc99705ad009a52
- (0) [eap] = handled
- (0) } # authenticate = handled
- (0) Using Post-Auth-Type Challenge
- (0) # Executing group from file /etc/raddb/sites-enabled/default
- (0) Challenge { ... } # empty sub-section is ignored
- (0) session-state: Saving cached attributes
- (0) Framed-MTU = 1014
- (0) Sent Access-Challenge Id 0 from 192.168.1.2:1812 to 192.168.1.2:52174 length 64
- (0) EAP-Message = 0x01c900060d20
- (0) Message-Authenticator = 0x00000000000000000000000000000000
- (0) State = 0xadc99705ad009a527377a09714487362
- (0) Finished request
- Waking up in 4.9 seconds.
- (1) Received Access-Request Id 1 from 192.168.1.2:52174 to 192.168.1.2:1812 length 336
- (1) User-Name = "johndoe"
- (1) NAS-IP-Address = 127.0.0.1
- (1) Calling-Station-Id = "02-00-00-00-00-01"
- (1) Framed-MTU = 1400
- (1) NAS-Port-Type = Wireless-802.11
- (1) Service-Type = Framed-User
- (1) Connect-Info = "CONNECT 11Mbps 802.11b"
- (1) EAP-Message = 0x02c900ca0d0016030100bf010000bb030359ecb21fa0d35dbfa8d1bb2f45ed49893fa1d416dc2f32bc6f101f33c8edd011000048c02cc030cca9cca8c0adc02bc02fc0acc023c027c00ac014c009c013009dc09d009cc09c003d003c0035002f009fccaac09f009ec09e006b006700390033c008c012000a001600ff0100004a000b000403000102000a000c000a001d0017001e001900180016000000170000000d002600240403050306030807080808090804080a0805080b08060401050106010303030102030201
- (1) State = 0xadc99705ad009a527377a09714487362
- (1) Message-Authenticator = 0x0755744e531aa78f1548483052e418bd
- (1) Restoring &session-state
- (1) &session-state:Framed-MTU = 1014
- (1) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (1) authorize {
- (1) policy filter_username {
- (1) if (&User-Name) {
- (1) if (&User-Name) -> TRUE
- (1) if (&User-Name) {
- (1) if (&User-Name =~ / /) {
- (1) if (&User-Name =~ / /) -> FALSE
- (1) if (&User-Name =~ /@[^@]*@/ ) {
- (1) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (1) if (&User-Name =~ /\.\./ ) {
- (1) if (&User-Name =~ /\.\./ ) -> FALSE
- (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (1) if (&User-Name =~ /\.$/) {
- (1) if (&User-Name =~ /\.$/) -> FALSE
- (1) if (&User-Name =~ /@\./) {
- (1) if (&User-Name =~ /@\./) -> FALSE
- (1) } # if (&User-Name) = notfound
- (1) } # policy filter_username = notfound
- (1) [preprocess] = ok
- (1) [chap] = noop
- (1) [mschap] = noop
- (1) [digest] = noop
- (1) suffix: Checking for suffix after "@"
- (1) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (1) suffix: Found realm "NULL"
- (1) suffix: Adding Stripped-User-Name = "johndoe"
- (1) suffix: Adding Realm = "NULL"
- (1) suffix: Authentication realm is LOCAL
- (1) [suffix] = ok
- (1) eap: Peer sent EAP Response (code 2) ID 201 length 202
- (1) eap: No EAP Start, assuming it's an on-going EAP conversation
- (1) [eap] = updated
- (1) [files] = noop
- (1) [expiration] = noop
- (1) [logintime] = noop
- (1) [pap] = noop
- (1) } # authorize = updated
- (1) Found Auth-Type = eap
- (1) # Executing group from file /etc/raddb/sites-enabled/default
- (1) authenticate {
- (1) eap: Expiring EAP session with state 0xadc99705ad009a52
- (1) eap: Finished EAP session with state 0xadc99705ad009a52
- (1) eap: Previous EAP request found for state 0xadc99705ad009a52, released from the list
- (1) eap: Peer sent packet with method EAP TLS (13)
- (1) eap: Calling submodule eap_tls to process data
- (1) eap_tls: (TLS) EAP Got final fragment (196 bytes)
- (1) eap_tls: WARNING: (TLS) EAP Total received record fragments (196 bytes), does not equal expected expected data length (0 bytes)
- (1) eap_tls: (TLS) EAP Done initial handshake
- (1) eap_tls: (TLS) Handshake state - before SSL initialization
- (1) eap_tls: (TLS) Handshake state - Server before SSL initialization
- (1) eap_tls: (TLS) Handshake state - Server before SSL initialization
- (1) eap_tls: (TLS) recv TLS 1.3 Handshake, ClientHello
- (1) eap_tls: (TLS) Handshake state - Server SSLv3/TLS read client hello
- (1) eap_tls: (TLS) send TLS 1.2 Handshake, ServerHello
- (1) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write server hello
- (1) eap_tls: (TLS) send TLS 1.2 Handshake, Certificate
- (1) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write certificate
- (1) eap_tls: (TLS) send TLS 1.2 Handshake, ServerKeyExchange
- (1) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write key exchange
- (1) eap_tls: (TLS) send TLS 1.2 Handshake, CertificateRequest
- (1) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write certificate request
- (1) eap_tls: (TLS) send TLS 1.2 Handshake, ServerHelloDone
- (1) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write server done
- (1) eap_tls: (TLS) Server : Need to read more data: SSLv3/TLS write server done
- (1) eap_tls: (TLS) In Handshake Phase
- (1) eap: Sending EAP Request (code 1) ID 202 length 1024
- (1) eap: EAP session adding &reply:State = 0xadc99705ac039a52
- (1) [eap] = handled
- (1) } # authenticate = handled
- (1) Using Post-Auth-Type Challenge
- (1) # Executing group from file /etc/raddb/sites-enabled/default
- (1) Challenge { ... } # empty sub-section is ignored
- (1) session-state: Saving cached attributes
- (1) Framed-MTU = 1014
- (1) TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (1) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (1) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (1) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (1) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (1) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (1) Sent Access-Challenge Id 1 from 192.168.1.2:1812 to 192.168.1.2:52174 length 1090
- (1) EAP-Message = 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
- (1) Message-Authenticator = 0x00000000000000000000000000000000
- (1) State = 0xadc99705ac039a527377a09714487362
- (1) Finished request
- Waking up in 4.9 seconds.
- (2) Received Access-Request Id 2 from 192.168.1.2:52174 to 192.168.1.2:1812 length 140
- (2) User-Name = "johndoe"
- (2) NAS-IP-Address = 127.0.0.1
- (2) Calling-Station-Id = "02-00-00-00-00-01"
- (2) Framed-MTU = 1400
- (2) NAS-Port-Type = Wireless-802.11
- (2) Service-Type = Framed-User
- (2) Connect-Info = "CONNECT 11Mbps 802.11b"
- (2) EAP-Message = 0x02ca00060d00
- (2) State = 0xadc99705ac039a527377a09714487362
- (2) Message-Authenticator = 0x6e6ed47ba90f751b499d3164c569b045
- (2) Restoring &session-state
- (2) &session-state:Framed-MTU = 1014
- (2) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (2) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (2) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (2) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (2) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (2) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (2) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (2) authorize {
- (2) policy filter_username {
- (2) if (&User-Name) {
- (2) if (&User-Name) -> TRUE
- (2) if (&User-Name) {
- (2) if (&User-Name =~ / /) {
- (2) if (&User-Name =~ / /) -> FALSE
- (2) if (&User-Name =~ /@[^@]*@/ ) {
- (2) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (2) if (&User-Name =~ /\.\./ ) {
- (2) if (&User-Name =~ /\.\./ ) -> FALSE
- (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (2) if (&User-Name =~ /\.$/) {
- (2) if (&User-Name =~ /\.$/) -> FALSE
- (2) if (&User-Name =~ /@\./) {
- (2) if (&User-Name =~ /@\./) -> FALSE
- (2) } # if (&User-Name) = notfound
- (2) } # policy filter_username = notfound
- (2) [preprocess] = ok
- (2) [chap] = noop
- (2) [mschap] = noop
- (2) [digest] = noop
- (2) suffix: Checking for suffix after "@"
- (2) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (2) suffix: Found realm "NULL"
- (2) suffix: Adding Stripped-User-Name = "johndoe"
- (2) suffix: Adding Realm = "NULL"
- (2) suffix: Authentication realm is LOCAL
- (2) [suffix] = ok
- (2) eap: Peer sent EAP Response (code 2) ID 202 length 6
- (2) eap: No EAP Start, assuming it's an on-going EAP conversation
- (2) [eap] = updated
- (2) [files] = noop
- (2) [expiration] = noop
- (2) [logintime] = noop
- (2) [pap] = noop
- (2) } # authorize = updated
- (2) Found Auth-Type = eap
- (2) # Executing group from file /etc/raddb/sites-enabled/default
- (2) authenticate {
- (2) eap: Expiring EAP session with state 0xadc99705ac039a52
- (2) eap: Finished EAP session with state 0xadc99705ac039a52
- (2) eap: Previous EAP request found for state 0xadc99705ac039a52, released from the list
- (2) eap: Peer sent packet with method EAP TLS (13)
- (2) eap: Calling submodule eap_tls to process data
- (2) eap_tls: (TLS) Peer ACKed our handshake fragment
- (2) eap: Sending EAP Request (code 1) ID 203 length 1024
- (2) eap: EAP session adding &reply:State = 0xadc99705af029a52
- (2) [eap] = handled
- (2) } # authenticate = handled
- (2) Using Post-Auth-Type Challenge
- (2) # Executing group from file /etc/raddb/sites-enabled/default
- (2) Challenge { ... } # empty sub-section is ignored
- (2) session-state: Saving cached attributes
- (2) Framed-MTU = 1014
- (2) TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (2) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (2) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (2) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (2) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (2) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (2) Sent Access-Challenge Id 2 from 192.168.1.2:1812 to 192.168.1.2:52174 length 1090
- (2) EAP-Message = 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
- (2) Message-Authenticator = 0x00000000000000000000000000000000
- (2) State = 0xadc99705af029a527377a09714487362
- (2) Finished request
- Waking up in 4.9 seconds.
- (3) Received Access-Request Id 3 from 192.168.1.2:52174 to 192.168.1.2:1812 length 140
- (3) User-Name = "johndoe"
- (3) NAS-IP-Address = 127.0.0.1
- (3) Calling-Station-Id = "02-00-00-00-00-01"
- (3) Framed-MTU = 1400
- (3) NAS-Port-Type = Wireless-802.11
- (3) Service-Type = Framed-User
- (3) Connect-Info = "CONNECT 11Mbps 802.11b"
- (3) EAP-Message = 0x02cb00060d00
- (3) State = 0xadc99705af029a527377a09714487362
- (3) Message-Authenticator = 0xc5b657efd98c5f49aeffda8059822157
- (3) Restoring &session-state
- (3) &session-state:Framed-MTU = 1014
- (3) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (3) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (3) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (3) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (3) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (3) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (3) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (3) authorize {
- (3) policy filter_username {
- (3) if (&User-Name) {
- (3) if (&User-Name) -> TRUE
- (3) if (&User-Name) {
- (3) if (&User-Name =~ / /) {
- (3) if (&User-Name =~ / /) -> FALSE
- (3) if (&User-Name =~ /@[^@]*@/ ) {
- (3) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (3) if (&User-Name =~ /\.\./ ) {
- (3) if (&User-Name =~ /\.\./ ) -> FALSE
- (3) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (3) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (3) if (&User-Name =~ /\.$/) {
- (3) if (&User-Name =~ /\.$/) -> FALSE
- (3) if (&User-Name =~ /@\./) {
- (3) if (&User-Name =~ /@\./) -> FALSE
- (3) } # if (&User-Name) = notfound
- (3) } # policy filter_username = notfound
- (3) [preprocess] = ok
- (3) [chap] = noop
- (3) [mschap] = noop
- (3) [digest] = noop
- (3) suffix: Checking for suffix after "@"
- (3) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (3) suffix: Found realm "NULL"
- (3) suffix: Adding Stripped-User-Name = "johndoe"
- (3) suffix: Adding Realm = "NULL"
- (3) suffix: Authentication realm is LOCAL
- (3) [suffix] = ok
- (3) eap: Peer sent EAP Response (code 2) ID 203 length 6
- (3) eap: No EAP Start, assuming it's an on-going EAP conversation
- (3) [eap] = updated
- (3) [files] = noop
- (3) [expiration] = noop
- (3) [logintime] = noop
- (3) [pap] = noop
- (3) } # authorize = updated
- (3) Found Auth-Type = eap
- (3) # Executing group from file /etc/raddb/sites-enabled/default
- (3) authenticate {
- (3) eap: Expiring EAP session with state 0xadc99705af029a52
- (3) eap: Finished EAP session with state 0xadc99705af029a52
- (3) eap: Previous EAP request found for state 0xadc99705af029a52, released from the list
- (3) eap: Peer sent packet with method EAP TLS (13)
- (3) eap: Calling submodule eap_tls to process data
- (3) eap_tls: (TLS) Peer ACKed our handshake fragment
- (3) eap: Sending EAP Request (code 1) ID 204 length 922
- (3) eap: EAP session adding &reply:State = 0xadc99705ae059a52
- (3) [eap] = handled
- (3) } # authenticate = handled
- (3) Using Post-Auth-Type Challenge
- (3) # Executing group from file /etc/raddb/sites-enabled/default
- (3) Challenge { ... } # empty sub-section is ignored
- (3) session-state: Saving cached attributes
- (3) Framed-MTU = 1014
- (3) TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (3) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (3) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (3) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (3) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (3) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (3) Sent Access-Challenge Id 3 from 192.168.1.2:1812 to 192.168.1.2:52174 length 986
- (3) EAP-Message = 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
- (3) Message-Authenticator = 0x00000000000000000000000000000000
- (3) State = 0xadc99705ae059a527377a09714487362
- (3) Finished request
- Waking up in 4.9 seconds.
- (4) Received Access-Request Id 4 from 192.168.1.2:52174 to 192.168.1.2:1812 length 1552
- (4) User-Name = "johndoe"
- (4) NAS-IP-Address = 127.0.0.1
- (4) Calling-Station-Id = "02-00-00-00-00-01"
- (4) Framed-MTU = 1400
- (4) NAS-Port-Type = Wireless-802.11
- (4) Service-Type = Framed-User
- (4) Connect-Info = "CONNECT 11Mbps 802.11b"
- (4) EAP-Message = 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
- (4) State = 0xadc99705ae059a527377a09714487362
- (4) Message-Authenticator = 0x68a3f5e2902821107caf75f3e8db20c0
- (4) Restoring &session-state
- (4) &session-state:Framed-MTU = 1014
- (4) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (4) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (4) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (4) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (4) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (4) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (4) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (4) authorize {
- (4) policy filter_username {
- (4) if (&User-Name) {
- (4) if (&User-Name) -> TRUE
- (4) if (&User-Name) {
- (4) if (&User-Name =~ / /) {
- (4) if (&User-Name =~ / /) -> FALSE
- (4) if (&User-Name =~ /@[^@]*@/ ) {
- (4) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (4) if (&User-Name =~ /\.\./ ) {
- (4) if (&User-Name =~ /\.\./ ) -> FALSE
- (4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (4) if (&User-Name =~ /\.$/) {
- (4) if (&User-Name =~ /\.$/) -> FALSE
- (4) if (&User-Name =~ /@\./) {
- (4) if (&User-Name =~ /@\./) -> FALSE
- (4) } # if (&User-Name) = notfound
- (4) } # policy filter_username = notfound
- (4) [preprocess] = ok
- (4) [chap] = noop
- (4) [mschap] = noop
- (4) [digest] = noop
- (4) suffix: Checking for suffix after "@"
- (4) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (4) suffix: Found realm "NULL"
- (4) suffix: Adding Stripped-User-Name = "johndoe"
- (4) suffix: Adding Realm = "NULL"
- (4) suffix: Authentication realm is LOCAL
- (4) [suffix] = ok
- (4) eap: Peer sent EAP Response (code 2) ID 204 length 1408
- (4) eap: No EAP Start, assuming it's an on-going EAP conversation
- (4) [eap] = updated
- (4) [files] = noop
- (4) [expiration] = noop
- (4) [logintime] = noop
- (4) [pap] = noop
- (4) } # authorize = updated
- (4) Found Auth-Type = eap
- (4) # Executing group from file /etc/raddb/sites-enabled/default
- (4) authenticate {
- (4) eap: Expiring EAP session with state 0xadc99705ae059a52
- (4) eap: Finished EAP session with state 0xadc99705ae059a52
- (4) eap: Previous EAP request found for state 0xadc99705ae059a52, released from the list
- (4) eap: Peer sent packet with method EAP TLS (13)
- (4) eap: Calling submodule eap_tls to process data
- (4) eap_tls: (TLS) EAP Peer says that the final record size will be 2479 bytes
- (4) eap_tls: (TLS) EAP Expecting 2 fragments
- (4) eap_tls: (TLS) EAP Got first TLS fragment (1398 bytes). Peer says more fragments will follow
- (4) eap_tls: (TLS) EAP ACKing fragment, the peer should send more data.
- (4) eap: Sending EAP Request (code 1) ID 205 length 6
- (4) eap: EAP session adding &reply:State = 0xadc99705a9049a52
- (4) [eap] = handled
- (4) } # authenticate = handled
- (4) Using Post-Auth-Type Challenge
- (4) # Executing group from file /etc/raddb/sites-enabled/default
- (4) Challenge { ... } # empty sub-section is ignored
- (4) session-state: Saving cached attributes
- (4) Framed-MTU = 1014
- (4) TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (4) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (4) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (4) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (4) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (4) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (4) Sent Access-Challenge Id 4 from 192.168.1.2:1812 to 192.168.1.2:52174 length 64
- (4) EAP-Message = 0x01cd00060d00
- (4) Message-Authenticator = 0x00000000000000000000000000000000
- (4) State = 0xadc99705a9049a527377a09714487362
- (4) Finished request
- Waking up in 4.9 seconds.
- (5) Received Access-Request Id 5 from 192.168.1.2:52174 to 192.168.1.2:1812 length 1229
- (5) User-Name = "johndoe"
- (5) NAS-IP-Address = 127.0.0.1
- (5) Calling-Station-Id = "02-00-00-00-00-01"
- (5) Framed-MTU = 1400
- (5) NAS-Port-Type = Wireless-802.11
- (5) Service-Type = Framed-User
- (5) Connect-Info = "CONNECT 11Mbps 802.11b"
- (5) EAP-Message = 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
- (5) State = 0xadc99705a9049a527377a09714487362
- (5) Message-Authenticator = 0xc687d62e20581d3dcb6a48f2b9e51a3a
- (5) Restoring &session-state
- (5) &session-state:Framed-MTU = 1014
- (5) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (5) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (5) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (5) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (5) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (5) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (5) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (5) authorize {
- (5) policy filter_username {
- (5) if (&User-Name) {
- (5) if (&User-Name) -> TRUE
- (5) if (&User-Name) {
- (5) if (&User-Name =~ / /) {
- (5) if (&User-Name =~ / /) -> FALSE
- (5) if (&User-Name =~ /@[^@]*@/ ) {
- (5) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (5) if (&User-Name =~ /\.\./ ) {
- (5) if (&User-Name =~ /\.\./ ) -> FALSE
- (5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (5) if (&User-Name =~ /\.$/) {
- (5) if (&User-Name =~ /\.$/) -> FALSE
- (5) if (&User-Name =~ /@\./) {
- (5) if (&User-Name =~ /@\./) -> FALSE
- (5) } # if (&User-Name) = notfound
- (5) } # policy filter_username = notfound
- (5) [preprocess] = ok
- (5) [chap] = noop
- (5) [mschap] = noop
- (5) [digest] = noop
- (5) suffix: Checking for suffix after "@"
- (5) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (5) suffix: Found realm "NULL"
- (5) suffix: Adding Stripped-User-Name = "johndoe"
- (5) suffix: Adding Realm = "NULL"
- (5) suffix: Authentication realm is LOCAL
- (5) [suffix] = ok
- (5) eap: Peer sent EAP Response (code 2) ID 205 length 1087
- (5) eap: No EAP Start, assuming it's an on-going EAP conversation
- (5) [eap] = updated
- (5) [files] = noop
- (5) [expiration] = noop
- (5) [logintime] = noop
- (5) [pap] = noop
- (5) } # authorize = updated
- (5) Found Auth-Type = eap
- (5) # Executing group from file /etc/raddb/sites-enabled/default
- (5) authenticate {
- (5) eap: Expiring EAP session with state 0xadc99705a9049a52
- (5) eap: Finished EAP session with state 0xadc99705a9049a52
- (5) eap: Previous EAP request found for state 0xadc99705a9049a52, released from the list
- (5) eap: Peer sent packet with method EAP TLS (13)
- (5) eap: Calling submodule eap_tls to process data
- (5) eap_tls: (TLS) EAP Got final fragment (1081 bytes)
- (5) eap_tls: (TLS) EAP Done initial handshake
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write server done
- (5) eap_tls: (TLS) recv TLS 1.2 Handshake, Certificate
- (5) eap_tls: (TLS) Creating attributes from server certificate
- (5) eap_tls: TLS-Cert-Serial := "010bd40c3282bd9d0cd4571bb51111c87f2a757a"
- (5) eap_tls: TLS-Cert-Expiration := "280724055333Z"
- (5) eap_tls: TLS-Cert-Valid-Since := "230726055333Z"
- (5) eap_tls: TLS-Cert-Subject := "/C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]"
- (5) eap_tls: TLS-Cert-Issuer := "/C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]"
- (5) eap_tls: TLS-Cert-Common-Name := "example.com"
- (5) eap_tls: (TLS) Creating attributes from client certificate
- (5) eap_tls: TLS-Client-Cert-Serial := "616e19f1f8c134e8ee67f90b13c0b340a37eab4f"
- (5) eap_tls: TLS-Client-Cert-Expiration := "330915024617Z"
- (5) eap_tls: TLS-Client-Cert-Valid-Since := "230918024617Z"
- (5) eap_tls: TLS-Client-Cert-Subject := "/C=TW/ST=Taiwan/L=Taipei/O=subject/OU=subject/CN=johndoe/[email protected]"
- (5) eap_tls: TLS-Client-Cert-Issuer := "/C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]"
- (5) eap_tls: TLS-Client-Cert-Common-Name := "johndoe"
- Certificate chain - 1 cert(s) untrusted
- (TLS) untrusted certificate with depth [1] subject name /C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]
- (TLS) untrusted certificate with depth [0] subject name /C=TW/ST=Taiwan/L=Taipei/O=subject/OU=subject/CN=johndoe/[email protected]
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS read client certificate
- (5) eap_tls: (TLS) recv TLS 1.2 Handshake, ClientKeyExchange
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS read client key exchange
- (5) eap_tls: (TLS) recv TLS 1.2 Handshake, CertificateVerify
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS read certificate verify
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS read change cipher spec
- (5) eap_tls: (TLS) recv TLS 1.2 Handshake, Finished
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS read finished
- (5) eap_tls: (TLS) send TLS 1.2 ChangeCipherSpec
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write change cipher spec
- (5) eap_tls: (TLS) send TLS 1.2 Handshake, Finished
- (5) eap_tls: (TLS) Handshake state - Server SSLv3/TLS write finished
- (5) eap_tls: (TLS) Handshake state - SSL negotiation finished successfully
- (5) eap_tls: (TLS) Connection Established
- (5) eap_tls: TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384"
- (5) eap_tls: TLS-Session-Version = "TLS 1.2"
- (5) eap: Sending EAP Request (code 1) ID 206 length 61
- (5) eap: EAP session adding &reply:State = 0xadc99705a8079a52
- (5) [eap] = handled
- (5) } # authenticate = handled
- (5) Using Post-Auth-Type Challenge
- (5) # Executing group from file /etc/raddb/sites-enabled/default
- (5) Challenge { ... } # empty sub-section is ignored
- (5) session-state: Saving cached attributes
- (5) Framed-MTU = 1014
- (5) TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (5) TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, Certificate"
- (5) TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, ClientKeyExchange"
- (5) TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, CertificateVerify"
- (5) TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, Finished"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 ChangeCipherSpec"
- (5) TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Finished"
- (5) TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384"
- (5) TLS-Session-Version = "TLS 1.2"
- (5) Sent Access-Challenge Id 5 from 192.168.1.2:1812 to 192.168.1.2:52174 length 119
- (5) EAP-Message = 0x01ce003d0d80000000331403030001011603030028222bafcaeae4adb512435e98c0bb2d6fa46944a56d4ecb600229341afd094dd362332bef02b05e48
- (5) Message-Authenticator = 0x00000000000000000000000000000000
- (5) State = 0xadc99705a8079a527377a09714487362
- (5) Finished request
- Waking up in 4.9 seconds.
- (6) Received Access-Request Id 6 from 192.168.1.2:52174 to 192.168.1.2:1812 length 140
- (6) User-Name = "johndoe"
- (6) NAS-IP-Address = 127.0.0.1
- (6) Calling-Station-Id = "02-00-00-00-00-01"
- (6) Framed-MTU = 1400
- (6) NAS-Port-Type = Wireless-802.11
- (6) Service-Type = Framed-User
- (6) Connect-Info = "CONNECT 11Mbps 802.11b"
- (6) EAP-Message = 0x02ce00060d00
- (6) State = 0xadc99705a8079a527377a09714487362
- (6) Message-Authenticator = 0xed92c109f69be26000bf3cfd482125f3
- (6) Restoring &session-state
- (6) &session-state:Framed-MTU = 1014
- (6) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.3 Handshake, ClientHello"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHello"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Certificate"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerKeyExchange"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, CertificateRequest"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, ServerHelloDone"
- (6) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, Certificate"
- (6) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, ClientKeyExchange"
- (6) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, CertificateVerify"
- (6) &session-state:TLS-Session-Information = "(TLS) recv TLS 1.2 Handshake, Finished"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 ChangeCipherSpec"
- (6) &session-state:TLS-Session-Information = "(TLS) send TLS 1.2 Handshake, Finished"
- (6) &session-state:TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384"
- (6) &session-state:TLS-Session-Version = "TLS 1.2"
- (6) # Executing section authorize from file /etc/raddb/sites-enabled/default
- (6) authorize {
- (6) policy filter_username {
- (6) if (&User-Name) {
- (6) if (&User-Name) -> TRUE
- (6) if (&User-Name) {
- (6) if (&User-Name =~ / /) {
- (6) if (&User-Name =~ / /) -> FALSE
- (6) if (&User-Name =~ /@[^@]*@/ ) {
- (6) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
- (6) if (&User-Name =~ /\.\./ ) {
- (6) if (&User-Name =~ /\.\./ ) -> FALSE
- (6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
- (6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
- (6) if (&User-Name =~ /\.$/) {
- (6) if (&User-Name =~ /\.$/) -> FALSE
- (6) if (&User-Name =~ /@\./) {
- (6) if (&User-Name =~ /@\./) -> FALSE
- (6) } # if (&User-Name) = notfound
- (6) } # policy filter_username = notfound
- (6) [preprocess] = ok
- (6) [chap] = noop
- (6) [mschap] = noop
- (6) [digest] = noop
- (6) suffix: Checking for suffix after "@"
- (6) suffix: No '@' in User-Name = "johndoe", looking up realm NULL
- (6) suffix: Found realm "NULL"
- (6) suffix: Adding Stripped-User-Name = "johndoe"
- (6) suffix: Adding Realm = "NULL"
- (6) suffix: Authentication realm is LOCAL
- (6) [suffix] = ok
- (6) eap: Peer sent EAP Response (code 2) ID 206 length 6
- (6) eap: No EAP Start, assuming it's an on-going EAP conversation
- (6) [eap] = updated
- (6) [files] = noop
- (6) [expiration] = noop
- (6) [logintime] = noop
- (6) [pap] = noop
- (6) } # authorize = updated
- (6) Found Auth-Type = eap
- (6) # Executing group from file /etc/raddb/sites-enabled/default
- (6) authenticate {
- (6) eap: Expiring EAP session with state 0xadc99705a8079a52
- (6) eap: Finished EAP session with state 0xadc99705a8079a52
- (6) eap: Previous EAP request found for state 0xadc99705a8079a52, released from the list
- (6) eap: Peer sent packet with method EAP TLS (13)
- (6) eap: Calling submodule eap_tls to process data
- (6) eap_tls: (TLS) Peer ACKed our handshake fragment. handshake is finished
- (6) eap_tls: (TLS) cache - Setting up attributes for session resumption
- (6) eap_tls: caching Stripped-User-Name = "johndoe"
- (6) eap_tls: caching EAP-Type = TLS
- (6) eap_tls: caching TLS-Cert-Serial := "010bd40c3282bd9d0cd4571bb51111c87f2a757a"
- (6) eap_tls: caching TLS-Cert-Expiration := "280724055333Z"
- (6) eap_tls: caching TLS-Cert-Valid-Since := "230726055333Z"
- (6) eap_tls: caching TLS-Cert-Subject := "/C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]"
- (6) eap_tls: caching TLS-Cert-Issuer := "/C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]"
- (6) eap_tls: caching TLS-Cert-Common-Name := "example.com"
- (6) eap_tls: caching TLS-Client-Cert-Serial := "616e19f1f8c134e8ee67f90b13c0b340a37eab4f"
- (6) eap_tls: caching TLS-Client-Cert-Expiration := "330915024617Z"
- (6) eap_tls: caching TLS-Client-Cert-Valid-Since := "230918024617Z"
- (6) eap_tls: caching TLS-Client-Cert-Subject := "/C=TW/ST=Taiwan/L=Taipei/O=subject/OU=subject/CN=johndoe/[email protected]"
- (6) eap_tls: caching TLS-Client-Cert-Issuer := "/C=TW/ST=Taiwan/L=Taipei/O=Example Inc/OU=Software Technology/CN=example.com/[email protected]"
- (6) eap_tls: caching TLS-Client-Cert-Common-Name := "johndoe"
- (6) eap_tls: Failed to find 'persist_dir' in TLS configuration. Session will not be cached on disk.
- (6) eap: Sending EAP Success (code 3) ID 206 length 4
- (6) eap: Freeing handler
- (6) [eap] = ok
- (6) } # authenticate = ok
- (6) # Executing section post-auth from file /etc/raddb/sites-enabled/default
- (6) post-auth {
- (6) if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name)) {
- (6) if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name)) -> FALSE
- (6) update {
- (6) &reply::Framed-MTU += &session-state:Framed-MTU[*] -> 1014
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) recv TLS 1.3 Handshake, ClientHello'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 Handshake, ServerHello'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 Handshake, Certificate'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 Handshake, ServerKeyExchange'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 Handshake, CertificateRequest'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 Handshake, ServerHelloDone'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) recv TLS 1.2 Handshake, Certificate'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) recv TLS 1.2 Handshake, ClientKeyExchange'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) recv TLS 1.2 Handshake, CertificateVerify'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) recv TLS 1.2 Handshake, Finished'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 ChangeCipherSpec'
- (6) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) send TLS 1.2 Handshake, Finished'
- (6) &reply::TLS-Session-Cipher-Suite += &session-state:TLS-Session-Cipher-Suite[*] -> 'ECDHE-RSA-AES256-GCM-SHA384'
- (6) &reply::TLS-Session-Version += &session-state:TLS-Session-Version[*] -> 'TLS 1.2'
- (6) } # update = noop
- (6) [exec] = noop
- (6) policy remove_reply_message_if_eap {
- (6) if (&reply:EAP-Message && &reply:Reply-Message) {
- (6) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
- (6) else {
- (6) [noop] = noop
- (6) } # else = noop
- (6) } # policy remove_reply_message_if_eap = noop
- (6) if (EAP-Key-Name && &reply:EAP-Session-Id) {
- (6) if (EAP-Key-Name && &reply:EAP-Session-Id) -> FALSE
- (6) } # post-auth = noop
- (6) Login OK: [johndoe/<via Auth-Type = eap>] (from client private-network-2 port 0 cli 02-00-00-00-00-01)
- (6) Sent Access-Accept Id 6 from 192.168.1.2:1812 to 192.168.1.2:52174 length 175
- (6) MS-MPPE-Recv-Key = 0xe255f998abb9b8f85bfe9056985176dab99462df283afa063aa6cf49ba636a45
- (6) MS-MPPE-Send-Key = 0xdf89b8bd766edad9130d65e1ab085dee73c586f426de388bdd9716543f30d7a4
- (6) EAP-Message = 0x03ce0004
- (6) Message-Authenticator = 0x00000000000000000000000000000000
- (6) User-Name = "johndoe"
- (6) Framed-MTU += 1014
- (6) Finished request
- Waking up in 4.9 seconds.
- (0) Cleaning up request packet ID 0 with timestamp +16 due to cleanup_delay was reached
- (1) Cleaning up request packet ID 1 with timestamp +16 due to cleanup_delay was reached
- (2) Cleaning up request packet ID 2 with timestamp +16 due to cleanup_delay was reached
- (3) Cleaning up request packet ID 3 with timestamp +16 due to cleanup_delay was reached
- (4) Cleaning up request packet ID 4 with timestamp +16 due to cleanup_delay was reached
- (5) Cleaning up request packet ID 5 with timestamp +16 due to cleanup_delay was reached
- (6) Cleaning up request packet ID 6 with timestamp +16 due to cleanup_delay was reached
- Ready to process requests
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement