Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/raddb/proxy.conf
Config:   including file: /etc/raddb/clients.conf
Config:   including file: /etc/raddb/snmp.conf
Config:   including file: /etc/raddb/eap.conf
Config:   including file: /etc/raddb/sql.conf
 main: prefix = "/usr/local"
 main: localstatedir = "/var"
 main: logdir = "/var/log/radius"
 main: libdir = "/usr/local/lib"
 main: radacctdir = "/var/log/radius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 1645
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = "/var/log/radius/radius.log"
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = "/var/run/radiusd/radiusd.pid"
 main: user = "(null)"
 main: group = "(null)"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/local/sbin/checkrad"
 main: proxy_requests = yes
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = no
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec 
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec) 
Module: Loaded expr 
Module: Instantiated expr (expr) 
Module: Loaded PAP 
 pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap) 
Module: Loaded CHAP 
Module: Instantiated chap (chap) 
Module: Loaded MS-CHAP 
 mschap: use_mppe = yes
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: with_ntdomain_hack = no
 mschap: passwd = "(null)"
 mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap) 
Module: Loaded System 
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "(null)"
 unix: group = "(null)"
 unix: radwtmp = "/var/log/radius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix) 
Module: Loaded eap 
 eap: default_eap_type = "peap"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
 gtc: challenge = "Password: "
 gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
 tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"
 tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"
 tls: private_key_password = "whatever"
 tls: dh_file = "/etc/raddb/certs/dh"
 tls: random_file = "/dev/urandom"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
 tls: cipher_list = "(null)"
 tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = no
 peap: use_tunneled_reply = no
 peap: proxy_tunneled_request_as_eap = no
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap) 
Module: Loaded preprocess 
 preprocess: huntgroups = "/etc/raddb/huntgroups"
 preprocess: hints = "/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess) 
Module: Loaded realm 
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix) 
Module: Loaded files 
 files: usersfile = "/etc/raddb/users"
 files: acctusersfile = "/etc/raddb/acct_users"
 files: preproxy_usersfile = "/etc/raddb/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files) 
Module: Loaded Acct-Unique-Session-Id 
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique) 
Module: Loaded detail 
 detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail) 
Module: Loaded radutmp 
 radutmp: filename = "/var/log/radius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp) 
Listening on authentication *:1645
Listening on accounting *:1646
Ready to process requests.
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=1, length=131
	Message-Authenticator = 0xed7cc73647c2ef86d580c178ab33ff95
	User-Name = "m1k3"
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x02010009016d316b33
	Framed-MTU = 1300
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "chap" returns noop for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
  rlm_eap: EAP packet type response id 1 length 9
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 1 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x010200061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xd1961fdac4595868186cda72cc2b9ef3
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=2, length=250
	Message-Authenticator = 0x9e15760e0710d95f60176dbcbfd5b71f
	User-Name = "m1k3"
	State = 0xd1961fdac4595868186cda72cc2b9ef3
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x0202006e198000000064160301005f0100005b030144e364bcaa153dbce0fc662e8237647199dd1bc3087d2092e0811d3cbcc8bde100003400390038003500160013000a00330032002f006600050004006300620061001500120009006500640060001400110008000600030100
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "chap" returns noop for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
  rlm_eap: EAP packet type response id 2 length 110
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 005f], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 06aa], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 010d], ServerKeyExchange  
    TLS_accept: SSLv3 write key exchange A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
    TLS_accept: SSLv3 write server done A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 2 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x6c69656e74406578616d706c652e636f6d301e170d30
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6dff3bd990d197e7dbf31009f81973c2
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=3, length=146
	Message-Authenticator = 0x4fc850aa39f358e063b869aa83de2abe
	User-Name = "m1k3"
	State = 0x6dff3bd990d197e7dbf31009f81973c2
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x020300061900
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "chap" returns noop for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 3 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0xaffd5d1abb530f02eca8491d2ba326a428c2
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xa88033be7e97e2944c4fe0c73da70c96
Finished request 2
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=4, length=146
	Message-Authenticator = 0xad8db520961de34d82518303172bcd4c
	User-Name = "m1k3"
	State = 0xa88033be7e97e2944c4fe0c73da70c96
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x020400061900
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "chap" returns noop for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 4 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x0105001f1900abaf13fbb834d122c8c3b3b84a64f41e16030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x5115d3fb0a9b4c591dd20785f313b88b
Finished request 3
Going to the next request
--- Walking the entire request list ---
Waking up in 4 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=5, length=284
	Message-Authenticator = 0x9ac1573d44c1f636acabe37da6396410
	User-Name = "m1k3"
	State = 0x5115d3fb0a9b4c591dd20785f313b88b
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x0205009019800000008616030100461000004200407caea33868ac8c245bf713042875f818f62d2603509dc1edeaf6da1b41bd358512c268881f53219d13e1aa1dea82595bccdbc05c193e2736b6112aaa83271377140301000101160301003057bffba8acf89302606607c57dda22a24a792dfac54b6daaff16bf5e488ea7666e35b77aa739ccc19c768508057e3f10
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "chap" returns noop for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
  rlm_eap: EAP packet type response id 5 length 144
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange  
    TLS_accept: SSLv3 read client key exchange A 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 read finished A 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
    TLS_accept: SSLv3 write change cipher spec A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 write finished A 
    TLS_accept: SSLv3 flush data 
    (other): SSL negotiation finished successfully 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
SSL Connection Established 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 5 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x0106004119001403010001011603010030f9717223cbf381babd4558f25b779fa4fa13d93d98d2f0a510600081577d9484443a5c9bd1ee06d303ac9a4ea83b46ef
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xda73abd448a0bb1a255e8e1fbe0e0de5
Finished request 4
Going to the next request
Waking up in 4 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=6, length=146
	Message-Authenticator = 0x1f3c1a198539706838112bb4e185f06e
	User-Name = "m1k3"
	State = 0xda73abd448a0bb1a255e8e1fbe0e0de5
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x020600061900
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "chap" returns noop for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 6 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3 
  eaptls_process returned 3 
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 6 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x0107005019001703010020878ece1d757a552f9a44ce9c5d1d38ae90cac2381277b2374f0e24232ac91635170301002077906b9d89b06991fdeb18b30764d27efc4f1cf0fbd5e0bdcd01d412c893f0a1
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x31ccc1ccc9ad14214abeecbeb192ea3b
Finished request 5
Going to the next request
--- Walking the entire request list ---
Waking up in 3 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=7, length=220
	Message-Authenticator = 0xc99049a51ea970a1cf39c6e09c921c38
	User-Name = "m1k3"
	State = 0x31ccc1ccc9ad14214abeecbeb192ea3b
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x0207005019001703010020929fb93940d5b8dcae4ce24a6b20e3ecd0d04faf2065f81220b8f616f534896417030100201e59d565d007776ee767bf3d95194e3751fc2f8ac346c992817933805bf65ab8
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "chap" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 7 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - m1k3
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled identity of m1k3
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to m1k3
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "chap" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 7 length 9
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 7 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x0108006019001703010020e2c3e36fbd4116dd26cdf3d84bd28a1e0c2d3b2239eb33bcad037b090ca82c1f170301003003a71fc84ec52f29f665f9bdd41d4d9dae6d94622e97fca2eb3918d22f8e1210def5bd2db7a5a1f3f595e39582ed568d
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb01a9319c02b82166603dad84633ce7b
Finished request 6
Going to the next request
Waking up in 3 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=8, length=268
	Message-Authenticator = 0x5612869ca38ac21c6ff4296a6ec9a9ac
	User-Name = "m1k3"
	State = 0xb01a9319c02b82166603dad84633ce7b
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x020800801900170301002010b278265db43e9f7b062d03ce53480c4e09982f194335f46a471c06b4ff847117030100501452be72bd8ce28329101664554459d95aabc17b955c00d51bb3904bae6f6d2a71e6747ce4d04eed92d8c0aa4824d052b921c49c44e3da3951ecc8503d46e60826aa98be5d3f3167315f6adfc9d62bb8
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 8 length 128
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Setting User-Name to m1k3
  PEAP: Adding old state with 14 25
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 8 length 63
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 7
  rlm_mschap: Told to do MS-CHAPv2 for m1k3 with NT-Password
rlm_mschap: adding MS-CHAPv2 MPPE keys
  modcall[authenticate]: module "mschap" returns ok for request 7
modcall: leaving group MS-CHAP (returns ok) for request 7
MSCHAP Success 
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challenge of id 8 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x010900801900170301002024c9d32842770780aeffdd8cc2572e4f98cd362249f4dc89e6a1dbfb9f6dfba21703010050ad1922bc973e3711ed0fbf53a33a4ceefe7c697b57186e89fdb3ae53c9473e50328f98835572eb246d95f2f3acea6b3712af66f56f7a47224591e31b765b590eb18f88b9ffa29f27b752776c4736fb5e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xab7a548fda8a58a54da33a7115775830
Finished request 7
Going to the next request
--- Walking the entire request list ---
Waking up in 2 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=9, length=220
	Message-Authenticator = 0xf84ec3a8bc681f6f5c7205d4d2122aba
	User-Name = "m1k3"
	State = 0xab7a548fda8a58a54da33a7115775830
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x0209005019001703010020567423265f121e4fe912d8c151589d8f7099b195366c78ece79b9afb3365660117030100207a0a16819fec13cadd6ce4c175b88e6c1cee862ade340019e272a3ce2b19948c
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "chap" returns noop for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
  rlm_eap: EAP packet type response id 9 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Setting User-Name to m1k3
  PEAP: Adding old state with c2 63
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "chap" returns noop for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
  rlm_eap: EAP packet type response id 9 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 8
modcall: leaving group authenticate (returns ok) for request 8
radius_xlat:  'Hello, m1k3'
  PEAP: Tunneled authentication was successful.
  rlm_eap_peap: SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 8
modcall: leaving group authenticate (returns handled) for request 8
Sending Access-Challenge of id 9 to 141.201.43.115 port 41295
	Reply-Message = "Hello, %u"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	EAP-Message = 0x010a0050190017030100205f451fa430e13bd5dacf4c24fde21b0573b693af7dd4d03a524d0b3a6ab14e251703010020590f5d0a7ebcea2369ffdab964e5d1c58d11f6931fbfc8e75beeb3e52a51eddb
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x7de362593463f66efaf336505d3cc410
Finished request 8
Going to the next request
Waking up in 2 seconds...
rad_recv: Access-Request packet from host 141.201.43.115:41295, id=10, length=220
	Message-Authenticator = 0x4a98e1aa6a8122c9791733b7d9709957
	User-Name = "m1k3"
	State = 0x7de362593463f66efaf336505d3cc410
	NAS-IP-Address = 141.201.43.115
	Called-Station-Id = "00-E0-63-93-75-B3"
	NAS-Port = 31005
	NAS-Port-Id = "fe.3.5"
	NAS-Port-Type = Ethernet
	Framed-MTU = 1300
	Service-Type = Framed-User
	Calling-Station-Id = "00-07-E9-D5-1D-EA"
	EAP-Message = 0x020a00501900170301002007a220a58013f03c16694099cff557ebcb0982eb46b7db4bcb6f6321a0951f1c1703010020f8c7a92f73af93c14ddee42df4d57f4f7715e373f9d27e59ae8329fcb57512c9
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
  modcall[authorize]: module "preprocess" returns ok for request 9
  modcall[authorize]: module "chap" returns noop for request 9
  modcall[authorize]: module "mschap" returns noop for request 9
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 9
  rlm_eap: EAP packet type response id 10 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 9
    users: Matched entry m1k3 at line 90
  modcall[authorize]: module "files" returns ok for request 9
modcall: leaving group authorize (returns updated) for request 9
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap: Success
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 9
modcall: leaving group authenticate (returns ok) for request 9
radius_xlat:  'Hello, m1k3'
Sending Access-Accept of id 10 to 141.201.43.115 port 41295
	Reply-Message = "Hello, m1k3"
	Filter-Id == "Enterasys:version=1:mgmt=su:policy=adminrole"
	MS-MPPE-Recv-Key = 0x230d13871dc29bcdc8e6df9d790b9fab6bde65238676867723af01c3f88aa50d
	MS-MPPE-Send-Key = 0x7b193860349ac83695f85a9f72d0ffd043b1cbc006c62d8dc29c0919b2a29b95
	EAP-Message = 0x030a0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "m1k3"
Finished request 9
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
rad_recv: Accounting-Request packet from host 141.201.43.115:41296, id=1, length=66
	Acct-Status-Type = Start
	User-Name = "m1k3"
	NAS-IP-Address = 141.201.43.115
	NAS-Port = 31005
	Acct-Delay-Time = 0
	Acct-Session-Id = "26000073"
	Acct-Authentic = RADIUS
  Processing the preacct section of radiusd.conf
modcall: entering group preacct for request 10
  modcall[preacct]: module "preprocess" returns noop for request 10
rlm_acct_unique: Hashing 'NAS-Port = 31005,Client-IP-Address = 141.201.43.115,NAS-IP-Address = 141.201.43.115,Acct-Session-Id = "26000073",User-Name = "m1k3"'
rlm_acct_unique: Acct-Unique-Session-ID = "5ab7d17ea0975d35".
  modcall[preacct]: module "acct_unique" returns ok for request 10
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[preacct]: module "suffix" returns noop for request 10
  modcall[preacct]: module "files" returns noop for request 10
modcall: leaving group preacct (returns ok) for request 10
  Processing the accounting section of radiusd.conf
modcall: entering group accounting for request 10
radius_xlat:  '/var/log/radius/radacct/141.201.43.115/detail-20060816'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d expands to /var/log/radius/radacct/141.201.43.115/detail-20060816
  modcall[accounting]: module "detail" returns ok for request 10
  modcall[accounting]: module "unix" returns ok for request 10
radius_xlat:  '/var/log/radius/radutmp'
radius_xlat:  'm1k3'
  modcall[accounting]: module "radutmp" returns ok for request 10
modcall: leaving group accounting (returns ok) for request 10
Sending Accounting-Response of id 1 to 141.201.43.115 port 41296
Finished request 10
Going to the next request
Cleaning up request 0 ID 1 with timestamp 44e364f9
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 1 ID 2 with timestamp 44e364fa
Cleaning up request 2 ID 3 with timestamp 44e364fa
Waking up in 1 seconds...
rad_recv: Accounting-Request packet from host 141.201.43.115:41297, id=1, length=78
	Acct-Status-Type = Stop
	User-Name = "m1k3"
	NAS-IP-Address = 141.201.43.115
	NAS-Port = 31005
	Acct-Session-Time = 3
	Acct-Terminate-Cause = User-Request
	Acct-Authentic = RADIUS
	Acct-Delay-Time = 0
	Acct-Session-Id = "26000073"
  Processing the preacct section of radiusd.conf
modcall: entering group preacct for request 11
  modcall[preacct]: module "preprocess" returns noop for request 11
rlm_acct_unique: Hashing 'NAS-Port = 31005,Client-IP-Address = 141.201.43.115,NAS-IP-Address = 141.201.43.115,Acct-Session-Id = "26000073",User-Name = "m1k3"'
rlm_acct_unique: Acct-Unique-Session-ID = "5ab7d17ea0975d35".
  modcall[preacct]: module "acct_unique" returns ok for request 11
    rlm_realm: No '@' in User-Name = "m1k3", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[preacct]: module "suffix" returns noop for request 11
  modcall[preacct]: module "files" returns noop for request 11
modcall: leaving group preacct (returns ok) for request 11
  Processing the accounting section of radiusd.conf
modcall: entering group accounting for request 11
radius_xlat:  '/var/log/radius/radacct/141.201.43.115/detail-20060816'
rlm_detail: /var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d expands to /var/log/radius/radacct/141.201.43.115/detail-20060816
  modcall[accounting]: module "detail" returns ok for request 11
  modcall[accounting]: module "unix" returns ok for request 11
radius_xlat:  '/var/log/radius/radutmp'
radius_xlat:  'm1k3'
  modcall[accounting]: module "radutmp" returns ok for request 11
modcall: leaving group accounting (returns ok) for request 11
Sending Accounting-Response of id 1 to 141.201.43.115 port 41297
Finished request 11
Going to the next request
Cleaning up request 3 ID 4 with timestamp 44e364fb
Cleaning up request 4 ID 5 with timestamp 44e364fb
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 6 with timestamp 44e364fc
Cleaning up request 6 ID 7 with timestamp 44e364fc
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 7 ID 8 with timestamp 44e364fd
Cleaning up request 8 ID 9 with timestamp 44e364fd
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 10 ID 1 with timestamp 44e364fe
Cleaning up request 9 ID 10 with timestamp 44e364fe
Waking up in 2 seconds...
 
freeradius_peap_log.txt · Last modified: 2009/09/13 17:39 (external edit)
 
Except where otherwise noted, content on this wiki is licensed under the following license:CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki