FreeRADIUS Version 3.0.16 Copyright (C) 1999-2017 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/freeradius/3.0/dictionary including configuration file /etc/freeradius/3.0/radiusd.conf including configuration file /etc/freeradius/3.0/proxy.conf including configuration file /etc/freeradius/3.0/clients.conf including files in directory /etc/freeradius/3.0/mods-enabled/ including configuration file /etc/freeradius/3.0/mods-enabled/passwd including configuration file /etc/freeradius/3.0/mods-enabled/dynamic_clients including configuration file /etc/freeradius/3.0/mods-enabled/radutmp including configuration file /etc/freeradius/3.0/mods-enabled/logintime including configuration file /etc/freeradius/3.0/mods-enabled/mschap including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp including configuration file /etc/freeradius/3.0/mods-enabled/replicate including configuration file /etc/freeradius/3.0/mods-enabled/unix including configuration file /etc/freeradius/3.0/mods-enabled/cache_eap including configuration file /etc/freeradius/3.0/mods-enabled/chap including configuration file /etc/freeradius/3.0/mods-enabled/always including configuration file /etc/freeradius/3.0/mods-enabled/detail including configuration file /etc/freeradius/3.0/mods-enabled/soh including configuration file /etc/freeradius/3.0/mods-enabled/unpack including configuration file /etc/freeradius/3.0/mods-enabled/files including configuration file /etc/freeradius/3.0/mods-enabled/preprocess including configuration file /etc/freeradius/3.0/mods-enabled/echo including configuration file /etc/freeradius/3.0/mods-enabled/ntlm_auth including configuration file /etc/freeradius/3.0/mods-enabled/realm including configuration file /etc/freeradius/3.0/mods-enabled/pap including configuration file /etc/freeradius/3.0/mods-enabled/utf8 including configuration file /etc/freeradius/3.0/mods-enabled/eap including configuration file /etc/freeradius/3.0/mods-enabled/linelog including configuration file /etc/freeradius/3.0/mods-enabled/attr_filter including configuration file /etc/freeradius/3.0/mods-enabled/detail.log including configuration file /etc/freeradius/3.0/mods-enabled/expiration including configuration file /etc/freeradius/3.0/mods-enabled/expr including configuration file /etc/freeradius/3.0/mods-enabled/exec including configuration file /etc/freeradius/3.0/mods-enabled/digest including files in directory /etc/freeradius/3.0/policy.d/ including configuration file /etc/freeradius/3.0/policy.d/operator-name including configuration file /etc/freeradius/3.0/policy.d/dhcp including configuration file /etc/freeradius/3.0/policy.d/cui including configuration file /etc/freeradius/3.0/policy.d/abfab-tr including configuration file /etc/freeradius/3.0/policy.d/accounting including configuration file /etc/freeradius/3.0/policy.d/moonshot-targeted-ids including configuration file /etc/freeradius/3.0/policy.d/control including configuration file /etc/freeradius/3.0/policy.d/canonicalization including configuration file /etc/freeradius/3.0/policy.d/debug including configuration file /etc/freeradius/3.0/policy.d/filter including configuration file /etc/freeradius/3.0/policy.d/ntlm_auth including configuration file /etc/freeradius/3.0/policy.d/eap including files in directory /etc/freeradius/3.0/sites-enabled/ including configuration file /etc/freeradius/3.0/sites-enabled/default including configuration file /etc/freeradius/3.0/sites-enabled/inner-tunnel main { security { user = "freerad" group = "freerad" allow_core_dumps = no } name = "freeradius" prefix = "/usr" localstatedir = "/var" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 16384 pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 120 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "*" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client localhost_ipv6 { ipv6addr = ::1 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 192.168.128.0/22 { ipaddr = 192.168.128.0/22 require_message_authenticator = no secret = <<< secret >>> shortname = "AP" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Debugger not attached # Creating Auth-Type = mschap # Creating Auth-Type = digest # Creating Auth-Type = eap # Creating Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type = MS-CHAP # Creating Auth-Type = ntlm_auth radiusd: #### Instantiating modules #### modules { # Loaded module rlm_passwd # Loading module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /etc/freeradius/3.0/mods-enabled/dynamic_clients # Loaded module rlm_radutmp # Loading module "radutmp" from file /etc/freeradius/3.0/mods-enabled/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_logintime # Loading module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_mschap # Loading module "mschap" from file /etc/freeradius/3.0/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{%{Stripped-User-Name}:-%{%{User-Name}:-None}} --challenge=%{%{mschap:Challenge}:-00} --nt-response=%{%{mschap:NT-Response}:-00}" passchange { } allow_retry = yes winbind_retry_with_normalised_username = no } # Loading module "sradutmp" from file /etc/freeradius/3.0/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/freeradius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_replicate # Loading module "replicate" from file /etc/freeradius/3.0/mods-enabled/replicate # Loaded module rlm_unix # Loading module "unix" from file /etc/freeradius/3.0/mods-enabled/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_cache # Loading module "cache_eap" from file /etc/freeradius/3.0/mods-enabled/cache_eap cache cache_eap { driver = "rlm_cache_rbtree" key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 0 epoch = 0 add_stats = no } # Loaded module rlm_chap # Loading module "chap" from file /etc/freeradius/3.0/mods-enabled/chap # Loaded module rlm_always # Loading module "reject" from file /etc/freeradius/3.0/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /etc/freeradius/3.0/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /etc/freeradius/3.0/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /etc/freeradius/3.0/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /etc/freeradius/3.0/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /etc/freeradius/3.0/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /etc/freeradius/3.0/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /etc/freeradius/3.0/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /etc/freeradius/3.0/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_detail # Loading module "detail" from file /etc/freeradius/3.0/mods-enabled/detail detail { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_soh # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_unpack # Loading module "unpack" from file /etc/freeradius/3.0/mods-enabled/unpack # Loaded module rlm_files # Loading module "files" from file /etc/freeradius/3.0/mods-enabled/files files { filename = "/etc/freeradius/3.0/mods-config/files/authorize" acctusersfile = "/etc/freeradius/3.0/mods-config/files/accounting" preproxy_usersfile = "/etc/freeradius/3.0/mods-config/files/pre-proxy" } # Loaded module rlm_preprocess # Loading module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess preprocess { huntgroups = "/etc/freeradius/3.0/mods-config/preprocess/huntgroups" hints = "/etc/freeradius/3.0/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } # Loaded module rlm_exec # Loading module "echo" from file /etc/freeradius/3.0/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loading module "ntlm_auth" from file /etc/freeradius/3.0/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/usr/bin/ntlm_auth --request-nt-key --domain=OEGNET --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loaded module rlm_realm # Loading module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\\" ignore_default = no ignore_null = no } # Loaded module rlm_pap # Loading module "pap" from file /etc/freeradius/3.0/mods-enabled/pap pap { normalise = yes } # Loaded module rlm_utf8 # Loading module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8 # Loaded module rlm_eap # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 16384 } # Loaded module rlm_linelog # Loading module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog linelog { filename = "/var/log/freeradius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog linelog log_accounting { filename = "/var/log/freeradius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/freeradius/3.0/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loading module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail auth_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail reply_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_expiration # Loading module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Loaded module rlm_expr # Loading module "expr" from file /etc/freeradius/3.0/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loading module "exec" from file /etc/freeradius/3.0/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_digest # Loading module "digest" from file /etc/freeradius/3.0/mods-enabled/digest instantiate { } # Instantiating module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime # Instantiating module "mschap" from file /etc/freeradius/3.0/mods-enabled/mschap rlm_mschap (mschap): authenticating by calling 'ntlm_auth' # Instantiating module "cache_eap" from file /etc/freeradius/3.0/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked # Instantiating module "reject" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "fail" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "ok" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "handled" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "invalid" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "userlock" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "notfound" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "noop" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "updated" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "detail" from file /etc/freeradius/3.0/mods-enabled/detail # Instantiating module "files" from file /etc/freeradius/3.0/mods-enabled/files reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy # Instantiating module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/huntgroups reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints # Instantiating module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "pap" from file /etc/freeradius/3.0/mods-enabled/pap # Instantiating module "eap" from file /etc/freeradius/3.0/mods-enabled/eap # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { verify_depth = 0 ca_path = "/etc/freeradius/3.0/certs" pem_file_type = yes private_key_file = "/etc/freeradius/3.0/certs/server.key" certificate_file = "/etc/freeradius/3.0/certs/server.pem" ca_file = "/etc/freeradius/3.0/certs/ca.pem" private_key_password = <<< secret >>> dh_file = "/etc/freeradius/3.0/certs/dh" random_file = "/dev/urandom" fragment_size = 1024 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" cipher_server_preference = no ecdh_curve = "prime256v1" tls_max_version = "" tls_min_version = "1.0" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common" default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" include_length = yes require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { tls = "tls-common" default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = no proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Instantiating module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_reject [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT". [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT". # Instantiating module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/accounting_response # Instantiating module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/freeradius/3.0/radiusd.conf } # server server default { # from file /etc/freeradius/3.0/sites-enabled/default # Loading authenticate {...} # Loading authorize {...} Ignoring "sql" (see raddb/mods-available/README.rst) Ignoring "ldap" (see raddb/mods-available/README.rst) # Loading preacct {...} # Loading accounting {...} # Loading post-proxy {...} # Loading post-auth {...} } # server default server inner-tunnel { # from file /etc/freeradius/3.0/sites-enabled/inner-tunnel # Loading authenticate {...} # Loading authorize {...} # Loading session {...} # Loading post-proxy {...} # Loading post-auth {...} } # server inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = 192.168.128.1 port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } Listening on auth interface eth3.3 address 192.168.128.1 port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel Listening on proxy address * port 35627 Listening on proxy address :: port 57367 Ready to process requests (0) Received Access-Request Id 6 from 192.168.128.2:44829 to 192.168.128.1:1812 length 147 (0) User-Name = "om" (0) NAS-IP-Address = 192.168.128.2 (0) NAS-Port = 0 (0) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (0) Calling-Station-Id = "E0-F8-47-0C-A0-60" (0) Framed-MTU = 1400 (0) NAS-Port-Type = Wireless-802.11 (0) Connect-Info = "CONNECT 0Mbps 802.11a" (0) EAP-Message = 0x02000007016f6d (0) Message-Authenticator = 0x4218501fb21bb6091cc0053f440354dd (0) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (0) authorize { (0) policy filter_username { (0) if (&User-Name) { (0) if (&User-Name) -> TRUE (0) if (&User-Name) { (0) if (&User-Name =~ / /) { (0) if (&User-Name =~ / /) -> FALSE (0) if (&User-Name =~ /@[^@]*@/ ) { (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (0) if (&User-Name =~ /\.\./ ) { (0) if (&User-Name =~ /\.\./ ) -> FALSE (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (0) if (&User-Name =~ /\.$/) { (0) if (&User-Name =~ /\.$/) -> FALSE (0) if (&User-Name =~ /@\./) { (0) if (&User-Name =~ /@\./) -> FALSE (0) } # if (&User-Name) = notfound (0) } # policy filter_username = notfound (0) [preprocess] = ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0) suffix: Checking for suffix after "@" (0) suffix: No '@' in User-Name = "om", looking up realm NULL (0) suffix: No such realm "NULL" (0) [suffix] = noop (0) eap: Peer sent EAP Response (code 2) ID 0 length 7 (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0) [eap] = ok (0) } # authorize = ok (0) Found Auth-Type = eap (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (0) authenticate { (0) eap: Peer sent packet with method EAP Identity (1) (0) eap: Calling submodule eap_peap to process data (0) eap_peap: Initiating new EAP-TLS session (0) eap_peap: [eaptls start] = request (0) eap: Sending EAP Request (code 1) ID 1 length 6 (0) eap: EAP session adding &reply:State = 0x0ccadbcf0ccbc2ce (0) [eap] = handled (0) } # authenticate = handled (0) Using Post-Auth-Type Challenge (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (0) Challenge { ... } # empty sub-section is ignored (0) Sent Access-Challenge Id 6 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (0) EAP-Message = 0x010100061920 (0) Message-Authenticator = 0x00000000000000000000000000000000 (0) State = 0x0ccadbcf0ccbc2ce3832807e011b30d5 (0) Finished request Waking up in 4.9 seconds. (1) Received Access-Request Id 7 from 192.168.128.2:44829 to 192.168.128.1:1812 length 319 (1) User-Name = "om" (1) NAS-IP-Address = 192.168.128.2 (1) NAS-Port = 0 (1) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (1) Calling-Station-Id = "E0-F8-47-0C-A0-60" (1) Framed-MTU = 1400 (1) NAS-Port-Type = Wireless-802.11 (1) Connect-Info = "CONNECT 0Mbps 802.11a" (1) EAP-Message = 0x020100a119800000009716030100920100008e03035b8819ee97a6e091a40fc018d05dc9921bfa125e930822a6bde878b81831688f00002c00ffc02cc02bc024c023c00ac009c008c030c02fc028c027c014c013c012009d009c003d003c0035002f000a01000039000a00080006001700180019000b00 (1) State = 0x0ccadbcf0ccbc2ce3832807e011b30d5 (1) Message-Authenticator = 0x785842a83a0f1165a07a7512ece314b2 (1) session-state: No cached attributes (1) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (1) authorize { (1) policy filter_username { (1) if (&User-Name) { (1) if (&User-Name) -> TRUE (1) if (&User-Name) { (1) if (&User-Name =~ / /) { (1) if (&User-Name =~ / /) -> FALSE (1) if (&User-Name =~ /@[^@]*@/ ) { (1) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (1) if (&User-Name =~ /\.\./ ) { (1) if (&User-Name =~ /\.\./ ) -> FALSE (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (1) if (&User-Name =~ /\.$/) { (1) if (&User-Name =~ /\.$/) -> FALSE (1) if (&User-Name =~ /@\./) { (1) if (&User-Name =~ /@\./) -> FALSE (1) } # if (&User-Name) = notfound (1) } # policy filter_username = notfound (1) [preprocess] = ok (1) [chap] = noop (1) [mschap] = noop (1) [digest] = noop (1) suffix: Checking for suffix after "@" (1) suffix: No '@' in User-Name = "om", looking up realm NULL (1) suffix: No such realm "NULL" (1) [suffix] = noop (1) eap: Peer sent EAP Response (code 2) ID 1 length 161 (1) eap: Continuing tunnel setup (1) [eap] = ok (1) } # authorize = ok (1) Found Auth-Type = eap (1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (1) authenticate { (1) eap: Expiring EAP session with state 0x0ccadbcf0ccbc2ce (1) eap: Finished EAP session with state 0x0ccadbcf0ccbc2ce (1) eap: Previous EAP request found for state 0x0ccadbcf0ccbc2ce, released from the list (1) eap: Peer sent packet with method EAP PEAP (25) (1) eap: Calling submodule eap_peap to process data (1) eap_peap: Continuing EAP-TLS (1) eap_peap: Peer indicated complete TLS record size will be 151 bytes (1) eap_peap: Got complete TLS record (151 bytes) (1) eap_peap: [eaptls verify] = length included (1) eap_peap: (other): before SSL initialization (1) eap_peap: TLS_accept: before SSL initialization (1) eap_peap: TLS_accept: before SSL initialization (1) eap_peap: <<< recv TLS 1.2 [length 0092] (1) eap_peap: TLS_accept: SSLv3/TLS read client hello (1) eap_peap: >>> send TLS 1.2 [length 003d] (1) eap_peap: TLS_accept: SSLv3/TLS write server hello (1) eap_peap: >>> send TLS 1.2 [length 081e] (1) eap_peap: TLS_accept: SSLv3/TLS write certificate (1) eap_peap: >>> send TLS 1.2 [length 014d] (1) eap_peap: TLS_accept: SSLv3/TLS write key exchange (1) eap_peap: >>> send TLS 1.2 [length 0004] (1) eap_peap: TLS_accept: SSLv3/TLS write server done (1) eap_peap: TLS_accept: Need to read more data: SSLv3/TLS write server done (1) eap_peap: In SSL Handshake Phase (1) eap_peap: In SSL Accept mode (1) eap_peap: [eaptls process] = handled (1) eap: Sending EAP Request (code 1) ID 2 length 1004 (1) eap: EAP session adding &reply:State = 0x0ccadbcf0dc8c2ce (1) [eap] = handled (1) } # authenticate = handled (1) Using Post-Auth-Type Challenge (1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (1) Challenge { ... } # empty sub-section is ignored (1) Sent Access-Challenge Id 7 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (1) EAP-Message = 0x010203ec19c0000009c0160303003d020000390303f119bfe04236fddf95dbfc5da04eb57ed0b455ef593aab9fee22888e349887a800c030000011ff01000100000b00040300010200170000160303081e0b00081a0008170003903082038c30820274a003020102020101300d06092a864886f70d0101 (1) Message-Authenticator = 0x00000000000000000000000000000000 (1) State = 0x0ccadbcf0dc8c2ce3832807e011b30d5 (1) Finished request Waking up in 4.9 seconds. (2) Received Access-Request Id 8 from 192.168.128.2:44829 to 192.168.128.1:1812 length 164 (2) User-Name = "om" (2) NAS-IP-Address = 192.168.128.2 (2) NAS-Port = 0 (2) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (2) Calling-Station-Id = "E0-F8-47-0C-A0-60" (2) Framed-MTU = 1400 (2) NAS-Port-Type = Wireless-802.11 (2) Connect-Info = "CONNECT 0Mbps 802.11a" (2) EAP-Message = 0x020200061900 (2) State = 0x0ccadbcf0dc8c2ce3832807e011b30d5 (2) Message-Authenticator = 0x8cb14a789db1bcbc8e7e3c347b8773d6 (2) session-state: No cached attributes (2) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (2) authorize { (2) policy filter_username { (2) if (&User-Name) { (2) if (&User-Name) -> TRUE (2) if (&User-Name) { (2) if (&User-Name =~ / /) { (2) if (&User-Name =~ / /) -> FALSE (2) if (&User-Name =~ /@[^@]*@/ ) { (2) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (2) if (&User-Name =~ /\.\./ ) { (2) if (&User-Name =~ /\.\./ ) -> FALSE (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (2) if (&User-Name =~ /\.$/) { (2) if (&User-Name =~ /\.$/) -> FALSE (2) if (&User-Name =~ /@\./) { (2) if (&User-Name =~ /@\./) -> FALSE (2) } # if (&User-Name) = notfound (2) } # policy filter_username = notfound (2) [preprocess] = ok (2) [chap] = noop (2) [mschap] = noop (2) [digest] = noop (2) suffix: Checking for suffix after "@" (2) suffix: No '@' in User-Name = "om", looking up realm NULL (2) suffix: No such realm "NULL" (2) [suffix] = noop (2) eap: Peer sent EAP Response (code 2) ID 2 length 6 (2) eap: Continuing tunnel setup (2) [eap] = ok (2) } # authorize = ok (2) Found Auth-Type = eap (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) authenticate { (2) eap: Expiring EAP session with state 0x0ccadbcf0dc8c2ce (2) eap: Finished EAP session with state 0x0ccadbcf0dc8c2ce (2) eap: Previous EAP request found for state 0x0ccadbcf0dc8c2ce, released from the list (2) eap: Peer sent packet with method EAP PEAP (25) (2) eap: Calling submodule eap_peap to process data (2) eap_peap: Continuing EAP-TLS (2) eap_peap: Peer ACKed our handshake fragment (2) eap_peap: [eaptls verify] = request (2) eap_peap: [eaptls process] = handled (2) eap: Sending EAP Request (code 1) ID 3 length 1000 (2) eap: EAP session adding &reply:State = 0x0ccadbcf0ec9c2ce (2) [eap] = handled (2) } # authenticate = handled (2) Using Post-Auth-Type Challenge (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) Challenge { ... } # empty sub-section is ignored (2) Sent Access-Challenge Id 8 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (2) EAP-Message = 0x010303e8194004813082047d30820365a003020102020900984baf1fe35101a0300d06092a864886f70d01010b0500308185310b3009060355040613024445310f300d06035504080c064272656d656e310f300d06035504070c064272656d656e31133011060355040a0c0a4f6547204272656d656e31 (2) Message-Authenticator = 0x00000000000000000000000000000000 (2) State = 0x0ccadbcf0ec9c2ce3832807e011b30d5 (2) Finished request Waking up in 4.9 seconds. (3) Received Access-Request Id 9 from 192.168.128.2:44829 to 192.168.128.1:1812 length 164 (3) User-Name = "om" (3) NAS-IP-Address = 192.168.128.2 (3) NAS-Port = 0 (3) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (3) Calling-Station-Id = "E0-F8-47-0C-A0-60" (3) Framed-MTU = 1400 (3) NAS-Port-Type = Wireless-802.11 (3) Connect-Info = "CONNECT 0Mbps 802.11a" (3) EAP-Message = 0x020300061900 (3) State = 0x0ccadbcf0ec9c2ce3832807e011b30d5 (3) Message-Authenticator = 0x9fce31fac0539cf1adfecce935e408a2 (3) session-state: No cached attributes (3) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (3) authorize { (3) policy filter_username { (3) if (&User-Name) { (3) if (&User-Name) -> TRUE (3) if (&User-Name) { (3) if (&User-Name =~ / /) { (3) if (&User-Name =~ / /) -> FALSE (3) if (&User-Name =~ /@[^@]*@/ ) { (3) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (3) if (&User-Name =~ /\.\./ ) { (3) if (&User-Name =~ /\.\./ ) -> FALSE (3) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (3) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (3) if (&User-Name =~ /\.$/) { (3) if (&User-Name =~ /\.$/) -> FALSE (3) if (&User-Name =~ /@\./) { (3) if (&User-Name =~ /@\./) -> FALSE (3) } # if (&User-Name) = notfound (3) } # policy filter_username = notfound (3) [preprocess] = ok (3) [chap] = noop (3) [mschap] = noop (3) [digest] = noop (3) suffix: Checking for suffix after "@" (3) suffix: No '@' in User-Name = "om", looking up realm NULL (3) suffix: No such realm "NULL" (3) [suffix] = noop (3) eap: Peer sent EAP Response (code 2) ID 3 length 6 (3) eap: Continuing tunnel setup (3) [eap] = ok (3) } # authorize = ok (3) Found Auth-Type = eap (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) authenticate { (3) eap: Expiring EAP session with state 0x0ccadbcf0ec9c2ce (3) eap: Finished EAP session with state 0x0ccadbcf0ec9c2ce (3) eap: Previous EAP request found for state 0x0ccadbcf0ec9c2ce, released from the list (3) eap: Peer sent packet with method EAP PEAP (25) (3) eap: Calling submodule eap_peap to process data (3) eap_peap: Continuing EAP-TLS (3) eap_peap: Peer ACKed our handshake fragment (3) eap_peap: [eaptls verify] = request (3) eap_peap: [eaptls process] = handled (3) eap: Sending EAP Request (code 1) ID 4 length 514 (3) eap: EAP session adding &reply:State = 0x0ccadbcf0fcec2ce (3) [eap] = handled (3) } # authenticate = handled (3) Using Post-Auth-Type Challenge (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) Challenge { ... } # empty sub-section is ignored (3) Sent Access-Challenge Id 9 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (3) EAP-Message = 0x0104020219006aa9c4b12043c10317e0bbd2d6f6d4f3a270f1b18fbed79462fc81309caa505e0264837b2c96775d77097238bd78ee36f0579eb0b5de197436fcac6e9baf2cc49e7ba2fc998e0e57850b5e892122d28d423883fc48f2b5782ff0f3e0c3c727eecc5124898f4ea481d26da23189ef5689ae (3) Message-Authenticator = 0x00000000000000000000000000000000 (3) State = 0x0ccadbcf0fcec2ce3832807e011b30d5 (3) Finished request Waking up in 4.8 seconds. (4) Received Access-Request Id 10 from 192.168.128.2:44829 to 192.168.128.1:1812 length 294 (4) User-Name = "om" (4) NAS-IP-Address = 192.168.128.2 (4) NAS-Port = 0 (4) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (4) Calling-Station-Id = "E0-F8-47-0C-A0-60" (4) Framed-MTU = 1400 (4) NAS-Port-Type = Wireless-802.11 (4) Connect-Info = "CONNECT 0Mbps 802.11a" (4) EAP-Message = 0x0204008819800000007e1603030046100000424104e00f4bc2beaccc8305d7105f8c6ecaebb2bcac618b4d3d8266d30e6fce038876ce8b6edd9894077a09c7cca67680a2e43610a469c5f159c25ddfc0d090daf80f14030300010116030300283848a626a2064d00e0b6ad85c916ebc019a118c49c5247 (4) State = 0x0ccadbcf0fcec2ce3832807e011b30d5 (4) Message-Authenticator = 0x98306b027c8148fde40a1f4c259742fb (4) session-state: No cached attributes (4) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (4) authorize { (4) policy filter_username { (4) if (&User-Name) { (4) if (&User-Name) -> TRUE (4) if (&User-Name) { (4) if (&User-Name =~ / /) { (4) if (&User-Name =~ / /) -> FALSE (4) if (&User-Name =~ /@[^@]*@/ ) { (4) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (4) if (&User-Name =~ /\.\./ ) { (4) if (&User-Name =~ /\.\./ ) -> FALSE (4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (4) if (&User-Name =~ /\.$/) { (4) if (&User-Name =~ /\.$/) -> FALSE (4) if (&User-Name =~ /@\./) { (4) if (&User-Name =~ /@\./) -> FALSE (4) } # if (&User-Name) = notfound (4) } # policy filter_username = notfound (4) [preprocess] = ok (4) [chap] = noop (4) [mschap] = noop (4) [digest] = noop (4) suffix: Checking for suffix after "@" (4) suffix: No '@' in User-Name = "om", looking up realm NULL (4) suffix: No such realm "NULL" (4) [suffix] = noop (4) eap: Peer sent EAP Response (code 2) ID 4 length 136 (4) eap: Continuing tunnel setup (4) [eap] = ok (4) } # authorize = ok (4) Found Auth-Type = eap (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) authenticate { (4) eap: Expiring EAP session with state 0x0ccadbcf0fcec2ce (4) eap: Finished EAP session with state 0x0ccadbcf0fcec2ce (4) eap: Previous EAP request found for state 0x0ccadbcf0fcec2ce, released from the list (4) eap: Peer sent packet with method EAP PEAP (25) (4) eap: Calling submodule eap_peap to process data (4) eap_peap: Continuing EAP-TLS (4) eap_peap: Peer indicated complete TLS record size will be 126 bytes (4) eap_peap: Got complete TLS record (126 bytes) (4) eap_peap: [eaptls verify] = length included (4) eap_peap: TLS_accept: SSLv3/TLS write server done (4) eap_peap: <<< recv TLS 1.2 [length 0046] (4) eap_peap: TLS_accept: SSLv3/TLS read client key exchange (4) eap_peap: TLS_accept: SSLv3/TLS read change cipher spec (4) eap_peap: <<< recv TLS 1.2 [length 0010] (4) eap_peap: TLS_accept: SSLv3/TLS read finished (4) eap_peap: >>> send TLS 1.2 [length 0001] (4) eap_peap: TLS_accept: SSLv3/TLS write change cipher spec (4) eap_peap: >>> send TLS 1.2 [length 0010] (4) eap_peap: TLS_accept: SSLv3/TLS write finished (4) eap_peap: (other): SSL negotiation finished successfully (4) eap_peap: SSL Connection Established (4) eap_peap: [eaptls process] = handled (4) eap: Sending EAP Request (code 1) ID 5 length 57 (4) eap: EAP session adding &reply:State = 0x0ccadbcf08cfc2ce (4) [eap] = handled (4) } # authenticate = handled (4) Using Post-Auth-Type Challenge (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) Challenge { ... } # empty sub-section is ignored (4) Sent Access-Challenge Id 10 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (4) EAP-Message = 0x01050039190014030300010116030300282873c43b6c5544007ede4189dfe65d312b212c017673df5e3b5c89042f740eb194e4268033eb250e (4) Message-Authenticator = 0x00000000000000000000000000000000 (4) State = 0x0ccadbcf08cfc2ce3832807e011b30d5 (4) Finished request Waking up in 4.8 seconds. (5) Received Access-Request Id 11 from 192.168.128.2:44829 to 192.168.128.1:1812 length 164 (5) User-Name = "om" (5) NAS-IP-Address = 192.168.128.2 (5) NAS-Port = 0 (5) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (5) Calling-Station-Id = "E0-F8-47-0C-A0-60" (5) Framed-MTU = 1400 (5) NAS-Port-Type = Wireless-802.11 (5) Connect-Info = "CONNECT 0Mbps 802.11a" (5) EAP-Message = 0x020500061900 (5) State = 0x0ccadbcf08cfc2ce3832807e011b30d5 (5) Message-Authenticator = 0x17e928dda9ed394d63bd0718087c186a (5) session-state: No cached attributes (5) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (5) authorize { (5) policy filter_username { (5) if (&User-Name) { (5) if (&User-Name) -> TRUE (5) if (&User-Name) { (5) if (&User-Name =~ / /) { (5) if (&User-Name =~ / /) -> FALSE (5) if (&User-Name =~ /@[^@]*@/ ) { (5) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (5) if (&User-Name =~ /\.\./ ) { (5) if (&User-Name =~ /\.\./ ) -> FALSE (5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (5) if (&User-Name =~ /\.$/) { (5) if (&User-Name =~ /\.$/) -> FALSE (5) if (&User-Name =~ /@\./) { (5) if (&User-Name =~ /@\./) -> FALSE (5) } # if (&User-Name) = notfound (5) } # policy filter_username = notfound (5) [preprocess] = ok (5) [chap] = noop (5) [mschap] = noop (5) [digest] = noop (5) suffix: Checking for suffix after "@" (5) suffix: No '@' in User-Name = "om", looking up realm NULL (5) suffix: No such realm "NULL" (5) [suffix] = noop (5) eap: Peer sent EAP Response (code 2) ID 5 length 6 (5) eap: Continuing tunnel setup (5) [eap] = ok (5) } # authorize = ok (5) Found Auth-Type = eap (5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (5) authenticate { (5) eap: Expiring EAP session with state 0x0ccadbcf08cfc2ce (5) eap: Finished EAP session with state 0x0ccadbcf08cfc2ce (5) eap: Previous EAP request found for state 0x0ccadbcf08cfc2ce, released from the list (5) eap: Peer sent packet with method EAP PEAP (25) (5) eap: Calling submodule eap_peap to process data (5) eap_peap: Continuing EAP-TLS (5) eap_peap: Peer ACKed our handshake fragment. handshake is finished (5) eap_peap: [eaptls verify] = success (5) eap_peap: [eaptls process] = success (5) eap_peap: Session established. Decoding tunneled attributes (5) eap_peap: PEAP state TUNNEL ESTABLISHED (5) eap: Sending EAP Request (code 1) ID 6 length 40 (5) eap: EAP session adding &reply:State = 0x0ccadbcf09ccc2ce (5) [eap] = handled (5) } # authenticate = handled (5) Using Post-Auth-Type Challenge (5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (5) Challenge { ... } # empty sub-section is ignored (5) Sent Access-Challenge Id 11 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (5) EAP-Message = 0x010600281900170303001d2873c43b6c5544013b094c53c4ff1196db366338068c6acf0b7dbb14c7 (5) Message-Authenticator = 0x00000000000000000000000000000000 (5) State = 0x0ccadbcf09ccc2ce3832807e011b30d5 (5) Finished request Waking up in 4.7 seconds. (6) Received Access-Request Id 12 from 192.168.128.2:44829 to 192.168.128.1:1812 length 196 (6) User-Name = "om" (6) NAS-IP-Address = 192.168.128.2 (6) NAS-Port = 0 (6) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (6) Calling-Station-Id = "E0-F8-47-0C-A0-60" (6) Framed-MTU = 1400 (6) NAS-Port-Type = Wireless-802.11 (6) Connect-Info = "CONNECT 0Mbps 802.11a" (6) EAP-Message = 0x020600261900170303001b3848a626a2064d01adcfbf10e460c4e9578798c07541e048a63c60 (6) State = 0x0ccadbcf09ccc2ce3832807e011b30d5 (6) Message-Authenticator = 0x66d34392127381f86175d904e4f6beb8 (6) session-state: No cached attributes (6) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (6) authorize { (6) policy filter_username { (6) if (&User-Name) { (6) if (&User-Name) -> TRUE (6) if (&User-Name) { (6) if (&User-Name =~ / /) { (6) if (&User-Name =~ / /) -> FALSE (6) if (&User-Name =~ /@[^@]*@/ ) { (6) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (6) if (&User-Name =~ /\.\./ ) { (6) if (&User-Name =~ /\.\./ ) -> FALSE (6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (6) if (&User-Name =~ /\.$/) { (6) if (&User-Name =~ /\.$/) -> FALSE (6) if (&User-Name =~ /@\./) { (6) if (&User-Name =~ /@\./) -> FALSE (6) } # if (&User-Name) = notfound (6) } # policy filter_username = notfound (6) [preprocess] = ok (6) [chap] = noop (6) [mschap] = noop (6) [digest] = noop (6) suffix: Checking for suffix after "@" (6) suffix: No '@' in User-Name = "om", looking up realm NULL (6) suffix: No such realm "NULL" (6) [suffix] = noop (6) eap: Peer sent EAP Response (code 2) ID 6 length 38 (6) eap: Continuing tunnel setup (6) [eap] = ok (6) } # authorize = ok (6) Found Auth-Type = eap (6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (6) authenticate { (6) eap: Expiring EAP session with state 0x0ccadbcf09ccc2ce (6) eap: Finished EAP session with state 0x0ccadbcf09ccc2ce (6) eap: Previous EAP request found for state 0x0ccadbcf09ccc2ce, released from the list (6) eap: Peer sent packet with method EAP PEAP (25) (6) eap: Calling submodule eap_peap to process data (6) eap_peap: Continuing EAP-TLS (6) eap_peap: [eaptls verify] = ok (6) eap_peap: Done initial handshake (6) eap_peap: [eaptls process] = ok (6) eap_peap: Session established. Decoding tunneled attributes (6) eap_peap: PEAP state WAITING FOR INNER IDENTITY (6) eap_peap: Identity - om (6) eap_peap: Got inner identity 'om' (6) eap_peap: Setting default EAP type for tunneled EAP session (6) eap_peap: Got tunneled request (6) eap_peap: EAP-Message = 0x02060007016f6d (6) eap_peap: Setting User-Name to om (6) eap_peap: Sending tunneled request to inner-tunnel (6) eap_peap: EAP-Message = 0x02060007016f6d (6) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (6) eap_peap: User-Name = "om" (6) Virtual server inner-tunnel received request (6) EAP-Message = 0x02060007016f6d (6) FreeRADIUS-Proxied-To = 127.0.0.1 (6) User-Name = "om" (6) WARNING: Outer and inner identities are the same. User privacy is compromised. (6) server inner-tunnel { (6) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (6) authorize { (6) [chap] = noop (6) [mschap] = noop (6) suffix: Checking for suffix after "@" (6) suffix: No '@' in User-Name = "om", looking up realm NULL (6) suffix: No such realm "NULL" (6) [suffix] = noop (6) update control { (6) Proxy-To-Realm := LOCAL (6) } # update control = noop (6) eap: Peer sent EAP Response (code 2) ID 6 length 7 (6) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (6) [eap] = ok (6) } # authorize = ok (6) Found Auth-Type = eap (6) # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (6) authenticate { (6) eap: Peer sent packet with method EAP Identity (1) (6) eap: Calling submodule eap_mschapv2 to process data (6) eap_mschapv2: Issuing Challenge (6) eap: Sending EAP Request (code 1) ID 7 length 43 (6) eap: EAP session adding &reply:State = 0xcccda0ebcccaba91 (6) [eap] = handled (6) } # authenticate = handled (6) } # server inner-tunnel (6) Virtual server sending reply (6) EAP-Message = 0x0107002b1a0107002610437e6e506ea1d559ec5b1e93f269d130667265657261646975732d332e302e3136 (6) Message-Authenticator = 0x00000000000000000000000000000000 (6) State = 0xcccda0ebcccaba91fc31ce5eaab91a24 (6) eap_peap: Got tunneled reply code 11 (6) eap_peap: EAP-Message = 0x0107002b1a0107002610437e6e506ea1d559ec5b1e93f269d130667265657261646975732d332e302e3136 (6) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (6) eap_peap: State = 0xcccda0ebcccaba91fc31ce5eaab91a24 (6) eap_peap: Got tunneled reply RADIUS code 11 (6) eap_peap: EAP-Message = 0x0107002b1a0107002610437e6e506ea1d559ec5b1e93f269d130667265657261646975732d332e302e3136 (6) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (6) eap_peap: State = 0xcccda0ebcccaba91fc31ce5eaab91a24 (6) eap_peap: Got tunneled Access-Challenge (6) eap: Sending EAP Request (code 1) ID 7 length 74 (6) eap: EAP session adding &reply:State = 0x0ccadbcf0acdc2ce (6) [eap] = handled (6) } # authenticate = handled (6) Using Post-Auth-Type Challenge (6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (6) Challenge { ... } # empty sub-section is ignored (6) Sent Access-Challenge Id 12 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (6) EAP-Message = 0x0107004a1900170303003f2873c43b6c554402f48d5a3f9b52691ed25f0fa04cc815bf4dc52b41737b66db918ce08d9c66e6e959c5a3096ee29f43f6746ff32f0fbcc1edc53d406a8b84 (6) Message-Authenticator = 0x00000000000000000000000000000000 (6) State = 0x0ccadbcf0acdc2ce3832807e011b30d5 (6) Finished request Waking up in 4.7 seconds. (7) Received Access-Request Id 13 from 192.168.128.2:44829 to 192.168.128.1:1812 length 250 (7) User-Name = "om" (7) NAS-IP-Address = 192.168.128.2 (7) NAS-Port = 0 (7) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (7) Calling-Station-Id = "E0-F8-47-0C-A0-60" (7) Framed-MTU = 1400 (7) NAS-Port-Type = Wireless-802.11 (7) Connect-Info = "CONNECT 0Mbps 802.11a" (7) EAP-Message = 0x0207005c190017030300513848a626a2064d02f63f8ec0264de35e02e26b335b0a70d8cbdee60ff1e9082727d5f5f8e09de6b434918e9847ce0fc311d8c1c6fc29638b7dd28e6f4e21e28a338bc577231081a54583db4cbffaef5764 (7) State = 0x0ccadbcf0acdc2ce3832807e011b30d5 (7) Message-Authenticator = 0x25f5800dd15f679b879cd42d99ef8b57 (7) session-state: No cached attributes (7) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (7) authorize { (7) policy filter_username { (7) if (&User-Name) { (7) if (&User-Name) -> TRUE (7) if (&User-Name) { (7) if (&User-Name =~ / /) { (7) if (&User-Name =~ / /) -> FALSE (7) if (&User-Name =~ /@[^@]*@/ ) { (7) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (7) if (&User-Name =~ /\.\./ ) { (7) if (&User-Name =~ /\.\./ ) -> FALSE (7) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (7) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (7) if (&User-Name =~ /\.$/) { (7) if (&User-Name =~ /\.$/) -> FALSE (7) if (&User-Name =~ /@\./) { (7) if (&User-Name =~ /@\./) -> FALSE (7) } # if (&User-Name) = notfound (7) } # policy filter_username = notfound (7) [preprocess] = ok (7) [chap] = noop (7) [mschap] = noop (7) [digest] = noop (7) suffix: Checking for suffix after "@" (7) suffix: No '@' in User-Name = "om", looking up realm NULL (7) suffix: No such realm "NULL" (7) [suffix] = noop (7) eap: Peer sent EAP Response (code 2) ID 7 length 92 (7) eap: Continuing tunnel setup (7) [eap] = ok (7) } # authorize = ok (7) Found Auth-Type = eap (7) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (7) authenticate { (7) eap: Expiring EAP session with state 0xcccda0ebcccaba91 (7) eap: Finished EAP session with state 0x0ccadbcf0acdc2ce (7) eap: Previous EAP request found for state 0x0ccadbcf0acdc2ce, released from the list (7) eap: Peer sent packet with method EAP PEAP (25) (7) eap: Calling submodule eap_peap to process data (7) eap_peap: Continuing EAP-TLS (7) eap_peap: [eaptls verify] = ok (7) eap_peap: Done initial handshake (7) eap_peap: [eaptls process] = ok (7) eap_peap: Session established. Decoding tunneled attributes (7) eap_peap: PEAP state phase2 (7) eap_peap: EAP method MSCHAPv2 (26) (7) eap_peap: Got tunneled request (7) eap_peap: EAP-Message = 0x0207003d1a0207003831b4243392fd4164e9dd995eb26aa728e10000000000000000b8279637f9cc5a47524d070d13e0ded9a74a1e3c8624c5af006f6d (7) eap_peap: Setting User-Name to om (7) eap_peap: Sending tunneled request to inner-tunnel (7) eap_peap: EAP-Message = 0x0207003d1a0207003831b4243392fd4164e9dd995eb26aa728e10000000000000000b8279637f9cc5a47524d070d13e0ded9a74a1e3c8624c5af006f6d (7) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (7) eap_peap: User-Name = "om" (7) eap_peap: State = 0xcccda0ebcccaba91fc31ce5eaab91a24 (7) Virtual server inner-tunnel received request (7) EAP-Message = 0x0207003d1a0207003831b4243392fd4164e9dd995eb26aa728e10000000000000000b8279637f9cc5a47524d070d13e0ded9a74a1e3c8624c5af006f6d (7) FreeRADIUS-Proxied-To = 127.0.0.1 (7) User-Name = "om" (7) State = 0xcccda0ebcccaba91fc31ce5eaab91a24 (7) WARNING: Outer and inner identities are the same. User privacy is compromised. (7) server inner-tunnel { (7) session-state: No cached attributes (7) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (7) authorize { (7) [chap] = noop (7) [mschap] = noop (7) suffix: Checking for suffix after "@" (7) suffix: No '@' in User-Name = "om", looking up realm NULL (7) suffix: No such realm "NULL" (7) [suffix] = noop (7) update control { (7) Proxy-To-Realm := LOCAL (7) } # update control = noop (7) eap: Peer sent EAP Response (code 2) ID 7 length 61 (7) eap: No EAP Start, assuming it's an on-going EAP conversation (7) [eap] = updated (7) [files] = noop (7) [expiration] = noop (7) [logintime] = noop (7) [pap] = noop (7) } # authorize = updated (7) Found Auth-Type = eap (7) # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (7) authenticate { (7) eap: Expiring EAP session with state 0xcccda0ebcccaba91 (7) eap: Finished EAP session with state 0xcccda0ebcccaba91 (7) eap: Previous EAP request found for state 0xcccda0ebcccaba91, released from the list (7) eap: Peer sent packet with method EAP MSCHAPv2 (26) (7) eap: Calling submodule eap_mschapv2 to process data (7) eap_mschapv2: Auth-Type sub-section not found. Ignoring. (7) eap_mschapv2: # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (7) eap: Sending EAP Failure (code 4) ID 7 length 4 (7) eap: Freeing handler (7) [eap] = reject (7) } # authenticate = reject (7) Failed to authenticate the user (7) Using Post-Auth-Type Reject (7) # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (7) Post-Auth-Type REJECT { (7) attr_filter.access_reject: EXPAND %{User-Name} (7) attr_filter.access_reject: --> om (7) attr_filter.access_reject: Matched entry DEFAULT at line 11 (7) [attr_filter.access_reject] = updated (7) } # Post-Auth-Type REJECT = updated (7) } # server inner-tunnel (7) Virtual server sending reply (7) EAP-Message = 0x04070004 (7) Message-Authenticator = 0x00000000000000000000000000000000 (7) eap_peap: Got tunneled reply code 3 (7) eap_peap: EAP-Message = 0x04070004 (7) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (7) eap_peap: Got tunneled reply RADIUS code 3 (7) eap_peap: EAP-Message = 0x04070004 (7) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (7) eap_peap: Tunneled authentication was rejected (7) eap_peap: FAILURE (7) eap: Sending EAP Request (code 1) ID 8 length 46 (7) eap: EAP session adding &reply:State = 0x0ccadbcf0bc2c2ce (7) [eap] = handled (7) } # authenticate = handled (7) Using Post-Auth-Type Challenge (7) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (7) Challenge { ... } # empty sub-section is ignored (7) Sent Access-Challenge Id 13 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (7) EAP-Message = 0x0108002e190017030300232873c43b6c5544030d15ab2cb098f6da5a68e928a15ee0a940f0bfe6f26f4bc569c6bc (7) Message-Authenticator = 0x00000000000000000000000000000000 (7) State = 0x0ccadbcf0bc2c2ce3832807e011b30d5 (7) Finished request Waking up in 4.7 seconds. (8) Received Access-Request Id 14 from 192.168.128.2:44829 to 192.168.128.1:1812 length 204 (8) User-Name = "om" (8) NAS-IP-Address = 192.168.128.2 (8) NAS-Port = 0 (8) Called-Station-Id = "E8-CC-18-8B-6A-81:OEG-WLAN-5" (8) Calling-Station-Id = "E0-F8-47-0C-A0-60" (8) Framed-MTU = 1400 (8) NAS-Port-Type = Wireless-802.11 (8) Connect-Info = "CONNECT 0Mbps 802.11a" (8) EAP-Message = 0x0208002e190017030300233848a626a2064d0369caca80b1fac57cc1180c7b2ff32e9a2d40ad6a0f02b0ee3d13cc (8) State = 0x0ccadbcf0bc2c2ce3832807e011b30d5 (8) Message-Authenticator = 0xca71622822c7be7ba760e344c5dd2392 (8) session-state: No cached attributes (8) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (8) authorize { (8) policy filter_username { (8) if (&User-Name) { (8) if (&User-Name) -> TRUE (8) if (&User-Name) { (8) if (&User-Name =~ / /) { (8) if (&User-Name =~ / /) -> FALSE (8) if (&User-Name =~ /@[^@]*@/ ) { (8) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (8) if (&User-Name =~ /\.\./ ) { (8) if (&User-Name =~ /\.\./ ) -> FALSE (8) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (8) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (8) if (&User-Name =~ /\.$/) { (8) if (&User-Name =~ /\.$/) -> FALSE (8) if (&User-Name =~ /@\./) { (8) if (&User-Name =~ /@\./) -> FALSE (8) } # if (&User-Name) = notfound (8) } # policy filter_username = notfound (8) [preprocess] = ok (8) [chap] = noop (8) [mschap] = noop (8) [digest] = noop (8) suffix: Checking for suffix after "@" (8) suffix: No '@' in User-Name = "om", looking up realm NULL (8) suffix: No such realm "NULL" (8) [suffix] = noop (8) eap: Peer sent EAP Response (code 2) ID 8 length 46 (8) eap: Continuing tunnel setup (8) [eap] = ok (8) } # authorize = ok (8) Found Auth-Type = eap (8) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (8) authenticate { (8) eap: Expiring EAP session with state 0x0ccadbcf0bc2c2ce (8) eap: Finished EAP session with state 0x0ccadbcf0bc2c2ce (8) eap: Previous EAP request found for state 0x0ccadbcf0bc2c2ce, released from the list (8) eap: Peer sent packet with method EAP PEAP (25) (8) eap: Calling submodule eap_peap to process data (8) eap_peap: Continuing EAP-TLS (8) eap_peap: [eaptls verify] = ok (8) eap_peap: Done initial handshake (8) eap_peap: [eaptls process] = ok (8) eap_peap: Session established. Decoding tunneled attributes (8) eap_peap: PEAP state send tlv failure (8) eap_peap: Received EAP-TLV response (8) eap_peap: ERROR: The users session was previously rejected: returning reject (again.) (8) eap_peap: This means you need to read the PREVIOUS messages in the debug output (8) eap_peap: to find out the reason why the user was rejected (8) eap_peap: Look for "reject" or "fail". Those earlier messages will tell you (8) eap_peap: what went wrong, and how to fix the problem (8) eap: ERROR: Failed continuing EAP PEAP (25) session. EAP sub-module failed (8) eap: Sending EAP Failure (code 4) ID 8 length 4 (8) eap: Failed in EAP select (8) [eap] = invalid (8) } # authenticate = invalid (8) Failed to authenticate the user (8) Using Post-Auth-Type Reject (8) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (8) Post-Auth-Type REJECT { (8) attr_filter.access_reject: EXPAND %{User-Name} (8) attr_filter.access_reject: --> om (8) attr_filter.access_reject: Matched entry DEFAULT at line 11 (8) [attr_filter.access_reject] = updated (8) [eap] = noop (8) policy remove_reply_message_if_eap { (8) if (&reply:EAP-Message && &reply:Reply-Message) { (8) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (8) else { (8) [noop] = noop (8) } # else = noop (8) } # policy remove_reply_message_if_eap = noop (8) } # Post-Auth-Type REJECT = updated (8) Delaying response for 1.000000 seconds Waking up in 0.3 seconds. Waking up in 0.6 seconds. (8) Sending delayed response (8) Sent Access-Reject Id 14 from 192.168.128.1:1812 to 192.168.128.2:44829 length 44 (8) EAP-Message = 0x04080004 (8) Message-Authenticator = 0x00000000000000000000000000000000 Waking up in 3.7 seconds. (0) Cleaning up request packet ID 6 with timestamp +8 (1) Cleaning up request packet ID 7 with timestamp +8 (2) Cleaning up request packet ID 8 with timestamp +8 (3) Cleaning up request packet ID 9 with timestamp +8 (4) Cleaning up request packet ID 10 with timestamp +8 (5) Cleaning up request packet ID 11 with timestamp +8 (6) Cleaning up request packet ID 12 with timestamp +8 (7) Cleaning up request packet ID 13 with timestamp +8 (8) Cleaning up request packet ID 14 with timestamp +8 Ready to process requests (9) Received Access-Request Id 15 from 192.168.128.2:44829 to 192.168.128.1:1812 length 145 (9) User-Name = "om" (9) NAS-IP-Address = 192.168.128.2 (9) NAS-Port = 0 (9) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (9) Calling-Station-Id = "E0-F8-47-0C-A0-60" (9) Framed-MTU = 1400 (9) NAS-Port-Type = Wireless-802.11 (9) Connect-Info = "CONNECT 0Mbps 802.11g" (9) EAP-Message = 0x02000007016f6d (9) Message-Authenticator = 0xc38007ffffa7188ae2fe4c8178c7a255 (9) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (9) authorize { (9) policy filter_username { (9) if (&User-Name) { (9) if (&User-Name) -> TRUE (9) if (&User-Name) { (9) if (&User-Name =~ / /) { (9) if (&User-Name =~ / /) -> FALSE (9) if (&User-Name =~ /@[^@]*@/ ) { (9) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (9) if (&User-Name =~ /\.\./ ) { (9) if (&User-Name =~ /\.\./ ) -> FALSE (9) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (9) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (9) if (&User-Name =~ /\.$/) { (9) if (&User-Name =~ /\.$/) -> FALSE (9) if (&User-Name =~ /@\./) { (9) if (&User-Name =~ /@\./) -> FALSE (9) } # if (&User-Name) = notfound (9) } # policy filter_username = notfound (9) [preprocess] = ok (9) [chap] = noop (9) [mschap] = noop (9) [digest] = noop (9) suffix: Checking for suffix after "@" (9) suffix: No '@' in User-Name = "om", looking up realm NULL (9) suffix: No such realm "NULL" (9) [suffix] = noop (9) eap: Peer sent EAP Response (code 2) ID 0 length 7 (9) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (9) [eap] = ok (9) } # authorize = ok (9) Found Auth-Type = eap (9) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (9) authenticate { (9) eap: Peer sent packet with method EAP Identity (1) (9) eap: Calling submodule eap_peap to process data (9) eap_peap: Initiating new EAP-TLS session (9) eap_peap: [eaptls start] = request (9) eap: Sending EAP Request (code 1) ID 1 length 6 (9) eap: EAP session adding &reply:State = 0x54f39e0354f287f3 (9) [eap] = handled (9) } # authenticate = handled (9) Using Post-Auth-Type Challenge (9) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (9) Challenge { ... } # empty sub-section is ignored (9) Sent Access-Challenge Id 15 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (9) EAP-Message = 0x010100061920 (9) Message-Authenticator = 0x00000000000000000000000000000000 (9) State = 0x54f39e0354f287f3d186ee0642b9bdd4 (9) Finished request Waking up in 4.9 seconds. (10) Received Access-Request Id 16 from 192.168.128.2:44829 to 192.168.128.1:1812 length 317 (10) User-Name = "om" (10) NAS-IP-Address = 192.168.128.2 (10) NAS-Port = 0 (10) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (10) Calling-Station-Id = "E0-F8-47-0C-A0-60" (10) Framed-MTU = 1400 (10) NAS-Port-Type = Wireless-802.11 (10) Connect-Info = "CONNECT 0Mbps 802.11g" (10) EAP-Message = 0x020100a119800000009716030100920100008e03035b8819f540cabc12632b32d11e76edaea0ec01cc3b98985db3753305b113044200002c00ffc02cc02bc024c023c00ac009c008c030c02fc028c027c014c013c012009d009c003d003c0035002f000a01000039000a00080006001700180019000b00 (10) State = 0x54f39e0354f287f3d186ee0642b9bdd4 (10) Message-Authenticator = 0xa4f8dba4484f96e1cc869f95194c12c9 (10) session-state: No cached attributes (10) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (10) authorize { (10) policy filter_username { (10) if (&User-Name) { (10) if (&User-Name) -> TRUE (10) if (&User-Name) { (10) if (&User-Name =~ / /) { (10) if (&User-Name =~ / /) -> FALSE (10) if (&User-Name =~ /@[^@]*@/ ) { (10) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (10) if (&User-Name =~ /\.\./ ) { (10) if (&User-Name =~ /\.\./ ) -> FALSE (10) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (10) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (10) if (&User-Name =~ /\.$/) { (10) if (&User-Name =~ /\.$/) -> FALSE (10) if (&User-Name =~ /@\./) { (10) if (&User-Name =~ /@\./) -> FALSE (10) } # if (&User-Name) = notfound (10) } # policy filter_username = notfound (10) [preprocess] = ok (10) [chap] = noop (10) [mschap] = noop (10) [digest] = noop (10) suffix: Checking for suffix after "@" (10) suffix: No '@' in User-Name = "om", looking up realm NULL (10) suffix: No such realm "NULL" (10) [suffix] = noop (10) eap: Peer sent EAP Response (code 2) ID 1 length 161 (10) eap: Continuing tunnel setup (10) [eap] = ok (10) } # authorize = ok (10) Found Auth-Type = eap (10) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (10) authenticate { (10) eap: Expiring EAP session with state 0x54f39e0354f287f3 (10) eap: Finished EAP session with state 0x54f39e0354f287f3 (10) eap: Previous EAP request found for state 0x54f39e0354f287f3, released from the list (10) eap: Peer sent packet with method EAP PEAP (25) (10) eap: Calling submodule eap_peap to process data (10) eap_peap: Continuing EAP-TLS (10) eap_peap: Peer indicated complete TLS record size will be 151 bytes (10) eap_peap: Got complete TLS record (151 bytes) (10) eap_peap: [eaptls verify] = length included (10) eap_peap: (other): before SSL initialization (10) eap_peap: TLS_accept: before SSL initialization (10) eap_peap: TLS_accept: before SSL initialization (10) eap_peap: <<< recv TLS 1.2 [length 0092] (10) eap_peap: TLS_accept: SSLv3/TLS read client hello (10) eap_peap: >>> send TLS 1.2 [length 003d] (10) eap_peap: TLS_accept: SSLv3/TLS write server hello (10) eap_peap: >>> send TLS 1.2 [length 081e] (10) eap_peap: TLS_accept: SSLv3/TLS write certificate (10) eap_peap: >>> send TLS 1.2 [length 014d] (10) eap_peap: TLS_accept: SSLv3/TLS write key exchange (10) eap_peap: >>> send TLS 1.2 [length 0004] (10) eap_peap: TLS_accept: SSLv3/TLS write server done (10) eap_peap: TLS_accept: Need to read more data: SSLv3/TLS write server done (10) eap_peap: In SSL Handshake Phase (10) eap_peap: In SSL Accept mode (10) eap_peap: [eaptls process] = handled (10) eap: Sending EAP Request (code 1) ID 2 length 1004 (10) eap: EAP session adding &reply:State = 0x54f39e0355f187f3 (10) [eap] = handled (10) } # authenticate = handled (10) Using Post-Auth-Type Challenge (10) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (10) Challenge { ... } # empty sub-section is ignored (10) Sent Access-Challenge Id 16 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (10) EAP-Message = 0x010203ec19c0000009c0160303003d0200003903030c1c4646b726e2e2c97efed47f24c6d13d7a2cf32193319c18619d003972a83f00c030000011ff01000100000b00040300010200170000160303081e0b00081a0008170003903082038c30820274a003020102020101300d06092a864886f70d0101 (10) Message-Authenticator = 0x00000000000000000000000000000000 (10) State = 0x54f39e0355f187f3d186ee0642b9bdd4 (10) Finished request Waking up in 4.9 seconds. (11) Received Access-Request Id 17 from 192.168.128.2:44829 to 192.168.128.1:1812 length 162 (11) User-Name = "om" (11) NAS-IP-Address = 192.168.128.2 (11) NAS-Port = 0 (11) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (11) Calling-Station-Id = "E0-F8-47-0C-A0-60" (11) Framed-MTU = 1400 (11) NAS-Port-Type = Wireless-802.11 (11) Connect-Info = "CONNECT 0Mbps 802.11g" (11) EAP-Message = 0x020200061900 (11) State = 0x54f39e0355f187f3d186ee0642b9bdd4 (11) Message-Authenticator = 0x0afd9af1699a976317420bbfb18695b2 (11) session-state: No cached attributes (11) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (11) authorize { (11) policy filter_username { (11) if (&User-Name) { (11) if (&User-Name) -> TRUE (11) if (&User-Name) { (11) if (&User-Name =~ / /) { (11) if (&User-Name =~ / /) -> FALSE (11) if (&User-Name =~ /@[^@]*@/ ) { (11) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (11) if (&User-Name =~ /\.\./ ) { (11) if (&User-Name =~ /\.\./ ) -> FALSE (11) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (11) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (11) if (&User-Name =~ /\.$/) { (11) if (&User-Name =~ /\.$/) -> FALSE (11) if (&User-Name =~ /@\./) { (11) if (&User-Name =~ /@\./) -> FALSE (11) } # if (&User-Name) = notfound (11) } # policy filter_username = notfound (11) [preprocess] = ok (11) [chap] = noop (11) [mschap] = noop (11) [digest] = noop (11) suffix: Checking for suffix after "@" (11) suffix: No '@' in User-Name = "om", looking up realm NULL (11) suffix: No such realm "NULL" (11) [suffix] = noop (11) eap: Peer sent EAP Response (code 2) ID 2 length 6 (11) eap: Continuing tunnel setup (11) [eap] = ok (11) } # authorize = ok (11) Found Auth-Type = eap (11) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (11) authenticate { (11) eap: Expiring EAP session with state 0x54f39e0355f187f3 (11) eap: Finished EAP session with state 0x54f39e0355f187f3 (11) eap: Previous EAP request found for state 0x54f39e0355f187f3, released from the list (11) eap: Peer sent packet with method EAP PEAP (25) (11) eap: Calling submodule eap_peap to process data (11) eap_peap: Continuing EAP-TLS (11) eap_peap: Peer ACKed our handshake fragment (11) eap_peap: [eaptls verify] = request (11) eap_peap: [eaptls process] = handled (11) eap: Sending EAP Request (code 1) ID 3 length 1000 (11) eap: EAP session adding &reply:State = 0x54f39e0356f087f3 (11) [eap] = handled (11) } # authenticate = handled (11) Using Post-Auth-Type Challenge (11) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (11) Challenge { ... } # empty sub-section is ignored (11) Sent Access-Challenge Id 17 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (11) EAP-Message = 0x010303e8194004813082047d30820365a003020102020900984baf1fe35101a0300d06092a864886f70d01010b0500308185310b3009060355040613024445310f300d06035504080c064272656d656e310f300d06035504070c064272656d656e31133011060355040a0c0a4f6547204272656d656e31 (11) Message-Authenticator = 0x00000000000000000000000000000000 (11) State = 0x54f39e0356f087f3d186ee0642b9bdd4 (11) Finished request Waking up in 4.9 seconds. (12) Received Access-Request Id 18 from 192.168.128.2:44829 to 192.168.128.1:1812 length 162 (12) User-Name = "om" (12) NAS-IP-Address = 192.168.128.2 (12) NAS-Port = 0 (12) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (12) Calling-Station-Id = "E0-F8-47-0C-A0-60" (12) Framed-MTU = 1400 (12) NAS-Port-Type = Wireless-802.11 (12) Connect-Info = "CONNECT 0Mbps 802.11g" (12) EAP-Message = 0x020300061900 (12) State = 0x54f39e0356f087f3d186ee0642b9bdd4 (12) Message-Authenticator = 0x53f0433ae56e43f1d18930b94e5ade9a (12) session-state: No cached attributes (12) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (12) authorize { (12) policy filter_username { (12) if (&User-Name) { (12) if (&User-Name) -> TRUE (12) if (&User-Name) { (12) if (&User-Name =~ / /) { (12) if (&User-Name =~ / /) -> FALSE (12) if (&User-Name =~ /@[^@]*@/ ) { (12) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (12) if (&User-Name =~ /\.\./ ) { (12) if (&User-Name =~ /\.\./ ) -> FALSE (12) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (12) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (12) if (&User-Name =~ /\.$/) { (12) if (&User-Name =~ /\.$/) -> FALSE (12) if (&User-Name =~ /@\./) { (12) if (&User-Name =~ /@\./) -> FALSE (12) } # if (&User-Name) = notfound (12) } # policy filter_username = notfound (12) [preprocess] = ok (12) [chap] = noop (12) [mschap] = noop (12) [digest] = noop (12) suffix: Checking for suffix after "@" (12) suffix: No '@' in User-Name = "om", looking up realm NULL (12) suffix: No such realm "NULL" (12) [suffix] = noop (12) eap: Peer sent EAP Response (code 2) ID 3 length 6 (12) eap: Continuing tunnel setup (12) [eap] = ok (12) } # authorize = ok (12) Found Auth-Type = eap (12) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (12) authenticate { (12) eap: Expiring EAP session with state 0x54f39e0356f087f3 (12) eap: Finished EAP session with state 0x54f39e0356f087f3 (12) eap: Previous EAP request found for state 0x54f39e0356f087f3, released from the list (12) eap: Peer sent packet with method EAP PEAP (25) (12) eap: Calling submodule eap_peap to process data (12) eap_peap: Continuing EAP-TLS (12) eap_peap: Peer ACKed our handshake fragment (12) eap_peap: [eaptls verify] = request (12) eap_peap: [eaptls process] = handled (12) eap: Sending EAP Request (code 1) ID 4 length 514 (12) eap: EAP session adding &reply:State = 0x54f39e0357f787f3 (12) [eap] = handled (12) } # authenticate = handled (12) Using Post-Auth-Type Challenge (12) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (12) Challenge { ... } # empty sub-section is ignored (12) Sent Access-Challenge Id 18 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (12) EAP-Message = 0x0104020219006aa9c4b12043c10317e0bbd2d6f6d4f3a270f1b18fbed79462fc81309caa505e0264837b2c96775d77097238bd78ee36f0579eb0b5de197436fcac6e9baf2cc49e7ba2fc998e0e57850b5e892122d28d423883fc48f2b5782ff0f3e0c3c727eecc5124898f4ea481d26da23189ef5689ae (12) Message-Authenticator = 0x00000000000000000000000000000000 (12) State = 0x54f39e0357f787f3d186ee0642b9bdd4 (12) Finished request Waking up in 4.8 seconds. (13) Received Access-Request Id 19 from 192.168.128.2:44829 to 192.168.128.1:1812 length 292 (13) User-Name = "om" (13) NAS-IP-Address = 192.168.128.2 (13) NAS-Port = 0 (13) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (13) Calling-Station-Id = "E0-F8-47-0C-A0-60" (13) Framed-MTU = 1400 (13) NAS-Port-Type = Wireless-802.11 (13) Connect-Info = "CONNECT 0Mbps 802.11g" (13) EAP-Message = 0x0204008819800000007e16030300461000004241047d2674a014106291b8858c7d0ae674be65659056d006f2e0d69d5eb57cf84aced75203971a6c945205442122fb586519812daf9dbd0d17b2d3f1f86aac0244eb14030300010116030300282e71d3712a841c234fa796d21b467b74a6068efb85f3a4 (13) State = 0x54f39e0357f787f3d186ee0642b9bdd4 (13) Message-Authenticator = 0x7f8a3648bc1189388bc4606676401259 (13) session-state: No cached attributes (13) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (13) authorize { (13) policy filter_username { (13) if (&User-Name) { (13) if (&User-Name) -> TRUE (13) if (&User-Name) { (13) if (&User-Name =~ / /) { (13) if (&User-Name =~ / /) -> FALSE (13) if (&User-Name =~ /@[^@]*@/ ) { (13) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (13) if (&User-Name =~ /\.\./ ) { (13) if (&User-Name =~ /\.\./ ) -> FALSE (13) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (13) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (13) if (&User-Name =~ /\.$/) { (13) if (&User-Name =~ /\.$/) -> FALSE (13) if (&User-Name =~ /@\./) { (13) if (&User-Name =~ /@\./) -> FALSE (13) } # if (&User-Name) = notfound (13) } # policy filter_username = notfound (13) [preprocess] = ok (13) [chap] = noop (13) [mschap] = noop (13) [digest] = noop (13) suffix: Checking for suffix after "@" (13) suffix: No '@' in User-Name = "om", looking up realm NULL (13) suffix: No such realm "NULL" (13) [suffix] = noop (13) eap: Peer sent EAP Response (code 2) ID 4 length 136 (13) eap: Continuing tunnel setup (13) [eap] = ok (13) } # authorize = ok (13) Found Auth-Type = eap (13) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (13) authenticate { (13) eap: Expiring EAP session with state 0x54f39e0357f787f3 (13) eap: Finished EAP session with state 0x54f39e0357f787f3 (13) eap: Previous EAP request found for state 0x54f39e0357f787f3, released from the list (13) eap: Peer sent packet with method EAP PEAP (25) (13) eap: Calling submodule eap_peap to process data (13) eap_peap: Continuing EAP-TLS (13) eap_peap: Peer indicated complete TLS record size will be 126 bytes (13) eap_peap: Got complete TLS record (126 bytes) (13) eap_peap: [eaptls verify] = length included (13) eap_peap: TLS_accept: SSLv3/TLS write server done (13) eap_peap: <<< recv TLS 1.2 [length 0046] (13) eap_peap: TLS_accept: SSLv3/TLS read client key exchange (13) eap_peap: TLS_accept: SSLv3/TLS read change cipher spec (13) eap_peap: <<< recv TLS 1.2 [length 0010] (13) eap_peap: TLS_accept: SSLv3/TLS read finished (13) eap_peap: >>> send TLS 1.2 [length 0001] (13) eap_peap: TLS_accept: SSLv3/TLS write change cipher spec (13) eap_peap: >>> send TLS 1.2 [length 0010] (13) eap_peap: TLS_accept: SSLv3/TLS write finished (13) eap_peap: (other): SSL negotiation finished successfully (13) eap_peap: SSL Connection Established (13) eap_peap: [eaptls process] = handled (13) eap: Sending EAP Request (code 1) ID 5 length 57 (13) eap: EAP session adding &reply:State = 0x54f39e0350f687f3 (13) [eap] = handled (13) } # authenticate = handled (13) Using Post-Auth-Type Challenge (13) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (13) Challenge { ... } # empty sub-section is ignored (13) Sent Access-Challenge Id 19 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (13) EAP-Message = 0x0105003919001403030001011603030028928840379f52b8d53a6b20357d3d7ef8f9baf0928c024764b75eddd2017e884a6ed24ab661a316be (13) Message-Authenticator = 0x00000000000000000000000000000000 (13) State = 0x54f39e0350f687f3d186ee0642b9bdd4 (13) Finished request Waking up in 4.7 seconds. (14) Received Access-Request Id 20 from 192.168.128.2:44829 to 192.168.128.1:1812 length 162 (14) User-Name = "om" (14) NAS-IP-Address = 192.168.128.2 (14) NAS-Port = 0 (14) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (14) Calling-Station-Id = "E0-F8-47-0C-A0-60" (14) Framed-MTU = 1400 (14) NAS-Port-Type = Wireless-802.11 (14) Connect-Info = "CONNECT 0Mbps 802.11g" (14) EAP-Message = 0x020500061900 (14) State = 0x54f39e0350f687f3d186ee0642b9bdd4 (14) Message-Authenticator = 0x42b649318bcd5dd2f1f80540aa5fd8a3 (14) session-state: No cached attributes (14) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (14) authorize { (14) policy filter_username { (14) if (&User-Name) { (14) if (&User-Name) -> TRUE (14) if (&User-Name) { (14) if (&User-Name =~ / /) { (14) if (&User-Name =~ / /) -> FALSE (14) if (&User-Name =~ /@[^@]*@/ ) { (14) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (14) if (&User-Name =~ /\.\./ ) { (14) if (&User-Name =~ /\.\./ ) -> FALSE (14) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (14) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (14) if (&User-Name =~ /\.$/) { (14) if (&User-Name =~ /\.$/) -> FALSE (14) if (&User-Name =~ /@\./) { (14) if (&User-Name =~ /@\./) -> FALSE (14) } # if (&User-Name) = notfound (14) } # policy filter_username = notfound (14) [preprocess] = ok (14) [chap] = noop (14) [mschap] = noop (14) [digest] = noop (14) suffix: Checking for suffix after "@" (14) suffix: No '@' in User-Name = "om", looking up realm NULL (14) suffix: No such realm "NULL" (14) [suffix] = noop (14) eap: Peer sent EAP Response (code 2) ID 5 length 6 (14) eap: Continuing tunnel setup (14) [eap] = ok (14) } # authorize = ok (14) Found Auth-Type = eap (14) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (14) authenticate { (14) eap: Expiring EAP session with state 0x54f39e0350f687f3 (14) eap: Finished EAP session with state 0x54f39e0350f687f3 (14) eap: Previous EAP request found for state 0x54f39e0350f687f3, released from the list (14) eap: Peer sent packet with method EAP PEAP (25) (14) eap: Calling submodule eap_peap to process data (14) eap_peap: Continuing EAP-TLS (14) eap_peap: Peer ACKed our handshake fragment. handshake is finished (14) eap_peap: [eaptls verify] = success (14) eap_peap: [eaptls process] = success (14) eap_peap: Session established. Decoding tunneled attributes (14) eap_peap: PEAP state TUNNEL ESTABLISHED (14) eap: Sending EAP Request (code 1) ID 6 length 40 (14) eap: EAP session adding &reply:State = 0x54f39e0351f587f3 (14) [eap] = handled (14) } # authenticate = handled (14) Using Post-Auth-Type Challenge (14) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (14) Challenge { ... } # empty sub-section is ignored (14) Sent Access-Challenge Id 20 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (14) EAP-Message = 0x010600281900170303001d928840379f52b8d6506998561115942a2d729f6e4cc2038211147d4bc6 (14) Message-Authenticator = 0x00000000000000000000000000000000 (14) State = 0x54f39e0351f587f3d186ee0642b9bdd4 (14) Finished request Waking up in 4.7 seconds. (15) Received Access-Request Id 21 from 192.168.128.2:44829 to 192.168.128.1:1812 length 194 (15) User-Name = "om" (15) NAS-IP-Address = 192.168.128.2 (15) NAS-Port = 0 (15) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (15) Calling-Station-Id = "E0-F8-47-0C-A0-60" (15) Framed-MTU = 1400 (15) NAS-Port-Type = Wireless-802.11 (15) Connect-Info = "CONNECT 0Mbps 802.11g" (15) EAP-Message = 0x020600261900170303001b2e71d3712a841c24a1791fecb4fd41ad1c3412c39875cd784674fe (15) State = 0x54f39e0351f587f3d186ee0642b9bdd4 (15) Message-Authenticator = 0x7ce2b77f30f3e4d1150611aad7d604ac (15) session-state: No cached attributes (15) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (15) authorize { (15) policy filter_username { (15) if (&User-Name) { (15) if (&User-Name) -> TRUE (15) if (&User-Name) { (15) if (&User-Name =~ / /) { (15) if (&User-Name =~ / /) -> FALSE (15) if (&User-Name =~ /@[^@]*@/ ) { (15) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (15) if (&User-Name =~ /\.\./ ) { (15) if (&User-Name =~ /\.\./ ) -> FALSE (15) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (15) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (15) if (&User-Name =~ /\.$/) { (15) if (&User-Name =~ /\.$/) -> FALSE (15) if (&User-Name =~ /@\./) { (15) if (&User-Name =~ /@\./) -> FALSE (15) } # if (&User-Name) = notfound (15) } # policy filter_username = notfound (15) [preprocess] = ok (15) [chap] = noop (15) [mschap] = noop (15) [digest] = noop (15) suffix: Checking for suffix after "@" (15) suffix: No '@' in User-Name = "om", looking up realm NULL (15) suffix: No such realm "NULL" (15) [suffix] = noop (15) eap: Peer sent EAP Response (code 2) ID 6 length 38 (15) eap: Continuing tunnel setup (15) [eap] = ok (15) } # authorize = ok (15) Found Auth-Type = eap (15) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (15) authenticate { (15) eap: Expiring EAP session with state 0x54f39e0351f587f3 (15) eap: Finished EAP session with state 0x54f39e0351f587f3 (15) eap: Previous EAP request found for state 0x54f39e0351f587f3, released from the list (15) eap: Peer sent packet with method EAP PEAP (25) (15) eap: Calling submodule eap_peap to process data (15) eap_peap: Continuing EAP-TLS (15) eap_peap: [eaptls verify] = ok (15) eap_peap: Done initial handshake (15) eap_peap: [eaptls process] = ok (15) eap_peap: Session established. Decoding tunneled attributes (15) eap_peap: PEAP state WAITING FOR INNER IDENTITY (15) eap_peap: Identity - om (15) eap_peap: Got inner identity 'om' (15) eap_peap: Setting default EAP type for tunneled EAP session (15) eap_peap: Got tunneled request (15) eap_peap: EAP-Message = 0x02060007016f6d (15) eap_peap: Setting User-Name to om (15) eap_peap: Sending tunneled request to inner-tunnel (15) eap_peap: EAP-Message = 0x02060007016f6d (15) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (15) eap_peap: User-Name = "om" (15) Virtual server inner-tunnel received request (15) EAP-Message = 0x02060007016f6d (15) FreeRADIUS-Proxied-To = 127.0.0.1 (15) User-Name = "om" (15) WARNING: Outer and inner identities are the same. User privacy is compromised. (15) server inner-tunnel { (15) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (15) authorize { (15) [chap] = noop (15) [mschap] = noop (15) suffix: Checking for suffix after "@" (15) suffix: No '@' in User-Name = "om", looking up realm NULL (15) suffix: No such realm "NULL" (15) [suffix] = noop (15) update control { (15) Proxy-To-Realm := LOCAL (15) } # update control = noop (15) eap: Peer sent EAP Response (code 2) ID 6 length 7 (15) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (15) [eap] = ok (15) } # authorize = ok (15) Found Auth-Type = eap (15) # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (15) authenticate { (15) eap: Peer sent packet with method EAP Identity (1) (15) eap: Calling submodule eap_mschapv2 to process data (15) eap_mschapv2: Issuing Challenge (15) eap: Sending EAP Request (code 1) ID 7 length 43 (15) eap: EAP session adding &reply:State = 0x5bb42ac15bb33079 (15) [eap] = handled (15) } # authenticate = handled (15) } # server inner-tunnel (15) Virtual server sending reply (15) EAP-Message = 0x0107002b1a0107002610075417e08b07282e39bf55ba1fb4ca1a667265657261646975732d332e302e3136 (15) Message-Authenticator = 0x00000000000000000000000000000000 (15) State = 0x5bb42ac15bb33079da4c9d5dac8b0795 (15) eap_peap: Got tunneled reply code 11 (15) eap_peap: EAP-Message = 0x0107002b1a0107002610075417e08b07282e39bf55ba1fb4ca1a667265657261646975732d332e302e3136 (15) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (15) eap_peap: State = 0x5bb42ac15bb33079da4c9d5dac8b0795 (15) eap_peap: Got tunneled reply RADIUS code 11 (15) eap_peap: EAP-Message = 0x0107002b1a0107002610075417e08b07282e39bf55ba1fb4ca1a667265657261646975732d332e302e3136 (15) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (15) eap_peap: State = 0x5bb42ac15bb33079da4c9d5dac8b0795 (15) eap_peap: Got tunneled Access-Challenge (15) eap: Sending EAP Request (code 1) ID 7 length 74 (15) eap: EAP session adding &reply:State = 0x54f39e0352f487f3 (15) [eap] = handled (15) } # authenticate = handled (15) Using Post-Auth-Type Challenge (15) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (15) Challenge { ... } # empty sub-section is ignored (15) Sent Access-Challenge Id 21 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (15) EAP-Message = 0x0107004a1900170303003f928840379f52b8d7aeac826d97494a47501896ff2c84fd8ba93555680975c4b993eab2f6a09dc3053eb728ddfc0bae80427b5a0f7e4e894ff55e63014f3665 (15) Message-Authenticator = 0x00000000000000000000000000000000 (15) State = 0x54f39e0352f487f3d186ee0642b9bdd4 (15) Finished request Waking up in 4.7 seconds. (16) Received Access-Request Id 22 from 192.168.128.2:44829 to 192.168.128.1:1812 length 248 (16) User-Name = "om" (16) NAS-IP-Address = 192.168.128.2 (16) NAS-Port = 0 (16) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (16) Calling-Station-Id = "E0-F8-47-0C-A0-60" (16) Framed-MTU = 1400 (16) NAS-Port-Type = Wireless-802.11 (16) Connect-Info = "CONNECT 0Mbps 802.11g" (16) EAP-Message = 0x0207005c190017030300512e71d3712a841c2507834cc8295ba1ca99a5d3047843b27ef014a0ed48badde2c4ce6b5e888326cda1dc161ad31e251b7e5867d1b03459abf87f97c9152d536b8dd01a2c58c15cb2428bb36a2e6b7bb04c (16) State = 0x54f39e0352f487f3d186ee0642b9bdd4 (16) Message-Authenticator = 0x53acdb7c504df1866e74084c202889d3 (16) session-state: No cached attributes (16) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (16) authorize { (16) policy filter_username { (16) if (&User-Name) { (16) if (&User-Name) -> TRUE (16) if (&User-Name) { (16) if (&User-Name =~ / /) { (16) if (&User-Name =~ / /) -> FALSE (16) if (&User-Name =~ /@[^@]*@/ ) { (16) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (16) if (&User-Name =~ /\.\./ ) { (16) if (&User-Name =~ /\.\./ ) -> FALSE (16) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (16) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (16) if (&User-Name =~ /\.$/) { (16) if (&User-Name =~ /\.$/) -> FALSE (16) if (&User-Name =~ /@\./) { (16) if (&User-Name =~ /@\./) -> FALSE (16) } # if (&User-Name) = notfound (16) } # policy filter_username = notfound (16) [preprocess] = ok (16) [chap] = noop (16) [mschap] = noop (16) [digest] = noop (16) suffix: Checking for suffix after "@" (16) suffix: No '@' in User-Name = "om", looking up realm NULL (16) suffix: No such realm "NULL" (16) [suffix] = noop (16) eap: Peer sent EAP Response (code 2) ID 7 length 92 (16) eap: Continuing tunnel setup (16) [eap] = ok (16) } # authorize = ok (16) Found Auth-Type = eap (16) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (16) authenticate { (16) eap: Expiring EAP session with state 0x5bb42ac15bb33079 (16) eap: Finished EAP session with state 0x54f39e0352f487f3 (16) eap: Previous EAP request found for state 0x54f39e0352f487f3, released from the list (16) eap: Peer sent packet with method EAP PEAP (25) (16) eap: Calling submodule eap_peap to process data (16) eap_peap: Continuing EAP-TLS (16) eap_peap: [eaptls verify] = ok (16) eap_peap: Done initial handshake (16) eap_peap: [eaptls process] = ok (16) eap_peap: Session established. Decoding tunneled attributes (16) eap_peap: PEAP state phase2 (16) eap_peap: EAP method MSCHAPv2 (26) (16) eap_peap: Got tunneled request (16) eap_peap: EAP-Message = 0x0207003d1a0207003831a5c91087b30591a31625fc765131f92f0000000000000000e6ffb9847e44560002bf7b7bec34b1bb2717592854006ee3006f6d (16) eap_peap: Setting User-Name to om (16) eap_peap: Sending tunneled request to inner-tunnel (16) eap_peap: EAP-Message = 0x0207003d1a0207003831a5c91087b30591a31625fc765131f92f0000000000000000e6ffb9847e44560002bf7b7bec34b1bb2717592854006ee3006f6d (16) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (16) eap_peap: User-Name = "om" (16) eap_peap: State = 0x5bb42ac15bb33079da4c9d5dac8b0795 (16) Virtual server inner-tunnel received request (16) EAP-Message = 0x0207003d1a0207003831a5c91087b30591a31625fc765131f92f0000000000000000e6ffb9847e44560002bf7b7bec34b1bb2717592854006ee3006f6d (16) FreeRADIUS-Proxied-To = 127.0.0.1 (16) User-Name = "om" (16) State = 0x5bb42ac15bb33079da4c9d5dac8b0795 (16) WARNING: Outer and inner identities are the same. User privacy is compromised. (16) server inner-tunnel { (16) session-state: No cached attributes (16) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (16) authorize { (16) [chap] = noop (16) [mschap] = noop (16) suffix: Checking for suffix after "@" (16) suffix: No '@' in User-Name = "om", looking up realm NULL (16) suffix: No such realm "NULL" (16) [suffix] = noop (16) update control { (16) Proxy-To-Realm := LOCAL (16) } # update control = noop (16) eap: Peer sent EAP Response (code 2) ID 7 length 61 (16) eap: No EAP Start, assuming it's an on-going EAP conversation (16) [eap] = updated (16) [files] = noop (16) [expiration] = noop (16) [logintime] = noop (16) [pap] = noop (16) } # authorize = updated (16) Found Auth-Type = eap (16) # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (16) authenticate { (16) eap: Expiring EAP session with state 0x5bb42ac15bb33079 (16) eap: Finished EAP session with state 0x5bb42ac15bb33079 (16) eap: Previous EAP request found for state 0x5bb42ac15bb33079, released from the list (16) eap: Peer sent packet with method EAP MSCHAPv2 (26) (16) eap: Calling submodule eap_mschapv2 to process data (16) eap_mschapv2: Auth-Type sub-section not found. Ignoring. (16) eap_mschapv2: # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (16) eap: Sending EAP Failure (code 4) ID 7 length 4 (16) eap: Freeing handler (16) [eap] = reject (16) } # authenticate = reject (16) Failed to authenticate the user (16) Using Post-Auth-Type Reject (16) # Executing group from file /etc/freeradius/3.0/sites-enabled/inner-tunnel (16) Post-Auth-Type REJECT { (16) attr_filter.access_reject: EXPAND %{User-Name} (16) attr_filter.access_reject: --> om (16) attr_filter.access_reject: Matched entry DEFAULT at line 11 (16) [attr_filter.access_reject] = updated (16) } # Post-Auth-Type REJECT = updated (16) } # server inner-tunnel (16) Virtual server sending reply (16) EAP-Message = 0x04070004 (16) Message-Authenticator = 0x00000000000000000000000000000000 (16) eap_peap: Got tunneled reply code 3 (16) eap_peap: EAP-Message = 0x04070004 (16) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (16) eap_peap: Got tunneled reply RADIUS code 3 (16) eap_peap: EAP-Message = 0x04070004 (16) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (16) eap_peap: Tunneled authentication was rejected (16) eap_peap: FAILURE (16) eap: Sending EAP Request (code 1) ID 8 length 46 (16) eap: EAP session adding &reply:State = 0x54f39e0353fb87f3 (16) [eap] = handled (16) } # authenticate = handled (16) Using Post-Auth-Type Challenge (16) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (16) Challenge { ... } # empty sub-section is ignored (16) Sent Access-Challenge Id 22 from 192.168.128.1:1812 to 192.168.128.2:44829 length 0 (16) EAP-Message = 0x0108002e19001703030023928840379f52b8d889e9b9c0258c6c1b9cfa805e82b68e2f9edea147ff576e694daa30 (16) Message-Authenticator = 0x00000000000000000000000000000000 (16) State = 0x54f39e0353fb87f3d186ee0642b9bdd4 (16) Finished request Waking up in 4.7 seconds. (17) Received Access-Request Id 23 from 192.168.128.2:44829 to 192.168.128.1:1812 length 202 (17) User-Name = "om" (17) NAS-IP-Address = 192.168.128.2 (17) NAS-Port = 0 (17) Called-Station-Id = "E8-CC-18-8B-6A-92:OEG-WLAN" (17) Calling-Station-Id = "E0-F8-47-0C-A0-60" (17) Framed-MTU = 1400 (17) NAS-Port-Type = Wireless-802.11 (17) Connect-Info = "CONNECT 0Mbps 802.11g" (17) EAP-Message = 0x0208002e190017030300232e71d3712a841c264e38878cb36520623557e7f5548ce530559e1362960a257110c76c (17) State = 0x54f39e0353fb87f3d186ee0642b9bdd4 (17) Message-Authenticator = 0xdfcb0af976f2c94bbbdbb384c3e33639 (17) session-state: No cached attributes (17) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (17) authorize { (17) policy filter_username { (17) if (&User-Name) { (17) if (&User-Name) -> TRUE (17) if (&User-Name) { (17) if (&User-Name =~ / /) { (17) if (&User-Name =~ / /) -> FALSE (17) if (&User-Name =~ /@[^@]*@/ ) { (17) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (17) if (&User-Name =~ /\.\./ ) { (17) if (&User-Name =~ /\.\./ ) -> FALSE (17) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (17) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (17) if (&User-Name =~ /\.$/) { (17) if (&User-Name =~ /\.$/) -> FALSE (17) if (&User-Name =~ /@\./) { (17) if (&User-Name =~ /@\./) -> FALSE (17) } # if (&User-Name) = notfound (17) } # policy filter_username = notfound (17) [preprocess] = ok (17) [chap] = noop (17) [mschap] = noop (17) [digest] = noop (17) suffix: Checking for suffix after "@" (17) suffix: No '@' in User-Name = "om", looking up realm NULL (17) suffix: No such realm "NULL" (17) [suffix] = noop (17) eap: Peer sent EAP Response (code 2) ID 8 length 46 (17) eap: Continuing tunnel setup (17) [eap] = ok (17) } # authorize = ok (17) Found Auth-Type = eap (17) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (17) authenticate { (17) eap: Expiring EAP session with state 0x54f39e0353fb87f3 (17) eap: Finished EAP session with state 0x54f39e0353fb87f3 (17) eap: Previous EAP request found for state 0x54f39e0353fb87f3, released from the list (17) eap: Peer sent packet with method EAP PEAP (25) (17) eap: Calling submodule eap_peap to process data (17) eap_peap: Continuing EAP-TLS (17) eap_peap: [eaptls verify] = ok (17) eap_peap: Done initial handshake (17) eap_peap: [eaptls process] = ok (17) eap_peap: Session established. Decoding tunneled attributes (17) eap_peap: PEAP state send tlv failure (17) eap_peap: Received EAP-TLV response (17) eap_peap: ERROR: The users session was previously rejected: returning reject (again.) (17) eap_peap: This means you need to read the PREVIOUS messages in the debug output (17) eap_peap: to find out the reason why the user was rejected (17) eap_peap: Look for "reject" or "fail". Those earlier messages will tell you (17) eap_peap: what went wrong, and how to fix the problem (17) eap: ERROR: Failed continuing EAP PEAP (25) session. EAP sub-module failed (17) eap: Sending EAP Failure (code 4) ID 8 length 4 (17) eap: Failed in EAP select (17) [eap] = invalid (17) } # authenticate = invalid (17) Failed to authenticate the user (17) Using Post-Auth-Type Reject (17) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (17) Post-Auth-Type REJECT { (17) attr_filter.access_reject: EXPAND %{User-Name} (17) attr_filter.access_reject: --> om (17) attr_filter.access_reject: Matched entry DEFAULT at line 11 (17) [attr_filter.access_reject] = updated (17) [eap] = noop (17) policy remove_reply_message_if_eap { (17) if (&reply:EAP-Message && &reply:Reply-Message) { (17) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (17) else { (17) [noop] = noop (17) } # else = noop (17) } # policy remove_reply_message_if_eap = noop (17) } # Post-Auth-Type REJECT = updated (17) Delaying response for 1.000000 seconds Waking up in 0.3 seconds. Waking up in 0.6 seconds. (17) (17) Discarding duplicate request from client AP port 44829 - ID: 23 due to delayed response (17) Sending delayed response (17) Sent Access-Reject Id 23 from 192.168.128.1:1812 to 192.168.128.2:44829 length 44 (17) EAP-Message = 0x04080004 (17) Message-Authenticator = 0x00000000000000000000000000000000 Waking up in 3.6 seconds. (9) Cleaning up request packet ID 15 with timestamp +15 (10) Cleaning up request packet ID 16 with timestamp +15 (11) Cleaning up request packet ID 17 with timestamp +15 (12) Cleaning up request packet ID 18 with timestamp +15 (13) Cleaning up request packet ID 19 with timestamp +15 (14) Cleaning up request packet ID 20 with timestamp +15 (15) Cleaning up request packet ID 21 with timestamp +15 (16) Cleaning up request packet ID 22 with timestamp +15 (17) Cleaning up request packet ID 23 with timestamp +15 Ready to process requests