[prev in list] [next in list] [prev in thread] [next in thread] 

List:       freeradius-users
Subject:    PEAP Authentication Problems with Windows Users
From:       Jacob Dawson <dawson () vt ! edu>
Date:       2011-08-29 21:28:38
Message-ID: 603B77B8-DC15-4A84-8CBC-81024DFAFA20 () vt ! edu
[Download RAW message or body]

We're having an odd problem here, and I just can't pin down quite where to look to \
fix it.  We use PEAP-MSCHAPv2 for authentication of our windows domain users on \
wireless.  This is accomplished by terminating the TLS conversation at FreeRADIUS and \
sending along the MSCHAP conversation to an IAS server. We've tested this in the \
past, and it's worked fine, and we're doing a modified form of this in production, \
and it's working fine, but I've lately been unable to get it to work in our \
pre-production 2.1.11 environment.  What's particularly odd is that it's only \
affecting the Windows clients.  My OS X client doing PEAP with the same credentials \
is happy.

What we're doing in production, which continues to work, is this:
We terminate TLS at FreeRADIUS.  This allows us to manage the wireless service \
certificate there, keeps the IAS operators from having to keep up with it. We proxy \
the MSCHAP conversation to our OpenRADIUS server (which is also running and \
interacting with TACACS). OpenRADIUS proxies the CHAP stuff to IAS.  It may be \
tinkering with the MSCHAP fields from IAS to make them more compatible (basically \
changing out the secrets because it's standing in the middle). Successful \
authentication then percolates back through the chain and the user is happy.

In pre-production, it looks like this:
Request comes in from Windows client, is recognized to be a Domain authentication \
request, gets proxied to an FR virtual server. Said virtual server gets it, processes \
the TLS and terminates it, and proxies the MSCHAP conversation to IAS. IAS does its \
MSCHAP thing, accepts the user. Access-Accept percolates back up through the chain.  \
We send an access challenge, the user sends an Access request, and FR says the user \
said something weird, so it's rejecting them.

Request comes in from non-windows client, is recognized to be Domain authentication \
request, gets proxied to an FR virtual server Said virtual server gets it, processes \
the TLS and terminates it, and proxies the MSCHAP conversation to IAS. IAS does its \
MSCHAP thing, accepts the user. Access-Accept percolates back up through the chain.  \
We send an access challenge, the user sends an Access request, and FR says \
everything's fine, user gets Access-Accept.

Thoughts on where I need to look?  I can't parse out what's happening to cause a \
response to be invalid for Windows users but not for, say, Mac users.  Our initial \
guess here is that the Windows clients are looking at the MPPE keys, and are unhappy \
about them, whereas the Mac clients are not, though we suspect neither set of clients \
requires them.

Posting relevant bits of debug output below.

Thanks much,
Jacob M. Dawson

---------

Pre-production failure:
rad_recv: Access-Request packet from host 198.82.171.153 port 32768, id=138, \
length=293  User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address = 198.82.171.153
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	EAP-Message = 0x020b005f19001703010054bdd79574acfa8744908880dfa66a9e861f5fff5d2b3b7e3 \
87679b867704afa60476df6cc1ac0f30d92a4dc753cebb4bc4e71f4e0bc4db75534ab2403ec993619f05ad02497597deaa193debe78641e14b4718e84
  State = 0x5b4a8e485341972bae816e794759d3ea
	Message-Authenticator = 0xc234d7f3f04c9d023687fd78e4d5c9da
(75) # Executing section authorize from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (75)   group authorize {
(75)  - entering group authorize {...}
(75)    policy split_username_prefix {
(75)   - entering policy split_username_prefix {...}
(75)    ? if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i)
(75) ? Evaluating (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) -> TRUE
(75)    ? if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) -> TRUE
(75)     if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) {
(75)    - entering if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) {...}
(75)     update request {
(75) 	expand: %{2} -> dawson
(75) 	expand: %{1} -> HOKIES
(75)     } # update request = notfound
(75)     [updated] = updated
(75)    - if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) returns \
updated (75)     ... skipping else for request 75: Preceding "if" was taken
(75)   - policy split_username_prefix returns updated
(75)    policy split_username_suffix {
(75)   - entering policy split_username_suffix {...}
(75)    ? if (request:User-Name =~ /^([^@]*)@([-[:alnum:]]+\.[-[:alnum:].]+)$/i)
(75) ? Evaluating (request:User-Name =~ /^([^@]*)@([-[:alnum:]]+\.[-[:alnum:].]+)$/i) \
-> FALSE (75)    ? if (request:User-Name =~ \
/^([^@]*)@([-[:alnum:]]+\.[-[:alnum:].]+)$/i) -> FALSE (75)     else else {
(75)    - entering else else {...}
(75)     [noop] = noop
(75)    - else else returns noop
(75)   - policy split_username_suffix returns noop
(75)   [preprocess] = ok
(75) auth_log : 	expand: \
/usr/local/freeradius-2.1.11/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d \
-> /usr/local/freeradius-2.1.11/var/log/radius/radacct/198.82.171.153/auth-detail-20110823
 (75) auth_log : /usr/local/freeradius-2.1.11/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d \
expands to /usr/local/freeradius-2.1.11/var/log/radius/radacct/198.82.171.153/auth-detail-20110823
 (75) auth_log : 	expand: %t -> Tue Aug 23 10:40:16 2011
(75)   [auth_log] = ok
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Framed-User
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair State = 0x5b4a8e485341972bae816e794759d3ea
rlm_perl: Added pair Called-Station-Id = 00-21-55-4d-c4-40:CNS-Test
rlm_perl: Added pair Message-Authenticator = 0xc234d7f3f04c9d023687fd78e4d5c9da
rlm_perl: Added pair Airespace-Wlan-Id = 17
rlm_perl: Added pair Stripped-User-Domain = HOKIES
rlm_perl: Added pair NAS-IP-Address = 198.82.171.153
rlm_perl: Added pair Tunnel-Private-Group-Id = 1381
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Calling-Station-Id = 00-1d-e0-90-5f-db
rlm_perl: Added pair User-Name = HOKIES\\dawson
rlm_perl: Added pair NAS-Identifier = cas-6509-3.wsm8b
rlm_perl: Added pair EAP-Message = \
0x020b005f19001703010054bdd79574acfa8744908880dfa66a9e861f5fff5d2b3b7e387679b867704afa \
60476df6cc1ac0f30d92a4dc753cebb4bc4e71f4e0bc4db75534ab2403ec993619f05ad02497597deaa193debe78641e14b4718e84
                
rlm_perl: Added pair Stripped-User-Name = dawson
rlm_perl: Added pair NAS-Port = 29
rlm_perl: Added pair Framed-MTU = 1300
(75)   [perl] = noop
(75)   ? if ("%{Stripped-User-Domain}" != "HOKIES")
(75) 	expand: %{Stripped-User-Domain} -> HOKIES
(75) ? Evaluating ("%{Stripped-User-Domain}" != "HOKIES") -> FALSE
(75)   ? if ("%{Stripped-User-Domain}" != "HOKIES") -> FALSE
(75) eap : EAP packet type response id 11 length 95
(75) eap : Continuing tunnel setup.
(75)   [eap] = ok
(75) Found Auth-Type = ?
(75) # Executing group from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (75)   group \
authenticate { (75)  - entering group authenticate {...}
(75) eap : Request found, released from the list
(75) eap : EAP/peap
(75) eap : processing type peap
(75) peap : processing EAP-TLS
(75) peap : eaptls_verify returned 7 
(75) peap : Done initial handshake
(75) peap : eaptls_process returned 7 
(75) peap : FR_TLS_OK
(75) peap : Session established.  Decoding tunneled attributes.
(75) peap : Peap state phase2
(75) peap : EAP type mschapv2
(75) peap : Got tunneled request
	EAP-Message = 0x020b00481a020b004331bf4d439d3028cbdba8fff532c04f1cf60000000000000000bee44f94acbe708a682535adc0505e56a87462580576d06600484f4b4945535c646177736f6e
 server  {
(75) peap : Setting User-Name to HOKIES\dawson
Sending tunneled request
	EAP-Message = 0x020b00481a020b004331bf4d439d3028cbdba8fff532c04f1cf60000000000000000bee44f94acbe708a682535adc0505e56a87462580576d06600484f4b4945535c646177736f6e
  FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "HOKIES\\dawson"
	State = 0x21ebcfee21e0d5ab22fbf5cfb29bfd25
	NAS-Port-Type = Wireless-802.11
	Service-Type = Framed-User
	Tunnel-Type:0 = VLAN
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-IP-Address = 198.82.171.153
	Tunnel-Private-Group-Id:0 = "1381"
	Tunnel-Medium-Type:0 = IEEE-802
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	NAS-Identifier = "cas-6509-3.wsm8b"
	NAS-Port = 29
	Framed-MTU = 1300
server proxy-inner-tunnel {
(75) # Executing section authorize from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/proxy-inner-tunnel (75)   group \
authorize { (75)  - entering group authorize {...}
(75)   ? if ("%{User-Name}" =~ /^(host\/.*)$/)
(75) 	expand: %{User-Name} -> HOKIES\dawson
(75) ? Evaluating ("%{User-Name}" =~ /^(host\/.*)$/) -> FALSE
(75)   ? if ("%{User-Name}" =~ /^(host\/.*)$/) -> FALSE
(75)    else else {
(75)   - entering else else {...}
(75)    update control {
(75)    } # update control = notfound
(75)   - else else returns notfound
} # server proxy-inner-tunnel
(75) peap : Got tunneled reply code 0
  PEAP: Calling authenticate in order to initiate tunneled EAP session.
(75) # Executing group from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/proxy-inner-tunnel (75)   group \
authenticate { (75)  - entering group authenticate {...}
(75) eap : Request found, released from the list
(75) eap : EAP/mschapv2
(75) eap : processing type mschapv2
rlm_eap_mschapv2: cancelling authentication and letting it be proxied
(75) eap :   Not-EAP proxy set.  Not composing EAP
(75)   [eap] = handled
  PEAP: Tunneled authentication will be proxied to DomainUser
  PEAP: Remembering to do EAP-MS-CHAP-V2 post-proxy.
(75) eap :   Tunneled session will be proxied.  Not doing EAP.
(75)   [eap] = handled
(75)   WARNING: Empty pre-proxy section.  Using default return values.
Sending Access-Request of id 161 to 198.82.160.219 port 1812
	User-Name = "HOKIES\\dawson"
	NAS-Port-Type = Wireless-802.11
	Service-Type = Framed-User
	Tunnel-Type:0 = VLAN
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-IP-Address = 198.82.171.153
	Tunnel-Private-Group-Id:0 = "1381"
	Tunnel-Medium-Type:0 = IEEE-802
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	NAS-Identifier = "cas-6509-3.wsm8b"
	NAS-Port = 29
	Framed-MTU = 1300
	MS-CHAP-Challenge = 0xd3827513a357a99d4eb9a5c87a716418
	MS-CHAP2-Response = \
0x0b4fbf4d439d3028cbdba8fff532c04f1cf60000000000000000bee44f94acbe708a682535adc0505e56a87462580576d066
  Proxy-State = 0x313338
(75) Proxying request to home server 198.82.160.219 port 1812
Sending Access-Request of id 161 to 198.82.160.219 port 1812
	User-Name = "HOKIES\\dawson"
	NAS-Port-Type = Wireless-802.11
	Service-Type = Framed-User
	Tunnel-Type:0 = VLAN
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-IP-Address = 198.82.171.153
	Tunnel-Private-Group-Id:0 = "1381"
	Tunnel-Medium-Type:0 = IEEE-802
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	NAS-Identifier = "cas-6509-3.wsm8b"
	NAS-Port = 29
	Framed-MTU = 1300
	MS-CHAP-Challenge = 0xd3827513a357a99d4eb9a5c87a716418
	MS-CHAP2-Response = \
0x0b4fbf4d439d3028cbdba8fff532c04f1cf60000000000000000bee44f94acbe708a682535adc0505e56a87462580576d066
  Proxy-State = 0x313338
Waking up in 0.2 seconds.
rad_recv: Access-Accept packet from host 198.82.160.219 port 1812, id=161, length=219
DEBUG: Compare b472204 to calculated digest f796ca40, secret temporaryS3CR3T
	Proxy-State = 0x313338
	Framed-Protocol = PPP
	Service-Type = Framed-User
	Class = 0x6538078a000001370001c652a0db01cc5476fe414ece0000000000004586
	MS-MPPE-Recv-Key = 0x7208bb9a9555b125d123303ac3db12a1
	MS-MPPE-Send-Key = 0x0cd6218a695a558ade111bcd7b05cfc2
	MS-CHAP2-Success = 0x0b533d32434230433038364541464632333233453842414534314643443231333130453939354641454134
  MS-CHAP-Domain = "\013HOKIES"
(75) # Executing section post-proxy from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (75)   group post-proxy \
{ (75)  - entering group post-proxy {...}
(75) eap : Doing post-proxy callback
(75) eap : Passing reply from proxy back into the tunnel.
server proxy-inner-tunnel {
(75) eap : Passing reply back for EAP-MS-CHAP-V2
(75) # Executing section post-proxy from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/proxy-inner-tunnel (75)   group \
post-proxy { (75)  - entering group post-proxy {...}
(75)   [eap] = noop
(75)   WARNING: Empty post-auth section.  Using default return values.
} # server proxy-inner-tunnel
(75) eap : Final reply from tunneled session code 2
	Proxy-State = 0x313338
	Framed-Protocol = PPP
	Service-Type = Framed-User
	Class = 0x6538078a000001370001c652a0db01cc5476fe414ece0000000000004586
	MS-MPPE-Recv-Key = 0x7208bb9a9555b125d123303ac3db12a1
	MS-MPPE-Send-Key = 0x0cd6218a695a558ade111bcd7b05cfc2
	MS-CHAP2-Success = 0x0b533d32434230433038364541464632333233453842414534314643443231333130453939354641454134
  MS-CHAP-Domain = "\013HOKIES"
(75) eap : Got reply 2
(75) eap : Got tunneled reply RADIUS code 2
	Proxy-State = 0x313338
	Framed-Protocol = PPP
	Service-Type = Framed-User
	Class = 0x6538078a000001370001c652a0db01cc5476fe414ece0000000000004586
	MS-MPPE-Recv-Key = 0x7208bb9a9555b125d123303ac3db12a1
	MS-MPPE-Send-Key = 0x0cd6218a695a558ade111bcd7b05cfc2
	MS-CHAP2-Success = 0x0b533d32434230433038364541464632333233453842414534314643443231333130453939354641454134
  MS-CHAP-Domain = "\013HOKIES"
(75) eap : Tunneled authentication was successful.
(75) eap : SUCCESS
(75) eap : Reply was handled
(75)   [eap] = ok
(75) Found Auth-Type = ?
(75) Found Auth-Type = ?
(75) Warning:  Found 2 auth-types on request for user 'HOKIES\dawson'
(75) Auth-Type = Accept, accepting the user
(75) Login OK: [HOKIES\\dawson] (from client 198.82.171.153 port 29 cli \
00-1d-e0-90-5f-db) (75) # Executing section post-auth from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (75)   group post-auth {
(75)  - entering group post-auth {...}
(75)   [exec] = noop
Sending Access-Challenge of id 138 to 198.82.171.153 port 32768
	EAP-Message = 0x010c00261900170301001b0167b434a0313cb3f29b20e1f731efe3d173083c964cda1451135a
  Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x5b4a8e485246972bae816e794759d3ea
(75) Finished request 75.
Waking up in 0.2 seconds.
rad_recv: Access-Request packet from host 198.82.171.153 port 32768, id=139, \
length=236  User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address = 198.82.171.153
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	EAP-Message = 0x020c00261900170301001b00dae368dd150e9d42e0c8888cb128e6ecc520b887a849a8a1d743
  State = 0x5b4a8e485246972bae816e794759d3ea
	Message-Authenticator = 0x26b42d72271f1819599977a28920622f
(76) # Executing section authorize from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (76)   group authorize {
(76)  - entering group authorize {...}
(76)    policy split_username_prefix {
(76)   - entering policy split_username_prefix {...}
(76)    ? if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i)
(76) ? Evaluating (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) -> TRUE
(76)    ? if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) -> TRUE
(76)     if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) {
(76)    - entering if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) {...}
(76)     update request {
(76) 	expand: %{2} -> dawson
(76) 	expand: %{1} -> HOKIES
(76)     } # update request = notfound
(76)     [updated] = updated
(76)    - if (request:User-Name =~ /^([a-z]+)[\\\/]+([-a-z0-9_.]+)$/i) returns \
updated (76)     ... skipping else for request 76: Preceding "if" was taken
(76)   - policy split_username_prefix returns updated
(76)    policy split_username_suffix {
(76)   - entering policy split_username_suffix {...}
(76)    ? if (request:User-Name =~ /^([^@]*)@([-[:alnum:]]+\.[-[:alnum:].]+)$/i)
(76) ? Evaluating (request:User-Name =~ /^([^@]*)@([-[:alnum:]]+\.[-[:alnum:].]+)$/i) \
-> FALSE (76)    ? if (request:User-Name =~ \
/^([^@]*)@([-[:alnum:]]+\.[-[:alnum:].]+)$/i) -> FALSE (76)     else else {
(76)    - entering else else {...}
(76)     [noop] = noop
(76)    - else else returns noop
(76)   - policy split_username_suffix returns noop
(76)   [preprocess] = ok
(76) auth_log : 	expand: \
/usr/local/freeradius-2.1.11/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d \
-> /usr/local/freeradius-2.1.11/var/log/radius/radacct/198.82.171.153/auth-detail-20110823
 (76) auth_log : /usr/local/freeradius-2.1.11/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d \
expands to /usr/local/freeradius-2.1.11/var/log/radius/radacct/198.82.171.153/auth-detail-20110823
 (76) auth_log : 	expand: %t -> Tue Aug 23 10:40:16 2011
(76)   [auth_log] = ok
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Framed-User
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair State = 0x5b4a8e485246972bae816e794759d3ea
rlm_perl: Added pair Called-Station-Id = 00-21-55-4d-c4-40:CNS-Test
rlm_perl: Added pair Message-Authenticator = 0x26b42d72271f1819599977a28920622f
rlm_perl: Added pair Airespace-Wlan-Id = 17
rlm_perl: Added pair Stripped-User-Domain = HOKIES
rlm_perl: Added pair NAS-IP-Address = 198.82.171.153
rlm_perl: Added pair Tunnel-Private-Group-Id = 1381
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Calling-Station-Id = 00-1d-e0-90-5f-db
rlm_perl: Added pair User-Name = HOKIES\\dawson
rlm_perl: Added pair NAS-Identifier = cas-6509-3.wsm8b
rlm_perl: Added pair EAP-Message = \
                0x020c00261900170301001b00dae368dd150e9d42e0c8888cb128e6ecc520b887a849a8a1d743
                
rlm_perl: Added pair Stripped-User-Name = dawson
rlm_perl: Added pair NAS-Port = 29
rlm_perl: Added pair Framed-MTU = 1300
(76)   [perl] = noop
(76)   ? if ("%{Stripped-User-Domain}" != "HOKIES")
(76) 	expand: %{Stripped-User-Domain} -> HOKIES
(76) ? Evaluating ("%{Stripped-User-Domain}" != "HOKIES") -> FALSE
(76)   ? if ("%{Stripped-User-Domain}" != "HOKIES") -> FALSE
(76) eap : EAP packet type response id 12 length 38
(76) eap : Continuing tunnel setup.
(76)   [eap] = ok
(76) Found Auth-Type = ?
(76) # Executing group from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (76)   group \
authenticate { (76)  - entering group authenticate {...}
(76) eap : Request found, released from the list
(76) eap : EAP/peap
(76) eap : processing type peap
(76) peap : processing EAP-TLS
(76) peap : eaptls_verify returned 7 
(76) peap : Done initial handshake
(76) peap : eaptls_process returned 7 
(76) peap : FR_TLS_OK
(76) peap : Session established.  Decoding tunneled attributes.
(76) peap : Peap state send tlv success
(76) peap : Received EAP-TLV response.
(76) peap : Client rejected our response.  The password is probably incorrect.
(76) peap : We sent a success, but received something weird in return.
(76) eap : Handler failed in EAP/peap
(76) eap : Failed in EAP select
(76)   [eap] = invalid
(76) Failed to authenticate the user.
(76) Login incorrect: [HOKIES\\dawson] (from client 198.82.171.153 port 29 cli \
00-1d-e0-90-5f-db) (76) Using Post-Auth-Type Reject
(76) # Executing group from file \
/usr/local/freeradius-2.1.11/etc/raddb/sites-enabled/default (76)   group REJECT {
(76)  - entering group REJECT {...}
(76) attr_filter.access_reject : 	expand: %{User-Name} -> HOKIES\dawson
attr_filter: Matched entry DEFAULT at line 11
(76)   [attr_filter.access_reject] = updated
(76) Finished request 76.
Waking up in 0.2 seconds.
Waking up in 0.6 seconds.
(76) Sending delayed reject
Sending Access-Reject of id 139 to 198.82.171.153 port 32768
	EAP-Message = 0x040c0004
	Message-Authenticator = 0x00000000000000000000000000000000

-----

Production Success:
Waking up in 4.9 seconds.
	User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address = 198.82.171.153
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	EAP-Message = 0x020a005f1900170301005499a000fc4d08b0c067d3251047d61b836767466160c386b \
38d37d4b6c39b07ce3b09c85590c8a923419e6f0ae464ac472050214b71b4d641e06f8a439348319233d622cd7900f8f172726407b0010bcb54c6a1d6
  State = 0x764462057e4e7bc59f1c525ed4400d40
	Message-Authenticator = 0xd9566738adb17439ce7d7568c8bc8264
+- entering group authorize
++[mschap] returns noop
  rlm_eap: EAP packet type response id 10 length 95
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group EAP
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  PEAP: Setting User-Name to HOKIES\dawson
+- entering group authorize
++? if ("%{User-Name}" =~ /^(host\/.*)$/)
	expand: %{User-Name} -> HOKIES\dawson
? Evaluating ("%{User-Name}" =~ /^(host\/.*)$/) -> FALSE
++? if ("%{User-Name}" =~ /^(host\/.*)$/) -> FALSE
++- entering else else
+++[control] returns notfound
++- else else returns notfound
  PEAP: Calling authenticate in order to initiate tunneled EAP session.
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Not-EAP proxy set.  Not composing EAP
++[eap] returns handled
  PEAP: Tunneled authentication will be proxied to openradius
  PEAP: Remembering to do EAP-MS-CHAP-V2 post-proxy.
  Tunneled session will be proxied.  Not doing EAP.
++[eap] returns handled
+- entering group pre-proxy
    preproxy_users: Matched entry DEFAULT at line 1
++[files] returns ok
	User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address := 198.82.247.103
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type := Framed-User
	Framed-MTU = 1300
	NAS-Port-Type := Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	MS-CHAP-Challenge = 0x20760eb105e545d6a131f324c1d30464
	MS-CHAP2-Response = \
0x0a4f84e590f059f31dc3ca5b621b238582190000000000000000385984c78f91f816edb8f1b279838a0a890bdd6573bac9f7
  Proxy-State = 0x323433
Proxying request 9 to home server 198.82.247.67 port 1812
	User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address := 198.82.247.103
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type := Framed-User
	Framed-MTU = 1300
	NAS-Port-Type := Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	MS-CHAP-Challenge = 0x20760eb105e545d6a131f324c1d30464
	MS-CHAP2-Response = \
0x0a4f84e590f059f31dc3ca5b621b238582190000000000000000385984c78f91f816edb8f1b279838a0a890bdd6573bac9f7
  Proxy-State = 0x323433
Going to the next request
Waking up in 0.9 seconds.
	Framed-Protocol = PPP
	Service-Type = Framed-User
	MS-MPPE-Recv-Key = 0xe32365fe45921738025084f44fd7822a
	MS-MPPE-Send-Key = 0xf65c13fbcd70a80768ea868ec27085ff
	MS-CHAP2-Success = 0x0a533d46333146313034313438374339373131303542344546363341364339333146344135424141383434
  MS-CHAP-Domain = "\nHOKIES"
+- entering group post-proxy
  rlm_eap: Doing post-proxy callback
  PEAP: Passing reply from proxy back into the tunnel.
  PEAP: Passing reply back for EAP-MS-CHAP-V2
+- entering group post-proxy
  rlm_eap: Doing post-proxy callback
  rlm_eap_mschapv2: Passing reply from proxy back into the tunnel 0x1cd469a0 2.
  rlm_eap_mschapv2: Authentication succeeded.
MSCHAP Success 
++[eap] returns ok
 PEAP: Got reply 11
  PEAP: Got tunneled Access-Challenge
  PEAP: Reply was handled
++[eap] returns ok
	EAP-Message = 0x010b004a1900170301003f084cf62c48fb9b9e951aa3801c9a88bbe2078c7a667df320929296299bdff2863bf8572a744dac5d9409953cda9855feca24aa24b8205677fbf3f7e3767f36
  Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x764462057f4f7bc59f1c525ed4400d40
Finished request 9.
Going to the next request
Waking up in 4.9 seconds.
	User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address = 198.82.171.153
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	EAP-Message = 0x020b001d19001703010012091d2f1089b72dd14c76daf331c2dc4de167
	State = 0x764462057f4f7bc59f1c525ed4400d40
	Message-Authenticator = 0xee39bc3d804727c33f69fc7d8172d2bf
+- entering group authorize
++[mschap] returns noop
  rlm_eap: EAP packet type response id 11 length 29
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group EAP
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  PEAP: Setting User-Name to HOKIES\dawson
+- entering group authorize
++? if ("%{User-Name}" =~ /^(host\/.*)$/)
	expand: %{User-Name} -> HOKIES\dawson
? Evaluating ("%{User-Name}" =~ /^(host\/.*)$/) -> FALSE
++? if ("%{User-Name}" =~ /^(host\/.*)$/) -> FALSE
++- entering else else
+++[control] returns notfound
++- else else returns notfound
  PEAP: Calling authenticate in order to initiate tunneled EAP session.
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  rlm_eap: Freeing handler
++[eap] returns ok
  PEAP: Tunneled authentication was successful.
  rlm_eap_peap: SUCCESS
++[eap] returns handled
	EAP-Message = 0x010c00261900170301001badffc5c8196273037ffc5ae8b421cb5a11d4cdbf3d67e521a2dd10
  Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x764462057c487bc59f1c525ed4400d40
Finished request 10.
Going to the next request
Waking up in 4.9 seconds.
	User-Name = "HOKIES\\dawson"
	Calling-Station-Id = "00-1d-e0-90-5f-db"
	Called-Station-Id = "00-21-55-4d-c4-40:CNS-Test"
	NAS-Port = 29
	NAS-IP-Address = 198.82.171.153
	NAS-Identifier = "cas-6509-3.wsm8b"
	Airespace-Wlan-Id = 17
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "1381"
	EAP-Message = 0x020c00261900170301001be252b19386182f2a3d9b6255f0b51007da074f90f732568c1dfbb8
  State = 0x764462057c487bc59f1c525ed4400d40
	Message-Authenticator = 0xc04ab29e63cd60e30bfd3fed2ba3be09
+- entering group authorize
++[mschap] returns noop
  rlm_eap: EAP packet type response id 12 length 38
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group EAP
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Success
  rlm_eap: Freeing handler
++[eap] returns ok
perl_pool: item 0x17a6e7a0 asigned new request. Handled so far: 1
found interpetator at address 0x17a6e7a0
rlm_perl: no serial number; assuming non-TLS authentication
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Framed-User
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair State = 0x764462057c487bc59f1c525ed4400d40
rlm_perl: Added pair Called-Station-Id = 00-21-55-4d-c4-40:CNS-Test
rlm_perl: Added pair Message-Authenticator = 0xc04ab29e63cd60e30bfd3fed2ba3be09
rlm_perl: Added pair Airespace-Wlan-Id = 17
rlm_perl: Added pair EAP-Type = PEAP
rlm_perl: Added pair NAS-IP-Address = 198.82.171.153
rlm_perl: Added pair Tunnel-Private-Group-Id = 1381
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Calling-Station-Id = 00-1d-e0-90-5f-db
rlm_perl: Added pair User-Name = HOKIES\\dawson
rlm_perl: Added pair NAS-Identifier = cas-6509-3.wsm8b
rlm_perl: Added pair EAP-Message = \
                0x020c00261900170301001be252b19386182f2a3d9b6255f0b51007da074f90f732568c1dfbb8
                
rlm_perl: Added pair NAS-Port = 29
rlm_perl: Added pair Framed-MTU = 1300
rlm_perl: Added pair User-Name = HOKIES\\dawson
rlm_perl: Added pair MS-MPPE-Recv-Key = \
                0x4e3e827b7fb173dbe293fadd607586b838cd55ae5261090fd483569509a070de
rlm_perl: Added pair EAP-Message = 0x030c0004
rlm_perl: Added pair MS-MPPE-Send-Key = \
                0xb43ef9e36d44d66d205184ee8ca81f0f14e3a52cd254bd27268c7c99f58a18b0
rlm_perl: Added pair Message-Authenticator = 0x00000000000000000000000000000000
rlm_perl: Added pair Auth-Type = EAP
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x17a6e7a0
++[perl] returns ok
Login OK: [HOKIES\\\\dawson/<via Auth-Type = EAP>] (from client cas-6509-3.wsm8b port \
29 cli 00-1d-e0-90-5f-db)  User-Name = "HOKIES\\\\dawson"
	MS-MPPE-Recv-Key = 0x4e3e827b7fb173dbe293fadd607586b838cd55ae5261090fd483569509a070de
  EAP-Message = 0x030c0004
	MS-MPPE-Send-Key = 0xb43ef9e36d44d66d205184ee8ca81f0f14e3a52cd254bd27268c7c99f58a18b0
  Message-Authenticator = 0x00000000000000000000000000000000
Finished request 11.
Going to the next request
Waking up in 4.9 seconds.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic