radiusd: FreeRADIUS Version 3.0.3, for host x86_64-unknown-linux-gnu, built on Jun 6 2014 at 13:18:16 Copyright (C) 1999-2014 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/raddb/dictionary including configuration file /etc/raddb/radiusd.conf including configuration file /etc/raddb/proxy.conf including configuration file /etc/raddb/clients.conf including files in directory /etc/raddb/mods-enabled/ including configuration file /etc/raddb/mods-enabled/soh including configuration file /etc/raddb/mods-enabled/linelog including configuration file /etc/raddb/mods-enabled/expr including configuration file /etc/raddb/mods-enabled/radutmp including configuration file /etc/raddb/mods-enabled/sradutmp including configuration file /etc/raddb/mods-enabled/unpack including configuration file /etc/raddb/mods-enabled/mschap including configuration file /etc/raddb/mods-enabled/cache_eap including configuration file /etc/raddb/mods-enabled/passwd including configuration file /etc/raddb/mods-enabled/digest including configuration file /etc/raddb/mods-enabled/chap including configuration file /etc/raddb/mods-enabled/eap including configuration file /etc/raddb/mods-enabled/pap including configuration file /etc/raddb/mods-enabled/exec including configuration file /etc/raddb/mods-enabled/files including configuration file /etc/raddb/mods-enabled/utf8 including configuration file /etc/raddb/mods-enabled/logintime including configuration file /etc/raddb/mods-enabled/attr_filter including configuration file /etc/raddb/mods-enabled/realm including configuration file /etc/raddb/mods-enabled/replicate including configuration file /etc/raddb/mods-enabled/always including configuration file /etc/raddb/mods-enabled/expiration including configuration file /etc/raddb/mods-enabled/dynamic_clients including configuration file /etc/raddb/mods-enabled/dhcp including configuration file /etc/raddb/mods-enabled/unix including configuration file /etc/raddb/mods-enabled/sql including configuration file /etc/raddb/mods-config/sql/main/mysql/queries.conf including configuration file /etc/raddb/mods-enabled/ntlm_auth including configuration file /etc/raddb/mods-enabled/detail including configuration file /etc/raddb/mods-enabled/echo including configuration file /etc/raddb/mods-enabled/detail.log including configuration file /etc/raddb/mods-enabled/preprocess including files in directory /etc/raddb/policy.d/ including configuration file /etc/raddb/policy.d/accounting including configuration file /etc/raddb/policy.d/control including configuration file /etc/raddb/policy.d/eap including configuration file /etc/raddb/policy.d/cui including configuration file /etc/raddb/policy.d/filter including configuration file /etc/raddb/policy.d/operator-name including configuration file /etc/raddb/policy.d/dhcp including configuration file /etc/raddb/policy.d/canonicalization including files in directory /etc/raddb/sites-enabled/ including configuration file /etc/raddb/sites-enabled/inner-tunnel including configuration file /etc/raddb/sites-enabled/default main { security { allow_core_dumps = no } } main { name = "radiusd" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/bin" logdir = "/var/log/radius" run_dir = "/var/run/radiusd" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/radius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 pidfile = "/var/run/radiusd/radiusd.pid" checkrad = "/usr/bin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } security { max_attributes = 200 reject_delay = 1 status_server = yes allow_vulnerable_openssl = "no" } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 20 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 revive_interval = 120 status_check_timeout = 4 coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } } realm LOCAL { } home_server_pool my_auth_failover { type = fail-over home_server = localhost } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "*" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 5720station { ipaddr = 192.168.223.50 netmask = 32 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "udp" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client servicebench { ipaddr = 192.168.254.99 netmask = 32 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "udp" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client dale { ipaddr = 192.168.211.211 netmask = 32 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "udp" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } radiusd: #### Instantiating modules #### instantiate { } modules { # Loaded module rlm_soh # Instantiating module "soh" from file /etc/raddb/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_linelog # Instantiating module "linelog" from file /etc/raddb/mods-enabled/linelog linelog { filename = "/var/log/radius/linelog" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{Packet-Type}:-default}" } # Instantiating module "log_accounting" from file /etc/raddb/mods-enabled/linelog linelog log_accounting { filename = "/var/log/radius/linelog-accounting" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_expr # Instantiating module "expr" from file /etc/raddb/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } # Loaded module rlm_radutmp # Instantiating module "radutmp" from file /etc/raddb/mods-enabled/radutmp radutmp { filename = "/var/log/radius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Instantiating module "sradutmp" from file /etc/raddb/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/radius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_unpack # Instantiating module "unpack" from file /etc/raddb/mods-enabled/unpack # Loaded module rlm_mschap # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes passchange { } allow_retry = yes } # Loaded module rlm_cache # Instantiating module "cache_eap" from file /etc/raddb/mods-enabled/cache_eap cache cache_eap { key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 16384 epoch = 0 add_stats = no } # Loaded module rlm_passwd # Instantiating module "etc_passwd" from file /etc/raddb/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Loaded module rlm_digest # Instantiating module "digest" from file /etc/raddb/mods-enabled/digest # Loaded module rlm_chap # Instantiating module "chap" from file /etc/raddb/mods-enabled/chap # Loaded module rlm_eap # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap eap { default_eap_type = "tls" timer_expire = 60 ignore_unknown_eap_types = no mod_accounting_username_bug = no max_sessions = 1024 } # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 ca_path = "/etc/raddb/certs" pem_file_type = yes private_key_file = "/etc/raddb/certs/managed-wireless.velocity.net.key" certificate_file = "/etc/raddb/certs/managed-wireless.velocity.net.crt" ca_file = "/etc/raddb/certs/new-positivessl-bundle-12.ca-bundle" dh_file = "/etc/raddb/certs/dh" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" ecdh_curve = "prime256v1" cache { enable = yes lifetime = 24 max_entries = 255 } verify { } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = yes } } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common" default_eap_type = "md5" copy_request_to_tunnel = yes use_tunneled_reply = yes virtual_server = "inner-tunnel" include_length = yes require_client_cert = no } Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { tls = "tls-common" default_method = "mschapv2" copy_request_to_tunnel = yes use_tunneled_reply = yes proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Loaded module rlm_pap # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap pap { normalise = yes } # Loaded module rlm_exec # Instantiating module "exec" from file /etc/raddb/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_files # Instantiating module "files" from file /etc/raddb/mods-enabled/files files { filename = "/etc/raddb/mods-config/files/authorize" usersfile = "/etc/raddb/mods-config/files/authorize" acctusersfile = "/etc/raddb/mods-config/files/accounting" preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy" compat = "cistron" } reading pairlist file /etc/raddb/mods-config/files/authorize [/etc/raddb/mods-config/files/authorize]:184 Cistron compatibility checks for entry DEFAULT ... [/etc/raddb/mods-config/files/authorize]:191 Cistron compatibility checks for entry DEFAULT ... [/etc/raddb/mods-config/files/authorize]:198 Cistron compatibility checks for entry DEFAULT ... reading pairlist file /etc/raddb/mods-config/files/authorize [/etc/raddb/mods-config/files/authorize]:184 Cistron compatibility checks for entry DEFAULT ... [/etc/raddb/mods-config/files/authorize]:191 Cistron compatibility checks for entry DEFAULT ... [/etc/raddb/mods-config/files/authorize]:198 Cistron compatibility checks for entry DEFAULT ... reading pairlist file /etc/raddb/mods-config/files/accounting reading pairlist file /etc/raddb/mods-config/files/pre-proxy # Loaded module rlm_utf8 # Instantiating module "utf8" from file /etc/raddb/mods-enabled/utf8 # Loaded module rlm_logintime # Instantiating module "logintime" from file /etc/raddb/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_attr_filter # Instantiating module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/raddb/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/raddb/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/raddb/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject # Instantiating module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/raddb/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/raddb/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } reading pairlist file /etc/raddb/mods-config/attr_filter/accounting_response # Loaded module rlm_realm # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Instantiating module "realmpercent" from file /etc/raddb/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Instantiating module "ntdomain" from file /etc/raddb/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = no } # Loaded module rlm_replicate # Instantiating module "replicate" from file /etc/raddb/mods-enabled/replicate # Loaded module rlm_always # Instantiating module "reject" from file /etc/raddb/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Instantiating module "fail" from file /etc/raddb/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Instantiating module "ok" from file /etc/raddb/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Instantiating module "handled" from file /etc/raddb/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Instantiating module "invalid" from file /etc/raddb/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Instantiating module "userlock" from file /etc/raddb/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Instantiating module "notfound" from file /etc/raddb/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Instantiating module "noop" from file /etc/raddb/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Instantiating module "updated" from file /etc/raddb/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_expiration # Instantiating module "expiration" from file /etc/raddb/mods-enabled/expiration # Loaded module rlm_dynamic_clients # Instantiating module "dynamic_clients" from file /etc/raddb/mods-enabled/dynamic_clients # Loaded module rlm_dhcp # Instantiating module "dhcp" from file /etc/raddb/mods-enabled/dhcp # Loaded module rlm_unix # Instantiating module "unix" from file /etc/raddb/mods-enabled/unix unix { radwtmp = "/var/log/radius/radwtmp" } # Loaded module rlm_sql # Instantiating module "sql" from file /etc/raddb/mods-enabled/sql sql { driver = "rlm_sql_mysql" server = "localhost" port = "3306" login = "radius" password = <<< secret >>> radius_db = "radius" read_groups = yes read_clients = no delete_stale_sessions = yes sql_user_name = "%{User-Name}" default_user_profile = "" client_query = "SELECT id, nasname, shortname, type, secret, server FROM nas" authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id" authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id" group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority" simul_count_query = "" simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name} AND acctstoptime IS NULL" safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } accounting { reference = "%{tolower:type.%{Acct-Status-Type}.query}" } post-auth { reference = ".query" } mysql { tls { } } rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked rlm_sql (sql): Attempting to connect to database "radius" rlm_sql (sql): Initialising connection pool pool { start = 5 min = 4 max = 32 spare = 3 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 1 spread = no } rlm_sql (sql): Opening additional connection (0) rlm_sql_mysql: Starting connect to MySQL server rlm_sql (sql): Opening additional connection (1) rlm_sql_mysql: Starting connect to MySQL server rlm_sql (sql): Opening additional connection (2) rlm_sql_mysql: Starting connect to MySQL server rlm_sql (sql): Opening additional connection (3) rlm_sql_mysql: Starting connect to MySQL server rlm_sql (sql): Opening additional connection (4) rlm_sql_mysql: Starting connect to MySQL server # Instantiating module "ntlm_auth" from file /etc/raddb/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loaded module rlm_detail # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail detail { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no log_packet_header = no } # Instantiating module "echo" from file /etc/raddb/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Instantiating module "auth_log" from file /etc/raddb/mods-enabled/detail.log detail auth_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no log_packet_header = no } rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/raddb/mods-enabled/detail.log detail reply_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no log_packet_header = no } # Instantiating module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no log_packet_header = no } # Instantiating module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no log_packet_header = no } # Loaded module rlm_preprocess # Instantiating module "preprocess" from file /etc/raddb/mods-enabled/preprocess preprocess { huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups" hints = "/etc/raddb/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups reading pairlist file /etc/raddb/mods-config/preprocess/hints } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/raddb/radiusd.conf } # server server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel # Loading authenticate {...} # Loading authorize {...} Ignoring "ldap" (see raddb/mods-available/README.rst) # Loading session {...} # Loading post-proxy {...} # Loading post-auth {...} } # server inner-tunnel server default { # from file /etc/raddb/sites-enabled/default # Creating Auth-Type = digest # Loading authenticate {...} # Loading authorize {...} # Loading preacct {...} # Loading accounting {...} # Loading post-proxy {...} # Loading post-auth {...} } # server default radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Listening on auth address 127.0.0.1 port 18120 as server inner-tunnel Listening on auth address * port 1812 as server default Listening on acct address * port 1813 as server default Opening new proxy socket 'proxy address * port 0' Listening on proxy address * port 55553 Ready to process requests. Received Access-Request Id 143 from 192.168.254.99:47723 to 192.168.211.189:1812 length 212 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x0200000e017269636b6a616d6573 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x5ab356745f713cbf05dd6404b20d6b8e (0) # Executing section authorize from file /etc/raddb/sites-enabled/default (0) authorize { (0) filter_username filter_username { (0) if (User-Name =~ /@.*@/ ) (0) if (User-Name =~ /@.*@/ ) -> FALSE (0) if (User-Name =~ /\\.\\./ ) (0) if (User-Name =~ /\\.\\./ ) -> FALSE (0) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (0) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (0) if (User-Name =~ /\\.$/) (0) if (User-Name =~ /\\.$/) -> FALSE (0) if (User-Name =~ /@\\./) (0) if (User-Name =~ /@\\./) -> FALSE (0) } # filter_username filter_username = notfound (0) [preprocess] = ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (0) suffix : No such realm "NULL" (0) [suffix] = noop (0) [files] = noop (0) eap : EAP packet type response id 0 length 14 (0) eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0) [eap] = ok (0) } # authorize = ok (0) Found Auth-Type = EAP (0) # Executing group from file /etc/raddb/sites-enabled/default (0) authenticate { (0) eap : Peer sent Identity (1) (0) eap : Calling eap_tls to process EAP data (0) eap_tls : Flushing SSL sessions (of #0) (0) eap_tls : Requiring client certificate (0) eap_tls : Initiate (0) eap_tls : Requiring client certificate (0) eap_tls : Start returned 1 (0) eap : New EAP session, adding 'State' attribute to reply 0x4ceb79454cea74d2 (0) [eap] = handled (0) } # authenticate = handled Sending Access-Challenge Id 143 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x010100060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb79454cea74d282e384b3b0a46e97 (0) Finished request Waking up in 0.3 seconds. Received Access-Request Id 144 from 192.168.254.99:47723 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020100060319 State = 0x4ceb79454cea74d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x66311fed7affa8091d42cae2a4c1f174 (1) # Executing section authorize from file /etc/raddb/sites-enabled/default (1) authorize { (1) filter_username filter_username { (1) if (User-Name =~ /@.*@/ ) (1) if (User-Name =~ /@.*@/ ) -> FALSE (1) if (User-Name =~ /\\.\\./ ) (1) if (User-Name =~ /\\.\\./ ) -> FALSE (1) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (1) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (1) if (User-Name =~ /\\.$/) (1) if (User-Name =~ /\\.$/) -> FALSE (1) if (User-Name =~ /@\\./) (1) if (User-Name =~ /@\\./) -> FALSE (1) } # filter_username filter_username = notfound (1) [preprocess] = ok (1) [chap] = noop (1) [mschap] = noop (1) [digest] = noop (1) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (1) suffix : No such realm "NULL" (1) [suffix] = noop (1) [files] = noop (1) eap : EAP packet type response id 1 length 6 (1) eap : No EAP Start, assuming it's an on-going EAP conversation (1) [eap] = updated (1) sql : EXPAND %{User-Name} (1) sql : --> rickjames (1) sql : SQL-User-Name set to 'rickjames' rlm_sql (sql): Reserved connection (4) (1) sql : EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id (1) sql : --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'rickjames' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'rickjames' ORDER BY id' (1) sql : User found in radcheck table (1) sql : EXPAND %{Packet-Src-IP-Address} (1) sql : --> 192.168.254.99 (1) sql : Check items matched (1) sql : EXPAND SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id (1) sql : --> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'rickjames' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radreply WHERE username = 'rickjames' ORDER BY id' (1) sql : EXPAND SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority (1) sql : --> SELECT groupname FROM radusergroup WHERE username = 'rickjames' ORDER BY priority rlm_sql (sql): Executing query: 'SELECT groupname FROM radusergroup WHERE username = 'rickjames' ORDER BY priority' (1) sql : User found in the group table (1) sql : EXPAND SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id (1) sql : --> SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'TestSite-Premium' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'TestSite-Premium' ORDER BY id' (1) sql : Group "TestSite-Premium" check items matched (1) sql : EXPAND SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id (1) sql : --> SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'TestSite-Premium' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'TestSite-Premium' ORDER BY id' (1) sql : Group "TestSite-Premium" reply items processed rlm_sql (sql): Released connection (4) (1) [sql] = ok (1) [expiration] = noop (1) [logintime] = noop (1) WARNING: pap : Auth-Type already set. Not setting to PAP (1) [pap] = noop (1) } # authorize = updated (1) Found Auth-Type = EAP (1) # Executing group from file /etc/raddb/sites-enabled/default (1) authenticate { (1) eap : Expiring EAP session with state 0x4ceb79454cea74d2 (1) eap : Finished EAP session with state 0x4ceb79454cea74d2 (1) eap : Previous EAP request found for state 0x4ceb79454cea74d2, released from the list (1) eap : Peer sent NAK (3) (1) eap : Found mutually acceptable type PEAP (25) (1) eap : Calling eap_peap to process EAP data (1) eap_peap : Initiate (1) eap_peap : Start returned 1 (1) eap : New EAP session, adding 'State' attribute to reply 0x4ceb79454de960d2 (1) [eap] = handled (1) } # authenticate = handled Sending Access-Challenge Id 144 from 192.168.211.189:1812 to 192.168.254.99:47723 Ruckus-Role = 'TestSite-Premium' EAP-Message = 0x010200061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb79454de960d282e384b3b0a46e97 (1) Finished request Waking up in 0.3 seconds. Received Access-Request Id 145 from 192.168.254.99:47723 to 192.168.211.189:1812 length 453 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020200ed1980000000e316030100de010000da030153ea2f791be84a9cd6b1bafd171e95e616c859a3ef4331ab822d758fa161be63000068c014c00ac022c0210039003800880087c00fc00500350084c012c008c01cc01b00160013c00dc003000ac013c009c01fc01e00330032009a009900450044c00ec004002f009600410007c011c007c00cc002000500040015001200090014001100080006000300ff01000049000b000403000102000a00340032000e000d0019000b000c00180009000a00160017000800060007001400150004000500120013000100020003000f0010001100230000000f000101 State = 0x4ceb79454de960d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x379486dd756430724548cd0ecaa8fb80 (2) # Executing section authorize from file /etc/raddb/sites-enabled/default (2) authorize { (2) filter_username filter_username { (2) if (User-Name =~ /@.*@/ ) (2) if (User-Name =~ /@.*@/ ) -> FALSE (2) if (User-Name =~ /\\.\\./ ) (2) if (User-Name =~ /\\.\\./ ) -> FALSE (2) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (2) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (2) if (User-Name =~ /\\.$/) (2) if (User-Name =~ /\\.$/) -> FALSE (2) if (User-Name =~ /@\\./) (2) if (User-Name =~ /@\\./) -> FALSE (2) } # filter_username filter_username = notfound (2) [preprocess] = ok (2) [chap] = noop (2) [mschap] = noop (2) [digest] = noop (2) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (2) suffix : No such realm "NULL" (2) [suffix] = noop (2) [files] = noop (2) eap : EAP packet type response id 2 length 237 (2) eap : Continuing tunnel setup. (2) [eap] = ok (2) } # authorize = ok (2) Found Auth-Type = EAP (2) # Executing group from file /etc/raddb/sites-enabled/default (2) authenticate { (2) eap : Expiring EAP session with state 0x4ceb79454de960d2 (2) eap : Finished EAP session with state 0x4ceb79454de960d2 (2) eap : Previous EAP request found for state 0x4ceb79454de960d2, released from the list (2) eap : Peer sent PEAP (25) (2) eap : EAP PEAP (25) (2) eap : Calling eap_peap to process EAP data (2) eap_peap : processing EAP-TLS TLS Length 227 (2) eap_peap : Length Included (2) eap_peap : eaptls_verify returned 11 (2) eap_peap : (other): before/accept initialization (2) eap_peap : TLS_accept: before/accept initialization (2) eap_peap : <<< TLS 1.0 Handshake [length 00de], ClientHello (2) eap_peap : TLS_accept: SSLv3 read client hello A (2) eap_peap : >>> TLS 1.0 Handshake [length 005e], ServerHello (2) eap_peap : TLS_accept: SSLv3 write server hello A (2) eap_peap : >>> TLS 1.0 Handshake [length 0e63], Certificate (2) eap_peap : TLS_accept: SSLv3 write certificate A (2) eap_peap : >>> TLS 1.0 Handshake [length 014b], ServerKeyExchange (2) eap_peap : TLS_accept: SSLv3 write key exchange A (2) eap_peap : >>> TLS 1.0 Handshake [length 0004], ServerHelloDone (2) eap_peap : TLS_accept: SSLv3 write server done A (2) eap_peap : TLS_accept: SSLv3 flush data (2) eap_peap : TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode (2) eap_peap : eaptls_process returned 13 (2) eap_peap : FR_TLS_HANDLED (2) eap : New EAP session, adding 'State' attribute to reply 0x4ceb79454ee860d2 (2) [eap] = handled (2) } # authenticate = handled Sending Access-Challenge Id 145 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 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 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb79454ee860d282e384b3b0a46e97 (2) Finished request Waking up in 0.3 seconds. Received Access-Request Id 146 from 192.168.254.99:47723 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020300061900 State = 0x4ceb79454ee860d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x0a2274bacba64ea010e2e134c47ac5e0 (3) # Executing section authorize from file /etc/raddb/sites-enabled/default (3) authorize { (3) filter_username filter_username { (3) if (User-Name =~ /@.*@/ ) (3) if (User-Name =~ /@.*@/ ) -> FALSE (3) if (User-Name =~ /\\.\\./ ) (3) if (User-Name =~ /\\.\\./ ) -> FALSE (3) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (3) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (3) if (User-Name =~ /\\.$/) (3) if (User-Name =~ /\\.$/) -> FALSE (3) if (User-Name =~ /@\\./) (3) if (User-Name =~ /@\\./) -> FALSE (3) } # filter_username filter_username = notfound (3) [preprocess] = ok (3) [chap] = noop (3) [mschap] = noop (3) [digest] = noop (3) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (3) suffix : No such realm "NULL" (3) [suffix] = noop (3) [files] = noop (3) eap : EAP packet type response id 3 length 6 (3) eap : Continuing tunnel setup. (3) [eap] = ok (3) } # authorize = ok (3) Found Auth-Type = EAP (3) # Executing group from file /etc/raddb/sites-enabled/default (3) authenticate { (3) eap : Expiring EAP session with state 0x4ceb79454ee860d2 (3) eap : Finished EAP session with state 0x4ceb79454ee860d2 (3) eap : Previous EAP request found for state 0x4ceb79454ee860d2, released from the list (3) eap : Peer sent PEAP (25) (3) eap : EAP PEAP (25) (3) eap : Calling eap_peap to process EAP data (3) eap_peap : processing EAP-TLS (3) eap_peap : Received TLS ACK (3) eap_peap : Received TLS ACK (3) eap_peap : ACK handshake fragment handler (3) eap_peap : eaptls_verify returned 1 (3) eap_peap : eaptls_process returned 13 (3) eap_peap : FR_TLS_HANDLED (3) eap : New EAP session, adding 'State' attribute to reply 0x4ceb79454fef60d2 (3) [eap] = handled (3) } # authenticate = handled Sending Access-Challenge Id 146 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 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 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb79454fef60d282e384b3b0a46e97 (3) Finished request Waking up in 0.3 seconds. Received Access-Request Id 147 from 192.168.254.99:47723 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020400061900 State = 0x4ceb79454fef60d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xa03b600b81fa910f10c733c534aefd3a (4) # Executing section authorize from file /etc/raddb/sites-enabled/default (4) authorize { (4) filter_username filter_username { (4) if (User-Name =~ /@.*@/ ) (4) if (User-Name =~ /@.*@/ ) -> FALSE (4) if (User-Name =~ /\\.\\./ ) (4) if (User-Name =~ /\\.\\./ ) -> FALSE (4) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (4) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (4) if (User-Name =~ /\\.$/) (4) if (User-Name =~ /\\.$/) -> FALSE (4) if (User-Name =~ /@\\./) (4) if (User-Name =~ /@\\./) -> FALSE (4) } # filter_username filter_username = notfound (4) [preprocess] = ok (4) [chap] = noop (4) [mschap] = noop (4) [digest] = noop (4) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (4) suffix : No such realm "NULL" (4) [suffix] = noop (4) [files] = noop (4) eap : EAP packet type response id 4 length 6 (4) eap : Continuing tunnel setup. (4) [eap] = ok (4) } # authorize = ok (4) Found Auth-Type = EAP (4) # Executing group from file /etc/raddb/sites-enabled/default (4) authenticate { (4) eap : Expiring EAP session with state 0x4ceb79454fef60d2 (4) eap : Finished EAP session with state 0x4ceb79454fef60d2 (4) eap : Previous EAP request found for state 0x4ceb79454fef60d2, released from the list (4) eap : Peer sent PEAP (25) (4) eap : EAP PEAP (25) (4) eap : Calling eap_peap to process EAP data (4) eap_peap : processing EAP-TLS (4) eap_peap : Received TLS ACK (4) eap_peap : Received TLS ACK (4) eap_peap : ACK handshake fragment handler (4) eap_peap : eaptls_verify returned 1 (4) eap_peap : eaptls_process returned 13 (4) eap_peap : FR_TLS_HANDLED (4) eap : New EAP session, adding 'State' attribute to reply 0x4ceb794548ee60d2 (4) [eap] = handled (4) } # authenticate = handled Sending Access-Challenge Id 147 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 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 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb794548ee60d282e384b3b0a46e97 (4) Finished request Waking up in 0.3 seconds. Received Access-Request Id 148 from 192.168.254.99:47723 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020500061900 State = 0x4ceb794548ee60d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x7613c72b480a4bd2625a3480371905c4 (5) # Executing section authorize from file /etc/raddb/sites-enabled/default (5) authorize { (5) filter_username filter_username { (5) if (User-Name =~ /@.*@/ ) (5) if (User-Name =~ /@.*@/ ) -> FALSE (5) if (User-Name =~ /\\.\\./ ) (5) if (User-Name =~ /\\.\\./ ) -> FALSE (5) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (5) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (5) if (User-Name =~ /\\.$/) (5) if (User-Name =~ /\\.$/) -> FALSE (5) if (User-Name =~ /@\\./) (5) if (User-Name =~ /@\\./) -> FALSE (5) } # filter_username filter_username = notfound (5) [preprocess] = ok (5) [chap] = noop (5) [mschap] = noop (5) [digest] = noop (5) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (5) suffix : No such realm "NULL" (5) [suffix] = noop (5) [files] = noop (5) eap : EAP packet type response id 5 length 6 (5) eap : Continuing tunnel setup. (5) [eap] = ok (5) } # authorize = ok (5) Found Auth-Type = EAP (5) # Executing group from file /etc/raddb/sites-enabled/default (5) authenticate { (5) eap : Expiring EAP session with state 0x4ceb794548ee60d2 (5) eap : Finished EAP session with state 0x4ceb794548ee60d2 (5) eap : Previous EAP request found for state 0x4ceb794548ee60d2, released from the list (5) eap : Peer sent PEAP (25) (5) eap : EAP PEAP (25) (5) eap : Calling eap_peap to process EAP data (5) eap_peap : processing EAP-TLS (5) eap_peap : Received TLS ACK (5) eap_peap : Received TLS ACK (5) eap_peap : ACK handshake fragment handler (5) eap_peap : eaptls_verify returned 1 (5) eap_peap : eaptls_process returned 13 (5) eap_peap : FR_TLS_HANDLED (5) eap : New EAP session, adding 'State' attribute to reply 0x4ceb794549ed60d2 (5) [eap] = handled (5) } # authenticate = handled Sending Access-Challenge Id 148 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x010603e81940726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b3122302006035 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb794549ed60d282e384b3b0a46e97 (5) Finished request Waking up in 0.3 seconds. Received Access-Request Id 149 from 192.168.254.99:47723 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020600061900 State = 0x4ceb794549ed60d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xe91d179bc8bb8788c1e6de8f3fcf50dd (6) # Executing section authorize from file /etc/raddb/sites-enabled/default (6) authorize { (6) filter_username filter_username { (6) if (User-Name =~ /@.*@/ ) (6) if (User-Name =~ /@.*@/ ) -> FALSE (6) if (User-Name =~ /\\.\\./ ) (6) if (User-Name =~ /\\.\\./ ) -> FALSE (6) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (6) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (6) if (User-Name =~ /\\.$/) (6) if (User-Name =~ /\\.$/) -> FALSE (6) if (User-Name =~ /@\\./) (6) if (User-Name =~ /@\\./) -> FALSE (6) } # filter_username filter_username = notfound (6) [preprocess] = ok (6) [chap] = noop (6) [mschap] = noop (6) [digest] = noop (6) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (6) suffix : No such realm "NULL" (6) [suffix] = noop (6) [files] = noop (6) eap : EAP packet type response id 6 length 6 (6) eap : Continuing tunnel setup. (6) [eap] = ok (6) } # authorize = ok (6) Found Auth-Type = EAP (6) # Executing group from file /etc/raddb/sites-enabled/default (6) authenticate { (6) eap : Expiring EAP session with state 0x4ceb794549ed60d2 (6) eap : Finished EAP session with state 0x4ceb794549ed60d2 (6) eap : Previous EAP request found for state 0x4ceb794549ed60d2, released from the list (6) eap : Peer sent PEAP (25) (6) eap : EAP PEAP (25) (6) eap : Calling eap_peap to process EAP data (6) eap_peap : processing EAP-TLS (6) eap_peap : Received TLS ACK (6) eap_peap : Received TLS ACK (6) eap_peap : ACK handshake fragment handler (6) eap_peap : eaptls_verify returned 1 (6) eap_peap : eaptls_process returned 13 (6) eap_peap : FR_TLS_HANDLED (6) eap : New EAP session, adding 'State' attribute to reply 0x4ceb79454aec60d2 (6) [eap] = handled (6) } # authenticate = handled Sending Access-Challenge Id 149 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x010700a2190003301a43fe6672038ac46b8a03e4cfbd0d7298f3ca18c0493c98bb41c8d241c4f47ccff53ab76570c75dd4eb039cd6e9349f6ea5a5103eac8b2a4299367f5f253e4d60eb6f152594eb09896977060700211d1e65e82103e31d08c275e98fdc07d150a678d621550679c6b3e62a8b3fc60c48449f6438aa1b4a7ac530b906201299ac899efab58ac94c2e16e24f2cd425ef6b4c16030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb79454aec60d282e384b3b0a46e97 (6) Finished request Waking up in 0.2 seconds. Received Access-Request Id 150 from 192.168.254.99:47723 to 192.168.211.189:1812 length 360 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020700901980000000861603010046100000424104b52a1d49f1ab34642dffae741387eb8784e12bd167acd53c4f59f25bc95981e119bba325ad2351f7f279011068f0a24b7723998b05536dc8cdbd672d48b47a1214030100010116030100308dc863a28f1da5df3d3d399245a6715c2ad8ac6c90fe056813ea9b766c144709ce3d5d8b059f7223bb1b941e1d1f64ee State = 0x4ceb79454aec60d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xf1a34af6b58861090a5a79c93043dd8f (7) # Executing section authorize from file /etc/raddb/sites-enabled/default (7) authorize { (7) filter_username filter_username { (7) if (User-Name =~ /@.*@/ ) (7) if (User-Name =~ /@.*@/ ) -> FALSE (7) if (User-Name =~ /\\.\\./ ) (7) if (User-Name =~ /\\.\\./ ) -> FALSE (7) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (7) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (7) if (User-Name =~ /\\.$/) (7) if (User-Name =~ /\\.$/) -> FALSE (7) if (User-Name =~ /@\\./) (7) if (User-Name =~ /@\\./) -> FALSE (7) } # filter_username filter_username = notfound (7) [preprocess] = ok (7) [chap] = noop (7) [mschap] = noop (7) [digest] = noop (7) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (7) suffix : No such realm "NULL" (7) [suffix] = noop (7) [files] = noop (7) eap : EAP packet type response id 7 length 144 (7) eap : Continuing tunnel setup. (7) [eap] = ok (7) } # authorize = ok (7) Found Auth-Type = EAP (7) # Executing group from file /etc/raddb/sites-enabled/default (7) authenticate { (7) eap : Expiring EAP session with state 0x4ceb79454aec60d2 (7) eap : Finished EAP session with state 0x4ceb79454aec60d2 (7) eap : Previous EAP request found for state 0x4ceb79454aec60d2, released from the list (7) eap : Peer sent PEAP (25) (7) eap : EAP PEAP (25) (7) eap : Calling eap_peap to process EAP data (7) eap_peap : processing EAP-TLS TLS Length 134 (7) eap_peap : Length Included (7) eap_peap : eaptls_verify returned 11 (7) eap_peap : <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange (7) eap_peap : TLS_accept: SSLv3 read client key exchange A (7) eap_peap : <<< TLS 1.0 ChangeCipherSpec [length 0001] (7) eap_peap : <<< TLS 1.0 Handshake [length 0010], Finished (7) eap_peap : TLS_accept: SSLv3 read finished A (7) eap_peap : >>> TLS 1.0 ChangeCipherSpec [length 0001] (7) eap_peap : TLS_accept: SSLv3 write change cipher spec A (7) eap_peap : >>> TLS 1.0 Handshake [length 0010], Finished (7) eap_peap : TLS_accept: SSLv3 write finished A (7) eap_peap : TLS_accept: SSLv3 flush data SSL: adding session af12a33c67faebc1699afe1405f87e62f655c334ef0035b31f29c8477e8f45be to cache (7) eap_peap : (other): SSL negotiation finished successfully SSL Connection Established (7) eap_peap : eaptls_process returned 13 (7) eap_peap : FR_TLS_HANDLED (7) eap : New EAP session, adding 'State' attribute to reply 0x4ceb79454be360d2 (7) [eap] = handled (7) } # authenticate = handled Sending Access-Challenge Id 150 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x0108004119001403010001011603010030a48817372ed27df2bbbe9a7e670f274e069b3c505441ef1829b1f03a6fae341ecf7580e7cb94fcf126283667c030c6e6 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb79454be360d282e384b3b0a46e97 (7) Finished request Waking up in 0.2 seconds. Received Access-Request Id 151 from 192.168.254.99:47723 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020800061900 State = 0x4ceb79454be360d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x80ee67f08a49406d181eef9a0033f411 (8) # Executing section authorize from file /etc/raddb/sites-enabled/default (8) authorize { (8) filter_username filter_username { (8) if (User-Name =~ /@.*@/ ) (8) if (User-Name =~ /@.*@/ ) -> FALSE (8) if (User-Name =~ /\\.\\./ ) (8) if (User-Name =~ /\\.\\./ ) -> FALSE (8) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (8) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (8) if (User-Name =~ /\\.$/) (8) if (User-Name =~ /\\.$/) -> FALSE (8) if (User-Name =~ /@\\./) (8) if (User-Name =~ /@\\./) -> FALSE (8) } # filter_username filter_username = notfound (8) [preprocess] = ok (8) [chap] = noop (8) [mschap] = noop (8) [digest] = noop (8) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (8) suffix : No such realm "NULL" (8) [suffix] = noop (8) [files] = noop (8) eap : EAP packet type response id 8 length 6 (8) eap : Continuing tunnel setup. (8) [eap] = ok (8) } # authorize = ok (8) Found Auth-Type = EAP (8) # Executing group from file /etc/raddb/sites-enabled/default (8) authenticate { (8) eap : Expiring EAP session with state 0x4ceb79454be360d2 (8) eap : Finished EAP session with state 0x4ceb79454be360d2 (8) eap : Previous EAP request found for state 0x4ceb79454be360d2, released from the list (8) eap : Peer sent PEAP (25) (8) eap : EAP PEAP (25) (8) eap : Calling eap_peap to process EAP data (8) eap_peap : processing EAP-TLS (8) eap_peap : Received TLS ACK (8) eap_peap : Received TLS ACK (8) eap_peap : ACK handshake is finished (8) eap_peap : eaptls_verify returned 3 (8) eap_peap : eaptls_process returned 3 (8) eap_peap : FR_TLS_SUCCESS (8) eap_peap : Session established. Decoding tunneled attributes. (8) eap_peap : Peap state TUNNEL ESTABLISHED (8) eap : New EAP session, adding 'State' attribute to reply 0x4ceb794544e260d2 (8) [eap] = handled (8) } # authenticate = handled Sending Access-Challenge Id 151 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x0109002b19001703010020d58397fe7de578e223815129812dc95f570056c4d519667870113e42f8d6b0a6 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb794544e260d282e384b3b0a46e97 (8) Finished request Waking up in 0.2 seconds. Received Access-Request Id 152 from 192.168.254.99:47723 to 192.168.211.189:1812 length 296 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x02090050190017030100202da537a9f57a2f9419791ab87b078ae3dfbf17ad04c8223e029c8a9b22ae095117030100201dbfd96179013b43e21a62d0a84ce734ed19968c4899da0347c2bc59a137865a State = 0x4ceb794544e260d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xbbfc01a0f2f5936bf8e5012329001e8a (9) # Executing section authorize from file /etc/raddb/sites-enabled/default (9) authorize { (9) filter_username filter_username { (9) if (User-Name =~ /@.*@/ ) (9) if (User-Name =~ /@.*@/ ) -> FALSE (9) if (User-Name =~ /\\.\\./ ) (9) if (User-Name =~ /\\.\\./ ) -> FALSE (9) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (9) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (9) if (User-Name =~ /\\.$/) (9) if (User-Name =~ /\\.$/) -> FALSE (9) if (User-Name =~ /@\\./) (9) if (User-Name =~ /@\\./) -> FALSE (9) } # filter_username filter_username = notfound (9) [preprocess] = ok (9) [chap] = noop (9) [mschap] = noop (9) [digest] = noop (9) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (9) suffix : No such realm "NULL" (9) [suffix] = noop (9) [files] = noop (9) eap : EAP packet type response id 9 length 80 (9) eap : Continuing tunnel setup. (9) [eap] = ok (9) } # authorize = ok (9) Found Auth-Type = EAP (9) # Executing group from file /etc/raddb/sites-enabled/default (9) authenticate { (9) eap : Expiring EAP session with state 0x4ceb794544e260d2 (9) eap : Finished EAP session with state 0x4ceb794544e260d2 (9) eap : Previous EAP request found for state 0x4ceb794544e260d2, released from the list (9) eap : Peer sent PEAP (25) (9) eap : EAP PEAP (25) (9) eap : Calling eap_peap to process EAP data (9) eap_peap : processing EAP-TLS (9) eap_peap : eaptls_verify returned 7 (9) eap_peap : Done initial handshake (9) eap_peap : eaptls_process returned 7 (9) eap_peap : FR_TLS_OK (9) eap_peap : Session established. Decoding tunneled attributes. (9) eap_peap : Peap state WAITING FOR INNER IDENTITY (9) eap_peap : Identity - rickjames (9) eap_peap : Got inner identity 'rickjames' (9) eap_peap : Setting default EAP type for tunneled EAP session. (9) eap_peap : Got tunneled request EAP-Message = 0x0209000e017269636b6a616d6573 server default { (9) eap_peap : Setting User-Name to rickjames Sending tunneled request EAP-Message = 0x0209000e017269636b6a616d6573 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' server inner-tunnel { (9) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (9) authorize { (9) [chap] = noop (9) [mschap] = noop (9) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (9) suffix : No such realm "NULL" (9) [suffix] = noop (9) update control { (9) Proxy-To-Realm := 'LOCAL' (9) } # update control = noop (9) eap : EAP packet type response id 9 length 14 (9) eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (9) [eap] = ok (9) } # authorize = ok (9) Found Auth-Type = EAP (9) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (9) authenticate { (9) eap : Peer sent Identity (1) (9) eap : Calling eap_mschapv2 to process EAP data (9) eap_mschapv2 : Issuing Challenge (9) eap : New EAP session, adding 'State' attribute to reply 0x90467cc2904c66f8 (9) [eap] = handled (9) } # authenticate = handled } # server inner-tunnel (9) eap_peap : Got tunneled reply code 11 EAP-Message = 0x010a00231a010a001e101b1e87871167666175bc2c591e8b21a67269636b6a616d6573 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x90467cc2904c66f875cb3bd5cfdd8058 (9) eap_peap : Got tunneled reply RADIUS code 11 EAP-Message = 0x010a00231a010a001e101b1e87871167666175bc2c591e8b21a67269636b6a616d6573 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x90467cc2904c66f875cb3bd5cfdd8058 (9) eap_peap : Got tunneled Access-Challenge (9) eap : New EAP session, adding 'State' attribute to reply 0x4ceb794545e160d2 (9) [eap] = handled (9) } # authenticate = handled Sending Access-Challenge Id 152 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x010a004b190017030100403b96556cbc12ef182861497e97d348bcb48d43542833be0ae4bbe3c22d2948e6e4d4505b85481d2fc9caaaf875219e0c1663ab4004394d13da5bdd187d994627 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb794545e160d282e384b3b0a46e97 (9) Finished request Waking up in 0.2 seconds. Received Access-Request Id 153 from 192.168.254.99:47723 to 192.168.211.189:1812 length 360 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020a00901900170301002062416948b50922b31ec6db5918ad2371b60ec40e62c454166b98cd041b43f4bc17030100601a7888d640133035adf7f73a023de29807bcb5c11bd25125e9f55ba76a05f38969ab477a3bfd66cc12f11ee20536b77109c463a7debf706bd04e34cbeb7792cb5bb9b27ec54cb8956b8762f96541d81ce82fed0424119af4597d53dd3d86ffd1 State = 0x4ceb794545e160d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x0de3a2ea5cd2cb7a1d03f3b3ace13455 (10) # Executing section authorize from file /etc/raddb/sites-enabled/default (10) authorize { (10) filter_username filter_username { (10) if (User-Name =~ /@.*@/ ) (10) if (User-Name =~ /@.*@/ ) -> FALSE (10) if (User-Name =~ /\\.\\./ ) (10) if (User-Name =~ /\\.\\./ ) -> FALSE (10) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (10) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (10) if (User-Name =~ /\\.$/) (10) if (User-Name =~ /\\.$/) -> FALSE (10) if (User-Name =~ /@\\./) (10) if (User-Name =~ /@\\./) -> FALSE (10) } # filter_username filter_username = notfound (10) [preprocess] = ok (10) [chap] = noop (10) [mschap] = noop (10) [digest] = noop (10) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (10) suffix : No such realm "NULL" (10) [suffix] = noop (10) [files] = noop (10) eap : EAP packet type response id 10 length 144 (10) eap : Continuing tunnel setup. (10) [eap] = ok (10) } # authorize = ok (10) Found Auth-Type = EAP (10) # Executing group from file /etc/raddb/sites-enabled/default (10) authenticate { (10) eap : Expiring EAP session with state 0x90467cc2904c66f8 (10) eap : Finished EAP session with state 0x4ceb794545e160d2 (10) eap : Previous EAP request found for state 0x4ceb794545e160d2, released from the list (10) eap : Peer sent PEAP (25) (10) eap : EAP PEAP (25) (10) eap : Calling eap_peap to process EAP data (10) eap_peap : processing EAP-TLS (10) eap_peap : eaptls_verify returned 7 (10) eap_peap : Done initial handshake (10) eap_peap : eaptls_process returned 7 (10) eap_peap : FR_TLS_OK (10) eap_peap : Session established. Decoding tunneled attributes. (10) eap_peap : Peap state phase2 (10) eap_peap : EAP type MSCHAPv2 (26) (10) eap_peap : Got tunneled request EAP-Message = 0x020a00441a020a003f31dbbd0f219cf4a4260eea22540f99505f00000000000000009467539fd509d30acc9168226f78a83458643880610fa797007269636b6a616d6573 server default { (10) eap_peap : Setting User-Name to rickjames Sending tunneled request EAP-Message = 0x020a00441a020a003f31dbbd0f219cf4a4260eea22540f99505f00000000000000009467539fd509d30acc9168226f78a83458643880610fa797007269636b6a616d6573 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = 'rickjames' State = 0x90467cc2904c66f875cb3bd5cfdd8058 Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' server inner-tunnel { (10) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (10) authorize { (10) [chap] = noop (10) [mschap] = noop (10) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (10) suffix : No such realm "NULL" (10) [suffix] = noop (10) update control { (10) Proxy-To-Realm := 'LOCAL' (10) } # update control = noop (10) eap : EAP packet type response id 10 length 68 (10) eap : No EAP Start, assuming it's an on-going EAP conversation (10) [eap] = updated (10) [files] = noop (10) sql : EXPAND %{User-Name} (10) sql : --> rickjames (10) sql : SQL-User-Name set to 'rickjames' rlm_sql (sql): Reserved connection (4) (10) sql : EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id (10) sql : --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'rickjames' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'rickjames' ORDER BY id' (10) sql : User found in radcheck table (10) sql : EXPAND %{Packet-Src-IP-Address} (10) sql : --> 192.168.254.99 (10) sql : Check items matched (10) sql : EXPAND SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id (10) sql : --> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'rickjames' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radreply WHERE username = 'rickjames' ORDER BY id' (10) sql : EXPAND SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority (10) sql : --> SELECT groupname FROM radusergroup WHERE username = 'rickjames' ORDER BY priority rlm_sql (sql): Executing query: 'SELECT groupname FROM radusergroup WHERE username = 'rickjames' ORDER BY priority' (10) sql : User found in the group table (10) sql : EXPAND SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id (10) sql : --> SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'TestSite-Premium' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'TestSite-Premium' ORDER BY id' (10) sql : Group "TestSite-Premium" check items matched (10) sql : EXPAND SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id (10) sql : --> SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'TestSite-Premium' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'TestSite-Premium' ORDER BY id' (10) sql : Group "TestSite-Premium" reply items processed rlm_sql (sql): Released connection (4) (10) [sql] = ok (10) [expiration] = noop (10) [logintime] = noop (10) WARNING: pap : Auth-Type already set. Not setting to PAP (10) [pap] = noop (10) } # authorize = updated (10) Found Auth-Type = EAP (10) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (10) authenticate { (10) eap : Expiring EAP session with state 0x90467cc2904c66f8 (10) eap : Finished EAP session with state 0x90467cc2904c66f8 (10) eap : Previous EAP request found for state 0x90467cc2904c66f8, released from the list (10) eap : Peer sent MSCHAPv2 (26) (10) eap : EAP MSCHAPv2 (26) (10) eap : Calling eap_mschapv2 to process EAP data (10) eap_mschapv2 : # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (10) eap_mschapv2 : Auth-Type MS-CHAP { (10) mschap : Found Cleartext-Password, hashing to create LM-Password (10) mschap : Found Cleartext-Password, hashing to create NT-Password (10) mschap : Creating challenge hash with username: rickjames (10) mschap : Client is using MS-CHAPv2 (10) mschap : Adding MS-CHAPv2 MPPE keys (10) [mschap] = ok (10) } # Auth-Type MS-CHAP = ok MSCHAP Success (10) eap : New EAP session, adding 'State' attribute to reply 0x90467cc2914d66f8 (10) [eap] = handled (10) } # authenticate = handled } # server inner-tunnel (10) eap_peap : Got tunneled reply code 11 Ruckus-Role = 'TestSite-Premium' EAP-Message = 0x010b00331a030a002e533d34393438363642393534463137394238304534394246363542394333423136324344373839353345 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x90467cc2914d66f875cb3bd5cfdd8058 (10) eap_peap : Got tunneled reply RADIUS code 11 Ruckus-Role = 'TestSite-Premium' EAP-Message = 0x010b00331a030a002e533d34393438363642393534463137394238304534394246363542394333423136324344373839353345 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x90467cc2914d66f875cb3bd5cfdd8058 (10) eap_peap : Got tunneled Access-Challenge (10) eap : New EAP session, adding 'State' attribute to reply 0x4ceb794546e060d2 (10) [eap] = handled (10) } # authenticate = handled Sending Access-Challenge Id 153 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x010b005b19001703010050e5513e4a445722dc9ac594ebf5b9f6309a412d6d5655e1d6e35acfea6615c1ebde380bff213578fba0b49313776bd1f3a17bdc75a36343004ac036deba25e7344efd8a1beba670cccb7457fb08c8bb6e Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb794546e060d282e384b3b0a46e97 (10) Finished request Waking up in 0.2 seconds. Received Access-Request Id 154 from 192.168.254.99:47723 to 192.168.211.189:1812 length 296 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020b005019001703010020ffd30b0cfb8eb8455e613a00eaed965a55aa329b3af426bf55c8bcaaf75b56b817030100204dc79b8b263d981da127fac74e9237c75d0eef9e74a172a2010a240ecc0cea65 State = 0x4ceb794546e060d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x98e0d20141954b55e09c207e4c83138e (11) # Executing section authorize from file /etc/raddb/sites-enabled/default (11) authorize { (11) filter_username filter_username { (11) if (User-Name =~ /@.*@/ ) (11) if (User-Name =~ /@.*@/ ) -> FALSE (11) if (User-Name =~ /\\.\\./ ) (11) if (User-Name =~ /\\.\\./ ) -> FALSE (11) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (11) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (11) if (User-Name =~ /\\.$/) (11) if (User-Name =~ /\\.$/) -> FALSE (11) if (User-Name =~ /@\\./) (11) if (User-Name =~ /@\\./) -> FALSE (11) } # filter_username filter_username = notfound (11) [preprocess] = ok (11) [chap] = noop (11) [mschap] = noop (11) [digest] = noop (11) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (11) suffix : No such realm "NULL" (11) [suffix] = noop (11) [files] = noop (11) eap : EAP packet type response id 11 length 80 (11) eap : Continuing tunnel setup. (11) [eap] = ok (11) } # authorize = ok (11) Found Auth-Type = EAP (11) # Executing group from file /etc/raddb/sites-enabled/default (11) authenticate { (11) eap : Expiring EAP session with state 0x90467cc2914d66f8 (11) eap : Finished EAP session with state 0x4ceb794546e060d2 (11) eap : Previous EAP request found for state 0x4ceb794546e060d2, released from the list (11) eap : Peer sent PEAP (25) (11) eap : EAP PEAP (25) (11) eap : Calling eap_peap to process EAP data (11) eap_peap : processing EAP-TLS (11) eap_peap : eaptls_verify returned 7 (11) eap_peap : Done initial handshake (11) eap_peap : eaptls_process returned 7 (11) eap_peap : FR_TLS_OK (11) eap_peap : Session established. Decoding tunneled attributes. (11) eap_peap : Peap state phase2 (11) eap_peap : EAP type MSCHAPv2 (26) (11) eap_peap : Got tunneled request EAP-Message = 0x020b00061a03 server default { (11) eap_peap : Setting User-Name to rickjames Sending tunneled request EAP-Message = 0x020b00061a03 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = 'rickjames' State = 0x90467cc2914d66f875cb3bd5cfdd8058 Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' server inner-tunnel { (11) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (11) authorize { (11) [chap] = noop (11) [mschap] = noop (11) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (11) suffix : No such realm "NULL" (11) [suffix] = noop (11) update control { (11) Proxy-To-Realm := 'LOCAL' (11) } # update control = noop (11) eap : EAP packet type response id 11 length 6 (11) eap : EAP-MSCHAPV2 success, returning short-circuit ok (11) [eap] = ok (11) } # authorize = ok (11) Found Auth-Type = EAP (11) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (11) authenticate { (11) eap : Expiring EAP session with state 0x90467cc2914d66f8 (11) eap : Finished EAP session with state 0x90467cc2914d66f8 (11) eap : Previous EAP request found for state 0x90467cc2914d66f8, released from the list (11) eap : Peer sent MSCHAPv2 (26) (11) eap : EAP MSCHAPv2 (26) (11) eap : Calling eap_mschapv2 to process EAP data (11) eap : Freeing handler (11) [eap] = ok (11) } # authenticate = ok (11) # Executing section post-auth from file /etc/raddb/sites-enabled/inner-tunnel (11) post-auth { (11) sql : EXPAND .query (11) sql : --> .query (11) sql : Using query template 'query' rlm_sql (sql): Reserved connection (4) (11) sql : EXPAND %{User-Name} (11) sql : --> rickjames (11) sql : SQL-User-Name set to 'rickjames' (11) sql : EXPAND INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') (11) sql : --> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'rickjames', '', 'Access-Accept', '2014-08-12 11:14:01') rlm_sql (sql): Executing query: 'INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'rickjames', '', 'Access-Accept', '2014-08-12 11:14:01')' rlm_sql (sql): Released connection (4) (11) [sql] = ok (11) } # post-auth = ok } # server inner-tunnel (11) eap_peap : Got tunneled reply code 2 MS-MPPE-Encryption-Policy = Encryption-Allowed MS-MPPE-Encryption-Types = RC4-40or128-bit-Allowed MS-MPPE-Send-Key = 0x7bddbf8ffc4cb3ce3634397a6e579f64 MS-MPPE-Recv-Key = 0xd35a84bb71e49778f9d360adef75c60d EAP-Message = 0x030b0004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = 'rickjames' (11) eap_peap : Got tunneled reply RADIUS code 2 MS-MPPE-Encryption-Policy = Encryption-Allowed MS-MPPE-Encryption-Types = RC4-40or128-bit-Allowed MS-MPPE-Send-Key = 0x7bddbf8ffc4cb3ce3634397a6e579f64 MS-MPPE-Recv-Key = 0xd35a84bb71e49778f9d360adef75c60d EAP-Message = 0x030b0004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = 'rickjames' (11) eap_peap : Tunneled authentication was successful. (11) eap_peap : SUCCESS (11) eap_peap : Saving tunneled attributes for later (11) eap : New EAP session, adding 'State' attribute to reply 0x4ceb794547e760d2 (11) [eap] = handled (11) } # authenticate = handled Sending Access-Challenge Id 154 from 192.168.211.189:1812 to 192.168.254.99:47723 EAP-Message = 0x010c002b19001703010020420ed36f06ca7f1850877875a0606eb3fce6c8912df8e2ff9267d51cc7940d52 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4ceb794547e760d282e384b3b0a46e97 (11) Finished request Waking up in 0.2 seconds. Received Access-Request Id 155 from 192.168.254.99:47723 to 192.168.211.189:1812 length 296 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 63 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020c005019001703010020356bbdf0e5df187009d14cf331e21032e4b0ef3415ed8c496a4b97423d29ef191703010020aa1c2279c28fe6e915a340770acada1050ce7f21c923326925a377af8b6902da State = 0x4ceb794547e760d282e384b3b0a46e97 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xdd6b9136ffab4709d54b4b95ec79afef (12) # Executing section authorize from file /etc/raddb/sites-enabled/default (12) authorize { (12) filter_username filter_username { (12) if (User-Name =~ /@.*@/ ) (12) if (User-Name =~ /@.*@/ ) -> FALSE (12) if (User-Name =~ /\\.\\./ ) (12) if (User-Name =~ /\\.\\./ ) -> FALSE (12) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (12) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (12) if (User-Name =~ /\\.$/) (12) if (User-Name =~ /\\.$/) -> FALSE (12) if (User-Name =~ /@\\./) (12) if (User-Name =~ /@\\./) -> FALSE (12) } # filter_username filter_username = notfound (12) [preprocess] = ok (12) [chap] = noop (12) [mschap] = noop (12) [digest] = noop (12) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (12) suffix : No such realm "NULL" (12) [suffix] = noop (12) [files] = noop (12) eap : EAP packet type response id 12 length 80 (12) eap : Continuing tunnel setup. (12) [eap] = ok (12) } # authorize = ok (12) Found Auth-Type = EAP (12) # Executing group from file /etc/raddb/sites-enabled/default (12) authenticate { (12) eap : Expiring EAP session with state 0x4ceb794547e760d2 (12) eap : Finished EAP session with state 0x4ceb794547e760d2 (12) eap : Previous EAP request found for state 0x4ceb794547e760d2, released from the list (12) eap : Peer sent PEAP (25) (12) eap : EAP PEAP (25) (12) eap : Calling eap_peap to process EAP data (12) eap_peap : processing EAP-TLS (12) eap_peap : eaptls_verify returned 7 (12) eap_peap : Done initial handshake (12) eap_peap : eaptls_process returned 7 (12) eap_peap : FR_TLS_OK (12) eap_peap : Session established. Decoding tunneled attributes. (12) eap_peap : Peap state send tlv success (12) eap_peap : Received EAP-TLV response. (12) eap_peap : Success (12) eap_peap : Using saved attributes from the original Access-Accept User-Name = 'rickjames' (12) eap_peap : Saving session af12a33c67faebc1699afe1405f87e62f655c334ef0035b31f29c8477e8f45be vps 0x27c03e0 in the cache (12) eap : Freeing handler (12) [eap] = ok (12) } # authenticate = ok (12) # Executing section post-auth from file /etc/raddb/sites-enabled/default (12) post-auth { (12) sql : EXPAND .query (12) sql : --> .query (12) sql : Using query template 'query' rlm_sql (sql): Reserved connection (4) (12) sql : EXPAND %{User-Name} (12) sql : --> rickjames (12) sql : SQL-User-Name set to 'rickjames' (12) sql : EXPAND INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') (12) sql : --> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'rickjames', '', 'Access-Accept', '2014-08-12 11:14:01') rlm_sql (sql): Executing query: 'INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'rickjames', '', 'Access-Accept', '2014-08-12 11:14:01')' rlm_sql (sql): Released connection (4) (12) [sql] = ok (12) [exec] = noop (12) remove_reply_message_if_eap remove_reply_message_if_eap { (12) if (reply:EAP-Message && reply:Reply-Message) (12) if (reply:EAP-Message && reply:Reply-Message) -> FALSE (12) else else { (12) [noop] = noop (12) } # else else = noop (12) } # remove_reply_message_if_eap remove_reply_message_if_eap = noop (12) } # post-auth = ok Sending Access-Accept Id 155 from 192.168.211.189:1812 to 192.168.254.99:47723 User-Name = 'rickjames' MS-MPPE-Recv-Key = 0xdf63136ac67313206330f76f12a3681cb91f99e6a42c55faf35c032b664a6377 MS-MPPE-Send-Key = 0x420e75a6ca75d4c11c75406c48472a3409d07419634f696875ab551be5e8a78b EAP-Message = 0x030c0004 Message-Authenticator = 0x00000000000000000000000000000000 (12) Finished request Waking up in 0.2 seconds. Waking up in 4.5 seconds. (0) Cleaning up request packet ID 143 with timestamp +15 (1) Cleaning up request packet ID 144 with timestamp +15 (2) Cleaning up request packet ID 145 with timestamp +15 (3) Cleaning up request packet ID 146 with timestamp +15 (4) Cleaning up request packet ID 147 with timestamp +15 (5) Cleaning up request packet ID 148 with timestamp +15 (6) Cleaning up request packet ID 149 with timestamp +15 (7) Cleaning up request packet ID 150 with timestamp +15 (8) Cleaning up request packet ID 151 with timestamp +15 (9) Cleaning up request packet ID 152 with timestamp +15 (10) Cleaning up request packet ID 153 with timestamp +15 (11) Cleaning up request packet ID 154 with timestamp +15 (12) Cleaning up request packet ID 155 with timestamp +15 Ready to process requests.