|
From: Morris, A. <am...@ca...> - 2014-05-15 14:07:13
|
FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on Oct 18 2012 at 13:58:38 Copyright (C) 1999-2012 The FreeRADIUS server project and contributors. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License v2. Starting - reading configuration files ... including configuration file /usr/local/pf/raddb//radiusd.conf including configuration file /usr/local/pf/raddb//proxy.conf including configuration file /usr/local/pf/raddb//clients.conf including files in directory /usr/local/pf/raddb//modules/ including configuration file /usr/local/pf/raddb//modules/mschap including configuration file /usr/local/pf/raddb//modules/attr_filter including configuration file /usr/local/pf/raddb//modules/sqlcounter_expire_on_login including configuration file /usr/local/pf/raddb//modules/sql_log including configuration file /usr/local/pf/raddb//modules/perl including configuration file /usr/local/pf/raddb//modules/sradutmp including configuration file /usr/local/pf/raddb//modules/realm including configuration file /usr/local/pf/raddb//modules/pam including configuration file /usr/local/pf/raddb//modules/unix including configuration file /usr/local/pf/raddb//modules/expiration including configuration file /usr/local/pf/raddb//modules/attr_rewrite including configuration file /usr/local/pf/raddb//modules/pap including configuration file /usr/local/pf/raddb//modules/soh including configuration file /usr/local/pf/raddb//modules/detail including configuration file /usr/local/pf/raddb//modules/digest including configuration file /usr/local/pf/raddb//modules/detail.log including configuration file /usr/local/pf/raddb//modules/rediswho including configuration file /usr/local/pf/raddb//modules/etc_group including configuration file /usr/local/pf/raddb//modules/smsotp including configuration file /usr/local/pf/raddb//modules/wimax including configuration file /usr/local/pf/raddb//modules/checkval including configuration file /usr/local/pf/raddb//modules/opendirectory including configuration file /usr/local/pf/raddb//modules/mac2ip including configuration file /usr/local/pf/raddb//modules/logintime including configuration file /usr/local/pf/raddb//modules/always including configuration file /usr/local/pf/raddb//modules/mac2vlan including configuration file /usr/local/pf/raddb//modules/replicate including configuration file /usr/local/pf/raddb//modules/counter including configuration file /usr/local/pf/raddb//modules/expr including configuration file /usr/local/pf/raddb//modules/ntlm_auth including configuration file /usr/local/pf/raddb//modules/exec including configuration file /usr/local/pf/raddb//modules/dynamic_clients including configuration file /usr/local/pf/raddb//modules/ldap including configuration file /usr/local/pf/raddb//modules/chap including configuration file /usr/local/pf/raddb//modules/files including configuration file /usr/local/pf/raddb//modules/otp including configuration file /usr/local/pf/raddb//modules/ippool including configuration file /usr/local/pf/raddb//modules/radutmp including configuration file /usr/local/pf/raddb//modules/policy including configuration file /usr/local/pf/raddb//modules/acct_unique including configuration file /usr/local/pf/raddb//modules/preprocess including configuration file /usr/local/pf/raddb//modules/smbpasswd including configuration file /usr/local/pf/raddb//modules/inner-eap including configuration file /usr/local/pf/raddb//modules/detail.example.com including configuration file /usr/local/pf/raddb//modules/redis including configuration file /usr/local/pf/raddb//modules/passwd including configuration file /usr/local/pf/raddb//modules/linelog including configuration file /usr/local/pf/raddb//modules/cui including configuration file /usr/local/pf/raddb//modules/echo including configuration file /usr/local/pf/raddb//eap.conf including configuration file /usr/local/pf/raddb//sql.conf including configuration file /usr/local/pf/raddb//sql/mysql/packetfence.conf including configuration file /usr/local/pf/raddb//policy.conf including files in directory /usr/local/pf/raddb//sites-enabled/ including configuration file /usr/local/pf/raddb//sites-enabled/packetfence including configuration file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel including configuration file /usr/local/pf/raddb//sites-enabled/control-socket including configuration file /usr/local/pf/raddb//sites-enabled/packetfence-soh including configuration file /usr/local/pf/raddb//sites-enabled/default including configuration file /usr/local/pf/raddb//sites-enabled/inner-tunnel main { user = "pf" group = "pf" allow_core_dumps = no } including dictionary file /usr/local/pf/raddb//dictionary main { name = "radiusd" prefix = "/usr" localstatedir = "/usr/local/pf/var" sbindir = "/usr/sbin" logdir = "/usr/local/pf/logs" run_dir = "/usr/local/pf/var/run" libdir = "/usr/lib/freeradius" radacctdir = "/usr/local/pf/logs/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 pidfile = "/usr/local/pf/var/run/radiusd.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = yes auth_badpass = no auth_goodpass = no } security { max_attributes = 200 reject_delay = 1 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = "testing123" response_window = 20 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 120 status_check_timeout = 4 coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server blah01.uwic.ac.uk { ipaddr = 1.2.3.4 port = 1812 type = "auth" secret = "testing123" response_window = 30 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 300 status_check_timeout = 4 } home_server blah02.uwic.ac.uk { ipaddr = 1.2.3.5 port = 1812 type = "auth" secret = "testing123" response_window = 30 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 300 status_check_timeout = 4 } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } realm cardiffmet.ac.uk { authhost = LOCAL accthost = LOCAL } realm uwic.ac.uk { authhost = LOCAL accthost = LOCAL } home_server_pool eduroam { type = fail-over home_server = blah01.uwic.ac.uk home_server = blah02.uwic.ac.uk } realm DEFAULT { auth_pool = eduroam nostrip } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "testing123" nastype = "other" } client blah01.uwic.ac.uk { require_message_authenticator = no secret = "testing123" shortname = "blah01" } client blah02.uwic.ac.uk { require_message_authenticator = no secret = "testing123" shortname = "blah02" } radiusd: #### Instantiating modules #### instantiate { Module: Linked to module rlm_exec Module: Instantiating module "exec" from file /usr/local/pf/raddb//modules/exec exec { wait = no input_pairs = "request" shell_escape = yes } Module: Linked to module rlm_expr Module: Instantiating module "expr" from file /usr/local/pf/raddb//modules/expr Module: Linked to module rlm_expiration Module: Instantiating module "expiration" from file /usr/local/pf/raddb//modules/expiration expiration { reply-message = "Password Has Expired " } Module: Linked to module rlm_logintime Module: Instantiating module "logintime" from file /usr/local/pf/raddb//modules/logintime logintime { reply-message = "You are calling outside your allowed timespan " minimum-timeout = 60 } } radiusd: #### Loading Virtual Servers #### server { # from file /usr/local/pf/raddb//radiusd.conf modules { Module: Creating Auth-Type = digest Module: Creating Post-Auth-Type = REJECT Module: Checking authenticate {...} for more modules to load Module: Linked to module rlm_pap Module: Instantiating module "pap" from file /usr/local/pf/raddb//modules/pap pap { encryption_scheme = "auto" auto_header = no } Module: Linked to module rlm_chap Module: Instantiating module "chap" from file /usr/local/pf/raddb//modules/chap Module: Linked to module rlm_mschap Module: Instantiating module "mschap" from file /usr/local/pf/raddb//modules/mschap mschap { use_mppe = yes require_encryption = yes require_strong = yes with_ntdomain_hack = yes ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}" allow_retry = yes } Module: Linked to module rlm_digest Module: Instantiating module "digest" from file /usr/local/pf/raddb//modules/digest Module: Linked to module rlm_unix Module: Instantiating module "unix" from file /usr/local/pf/raddb//modules/unix unix { radwtmp = "/usr/local/pf/logs/radwtmp" } Module: Linked to module rlm_eap Module: Instantiating module "eap" from file /usr/local/pf/raddb//eap.conf eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 2048 } Module: Linked to sub-module rlm_eap_md5 Module: Instantiating eap-md5 Module: Linked to sub-module rlm_eap_tls Module: Instantiating eap-tls tls { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/pf/conf/ssl/pfenceha.key" certificate_file = "/usr/local/pf/conf/ssl/pfenceha.crt" dh_file = "/usr/local/pf/raddb//certs/dh" random_file = "/dev/urandom" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" make_cert_command = "/usr/local/pf/raddb//certs/bootstrap" cache { enable = no lifetime = 24 max_entries = 255 } verify { } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } Module: Linked to sub-module rlm_eap_ttls Module: Instantiating eap-ttls ttls { default_eap_type = "md5" copy_request_to_tunnel = yes use_tunneled_reply = yes virtual_server = "packetfence-tunnel" include_length = yes } Module: Linked to sub-module rlm_eap_peap Module: Instantiating eap-peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = yes use_tunneled_reply = yes proxy_tunneled_request_as_eap = yes virtual_server = "packetfence-tunnel" soh = no } Module: Linked to sub-module rlm_eap_mschapv2 Module: Instantiating eap-mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_preprocess Module: Instantiating module "preprocess" from file /usr/local/pf/raddb//modules/preprocess preprocess { huntgroups = "/usr/local/pf/raddb//huntgroups" hints = "/usr/local/pf/raddb//hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } reading pairlist file /usr/local/pf/raddb//huntgroups reading pairlist file /usr/local/pf/raddb//hints Module: Linked to module rlm_realm Module: Instantiating module "suffix" from file /usr/local/pf/raddb//modules/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = yes } Module: Linked to module rlm_files Module: Instantiating module "files" from file /usr/local/pf/raddb//modules/files files { usersfile = "/usr/local/pf/raddb//users" acctusersfile = "/usr/local/pf/raddb//acct_users" preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users" compat = "no" } reading pairlist file /usr/local/pf/raddb//users reading pairlist file /usr/local/pf/raddb//acct_users reading pairlist file /usr/local/pf/raddb//preproxy_users Module: Checking preacct {...} for more modules to load Module: Linked to module rlm_acct_unique Module: Instantiating module "acct_unique" from file /usr/local/pf/raddb//modules/acct_unique acct_unique { key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" } Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_detail Module: Instantiating module "detail" from file /usr/local/pf/raddb//modules/detail detail { detailfile = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } Module: Linked to module rlm_radutmp Module: Instantiating module "radutmp" from file /usr/local/pf/raddb//modules/radutmp radutmp { filename = "/usr/local/pf/logs/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes perm = 384 callerid = yes } Module: Linked to module rlm_attr_filter Module: Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb//modules/attr_filter attr_filter attr_filter.accounting_response { attrsfile = "/usr/local/pf/raddb//attrs.accounting_response" key = "%{User-Name}" relaxed = no } reading pairlist file /usr/local/pf/raddb//attrs.accounting_response Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load Module: Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb//modules/attr_filter attr_filter attr_filter.access_reject { attrsfile = "/usr/local/pf/raddb//attrs.access_reject" key = "%{User-Name}" relaxed = no } reading pairlist file /usr/local/pf/raddb//attrs.access_reject } # modules } # server server packetfence { # from file /usr/local/pf/raddb//sites-enabled/packetfence modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_perl Module: Instantiating module "packetfence" from file /usr/local/pf/raddb//modules/perl perl packetfence { module = "/usr/local/pf/raddb//packetfence.pm" func_authorize = "authorize" func_authenticate = "authenticate" func_accounting = "accounting" func_preacct = "preacct" func_checksimul = "checksimul" func_detach = "detach" func_xlat = "xlat" func_pre_proxy = "pre_proxy" func_post_proxy = "post_proxy" func_post_auth = "post_auth" func_recv_coa = "recv_coa" func_send_coa = "send_coa" } Module: Checking preacct {...} for more modules to load Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_sql Module: Instantiating module "sql" from file /usr/local/pf/raddb//sql.conf sql { driver = "rlm_sql_mysql" server = "localhost" port = "3306" login = "pf" password = "password" radius_db = "pf" read_groups = yes sqltrace = no sqltracefile = "/usr/local/pf/logs/sqltrace.sql" readclients = yes deletestalesessions = yes num_sql_socks = 5 lifetime = 0 max_queries = 0 sql_user_name = "%{User-Name}" default_user_profile = "" nas_query = "SELECT id, nasname, shortname, type, secret FROM radius_nas" authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id" authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id" accounting_onoff_query = " UPDATE radacct SET acctstoptime = '%S', acctsessiontime = unix_timestamp('%S') - unix_timestamp(acctstarttime), acctterminatecause = '%{Acct-Terminate-Cause}', acctstopdelay = %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= '%S'" accounting_update_query = " CALL acct_update ( '%S', '%{Acct-Session-Time}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')" accounting_update_query_alt = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctsessiontime, acctauthentic, connectinfo_start, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, servicetype, framedprotocol, framedipaddress, acctstartdelay, xascendsessionsvrkey) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{X-Ascend-Session-Svr-Key}')" accounting_start_query = " CALL acct_start ( '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', '%S', NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')" accounting_start_query_alt = " UPDATE radacct SET acctstarttime = '%S', acctstartdelay = '%{%{Acct-Delay-Time}:-0}', connectinfo_start = '%{Connect-Info}' WHERE acctsessionid = '%{Acct-Session-Id}' AND username = '%{SQL-User-Name}' AND nasipaddress = '%{NAS-IP-Address}'" accounting_stop_query = " CALL acct_stop ( '%S', '%{Acct-Session-Time}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}', '%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')" accounting_stop_query_alt = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '%{Acct-Terminate-Cause}', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')" group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority" connect_failure_retry_delay = 60 simul_count_query = "" simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL" postauth_query = "INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S')" safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf rlm_sql (sql): starting 0 rlm_sql (sql): Attempting to connect rlm_sql_mysql #0 rlm_sql_mysql: Starting connect to MySQL server for #0 rlm_sql (sql): Connected new DB handle, #0 rlm_sql (sql): starting 1 rlm_sql (sql): Attempting to connect rlm_sql_mysql #1 rlm_sql_mysql: Starting connect to MySQL server for #1 rlm_sql (sql): Connected new DB handle, #1 rlm_sql (sql): starting 2 rlm_sql (sql): Attempting to connect rlm_sql_mysql #2 rlm_sql_mysql: Starting connect to MySQL server for #2 rlm_sql (sql): Connected new DB handle, #2 rlm_sql (sql): starting 3 rlm_sql (sql): Attempting to connect rlm_sql_mysql #3 rlm_sql_mysql: Starting connect to MySQL server for #3 rlm_sql (sql): Connected new DB handle, #3 rlm_sql (sql): starting 4 rlm_sql (sql): Attempting to connect rlm_sql_mysql #4 rlm_sql_mysql: Starting connect to MySQL server for #4 rlm_sql (sql): Connected new DB handle, #4 rlm_sql (sql): Processing generate_sql_clients rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname, shortname, type, secret FROM radius_nas rlm_sql (sql): Reserving sql socket id: 4 rlm_sql (sql): Read entry nasname=192.168.142.13,shortname=192.168.142.13,secret=sjSLzXgtwSrCk7IIU9+Jv21Z rlm_sql (sql): Adding client 192.168.142.13 (192.168.142.13, server=<none>) to clients list rlm_sql (sql): Released sql socket id: 4 Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server server packetfence-tunnel { # from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Instantiating module "ntdomain" from file /usr/local/pf/raddb//modules/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = yes } Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server server soh-server { # from file /usr/local/pf/raddb//sites-enabled/packetfence-soh modules { Module: Checking authorize {...} for more modules to load Module: Instantiating module "packetfence-soh" from file /usr/local/pf/raddb//modules/perl perl packetfence-soh { module = "/usr/local/pf/raddb//packetfence-soh.pm" func_authorize = "authorize" func_authenticate = "authenticate" func_accounting = "accounting" func_preacct = "preacct" func_checksimul = "checksimul" func_detach = "detach" func_xlat = "xlat" func_pre_proxy = "pre_proxy" func_post_proxy = "post_proxy" func_post_auth = "post_auth" func_recv_coa = "recv_coa" func_send_coa = "send_coa" } } # modules } # server server inner-tunnel { # from file /usr/local/pf/raddb//sites-enabled/inner-tunnel modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" virtual_server = "packetfence" ipaddr = 192.168.101.103 port = 0 } listen { type = "acct" virtual_server = "packetfence" ipaddr = 192.168.101.103 port = 0 } listen { type = "control" listen { socket = "/usr/local/pf/var/run/radiusd.sock" mode = "rw" } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } ... adding new socket proxy address * port 40175 ... adding new socket proxy address * port 42196 ... adding new socket proxy address * port 33345 Listening on authentication address 192.168.101.103 port 1812 as server packetfence Listening on accounting address 192.168.101.103 port 1813 as server packetfence Listening on command file /usr/local/pf/var/run/radiusd.sock Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel Listening on proxy address 192.168.101.103 port 1814 Ready to process requests. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=157, length=265 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x0202001d01736d313838313840636172646966666d65742e61632e756b Message-Authenticator = 0x15fbf7562218eb58192ab7b1c87fda2e server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 2 length 29 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 rlm_perl: Added pair Service-Type = Framed-User rlm_perl: Added pair Tunnel-Type = VLAN rlm_perl: Added pair Called-Station-Id = 34-a8-4e-1e-44-a0:eduroam_temp rlm_perl: Added pair Message-Authenticator = 0x15fbf7562218eb58192ab7b1c87fda2e rlm_perl: Added pair Airespace-Wlan-Id = 13 rlm_perl: Added pair Realm = cardiffmet.ac.uk rlm_perl: Added pair EAP-Type = Identity rlm_perl: Added pair NAS-IP-Address = 192.168.142.13 rlm_perl: Added pair Tunnel-Private-Group-Id = 145 rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 rlm_perl: Added pair Calling-Station-Id = 00-26-b6-da-18-42 rlm_perl: Added pair Cisco-AVPair = audit-session-id=c0a88e0d001887d75374c0c7 rlm_perl: Added pair User-Name = sta...@ca... rlm_perl: Added pair NAS-Identifier = llWAC5505 rlm_perl: Added pair EAP-Message = 0x0202001d01736d313838313840636172646966666d65742e61632e756b rlm_perl: Added pair Stripped-User-Name = staffuser rlm_perl: Added pair NAS-Port = 13 rlm_perl: Added pair Framed-MTU = 1300 rlm_perl: Added pair Auth-Type = EAP ++[packetfence] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] EAP Identity [eap] processing type tls [tls] Initiate [tls] Start returned 1 ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 157 to 192.168.142.13 port 32769 EAP-Message = 0x010300061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b35421389f981db398ac5a9ac Finished request 0. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=158, length=359 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x0203006919800000005f160301005a0100005603015374c0ccc84e170a71b6d23ec8cc61ef05c554c610313521742587eddcaf826e000018002f00350005000ac013c014c009c00a003200380013000401000015ff01000100000a0006000400170018000b00020100 State = 0x35410a5b35421389f981db398ac5a9ac Message-Authenticator = 0x7a5ab2d2ae569416635b55ae08d408df server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 3 length 105 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS TLS Length 95 [peap] Length Included [peap] eaptls_verify returned 11 [peap] (other): before/accept initialization [peap] TLS_accept: before/accept initialization [peap] <<< TLS 1.0 Handshake [length 005a], ClientHello [peap] TLS_accept: SSLv3 read client hello A [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello [peap] TLS_accept: SSLv3 write server hello A [peap] >>> TLS 1.0 Handshake [length 03e5], Certificate [peap] TLS_accept: SSLv3 write certificate A [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone [peap] TLS_accept: SSLv3 write server done A [peap] TLS_accept: SSLv3 flush data [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 158 to 192.168.142.13 port 32769 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0xf8d68248ba65d6ac676b69e1047110415b7d22fd23f62fdbaaa64405ddbff32ad05c9a79267ae175db47c95efde845683f7867dbc0df05fd09804e879eb247eeeb41695fc0bd9ca3fc278a87ea5991f8e9163a39c35d0a7c5f96cb4de835d7b7cdc9c8ff8d90847172c3259deeb5768fb6c0b4fab1d4f94deed30f7a1fd4dfd1df611fab97b506aaab20e976992c43329634d186937072df7afacd97e80f7bcb0ffb64723410f6ffd095c46cb9ffe82a631bd7dcfa4b741af6667e1e37e5887665b03f40038de4f24353841b63322d5434ce1bb60a526f55cc1497352f80ee977ee71ae6d38287ee18c49c4f17daf991bfe45c5582bbfab6f980fe655d EAP-Message = 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 EAP-Message = 0x40189ba306a20942456a92a1 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b34451389f981db398ac5a9ac Finished request 1. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=159, length=260 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x020400061900 State = 0x35410a5b34451389f981db398ac5a9ac Message-Authenticator = 0xa0c84bb74d9307f1ed2bb53216cf2a63 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 4 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake fragment handler [peap] eaptls_verify returned 1 [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 159 to 192.168.142.13 port 32769 EAP-Message = 0x0105003919006353d13b4c631c4a59a10df4be1d5b37d38041893a4b534ebf8aea5c1c3d75ba182c5bcdd75991b41dc216030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b37441389f981db398ac5a9ac Finished request 2. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=160, length=592 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 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 EAP-Message = 0x472d69e3e29f91ff33620fcd71958fc057a75e759eeb24321403010001011603010030c54c0ef132a8d93ed7434449a85b6a27eef115eba303d21848413f75142e35baad5edfa273bf2eb17a9a048b06198273 State = 0x35410a5b37441389f981db398ac5a9ac Message-Authenticator = 0x30abf2c4ea95e6939c48d1e4e4b62a6b server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 5 length 253 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS TLS Length 326 [peap] Length Included [peap] eaptls_verify returned 11 [peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange [peap] TLS_accept: SSLv3 read client key exchange A [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] [peap] <<< TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 read finished A [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] [peap] TLS_accept: SSLv3 write change cipher spec A [peap] >>> TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 write finished A [peap] TLS_accept: SSLv3 flush data [peap] (other): SSL negotiation finished successfully SSL Connection Established [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 160 to 192.168.142.13 port 32769 EAP-Message = 0x01060041190014030100010116030100308ef59472d9c4365f8fb909fded980423be3556177a543a50613380c9f70667dc3a785b1cfd1e0cdfa811d787e407172a Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b36471389f981db398ac5a9ac Finished request 3. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=161, length=260 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x020600061900 State = 0x35410a5b36471389f981db398ac5a9ac Message-Authenticator = 0xe01cb9cb2ea9a62f033c186ea0e8bf22 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 6 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake is finished [peap] eaptls_verify returned 3 [peap] eaptls_process returned 3 [peap] EAPTLS_SUCCESS [peap] Session established. Decoding tunneled attributes. [peap] Peap state TUNNEL ESTABLISHED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 161 to 192.168.142.13 port 32769 EAP-Message = 0x0107002b190017030100204486edc4a7f9b434d30ba3dea13a46f221c8875906ff387fc1936a513429f956 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b31461389f981db398ac5a9ac Finished request 4. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=162, length=313 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x0207003b19001703010030dcfd89053aa133831680cbb4ed7d7f876cc19d8560bebe0c8dbe803e0790199af180b1b062198928a0f18c3c3c826495 State = 0x35410a5b31461389f981db398ac5a9ac Message-Authenticator = 0xec16fceaf75a8970b1cc00b576a3887a server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 7 length 59 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state WAITING FOR INNER IDENTITY [peap] Identity - sta...@ca... [peap] Got inner identity 'sta...@ca...' [peap] Setting default EAP type for tunneled EAP session. [peap] Got tunneled request EAP-Message = 0x0207001d01736d313838313840636172646966666d65742e61632e756b server packetfence { [peap] Setting User-Name to sta...@ca... Sending tunneled request EAP-Message = 0x0207001d01736d313838313840636172646966666d65742e61632e756b FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok [ntdomain] Request already proxied. Ignoring. ++[ntdomain] returns ok [eap] EAP packet type response id 7 length 29 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authenticate {...} [eap] EAP Identity [eap] processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge ++[eap] returns handled } # server packetfence-tunnel [peap] Got tunneled reply code 11 EAP-Message = 0x010800321a0108002d105e3d05908509c1791a1ddf2cfd742d67736d313838313840636172646966666d65742e61632e756b Message-Authenticator = 0x00000000000000000000000000000000 State = 0xbfc33029bfcb2a7d5b944f66cdaf204f [peap] Got tunneled reply RADIUS code 11 EAP-Message = 0x010800321a0108002d105e3d05908509c1791a1ddf2cfd742d67736d313838313840636172646966666d65742e61632e756b Message-Authenticator = 0x00000000000000000000000000000000 State = 0xbfc33029bfcb2a7d5b944f66cdaf204f [peap] Got tunneled Access-Challenge ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 162 to 192.168.142.13 port 32769 EAP-Message = 0x0108005b1900170301005007b424644ed7cf1c828f3f92eea6c0cb99433da8c0b18402fbb145027741508d0f5529d35e2bd2c11458445dd7c68dd30a2aead766c25940397be6fd81775077e39e566727b849a8817341ee96fa2ce4 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b30491389f981db398ac5a9ac Finished request 5. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=163, length=377 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x0208007b19001703010070a683cb8784c76407d275036575d0ef04ea333bd473defc03113c127965b4e0a867e4d8ce41f7fcd4a7713913ea4775f10777e8f21a25628dcbb5eae97572f385b73829fdcd5025d8a9b42637110edc0124eb0197b4ae7a412a9578a9d09610a70fa0b508055e179ae64ebef02f80f328 State = 0x35410a5b30491389f981db398ac5a9ac Message-Authenticator = 0x73b16a80fd2817051b7556cc63352d5e server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 8 length 123 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state phase2 [peap] EAP type mschapv2 [peap] Got tunneled request EAP-Message = 0x020800531a0208004e311c32182ad64a6d8cabbe825e80ca2a24000000000000000002a9c996178a355e1a87ed6b2d883fb804c5aa559f1af3aa00736d313838313840636172646966666d65742e61632e756b server packetfence { [peap] Setting User-Name to sta...@ca... Sending tunneled request EAP-Message = 0x020800531a0208004e311c32182ad64a6d8cabbe825e80ca2a24000000000000000002a9c996178a355e1a87ed6b2d883fb804c5aa559f1af3aa00736d313838313840636172646966666d65742e61632e756b FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "sta...@ca..." State = 0xbfc33029bfcb2a7d5b944f66cdaf204f Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok [ntdomain] Request already proxied. Ignoring. ++[ntdomain] returns ok [eap] EAP packet type response id 8 length 83 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/mschapv2 [eap] processing type mschapv2 [mschapv2] # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel [mschapv2] +- entering group MS-CHAP {...} [mschap] Creating challenge hash with username: sta...@ca... [mschap] Client is using MS-CHAPv2 for sta...@ca..., we need NT-Password [mschap] expand: %{Stripped-User-Name} -> staffuser [mschap] expand: --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}} -> --username=staffuser [mschap] Creating challenge hash with username: sta...@ca... [mschap] expand: --challenge=%{mschap:Challenge:-00} -> --challenge=73012fb8f82e8064 [mschap] expand: --nt-response=%{mschap:NT-Response:-00} -> --nt-response=02a9c996178a355e1a87ed6b2d883fb804c5aa559f1af3aa Exec-Program output: NT_KEY: 4E824924DC59E6FE2CAD89A10B0657E2 Exec-Program-Wait: plaintext: NT_KEY: 4E824924DC59E6FE2CAD89A10B0657E2 Exec-Program: returned: 0 [mschap] adding MS-CHAPv2 MPPE keys ++[mschap] returns ok MSCHAP Success ++[eap] returns handled } # server packetfence-tunnel [peap] Got tunneled reply code 11 EAP-Message = 0x010900331a0308002e533d37443344373141323832314135354638323736464646384337353044394146324345353533333846 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xbfc33029beca2a7d5b944f66cdaf204f [peap] Got tunneled reply RADIUS code 11 EAP-Message = 0x010900331a0308002e533d37443344373141323832314135354638323736464646384337353044394146324345353533333846 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xbfc33029beca2a7d5b944f66cdaf204f [peap] Got tunneled Access-Challenge ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 163 to 192.168.142.13 port 32769 EAP-Message = 0x0109005b190017030100504886873f8bb52f885a38f6705b5a5dc0e000c2ca4b68c5a6da7b7f3d30da5be72f3249474626c390c74181fc462926dc080573be513b95734573a8c4aa26d981114d02384f1d1d5520016851bf3b185a Message-Authenticator = 0x00000000000000000000000000000000 State = 0x35410a5b33481389f981db398ac5a9ac Finished request 6. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.142.13 port 32769, id=164, length=297 User-Name = "sta...@ca..." Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" EAP-Message = 0x0209002b19001703010020f8c58ece1a54f95220201cc5be4f33aa5a6f62aeb042374e16032de9d7b66756 State = 0x35410a5b33481389f981db398ac5a9ac Message-Authenticator = 0x4721c34fdd2a444781e465018aef7f17 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "sta...@ca..." [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 9 length 43 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state phase2 [peap] EAP type mschapv2 [peap] Got tunneled request EAP-Message = 0x020900061a03 server packetfence { [peap] Setting User-Name to sta...@ca... Sending tunneled request EAP-Message = 0x020900061a03 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "sta...@ca..." State = 0xbfc33029beca2a7d5b944f66cdaf204f Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_temp" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d001887d75374c0c7" NAS-IP-Address = 192.168.142.13 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 13 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "145" server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [... [truncated message content] |