dir-300 и freeradius. Как подружить

Настройка сетевых служб, маршрутизации, фаерволлов. Проблемы с сетевым оборудованием.
Правила форума
Убедительная просьба юзать теги [code] при оформлении листингов.
Сообщения не оформленные должным образом имеют все шансы быть незамеченными.
Ытя
проходил мимо

dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-13 18:44:21

Привет всем. Хочу попробовать подружить dir300 (длинковый) и freeradius. Подскажите как это сделать. Порт я заставил слушать, авторизация нфчинается, но отваливается. Для pptp все нормально работает. Может кто таким занимался и знает что там нужно?

Хостинговая компания Host-Food.ru
Хостинг HostFood.ru
 

Услуги хостинговой компании Host-Food.ru

Хостинг HostFood.ru

Тарифы на хостинг в России, от 12 рублей: https://www.host-food.ru/tariffs/hosting/
Тарифы на виртуальные сервера (VPS/VDS/KVM) в РФ, от 189 руб.: https://www.host-food.ru/tariffs/virtualny-server-vps/
Выделенные сервера, Россия, Москва, от 2000 рублей (HP Proliant G5, Intel Xeon E5430 (2.66GHz, Quad-Core, 12Mb), 8Gb RAM, 2x300Gb SAS HDD, P400i, 512Mb, BBU):
https://www.host-food.ru/tariffs/vydelennyi-server-ds/
Недорогие домены в популярных зонах: https://www.host-food.ru/domains/

Аватара пользователя
vadim64
майор
Сообщения: 2101
Зарегистрирован: 2009-09-17 15:15:26
Откуда: Засратовец

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение vadim64 » 2011-04-13 19:48:34

tcpdump в руки
Люди не делятся на национальности, партии, фракции и религии. Люди делятся на умных и дураков, а вот дураки делятся на национальности, партии, фракции и религии.

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 14:14:42

Код: Выделить всё

g# tcpdump -vvv -X -s 1500 -n -i em0 host 10.10.10.95
tcpdump: listening on em0, link-type EN10MB (Ethernet), capture size 1500 bytes
17:08:14.583272 IP (tos 0x0, ttl 64, id 39431, offset 0, flags [DF], proto UDP (17), length 168) 10.10.10.95.3073 > 10.10.10.98.1812: [udp sum ok] RADIUS, length: 140
        Access Request (1), id: 0x4a, Authenticator: aaab2c174103ba62005cfbec2b84194d
          Username Attribute (1), length: 6, Value: abcd
            0x0000:  6162 6364
          NAS Port Attribute (5), length: 6, Value: 0
            0x0000:  0000 0000
          Called Station Attribute (30), length: 24, Value: F0-7D-68-8A-93-22:test
            0x0000:  4630 2d37 442d 3638 2d38 412d 3933 2d32
            0x0010:  323a 7465 7374
          Calling Station Attribute (31), length: 19, Value: 00-1F-C6-ED-69-0A
            0x0000:  3030 2d31 462d 4336 2d45 442d 3639 2d30
            0x0010:  41
          Framed MTU Attribute (12), length: 6, Value: 1400
            0x0000:  0000 0578
          NAS Port Type Attribute (61), length: 6, Value: Wireless - IEEE 802.11
            0x0000:  0000 0013
          Connect Info Attribute (77), length: 24, Value: CONNECT 11Mbps 802.11b
            0x0000:  434f 4e4e 4543 5420 3131 4d62 7073 2038
            0x0010:  3032 2e31 3162
          EAP Message Attribute (79), length: 11, Value: ..
            0x0000:  0201 0009 0161 6263 64
          Message Authentication Attribute (80), length: 18, Value: H..y..9R...-?.
            0x0000:  481c d47f bf79 d0f1 3952 0e9e cb2d 3fb1
        0x0000:  4500 00a8 9a07 4000 4011 7769 0a0a 0a5f  E.....@.@.wi..._
        0x0010:  0a0a 0a62 0c01 0714 0094 ed10 014a 008c  ...b.........J..
        0x0020:  aaab 2c17 4103 ba62 005c fbec 2b84 194d  ..,.A..b.\..+..M
        0x0030:  0106 6162 6364 0506 0000 0000 1e18 4630  ..abcd........F0
        0x0040:  2d37 442d 3638 2d38 412d 3933 2d32 323a  -7D-68-8A-93-22:
        0x0050:  7465 7374 1f13 3030 2d31 462d 4336 2d45  test..00-1F-C6-E
        0x0060:  442d 3639 2d30 410c 0600 0005 783d 0600  D-69-0A.....x=..
        0x0070:  0000 134d 1843 4f4e 4e45 4354 2031 314d  ...M.CONNECT.11M
        0x0080:  6270 7320 3830 322e 3131 624f 0b02 0100  bps.802.11bO....
        0x0090:  0901 6162 6364 5012 481c d47f bf79 d0f1  ..abcdP.H....y..
        0x00a0:  3952 0e9e cb2d 3fb1                      9R...-?.
вот такая ботва.
логин abcd
пароль 123456

при авторизации пишет:
Thu Apr 14 17:08:21 2011 : Auth: Login incorrect: [abcd/<no User-Password attribute>] (from client test port 0 cli 00-1F-C6-ED-69-0A)

Куда смотреть?

Может для dir300 надо уникальный словарь?

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-14 14:19:59

а что если вбить в гугле два слова
dir300 freeradius
и все перечитать?

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 15:22:46

Гость писал(а):а что если вбить в гугле два слова
dir300 freeradius
и все перечитать?
Я бы не поднимал тему, если не перечитал половину этого ранее.
Если есть конкретно ссылка, то поделитесь.


Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 19:04:45

А конкретно на решение проблемы направить можете? Гуглом я сам пользоваться могу, вот только решения нет, почему пароль не отрабатывается.
Из всего предложенного вами только на каком-то бразильском сайте встречается то, что нужно, но и то что такое есть.

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-14 19:34:34

а мозг свой вы когда простите задействуете? после какого поста в этой теме, сообщите мне пожалуста
тогда я в него зайду еще раз
а пока что берете свой мозг+дебаг фрирадиуса=включаете их оба
при авторизации пишет:
Thu Apr 14 17:08:21 2011 : Auth: Login incorrect: [abcd/<no User-Password attribute>] (from client test port 0 cli 00-1F-C6-ED-69-0A)
это можно сравнить с такой проблемой
приходит пациент к доктору, и говорит - доктор мне плохо,
доктор - как плохо? что у вас болит? где болит? что ели? что пили? итд
пациент в ответ - доктор мне плохо

помоему клиника ясна, пациента можно в психушку отправлять, он не адекват

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 20:17:01

Гость писал(а):а мозг свой вы когда простите задействуете? после какого поста в этой теме, сообщите мне пожалуста
тогда я в него зайду еще раз
а пока что берете свой мозг+дебаг фрирадиуса=включаете их оба
при авторизации пишет:
Thu Apr 14 17:08:21 2011 : Auth: Login incorrect: [abcd/<no User-Password attribute>] (from client test port 0 cli 00-1F-C6-ED-69-0A)
это можно сравнить с такой проблемой
приходит пациент к доктору, и говорит - доктор мне плохо,
доктор - как плохо? что у вас болит? где болит? что ели? что пили? итд
пациент в ответ - доктор мне плохо

помоему клиника ясна, пациента можно в психушку отправлять, он не адекват
В дэбаге фрирадиуса тоже самое. Все хорошо, все запросы есть, все данные приходят, но результата нет.

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-14 20:21:13

анекдот просто в тему
- Алло, это кто?
- Наташа.
- Какая Наташа? Я штук семь знаю.
- Как это какая? Мы же переспали, у нас вроде отношения даже.
- Знаешь, ты вот сейчас нихрена не уточнила…

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 21:12:30

Вы бы вместо того, чтобы балогурить - дельно помогли. А то похожи на еврейчика, который "Я все знаю, но я ничего вам не скажу"

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-14 21:39:36

а в этой проблеме нет таких вариантов как: когда все знаю и не скажу
здесь нужно разбиратся
я вам уже и так и этак
но вы уперлись как баран в ворота, и талдычите
у меня все правильно, но ничего неработает, что мне делать дальше
значит вывод?, - у вас нихрена не правильно
и если на dir300 особо настроек нет итд
то все упирается в настройку радиуса
и как его настраивать как раз в гугле по ссылке выше я вам показал
а вы все игнорите
и опять начинаете
у меня все правильно, но ничего неработает, что мне делать дальше
ну повторяйте дальше, как мантру))..вдруг поможется

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 21:45:15

Даже цитировать не можете ))
Ну нет там ничего по той ссылке. Косяк исключительно в настройке радиуса, т.к. установив freeradius2 и прописав в users принудительно логин и пароль смог авторизоваться.Прописал в БД, но найти не могу где запрос к самой БД mysql. Как она выбирает данные - не ясно.

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-14 22:01:32

я цитировал не дословно, а по смыслу

ну так я ж сказал, включаем дебаг фрирадиусааааааа
там в командной строке какие то параметры не помню
чем их больше тем дебаг выше
и все становится понятно

я вам анекдотом так и сказал
- Знаешь, ты вот сейчас нихрена не уточнила…
как мне еще намекать то? если вы ниразу меня не понимаете

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 22:04:29

radiusd -sfxxyz -l stdout
только это в голову приходит.
Есть еще
freeradius -X ну эт для пингвинов.

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-14 22:12:24

radiusd -d /usr/local/etc/raddb -l stdout -fsxx
так точнее

Лог запуска:

Код: Выделить всё

g# radiusd -d /usr/local/etc/raddb -l stdout -fsxx
FreeRADIUS Version 2.1.10, for host i386-portbld-freebsd7.3, built on Apr 14 2011 at 23:20:08
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /usr/local/etc/raddb/radiusd.conf
including configuration file /usr/local/etc/raddb/proxy.conf
including configuration file /usr/local/etc/raddb/clients.conf
including files in directory /usr/local/etc/raddb/modules/
including configuration file /usr/local/etc/raddb/modules/wimax
including configuration file /usr/local/etc/raddb/modules/always
including configuration file /usr/local/etc/raddb/modules/attr_filter
including configuration file /usr/local/etc/raddb/modules/attr_rewrite
including configuration file /usr/local/etc/raddb/modules/chap
including configuration file /usr/local/etc/raddb/modules/checkval
including configuration file /usr/local/etc/raddb/modules/counter
including configuration file /usr/local/etc/raddb/modules/cui
including configuration file /usr/local/etc/raddb/modules/detail
including configuration file /usr/local/etc/raddb/modules/detail.example.com
including configuration file /usr/local/etc/raddb/modules/detail.log
including configuration file /usr/local/etc/raddb/modules/digest
including configuration file /usr/local/etc/raddb/modules/dynamic_clients
including configuration file /usr/local/etc/raddb/modules/echo
including configuration file /usr/local/etc/raddb/modules/etc_group
including configuration file /usr/local/etc/raddb/modules/exec
including configuration file /usr/local/etc/raddb/modules/expiration
including configuration file /usr/local/etc/raddb/modules/expr
including configuration file /usr/local/etc/raddb/modules/files
including configuration file /usr/local/etc/raddb/modules/inner-eap
including configuration file /usr/local/etc/raddb/modules/ippool
including configuration file /usr/local/etc/raddb/modules/krb5
including configuration file /usr/local/etc/raddb/modules/ldap
including configuration file /usr/local/etc/raddb/modules/linelog
including configuration file /usr/local/etc/raddb/modules/logintime
including configuration file /usr/local/etc/raddb/modules/mac2ip
including configuration file /usr/local/etc/raddb/modules/mschap
including configuration file /usr/local/etc/raddb/modules/mac2vlan
including configuration file /usr/local/etc/raddb/modules/ntlm_auth
including configuration file /usr/local/etc/raddb/modules/opendirectory
including configuration file /usr/local/etc/raddb/modules/otp
including configuration file /usr/local/etc/raddb/modules/pam
including configuration file /usr/local/etc/raddb/modules/pap
including configuration file /usr/local/etc/raddb/modules/passwd
including configuration file /usr/local/etc/raddb/modules/perl
including configuration file /usr/local/etc/raddb/modules/policy
including configuration file /usr/local/etc/raddb/modules/preprocess
including configuration file /usr/local/etc/raddb/modules/radutmp
including configuration file /usr/local/etc/raddb/modules/realm
including configuration file /usr/local/etc/raddb/modules/smbpasswd
including configuration file /usr/local/etc/raddb/modules/smsotp
including configuration file /usr/local/etc/raddb/modules/sql_log
including configuration file /usr/local/etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /usr/local/etc/raddb/modules/sradutmp
including configuration file /usr/local/etc/raddb/modules/unix
including configuration file /usr/local/etc/raddb/modules/acct_unique
including configuration file /usr/local/etc/raddb/eap.conf
including configuration file /usr/local/etc/raddb/policy.conf
including files in directory /usr/local/etc/raddb/sites-enabled/
including configuration file /usr/local/etc/raddb/sites-enabled/default
including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel
including configuration file /usr/local/etc/raddb/sites-enabled/control-socket
main {
        user = "freeradius"
        group = "freeradius"
        allow_core_dumps = no
}
including dictionary file /usr/local/etc/raddb/dictionary
main {
        prefix = "/usr/local"
        localstatedir = "/var"
        logdir = "/var/log"
        libdir = "/usr/local/lib/freeradius-2.1.10"
        radacctdir = "/var/log/radacct"
        hostname_lookups = no
        max_request_time = 30
        cleanup_delay = 5
        max_requests = 1024
        pidfile = "/var/run/radiusd/radiusd.pid"
        checkrad = "/usr/local/sbin/checkrad"
        debug_level = 0
        proxy_requests = yes
 log {
        stripped_names = yes
        auth = yes
        auth_badpass = yes
        auth_goodpass = yes
 }
 security {
        max_attributes = 200
        reject_delay = 1
        status_server = yes
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
        retry_delay = 5
        retry_count = 3
        default_fallback = no
        dead_time = 120
        wake_all_if_all_dead = no
 }
 home_server localhost {
        ipaddr = 127.0.0.1
        port = 1812
        type = "auth"
        secret = "testing123"
        response_window = 20
        max_outstanding = 65536
        require_message_authenticator = yes
        zombie_period = 40
        status_check = "status-server"
        ping_interval = 30
        check_interval = 30
        num_answers_to_alive = 3
        num_pings_to_alive = 3
        revive_interval = 120
        status_check_timeout = 4
        irt = 2
        mrt = 16
        mrc = 5
        mrd = 30
 }
 home_server_pool my_auth_failover {
        type = fail-over
        home_server = localhost
 }
 realm example.com {
        auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
radiusd: #### Loading Clients ####
 client localhost {
        ipaddr = 127.0.0.1
        require_message_authenticator = no
        secret = "testing123"
        nastype = "other"
 }
 client 10.10.10.95 {
        require_message_authenticator = no
        secret = "testwifi"
        shortname = "test"
        nastype = "other"
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating module "exec" from file /usr/local/etc/raddb/modules/exec
  exec {
        wait = no
        input_pairs = "request"
        shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating module "expr" from file /usr/local/etc/raddb/modules/expr
 Module: Linked to module rlm_expiration
 Module: Instantiating module "expiration" from file /usr/local/etc/raddb/modules/expiration
  expiration {
        reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating module "logintime" from file /usr/local/etc/raddb/modules/logintime
  logintime {
        reply-message = "You are calling outside your allowed timespan  "
        minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel { # from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating module "pap" from file /usr/local/etc/raddb/modules/pap
  pap {
        encryption_scheme = "auto"
        auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating module "chap" from file /usr/local/etc/raddb/modules/chap
 Module: Linked to module rlm_mschap
 Module: Instantiating module "mschap" from file /usr/local/etc/raddb/modules/mschap
  mschap {
        use_mppe = yes
        require_encryption = no
        require_strong = no
        with_ntdomain_hack = no
  }
 Module: Linked to module rlm_unix
 Module: Instantiating module "unix" from file /usr/local/etc/raddb/modules/unix
  unix {
        radwtmp = "/var/log/radwtmp"
  }
 Module: Linked to module rlm_eap
 Module: Instantiating module "eap" from file /usr/local/etc/raddb/eap.conf
  eap {
        default_eap_type = "md5"
        timer_expire = 60
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = no
        max_sessions = 4096
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_leap
 Module: Instantiating eap-leap
 Module: Linked to sub-module rlm_eap_gtc
 Module: Instantiating eap-gtc
   gtc {
        challenge = "Password: "
        auth_type = "PAP"
   }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
        rsa_key_exchange = no
        dh_key_exchange = yes
        rsa_key_length = 512
        dh_key_length = 512
        verify_depth = 0
        CA_path = "/usr/local/etc/raddb/certs"
        pem_file_type = yes
        private_key_file = "/usr/local/etc/raddb/certs/server.pem"
        certificate_file = "/usr/local/etc/raddb/certs/server.pem"
        CA_file = "/usr/local/etc/raddb/certs/ca.pem"
        private_key_password = "whatever"
        dh_file = "/usr/local/etc/raddb/certs/dh"
        random_file = "/usr/local/etc/raddb/certs/random"
        fragment_size = 1024
        include_length = yes
        check_crl = no
        cipher_list = "DEFAULT"
        make_cert_command = "/usr/local/etc/raddb/certs/bootstrap"
    cache {
        enable = no
        lifetime = 24
        max_entries = 255
    }
    verify {
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
        default_eap_type = "md5"
        copy_request_to_tunnel = no
        use_tunneled_reply = no
        virtual_server = "inner-tunnel"
        include_length = yes
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
        default_eap_type = "mschapv2"
        copy_request_to_tunnel = no
        use_tunneled_reply = no
        proxy_tunneled_request_as_eap = yes
        virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
        with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_realm
 Module: Instantiating module "suffix" from file /usr/local/etc/raddb/modules/realm
  realm suffix {
        format = "suffix"
        delimiter = "@"
        ignore_default = no
        ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating module "files" from file /usr/local/etc/raddb/modules/files
  files {
        usersfile = "/usr/local/etc/raddb/users"
        acctusersfile = "/usr/local/etc/raddb/acct_users"
        preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
        compat = "no"
  }
 Module: Checking session {...} for more modules to load
 Module: Linked to module rlm_radutmp
 Module: Instantiating module "radutmp" from file /usr/local/etc/raddb/modules/radutmp
  radutmp {
        filename = "/var/log/radutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        perm = 384
        callerid = yes
  }
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Linked to module rlm_attr_filter
 Module: Instantiating module "attr_filter.access_reject" from file /usr/local/etc/raddb/modules/attr_filter
  attr_filter attr_filter.access_reject {
        attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
        key = "%{User-Name}"
  }
 } # modules
} # server
server { # from file /usr/local/etc/raddb/radiusd.conf
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_digest
 Module: Instantiating module "digest" from file /usr/local/etc/raddb/modules/digest
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating module "preprocess" from file /usr/local/etc/raddb/modules/preprocess
  preprocess {
        huntgroups = "/usr/local/etc/raddb/huntgroups"
        hints = "/usr/local/etc/raddb/hints"
        with_ascend_hack = no
        ascend_channels_per_line = 23
        with_ntdomain_hack = no
        with_specialix_jetstream_hack = no
        with_cisco_vsa_hack = no
        with_alvarion_vsa_hack = no
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating module "acct_unique" from file /usr/local/etc/raddb/modules/acct_unique
  acct_unique {
        key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating module "detail" from file /usr/local/etc/raddb/modules/detail
  detail {
        detailfile = "/var/log/radacct/%{Client-IP-Address}/detail-%Y%m%d"
        header = "%t"
        detailperm = 384
        dirperm = 493
        locking = no
        log_packet_header = no
  }
 Module: Instantiating module "attr_filter.accounting_response" from file /usr/local/etc/raddb/modules/attr_filter
  attr_filter attr_filter.accounting_response {
        attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
        key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
        type = "auth"
        ipaddr = *
        port = 0
}
listen {
        type = "acct"
        ipaddr = *
        port = 0
}
listen {
        type = "control"
 listen {
        socket = "/var/run/radiusd/radiusd.sock"
 }
}
listen {
        type = "auth"
        ipaddr = 127.0.0.1
        port = 18120
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on command file /var/run/radiusd/radiusd.sock
Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel
Listening on proxy address * port 1814
Ready to process requests.
Лог подключения.

Код: Выделить всё

rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=63, length=140
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020100090161626364
        Message-Authenticator = 0x810fec62704b106cf53729b39753b76a
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type md5
rlm_eap_md5: Issuing Challenge
++[eap] returns handled
Sending Access-Challenge of id 63 to 10.10.10.95 port 3073
        EAP-Message = 0x0102001604104a8ac6975767275511718fa9f482f59d
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912f990bdfaac74b08ee56b439e
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=64, length=155
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020200060319
        State = 0xf992b912f990bdfaac74b08ee56b439e
        Message-Authenticator = 0xa3e2a7a4b985e86d553ac1e6c9ff9d48
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 64 to 10.10.10.95 port 3073
        EAP-Message = 0x010300061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912f891a0faac74b08ee56b439e
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=65, length=262
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0203007119800000006716030100620100005e03014da746691461c640a4a3cec23fb2372587b87e6f7709a294778b1689122e5c79000018002f00350005000ac013c014c009c00a00320038001300040100001d00000009000700000461626364000a0006000400170018000b00020100
        State = 0xf992b912f891a0faac74b08ee56b439e
        Message-Authenticator = 0xf826350777bc6720bf933bc83b88702c
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 113
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 103
[peap] Length Included
[peap] eaptls_verify returned 11
[peap]     (other): before/accept initialization
[peap]     TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0062], ClientHello
[peap]     TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap]     TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 085e], Certificate
[peap]     TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap]     TLS_accept: SSLv3 write server done A
[peap]     TLS_accept: SSLv3 flush data
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 65 to 10.10.10.95 port 3073
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 0xa73082038fa0030201020209
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912fb96a0faac74b08ee56b439e
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=66, length=155
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020400061900
        State = 0xf992b912fb96a0faac74b08ee56b439e
        Message-Authenticator = 0x4278bf0d787858bc545f0869d0bfb4f0
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 66 to 10.10.10.95 port 3073
        EAP-Message = 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
        EAP-Message = 0x071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100da4a85e887d5c2af0de9c6e9566bdba3214a742f7c8eab135a2a8c9f5739e2240e1e3209d470a3b33c3f3149ac0011b5b60ad290c16e083b09a0d89ca302259075e482743cbaf5e3be514ad7943c8d69b29010b86ed05ffee5b36d12bcaf21aa6d012a22e00b3097f2fbd20ca7d15a
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 0xf5e145f33016421c
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912fa97a0faac74b08ee56b439e
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=67, length=155
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020500061900
        State = 0xf992b912fa97a0faac74b08ee56b439e
        Message-Authenticator = 0x01d61cadb9e37a74e24fd544012393e1
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 67 to 10.10.10.95 port 3073
        EAP-Message = 0x010600b519002725c4e0bfeaaf5027bd7a9c5f572d93b03946f4ce5d6c4debee089bb9c367ba3ea9779023a1cfce4bf70818072e58e0e7c0cc8c00d860f97e21321e37c243f8bba76f626d3e853f907a6125314399a90202e3bf767f917300cf2df59fddcc68ea1bd4fec9de5d318b1a6512ecf474743826562b1ccb535b7232eadf9d9b8986b0fd4ca2fadb3fb912a9cfd41f3dc9c2349030b55bb217a3dce59086f45cfb30549a8685793716030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912fd94a0faac74b08ee56b439e
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=68, length=487
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 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
        EAP-Message = 0x516764ee6c51ad21b13dddbf24a4e8cf3514f52933da76da14030100010116030100302f83d542afa30a8cb475cd8cfcec7455435dc8c58ce2373df26824866fc145a2035d8f7e578dd822d76f30c9c4a97eee
        State = 0xf992b912fd94a0faac74b08ee56b439e
        Message-Authenticator = 0xa91be6a5c097a9508c63c22bcc440a89
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 326
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange
[peap]     TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
[peap] <<< TLS 1.0 Handshake [length 0010], Finished
[peap]     TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
[peap]     TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished
[peap]     TLS_accept: SSLv3 write finished A
[peap]     TLS_accept: SSLv3 flush data
[peap]     (other): SSL negotiation finished successfully
SSL Connection Established
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 68 to 10.10.10.95 port 3073
        EAP-Message = 0x01070041190014030100010116030100308807c3104856869b637be8eea68bb8c0cfaf7fba079667dceef50813c57d31f7bcb3f7f77a544f1753e7624cb2a06028
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912fc95a0faac74b08ee56b439e
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=69, length=155
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020700061900
        State = 0xf992b912fc95a0faac74b08ee56b439e
        Message-Authenticator = 0x2cb40d0ea31d30e28fc707acce9e4f66
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3
[peap] eaptls_process returned 3
[peap] EAPTLS_SUCCESS
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state TUNNEL ESTABLISHED
++[eap] returns handled
Sending Access-Challenge of id 69 to 10.10.10.95 port 3073
        EAP-Message = 0x0108002b190017030100207bf81d8d1a0c4bb7c2fb7ffbdc3a5b99aaebe250005f50a4e70c85d245027782
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912ff9aa0faac74b08ee56b439e
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=70, length=192
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0208002b19001703010020958157d1959d47551aafb0193444d29cb00da52019ed63d45d645fc10a6db65e
        State = 0xf992b912ff9aa0faac74b08ee56b439e
        Message-Authenticator = 0xaff47163908f58f3d20db2f964b8ab45
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 8 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state WAITING FOR INNER IDENTITY
[peap] Identity - abcd
[peap] Got inner identity 'abcd'
[peap] Setting default EAP type for tunneled EAP session.
[peap] Got tunneled request
        EAP-Message = 0x020800090161626364
server  {
  PEAP: Setting User-Name to abcd
Sending tunneled request
        EAP-Message = 0x020800090161626364
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "abcd"
server inner-tunnel {
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 8 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
        EAP-Message = 0x0109001e1a0109001910d63eba70eff1b7ee371461ad21866e2661626364
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x0f19b88b0f10a2b8d8a39b8ea2462df7
[peap] Got tunneled reply RADIUS code 11
        EAP-Message = 0x0109001e1a0109001910d63eba70eff1b7ee371461ad21866e2661626364
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x0f19b88b0f10a2b8d8a39b8ea2462df7
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 70 to 10.10.10.95 port 3073
        EAP-Message = 0x0109003b19001703010030f85d4193dd7d56b8528e236de568b97ff37f8e90600fb8b101a4e5fbfd103722c23ff327b697b28ca590381476731d64
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912fe9ba0faac74b08ee56b439e
Finished request 7.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=71, length=240
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0209005b1900170301005059002e9a19f9c5286e39ccd7d27143ded156f629c09126538d68efd0a39ce421f053cfed23285d92e3efb81820eac035bb1ccaa71d47b341ebd339e1ebce97f7fc04ccff149afb685c943627349cc4d7
        State = 0xf992b912fe9ba0faac74b08ee56b439e
        Message-Authenticator = 0xe39c5880ab947dbe5d99067fb489e1f3
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 9 length 91
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state phase2
[peap] EAP type mschapv2
[peap] Got tunneled request
        EAP-Message = 0x0209003f1a0209003a31ec22d1b8536d974382f5f976478cc7430000000000000000d245cc61cc68de7464494b1663ef5e7e98f9392a00e7638f0061626364
server  {
  PEAP: Setting User-Name to abcd
Sending tunneled request
        EAP-Message = 0x0209003f1a0209003a31ec22d1b8536d974382f5f976478cc7430000000000000000d245cc61cc68de7464494b1663ef5e7e98f9392a00e7638f0061626364
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "abcd"
        State = 0x0f19b88b0f10a2b8d8a39b8ea2462df7
server inner-tunnel {
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 9 length 63
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] # Executing group from file /usr/local/etc/raddb/sites-enabled/inner-tunnel
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Creating challenge hash with username: abcd
[mschap] Told to do MS-CHAPv2 for abcd with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
Login incorrect: [abcd/<via Auth-Type = EAP>] (from client test port 0 via TLS tunnel)
} # server inner-tunnel
[peap] Got tunneled reply code 3
        MS-CHAP-Error = "\tE=691 R=1"
        EAP-Message = 0x04090004
        Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
        MS-CHAP-Error = "\tE=691 R=1"
        EAP-Message = 0x04090004
        Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 71 to 10.10.10.95 port 3073
        EAP-Message = 0x010a002b190017030100200a77af920c1d8e6dacd6a9aea6647957de22245dbe9b837523a200d9b0403be4
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xf992b912f198a0faac74b08ee56b439e
Finished request 8.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.95 port 3073, id=72, length=192
        User-Name = "abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020a002b190017030100207a448419076390c8aa663085873632825d3fa0a75aff46bd69f669f81f9f8056
        State = 0xf992b912f198a0faac74b08ee56b439e
        Message-Authenticator = 0xcf172f3705f338b6fe167417779b8d93
# Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "abcd", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 10 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state send tlv failure
[peap] Received EAP-TLV response.
[peap]  The users session was previously rejected: returning reject (again.)
[peap]  *** This means you need to read the PREVIOUS messages in the debug output
[peap]  *** to find out the reason why the user was rejected.
[peap]  *** Look for "reject" or "fail".  Those earlier messages will tell you.
[peap]  *** what went wrong, and how to fix the problem.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Login incorrect: [abcd/<via Auth-Type = EAP>] (from client test port 0 cli 00-1F-C6-ED-69-0A)
Using Post-Auth-Type Reject
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group REJECT {...}
[attr_filter.access_reject]     expand: %{User-Name} -> abcd
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 9 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 9
Sending Access-Reject of id 72 to 10.10.10.95 port 3073
        EAP-Message = 0x040a0004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.8 seconds.

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-14 22:26:20

вы вроде sql говорили прикрутили или как?
не вижу его ни в конфигах ни в обращении лога
и второе, у меня дежавю.. на wifi и freeradius eap
где то было уже на форуме, вроде в той теме эту проблему (авторизации) решили
поищете? а то я темы не помню
но она не давно была, может в течении двух месяцев




Аватара пользователя
vadim64
майор
Сообщения: 2101
Зарегистрирован: 2009-09-17 15:15:26
Откуда: Засратовец

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение vadim64 » 2011-04-15 6:37:51

Ытя писал(а):Вы бы вместо того, чтобы балогурить - дельно помогли. А то похожи на еврейчика, который "Я все знаю, но я ничего вам не скажу"
такие посты подсудны
Люди не делятся на национальности, партии, фракции и религии. Люди делятся на умных и дураков, а вот дураки делятся на национальности, партии, фракции и религии.

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-15 9:46:50

А что там подсудного? Сравнить с озвученной национальностью?

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-15 15:18:55

Код: Выделить всё

rlm_sql (sql): sql_set_user escaped user --> 'ADMIN\\abcd'
radius_xlat:  'SELECT id, wpa, 'Cleartext-Password', passwd, ':=' FROM wifi WHERE wpa = 'ADMIN=5C=5C=5C=5Cabcd' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 4
rlm_sql (sql): User ADMIN\\abcd not found in radcheck
Вот такая штука появляется.
Пользователь прописан в БД abcd, но при авторизации радиус "втыкает" имя ПК. Н:а линуксе такой проблемы нет. Как рещить проблему? Заранее благодарен.

Гость
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Гость » 2011-04-15 15:50:30

это называется realm
его нужно отрезать
настраивается конфигами самого фрирадиуса

Ытя
проходил мимо

Re: dir-300 и freeradius. Как подружить

Непрочитанное сообщение Ытя » 2011-04-15 19:55:22

Странно. Закомментил, но все равно тоже самое. Вот лог запуска:

Код: Выделить всё

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/etc/raddb/clients.conf
Config:   including file: /usr/local/etc/raddb/eap.conf
Config:   including file: /usr/local/etc/raddb/sql.conf
 main: prefix = "/usr/local"
 main: localstatedir = "/var"
 main: logdir = "/var/log"
 main: libdir = "/usr/local/lib"
 main: radacctdir = "/var/log/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 1812
 main: allow_core_dumps = no
 main: log_stripped_names = yes
 main: log_file = "/var/log/radius.log"
 main: log_auth = yes
 main: log_auth_badpass = yes
 main: log_auth_goodpass = yes
 main: pidfile = "/var/run/radiusd/radiusd.pid"
 main: user = "root"
 main: group = "nobody"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/local/sbin/checkrad"
 main: proxy_requests = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
Using deprecated clients file.  Support for this will go away soon.
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
 pap: encryption_scheme = "crypt"
 pap: auto_header = yes
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
 mschap: use_mppe = yes
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: with_ntdomain_hack = no
 mschap: passwd = "(null)"
 mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded System
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "(null)"
 unix: group = "(null)"
 unix: radwtmp = "/var/log/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
 eap: default_eap_type = "md5"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
 gtc: challenge = "Password: "
 gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/usr/local/etc/raddb/certs/cert-srv.pem"
 tls: certificate_file = "/usr/local/etc/raddb/certs/cert-srv.pem"
 tls: CA_file = "/usr/local/etc/raddb/certs/demoCA/cacert.pem"
 tls: private_key_password = "whatever"
 tls: dh_file = "/usr/local/etc/raddb/certs/dh"
 tls: random_file = "/usr/local/etc/raddb/certs/random"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
 tls: cipher_list = "(null)"
 tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
 ttls: default_eap_type = "md5"
 ttls: copy_request_to_tunnel = no
 ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = no
 peap: use_tunneled_reply = no
 peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups"
 preprocess: hints = "/usr/local/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
 preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded files
 files: usersfile = "/usr/local/etc/raddb/users"
 files: acctusersfile = "/usr/local/etc/raddb/acct_users"
 files: preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files)
Module: Loaded SQL
 sql: driver = "rlm_sql_mysql"
 sql: server = "localhost"
 sql: port = ""
 sql: login = "root"
 sql: password = ""
 sql: radius_db = "wifi"
 sql: nas_table = "nas"
 sql: sqltrace = no
 sql: sqltracefile = "/var/log/sqltrace.sql"
 sql: readclients = no
 sql: deletestalesessions = yes
 sql: num_sql_socks = 5
 sql: sql_user_name = "%{User-Name}"
 sql: default_user_profile = ""
 sql: query_on_not_found = no
 sql: authorize_check_query = "SELECT id, wpa, 'Cleartext-Password', passwd, ':=' FROM wifi WHERE wpa = '%{SQL-User-Name}' ORDER BY id"
 sql: authorize_reply_query = ""
 sql: authorize_group_check_query = ""
 sql: authorize_group_reply_query = ""
 sql: accounting_onoff_query = ""
 sql: accounting_update_query = ""
 sql: accounting_update_query_alt = ""
 sql: accounting_start_query = ""
 sql: accounting_start_query_alt = ""
 sql: accounting_stop_query = ""
 sql: accounting_stop_query_alt = ""
 sql: group_membership_query = ""
 sql: connect_failure_retry_delay = 60
 sql: simul_count_query = ""
 sql: simul_verify_query = ""
 sql: postauth_query = ""
 sql: safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
rlm_sql (sql): Attempting to connect to root@localhost:/wifi
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
rlm_sql_mysql: Starting connect to MySQL server for #0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
rlm_sql_mysql: Starting connect to MySQL server for #1
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
rlm_sql_mysql: Starting connect to MySQL server for #2
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
rlm_sql_mysql: Starting connect to MySQL server for #3
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
rlm_sql_mysql: Starting connect to MySQL server for #4
rlm_sql (sql): Connected new DB handle, #4
Module: Instantiated sql (sql)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
 detail: detailfile = "/var/log/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
 radutmp: filename = "/var/log/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
Вот лог авторизации:

Код: Выделить всё

  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "chap" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
  rlm_eap: EAP packet type response id 7 length 15
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 6
radius_xlat:  'ADMIN\\abcd'
rlm_sql (sql): sql_set_user escaped user --> 'ADMIN\\abcd'
radius_xlat:  'SELECT id, wpa, 'Cleartext-Password', passwd, ':=' FROM wifi WHERE wpa = 'ADMIN=5C=5C=5C=5Cabcd' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 2
radius_xlat:  ''
radius_xlat:  ''
radius_xlat:  ''
rlm_sql (sql): Released sql socket id: 2
  modcall[authorize]: module "sql" returns ok for request 6
rlm_pap: Found existing Auth-Type, not changing it.
  modcall[authorize]: module "pap" returns noop for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 235 to 10.10.10.95 port 3073
        EAP-Message = 0x0108004b1900170301004097f26551cc09ff747f1b76dac9f5182baf1915c1076dcced1b587e32719fd957349b1884e86acfabf25efd5e873039d9d3a32e5643262efdaef8580a65c2f3de
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x5830372ce5f10f398a9d2e78d1da57d6
Finished request 6
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 10.10.10.95:3073, id=236, length=262
        User-Name = "ADMIN\\abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0208006b19001703010060d190adf029d14593cae1980022a19aa48020e5527fab4edad2f81c4219ca5095e30944757e83b605445b822f8d3c1ab66b544ca340fd93686b00469bd646ef0ce860bbb2ae7b2fce030e432afe734cd57a48c4efb7de51c8eaed3f6f49af3963
        State = 0x5830372ce5f10f398a9d2e78d1da57d6
        Message-Authenticator = 0x311e15088ca70bb2f274c210952ef81f
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
  rlm_eap: EAP packet type response id 8 length 107
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 7
radius_xlat:  'ADMIN\\abcd'
rlm_sql (sql): sql_set_user escaped user --> 'ADMIN\\abcd'
radius_xlat:  'SELECT id, wpa, 'Cleartext-Password', passwd, ':=' FROM wifi WHERE wpa = 'ADMIN=5C=5C=5C=5Cabcd' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 1
radius_xlat:  ''
radius_xlat:  ''
radius_xlat:  ''
rlm_sql (sql): Released sql socket id: 1
  modcall[authorize]: module "sql" returns ok for request 7
rlm_pap: Found existing Auth-Type, not changing it.
  modcall[authorize]: module "pap" returns noop for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Setting User-Name to ADMIN\abcd
  PEAP: Adding old state with 24 2f
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
  rlm_eap: EAP packet type response id 8 length 69
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 7
radius_xlat:  'ADMIN\\abcd'
rlm_sql (sql): sql_set_user escaped user --> 'ADMIN\\abcd'
radius_xlat:  'SELECT id, wpa, 'Cleartext-Password', passwd, ':=' FROM wifi WHERE wpa = 'ADMIN=5C=5C=5C=5Cabcd' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 0
radius_xlat:  ''
radius_xlat:  ''
radius_xlat:  ''
rlm_sql (sql): Released sql socket id: 0
  modcall[authorize]: module "sql" returns ok for request 7
rlm_pap: Found existing Auth-Type, not changing it.
  modcall[authorize]: module "pap" returns noop for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 7
  rlm_mschap: NT Domain delimeter found, should we have enabled with_ntdomain_hack?
  rlm_mschap: Told to do MS-CHAPv2 for ADMIN\abcd with NT-Password
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 7
modcall: leaving group MS-CHAP (returns reject) for request 7
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 7
modcall: leaving group authenticate (returns reject) for request 7
auth: Failed to validate the user.
Login incorrect: [ADMIN\\abcd/<no User-Password attribute>] (from client localhost port 0)
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challenge of id 236 to 10.10.10.95 port 3073
        EAP-Message = 0x0109002b19001703010020a4c28a93043ce6d24a77278cf026f0cad694c06898bce58a0a1782ef5564c79a
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xb89f5b129db57ad77af4db92911c202a
Finished request 7
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 10.10.10.95:3073, id=237, length=198
        User-Name = "ADMIN\\abcd"
        NAS-Port = 0
        Called-Station-Id = "F0-7D-68-8A-93-22:test"
        Calling-Station-Id = "00-1F-C6-ED-69-0A"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0209002b19001703010020a80b08cf8324c989a612537b6be86bd50f69120713fbdd4c02881fe7505a0e05
        State = 0xb89f5b129db57ad77af4db92911c202a
        Message-Authenticator = 0x989199fbf845cabef311d191bfbc34e7
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "chap" returns noop for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
  rlm_eap: EAP packet type response id 9 length 43
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 8
radius_xlat:  'ADMIN\\abcd'
rlm_sql (sql): sql_set_user escaped user --> 'ADMIN\\abcd'
radius_xlat:  'SELECT id, wpa, 'Cleartext-Password', passwd, ':=' FROM wifi WHERE wpa = 'ADMIN=5C=5C=5C=5Cabcd' ORDER BY id'
rlm_sql (sql): Reserving sql socket id: 4
radius_xlat:  ''
radius_xlat:  ''
radius_xlat:  ''
rlm_sql (sql): Released sql socket id: 4
  modcall[authorize]: module "sql" returns ok for request 8
rlm_pap: Found existing Auth-Type, not changing it.
  modcall[authorize]: module "pap" returns noop for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected earlier in this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 8
modcall: leaving group authenticate (returns invalid) for request 8
auth: Failed to validate the user.
Login incorrect: [ADMIN\\abcd/<no User-Password attribute>] (from client d300 port 0 cli 00-1F-C6-ED-69-0A)
Delaying request 8 for 1 seconds
Finished request 8
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 10.10.10.95:3073, id=237, length=198
Sending Access-Reject of id 237 to 10.10.10.95 port 3073
        EAP-Message = 0x04090004
        Message-Authenticator = 0x00000000000000000000000000000000
--- Walking the entire request list ---
Waking up in 2 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 229 with timestamp 4da8cc8b
Cleaning up request 1 ID 230 with timestamp 4da8cc8b
Cleaning up request 2 ID 231 with timestamp 4da8cc8b
Cleaning up request 3 ID 232 with timestamp 4da8cc8b
Cleaning up request 4 ID 233 with timestamp 4da8cc8b
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 234 with timestamp 4da8cc8c
Cleaning up request 6 ID 235 with timestamp 4da8cc8c
Cleaning up request 7 ID 236 with timestamp 4da8cc8c
Cleaning up request 8 ID 237 with timestamp 4da8cc8c
Nothing to do.  Sleeping until we see a request.
Получается что-то еще комментить надо.