Skip to content

Instantly share code, notes, and snippets.

@Ricardo1980
Created September 10, 2017 15:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Ricardo1980/a5a7047fd0a03a6b10aea3b82f5e7cdf to your computer and use it in GitHub Desktop.
Save Ricardo1980/a5a7047fd0a03a6b10aea3b82f5e7cdf to your computer and use it in GitHub Desktop.
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 31 length 6
Sun Sep 10 14:07:31 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:31 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:31 2017 : Info: [peap] Received TLS ACK
Sun Sep 10 14:07:31 2017 : Info: [peap] ACK handshake fragment handler
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_verify returned 1
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_process returned 13
Sun Sep 10 14:07:31 2017 : Info: [peap] EAPTLS_HANDLED
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 106 to 127.0.0.1 port 39997
EAP-Message = 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
EAP-Message = 0xd9c29ec00c9c87ef89478fd558a80b4f7fb00831de346518ef02b95ecf99ffc0dd39f5082189fe4f83a63c0ab2d5a5fc160301014b0c00014703001741043629c10fa73a7bc76d96f6c8d9a1ddb4a1ae062484d8d7e3311a37fa77095bf287db00f72d67500cfc147e5c79d75a9e3a975790e55e280b7f4ab5a96255921301002b7281ddd810cda9bee133c9ae78a001c5f5ab9f847aea954b443b1b6531b072b3b0e17ef883f307c39808ba9834fdc0484a5d263a6f2acec2488561823264743c5064c2c0b36b530c3bf11143fdeb7034b7cfb06f4952cae6193874abdd0cc47cdd5e932b5c65cc5945e804ca0ff59808257789c2b2371eb3a5671dea
EAP-Message = 0x80cfd8f42d78ad1ad2c3f16a1e9d5f72e731f3e5fe660955c74eb69c49608a07714b6b424215ecaa3e55bec0bfbbd32f75db2d6e03798900630533cf9a7647cea99a16e9e79f8aee31c4968c9cb3d6f006136fe429f86d0aa509728a1279e975adb09e502c3725954196d444ffa66ec528f82fb01e7705a50fa2ac25b463dee01f88ea16030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4b4fc211486fdba2ea6eb60b0d97c608
Sun Sep 10 14:07:31 2017 : Info: Finished request 23.
Sun Sep 10 14:07:31 2017 : Debug: Going to the next request
Sun Sep 10 14:07:31 2017 : Debug: Waking up in 2.5 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=107, length=333
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x022000901980000000861603010046100000424104d5eb64acbdb2899c6250c7c2f7d001f1e7f9a890e596a784dfbad873fdbbc6133e193fb93168766796dc906a7ec2ae1da567f8e5c24dd1bc3e2766ee754b4c491403010001011603010030bec4e6a4cddcff628d31b226b9f2ca5cc602b0003613b35c7cbbcd2bb25c0cecc41b358b53a60bd921d34971ad8dcdf4
State = 0x4b4fc211486fdba2ea6eb60b0d97c608
Message-Authenticator = 0x8685c9088cecd5abc6dbdcbafbcd7e75
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 32 length 144
Sun Sep 10 14:07:31 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:31 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:31 2017 : Debug: TLS Length 134
Sun Sep 10 14:07:31 2017 : Info: [peap] Length Included
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_verify returned 11
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange
Sun Sep 10 14:07:31 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:31 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< TLS 1.0 Handshake [length 0010], Finished
Sun Sep 10 14:07:31 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
Sun Sep 10 14:07:31 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> TLS 1.0 Handshake [length 0010], Finished
Sun Sep 10 14:07:31 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:31 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:31 2017 : Info: [peap] (other): SSL negotiation finished successfully
Sun Sep 10 14:07:31 2017 : Debug: SSL Connection Established
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_process returned 13
Sun Sep 10 14:07:31 2017 : Info: [peap] EAPTLS_HANDLED
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 107 to 127.0.0.1 port 39997
EAP-Message = 0x012100411900140301000101160301003035aa823506101d054f1d05a80ebd405734fa89c9da677d733e29b2533424801a176121f7437fd3e0a67ea550703772b1
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4b4fc2114f6edba2ea6eb60b0d97c608
Sun Sep 10 14:07:31 2017 : Info: Finished request 24.
Sun Sep 10 14:07:31 2017 : Debug: Going to the next request
Sun Sep 10 14:07:31 2017 : Debug: Waking up in 2.4 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=108, length=195
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x022100061900
State = 0x4b4fc2114f6edba2ea6eb60b0d97c608
Message-Authenticator = 0xf4c59945861084e202d273082c9f321e
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 33 length 6
Sun Sep 10 14:07:31 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:31 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:31 2017 : Info: [peap] Received TLS ACK
Sun Sep 10 14:07:31 2017 : Info: [peap] ACK handshake is finished
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_verify returned 3
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_process returned 3
Sun Sep 10 14:07:31 2017 : Info: [peap] EAPTLS_SUCCESS
Sun Sep 10 14:07:31 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:31 2017 : Info: [peap] Peap state TUNNEL ESTABLISHED
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 108 to 127.0.0.1 port 39997
EAP-Message = 0x0122002b19001703010020184086ed94fcbbd1485ff59a99b92a3c6546a9d12fee731152d56b63aaaff25a
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4b4fc2114e6ddba2ea6eb60b0d97c608
Sun Sep 10 14:07:31 2017 : Info: Finished request 25.
Sun Sep 10 14:07:31 2017 : Debug: Going to the next request
Sun Sep 10 14:07:31 2017 : Debug: Waking up in 2.4 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=109, length=232
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x0222002b190017030100204196b6ac8bad449f57d7195e44f875ca36f1740acdffab80b4252648830968dd
State = 0x4b4fc2114e6ddba2ea6eb60b0d97c608
Message-Authenticator = 0x3c4c8b5d6a8b3e790a6545f07ef0e720
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 34 length 43
Sun Sep 10 14:07:31 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:31 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:31 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:31 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:31 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:31 2017 : Info: [peap] Peap state WAITING FOR INNER IDENTITY
Sun Sep 10 14:07:31 2017 : Info: [peap] Identity - ricardo
Sun Sep 10 14:07:31 2017 : Info: [peap] Got inner identity 'ricardo'
Sun Sep 10 14:07:31 2017 : Info: [peap] Setting default EAP type for tunneled EAP session.
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled request
EAP-Message = 0x0222000c017269636172646f
server {
Sun Sep 10 14:07:31 2017 : Info: [peap] Setting User-Name to ricardo
Sending tunneled request
EAP-Message = 0x0222000c017269636172646f
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
server {
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 34 length 12
Sun Sep 10 14:07:31 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:31 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:31 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:31 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:31 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP Identity
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type mschapv2
Sun Sep 10 14:07:31 2017 : Debug: rlm_eap_mschapv2: Issuing Challenge
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
} # server
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled reply code 11
EAP-Message = 0x012300211a0123001c1095c5d4bd969af2eee3e33e56db1b6fdc7269636172646f
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x12eec92712cdd37c77d817641fef5cbf
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled reply RADIUS code Access-Challenge
EAP-Message = 0x012300211a0123001c1095c5d4bd969af2eee3e33e56db1b6fdc7269636172646f
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x12eec92712cdd37c77d817641fef5cbf
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled Access-Challenge
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 109 to 127.0.0.1 port 39997
EAP-Message = 0x0123004b190017030100408fa455f400906d05e898f462db87ecb729f7d13365a7079ecda2889c9826792c826fed87cdceaa9d465e583868ac3194c5d2492244e14bca0db986de42036b2c
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4b4fc2114d6cdba2ea6eb60b0d97c608
Sun Sep 10 14:07:31 2017 : Info: Finished request 26.
Sun Sep 10 14:07:31 2017 : Debug: Going to the next request
Sun Sep 10 14:07:31 2017 : Debug: Waking up in 2.3 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=110, length=296
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x0223006b19001703010060d8952ecf3767def98c0068347cf19b95518f63155efcc44bb12d0e6d0197e0997ede1040c1f2a626a00cac8be956418896d3f4003c4cb0bc6085ca74ce61d82ec815e6216fc0cae993b45fe3f6cf5450abc2acd880f2903d0ded9d16f0b86a81
State = 0x4b4fc2114d6cdba2ea6eb60b0d97c608
Message-Authenticator = 0x4967036564b0ffe5eb5be24610168db1
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 35 length 107
Sun Sep 10 14:07:31 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:31 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:31 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:31 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:31 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:31 2017 : Info: [peap] Peap state phase2
Sun Sep 10 14:07:31 2017 : Info: [peap] EAP type mschapv2
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled request
EAP-Message = 0x022300421a0223003d3167401308e41250029704ad46206a11ed00000000000000004c9569a90b3dd118f92a2e61ea198ce1bd6e79b033100724007269636172646f
server {
Sun Sep 10 14:07:31 2017 : Info: [peap] Setting User-Name to ricardo
Sending tunneled request
EAP-Message = 0x022300421a0223003d3167401308e41250029704ad46206a11ed00000000000000004c9569a90b3dd118f92a2e61ea198ce1bd6e79b033100724007269636172646f
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "ricardo"
State = 0x12eec92712cdd37c77d817641fef5cbf
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
server {
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 35 length 66
Sun Sep 10 14:07:31 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:31 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:31 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:31 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:31 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/mschapv2
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type mschapv2
Sun Sep 10 14:07:31 2017 : Info: [mschapv2] # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: [mschapv2] +group MS-CHAP {
Sun Sep 10 14:07:31 2017 : Info: [mschap] Creating challenge hash with username: ricardo
Sun Sep 10 14:07:31 2017 : Info: [mschap] Client is using MS-CHAPv2 for ricardo, we need NT-Password
Sun Sep 10 14:07:31 2017 : Info: [mschap] adding MS-CHAPv2 MPPE keys
Sun Sep 10 14:07:31 2017 : Info: ++[mschap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group MS-CHAP = ok
Sun Sep 10 14:07:31 2017 : Debug: MSCHAP Success
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
} # server
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled reply code 11
EAP-Message = 0x012400331a0323002e533d41444639353037354131354439434245314336373933334537354432453542333834393035353231
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x12eec92713cad37c77d817641fef5cbf
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled reply RADIUS code Access-Challenge
EAP-Message = 0x012400331a0323002e533d41444639353037354131354439434245314336373933334537354432453542333834393035353231
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x12eec92713cad37c77d817641fef5cbf
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled Access-Challenge
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 110 to 127.0.0.1 port 39997
EAP-Message = 0x0124005b190017030100505e862b28a26192dff35eccaa1c2087bd669ee9dc65fdcdebf98442aabbc93bc40e083a9e89183433262b71e8c7c0659ba4295439d9c32943cf02e22bd741f7cf0312fd358468865737bf9c8c7fa8d083
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4b4fc2114c6bdba2ea6eb60b0d97c608
Sun Sep 10 14:07:31 2017 : Info: Finished request 27.
Sun Sep 10 14:07:31 2017 : Debug: Going to the next request
Sun Sep 10 14:07:31 2017 : Debug: Waking up in 2.3 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=111, length=232
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x0224002b190017030100201ed1b1d40de207a61a8400cd0b7bf3c00ae3556bf147c0e6ad28b819e2765732
State = 0x4b4fc2114c6bdba2ea6eb60b0d97c608
Message-Authenticator = 0x545b6e84741aa9cf80467a534fb794ce
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 36 length 43
Sun Sep 10 14:07:31 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:31 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:31 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:31 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:31 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:31 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:31 2017 : Info: [peap] Peap state phase2
Sun Sep 10 14:07:31 2017 : Info: [peap] EAP type mschapv2
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled request
EAP-Message = 0x022400061a03
server {
Sun Sep 10 14:07:31 2017 : Info: [peap] Setting User-Name to ricardo
Sending tunneled request
EAP-Message = 0x022400061a03
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "ricardo"
State = 0x12eec92713cad37c77d817641fef5cbf
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
server {
Sun Sep 10 14:07:31 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authorize {
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP packet type response id 36 length 6
Sun Sep 10 14:07:31 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:31 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:31 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:31 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:31 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:31 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:31 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:31 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:31 2017 : Info: +group authenticate {
Sun Sep 10 14:07:31 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:31 2017 : Info: [eap] EAP/mschapv2
Sun Sep 10 14:07:31 2017 : Info: [eap] processing type mschapv2
Sun Sep 10 14:07:31 2017 : Info: [eap] Freeing handler
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = ok
Sun Sep 10 14:07:31 2017 : Auth: Login OK: [ricardo/<via Auth-Type = EAP>] (from client localhost port 0 cli C0-CC-F8-EC-55-F8 via TLS tunnel)
Sun Sep 10 14:07:31 2017 : Info: WARNING: Empty post-auth section. Using default return values.
} # server
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled reply code 2
MS-MPPE-Encryption-Policy = 0x00000001
MS-MPPE-Encryption-Types = 0x00000006
MS-MPPE-Send-Key = 0x369f91e4d86bf334b4fd56bb880d56c2
MS-MPPE-Recv-Key = 0x3b0baf16d7b38aaf46e47bb9f947dd4d
EAP-Message = 0x03240004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "ricardo"
Sun Sep 10 14:07:31 2017 : Info: [peap] Got tunneled reply RADIUS code Access-Accept
MS-MPPE-Encryption-Policy = 0x00000001
MS-MPPE-Encryption-Types = 0x00000006
MS-MPPE-Send-Key = 0x369f91e4d86bf334b4fd56bb880d56c2
MS-MPPE-Recv-Key = 0x3b0baf16d7b38aaf46e47bb9f947dd4d
EAP-Message = 0x03240004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "ricardo"
Sun Sep 10 14:07:31 2017 : Info: [peap] Tunneled authentication was successful.
Sun Sep 10 14:07:31 2017 : Info: [peap] SUCCESS
Sun Sep 10 14:07:31 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:31 2017 : Info: [peap] Saving tunneled attributes for later
Sun Sep 10 14:07:31 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:31 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 111 to 127.0.0.1 port 39997
EAP-Message = 0x0125002b1900170301002073ee49d548c86355d3698aa1feae8450d93c1c8d4ec30452c5c725701d2d71a4
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4b4fc211436adba2ea6eb60b0d97c608
Sun Sep 10 14:07:31 2017 : Info: Finished request 28.
Sun Sep 10 14:07:31 2017 : Debug: Going to the next request
Sun Sep 10 14:07:31 2017 : Debug: Waking up in 2.2 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=112, length=232
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "603A295A43991487"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x0225002b190017030100209dfc247e7f4a22dcb077a39f9796b77d13cbf046b5b6005f1085fef9030c3448
State = 0x4b4fc211436adba2ea6eb60b0d97c608
Message-Authenticator = 0xa11882b2f6f557048b9a402b77c3420a
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 37 length 43
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:32 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:32 2017 : Info: [peap] Peap state send tlv success
Sun Sep 10 14:07:32 2017 : Info: [peap] Received EAP-TLV response.
Sun Sep 10 14:07:32 2017 : Info: [peap] Success
Sun Sep 10 14:07:32 2017 : Info: [peap] Using saved attributes from the original Access-Accept
User-Name = "ricardo"
Sun Sep 10 14:07:32 2017 : Info: [eap] Freeing handler
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = ok
Sun Sep 10 14:07:32 2017 : Auth: Login OK: [ricardo/<via Auth-Type = EAP>] (from client localhost port 0 cli C0-CC-F8-EC-55-F8)
Sun Sep 10 14:07:32 2017 : Info: WARNING: Empty post-auth section. Using default return values.
Sending Access-Accept of id 112 to 127.0.0.1 port 39997
User-Name = "ricardo"
MS-MPPE-Recv-Key = 0x26b0a161d9c28818a72b7898e66e15123f9fabfbfdf43a408e1e6ff6cbb1b434
MS-MPPE-Send-Key = 0x8377a935801efbd20c46de29c1faf0a19fbdbb5b9b75e0e3a1dc43fc8b72eac1
EAP-Message = 0x03250004
Message-Authenticator = 0x00000000000000000000000000000000
Sun Sep 10 14:07:32 2017 : Info: Finished request 29.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 2.2 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=113, length=183
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02d4000c017269636172646f
Message-Authenticator = 0x8107ffb46291198e3a29336f3f127eca
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 212 length 12
Sun Sep 10 14:07:32 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:32 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:32 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:32 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:32 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP Identity
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type tls
Sun Sep 10 14:07:32 2017 : Info: [tls] Initiate
Sun Sep 10 14:07:32 2017 : Info: [tls] Start returned 1
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 113 to 127.0.0.1 port 39997
EAP-Message = 0x01d500061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39e8e187ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 30.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.8 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=114, length=316
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02d5007f19800000007516030100700100006c030159b5472442d1371ba347d154f7f808d4d4e64c869cf39ef91658431b57ec21e400002000ffc024c023c00ac009c008c028c027c014c013c012003d003c0035002f000a01000023000a00080006001700180019000b000201000005000501000000000012000000170000
State = 0xe8349e39e8e187ca6d33ab4e3cddc8ca
Message-Authenticator = 0x305e008d773dcd3689a25e4db9d3feb0
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 213 length 127
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Debug: TLS Length 117
Sun Sep 10 14:07:32 2017 : Info: [peap] Length Included
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 11
Sun Sep 10 14:07:32 2017 : Info: [peap] (other): before/accept initialization
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: before/accept initialization
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< TLS 1.0 Handshake [length 0070], ClientHello
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> TLS 1.0 Handshake [length 0039], ServerHello
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> TLS 1.0 Handshake [length 08d0], Certificate
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> TLS 1.0 Handshake [length 014b], ServerKeyExchange
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: Need to read more data: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: Need to read more data: unknown state
Sun Sep 10 14:07:32 2017 : Debug: In SSL Handshake Phase
Sun Sep 10 14:07:32 2017 : Debug: In SSL Accept mode
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 13
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_HANDLED
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 114 to 127.0.0.1 port 39997
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xc07c8909fe4d11bcfb7e68359ec6d786b428f0060d8a49707d1599df08badbdbce54a32e5fd108cd2b0b6e23a37d62da1fcb21f479eaefa4b359a5340b167e05511606c16f8bb0c510591f30648365ed2267ade65cafdf32a1a331d6ebe9f2a95e77cf5ce7db438d1fa70d511c202b128933a7a9e88e364b896edba89b90916ceb5b5fad98b40de9501f0d6f456401ebdac1a0721b0d6fb0712f42cc24dd8a48dd217246ccadf169252de85d83201a5f4fb61cee56d206219c874df4b6c6b0d8220b1bbc2ae709b3c918e555d395a52a230203010001a34f304d30130603551d25040c300a06082b0601050507030130360603551d1f042f302d302ba0
EAP-Message = 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
EAP-Message = 0xe6ff2b291b9dbd765584ef75
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39e9e287ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 31.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.7 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=115, length=195
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02d600061900
State = 0xe8349e39e9e287ca6d33ab4e3cddc8ca
Message-Authenticator = 0x8331e5e57944f8664f89c86f8660f40f
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 214 length 6
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] Received TLS ACK
Sun Sep 10 14:07:32 2017 : Info: [peap] ACK handshake fragment handler
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 1
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 13
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_HANDLED
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 115 to 127.0.0.1 port 39997
EAP-Message = 0x01d703fc1940d37fe62cb4b9c4e15674c64f2a79c36c3ec2c6aeafb554dc75e9ac4813405ba75e6d5cd2038256c7a8195073c585e433f17d6adb9e0004e5308204e1308203c9a003020102020900f9e144012e319906300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d3126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479301e
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x2e6578616d706c65
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39eae387ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 32.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.6 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=116, length=195
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02d700061900
State = 0xe8349e39eae387ca6d33ab4e3cddc8ca
Message-Authenticator = 0xe7e4fcfae9a3da2084ce80cf9392cf57
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 215 length 6
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] Received TLS ACK
Sun Sep 10 14:07:32 2017 : Info: [peap] ACK handshake fragment handler
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 1
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 13
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_HANDLED
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 116 to 127.0.0.1 port 39997
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xb649f9fc0339a215f7f2afa0d767f1e28eba7345a8b749d45123ed4361e384426e1fc2af44675efdc9588cd0a5efef9f2b480f41178c07007a9a8d5b73ea0c94c9c68fc25b7d51db80b2a23db7a328c117d2b844856accb8505f08cedec76a4a16d62e255f5266652119ad9fe71438633bf8c80af01fdaa9ba0c474ba0bf8533b1968e16030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39ebec87ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 33.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.6 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=117, length=333
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02d800901980000000861603010046100000424104c560df78f2f9213239a952b2ec41e8f32a2fc074c2088989cc63450070fb8752902de35df6103cc0b2dde26352d1ed26500ce036df3d4171579e094a4821e16b1403010001011603010030b32115bd4c085b291da175d42d72f5a4c018f255104e6f95cf448c368604b644026976d8859b5dd5e6a15f15dc000bcb
State = 0xe8349e39ebec87ca6d33ab4e3cddc8ca
Message-Authenticator = 0x5cf9032295b562981710488a3c8a6ca6
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 216 length 144
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Debug: TLS Length 134
Sun Sep 10 14:07:32 2017 : Info: [peap] Length Included
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 11
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< TLS 1.0 Handshake [length 0010], Finished
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> TLS 1.0 Handshake [length 0010], Finished
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] TLS_accept: unknown state
Sun Sep 10 14:07:32 2017 : Info: [peap] (other): SSL negotiation finished successfully
Sun Sep 10 14:07:32 2017 : Debug: SSL Connection Established
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 13
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_HANDLED
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 117 to 127.0.0.1 port 39997
EAP-Message = 0x01d9004119001403010001011603010030eabda3d78ad17f24ee4ae43b060b033ef26730c6f4ccf27c03ab42a5a1fd2c2fe83ae5acb9068f704449be205d574416
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39eced87ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 34.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.5 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=118, length=195
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02d900061900
State = 0xe8349e39eced87ca6d33ab4e3cddc8ca
Message-Authenticator = 0x1c0272da73127b59f47cd6530ba34a94
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 217 length 6
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] Received TLS ACK
Sun Sep 10 14:07:32 2017 : Info: [peap] ACK handshake is finished
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 3
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 3
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_SUCCESS
Sun Sep 10 14:07:32 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:32 2017 : Info: [peap] Peap state TUNNEL ESTABLISHED
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 118 to 127.0.0.1 port 39997
EAP-Message = 0x01da002b19001703010020bdb39aeeb461ec22b30c9547f299584d7fa240e379b2609d100bf80589036d68
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39edee87ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 35.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.5 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=119, length=232
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02da002b190017030100209584134edd09e777f04f617027cf5be197985062d828ce2c335b088be03c9253
State = 0xe8349e39edee87ca6d33ab4e3cddc8ca
Message-Authenticator = 0x6fe707fbc0f3f31c640d18d7c4dd5fdb
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 218 length 43
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:32 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:32 2017 : Info: [peap] Peap state WAITING FOR INNER IDENTITY
Sun Sep 10 14:07:32 2017 : Info: [peap] Identity - ricardo
Sun Sep 10 14:07:32 2017 : Info: [peap] Got inner identity 'ricardo'
Sun Sep 10 14:07:32 2017 : Info: [peap] Setting default EAP type for tunneled EAP session.
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled request
EAP-Message = 0x02da000c017269636172646f
server {
Sun Sep 10 14:07:32 2017 : Info: [peap] Setting User-Name to ricardo
Sending tunneled request
EAP-Message = 0x02da000c017269636172646f
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
server {
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 218 length 12
Sun Sep 10 14:07:32 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:32 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:32 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:32 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:32 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP Identity
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type mschapv2
Sun Sep 10 14:07:32 2017 : Debug: rlm_eap_mschapv2: Issuing Challenge
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
} # server
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled reply code 11
EAP-Message = 0x01db00211a01db001c100553c574f4d3bb46e542bf6b45c64e587269636172646f
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xec48d4beec93ce720d2892671ae3b469
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled reply RADIUS code Access-Challenge
EAP-Message = 0x01db00211a01db001c100553c574f4d3bb46e542bf6b45c64e587269636172646f
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xec48d4beec93ce720d2892671ae3b469
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled Access-Challenge
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 119 to 127.0.0.1 port 39997
EAP-Message = 0x01db004b1900170301004051e99dcbb4b542226a4ad939d4a96317868c2af7a15502f3c13ae61197322b78ef702b4ad38a19545b8db2e675aa7da52d85c6913f75bc6b5310fb512b503c09
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39eeef87ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 36.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.5 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=120, length=296
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02db006b19001703010060d40305b7cab2a722b16a63caafea166e68e3ecccf4e9c84e91092ac929b99fe47f42d36b2f481d90b592fade8442b08cda256de1412a91066c5b2d01ee6157d0634398fa58ea5986952a39f61cc3c553f7b57a2b949210db04d39355b49dd83e
State = 0xe8349e39eeef87ca6d33ab4e3cddc8ca
Message-Authenticator = 0xf6652d624cb2660495ad200e1acab80d
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 219 length 107
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:32 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:32 2017 : Info: [peap] Peap state phase2
Sun Sep 10 14:07:32 2017 : Info: [peap] EAP type mschapv2
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled request
EAP-Message = 0x02db00421a02db003d310947e07809ac05eef7ef318e9ff2b1890000000000000000a099b4486c73e430b65cb2510eb0b5abcb14944926261330007269636172646f
server {
Sun Sep 10 14:07:32 2017 : Info: [peap] Setting User-Name to ricardo
Sending tunneled request
EAP-Message = 0x02db00421a02db003d310947e07809ac05eef7ef318e9ff2b1890000000000000000a099b4486c73e430b65cb2510eb0b5abcb14944926261330007269636172646f
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "ricardo"
State = 0xec48d4beec93ce720d2892671ae3b469
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
server {
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 219 length 66
Sun Sep 10 14:07:32 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:32 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:32 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:32 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:32 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/mschapv2
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type mschapv2
Sun Sep 10 14:07:32 2017 : Info: [mschapv2] # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: [mschapv2] +group MS-CHAP {
Sun Sep 10 14:07:32 2017 : Info: [mschap] Creating challenge hash with username: ricardo
Sun Sep 10 14:07:32 2017 : Info: [mschap] Client is using MS-CHAPv2 for ricardo, we need NT-Password
Sun Sep 10 14:07:32 2017 : Info: [mschap] adding MS-CHAPv2 MPPE keys
Sun Sep 10 14:07:32 2017 : Info: ++[mschap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group MS-CHAP = ok
Sun Sep 10 14:07:32 2017 : Debug: MSCHAP Success
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
} # server
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled reply code 11
EAP-Message = 0x01dc00331a03db002e533d39444136384537464246373933303742313539353436463836443335393938374438323346413033
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xec48d4beed94ce720d2892671ae3b469
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled reply RADIUS code Access-Challenge
EAP-Message = 0x01dc00331a03db002e533d39444136384537464246373933303742313539353436463836443335393938374438323346413033
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xec48d4beed94ce720d2892671ae3b469
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled Access-Challenge
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 120 to 127.0.0.1 port 39997
EAP-Message = 0x01dc005b1900170301005012d64577ccc01398ecc088526153ceec011e3ba715989ad2b1051e56386e1b131e6929a03f7240739fc0a8c189e12be364721a24fffdf3b147cee17189d9d6ea7b41d45d97adef4c296b624379777bcd
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39efe887ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 37.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.4 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=121, length=232
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02dc002b190017030100201140fbddae816519c6fd83dc38b939d06c51d3d82e7f0e7dabf8d42f1bb69f03
State = 0xe8349e39efe887ca6d33ab4e3cddc8ca
Message-Authenticator = 0x1e1b47319fee865e35cbda1e78762b79
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 220 length 43
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:32 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:32 2017 : Info: [peap] Peap state phase2
Sun Sep 10 14:07:32 2017 : Info: [peap] EAP type mschapv2
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled request
EAP-Message = 0x02dc00061a03
server {
Sun Sep 10 14:07:32 2017 : Info: [peap] Setting User-Name to ricardo
Sending tunneled request
EAP-Message = 0x02dc00061a03
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "ricardo"
State = 0xec48d4beed94ce720d2892671ae3b469
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
server {
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 220 length 6
Sun Sep 10 14:07:32 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:32 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:32 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:32 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:32 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/mschapv2
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type mschapv2
Sun Sep 10 14:07:32 2017 : Info: [eap] Freeing handler
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = ok
Sun Sep 10 14:07:32 2017 : Auth: Login OK: [ricardo/<via Auth-Type = EAP>] (from client localhost port 0 cli C0-CC-F8-EC-55-F8 via TLS tunnel)
Sun Sep 10 14:07:32 2017 : Info: WARNING: Empty post-auth section. Using default return values.
} # server
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled reply code 2
MS-MPPE-Encryption-Policy = 0x00000001
MS-MPPE-Encryption-Types = 0x00000006
MS-MPPE-Send-Key = 0x704f7e7ee2ecada2bc481c8cd8bc931d
MS-MPPE-Recv-Key = 0xf8bac3a2c4fbe9bbbe5f0f46ebd77132
EAP-Message = 0x03dc0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "ricardo"
Sun Sep 10 14:07:32 2017 : Info: [peap] Got tunneled reply RADIUS code Access-Accept
MS-MPPE-Encryption-Policy = 0x00000001
MS-MPPE-Encryption-Types = 0x00000006
MS-MPPE-Send-Key = 0x704f7e7ee2ecada2bc481c8cd8bc931d
MS-MPPE-Recv-Key = 0xf8bac3a2c4fbe9bbbe5f0f46ebd77132
EAP-Message = 0x03dc0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "ricardo"
Sun Sep 10 14:07:32 2017 : Info: [peap] Tunneled authentication was successful.
Sun Sep 10 14:07:32 2017 : Info: [peap] SUCCESS
Sun Sep 10 14:07:32 2017 : Info: [peap] >>> Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] Saving tunneled attributes for later
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = handled
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = handled
Sending Access-Challenge of id 121 to 127.0.0.1 port 39997
EAP-Message = 0x01dd002b19001703010020b00738f3d45c9e8e86802714dabb4ac641e29b7c0a907ee8fef16bd8a01c09e3
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe8349e39e0e987ca6d33ab4e3cddc8ca
Sun Sep 10 14:07:32 2017 : Info: Finished request 38.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.4 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=122, length=232
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "07802D3C70FEB225"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x02dd002b19001703010020937d9c56b95a24b6db67ad90fa2dafc310ec8367889851a155798fd9428d06eb
State = 0xe8349e39e0e987ca6d33ab4e3cddc8ca
Message-Authenticator = 0xeb8e707d0ad1a5e1e973c2d08045264a
Sun Sep 10 14:07:32 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authorize {
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP packet type response id 221 length 43
Sun Sep 10 14:07:32 2017 : Info: [eap] Continuing tunnel setup.
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authorize = ok
Sun Sep 10 14:07:32 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:32 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:32 2017 : Info: +group authenticate {
Sun Sep 10 14:07:32 2017 : Info: [eap] Request found, released from the list
Sun Sep 10 14:07:32 2017 : Info: [eap] EAP/peap
Sun Sep 10 14:07:32 2017 : Info: [eap] processing type peap
Sun Sep 10 14:07:32 2017 : Info: [peap] processing EAP-TLS
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_verify returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] Done initial handshake
Sun Sep 10 14:07:32 2017 : Info: [peap] <<< Unknown TLS version [length 0005]
Sun Sep 10 14:07:32 2017 : Info: [peap] eaptls_process returned 7
Sun Sep 10 14:07:32 2017 : Info: [peap] EAPTLS_OK
Sun Sep 10 14:07:32 2017 : Info: [peap] Session established. Decoding tunneled attributes.
Sun Sep 10 14:07:32 2017 : Info: [peap] Peap state send tlv success
Sun Sep 10 14:07:32 2017 : Info: [peap] Received EAP-TLV response.
Sun Sep 10 14:07:32 2017 : Info: [peap] Success
Sun Sep 10 14:07:32 2017 : Info: [peap] Using saved attributes from the original Access-Accept
User-Name = "ricardo"
Sun Sep 10 14:07:32 2017 : Info: [eap] Freeing handler
Sun Sep 10 14:07:32 2017 : Info: ++[eap] = ok
Sun Sep 10 14:07:32 2017 : Info: +} # group authenticate = ok
Sun Sep 10 14:07:32 2017 : Auth: Login OK: [ricardo/<via Auth-Type = EAP>] (from client localhost port 0 cli C0-CC-F8-EC-55-F8)
Sun Sep 10 14:07:32 2017 : Info: WARNING: Empty post-auth section. Using default return values.
Sending Access-Accept of id 122 to 127.0.0.1 port 39997
User-Name = "ricardo"
MS-MPPE-Recv-Key = 0xf809382e90d0b04f215017c3b5c7733a611eb37ceaa35143455021fd6045be74
MS-MPPE-Send-Key = 0x2858e9865b292fe5f55acddfe83514c3162f7a077a42a2e971d37c9086fc3a79
EAP-Message = 0x03dd0004
Message-Authenticator = 0x00000000000000000000000000000000
Sun Sep 10 14:07:32 2017 : Info: Finished request 39.
Sun Sep 10 14:07:32 2017 : Debug: Going to the next request
Sun Sep 10 14:07:32 2017 : Debug: Waking up in 1.4 seconds.
rad_recv: Access-Request packet from host 127.0.0.1 port 39997, id=123, length=183
User-Name = "ricardo"
Called-Station-Id = "B8-27-EB-7A-87-CD:MyWiFi"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Calling-Station-Id = "C0-CC-F8-EC-55-F8"
Connect-Info = "CONNECT 0Mbps 802.11g"
Acct-Session-Id = "0E4849104B480BC4"
Attr-186 = 0x000fac04
Attr-187 = 0x000fac04
Attr-188 = 0x000fac01
Framed-MTU = 1400
EAP-Message = 0x0227000c017269636172646f
Message-Authenticator = 0xe5a5c9dc76b1b88a35d837389d07da75
Sun Sep 10 14:07:33 2017 : Info: # Executing section authorize from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:33 2017 : Info: +group authorize {
Sun Sep 10 14:07:33 2017 : Info: [eap] EAP packet type response id 39 length 12
Sun Sep 10 14:07:33 2017 : Info: [eap] No EAP Start, assuming it's an on-going EAP conversation
Sun Sep 10 14:07:33 2017 : Info: ++[eap] = updated
Sun Sep 10 14:07:33 2017 : Info: [files] users: Matched entry ricardo at line 76
Sun Sep 10 14:07:33 2017 : Info: ++[files] = ok
Sun Sep 10 14:07:33 2017 : Info: [pap] WARNING: Auth-Type already set. Not setting to PAP
Sun Sep 10 14:07:33 2017 : Info: ++[pap] = noop
Sun Sep 10 14:07:33 2017 : Info: +} # group authorize = updated
Sun Sep 10 14:07:33 2017 : Info: Found Auth-Type = EAP
Sun Sep 10 14:07:33 2017 : Info: # Executing group from file /etc/freeradius2/sites/default
Sun Sep 10 14:07:33 2017 : Info: +group authenticate {
Sun Sep 10 14:07:33 2017 : Info: [eap] EAP Identity
Sun Sep 10 14:07:33 2017 : Info: [eap] processing type tls
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment