Part of Slepp's ProjectsPastebinTURLImagebinFilebin
Feedback -- English French German Japanese
Create Upload Newest Tools Donate
Sign In | Create Account

Advertising

users
Tuesday, April 17th, 2007 at 4:14:06am UTC 

  1.         Message-Authenticator = 0x00000000000000000000000000000000
  2.         State = 0x19d453c8e6e0f4879c991b605f3eecdc
  3. Finished request 3
  4. Going to the next request
  5. Waking up in 6 seconds...
  6. rad_recv: Access-Request packet from host 10.1.1.110:1645, id=127, length=139
  7.         User-Name = "jt"
  8.         Framed-MTU = 1400
  9.         Called-Station-Id = "001a.6c5f.5100"
  10.         Calling-Station-Id = "0040.96a1.f472"
  11.         Service-Type = Login-User
  12.         Message-Authenticator = 0xd035ebfc0eb390a2c2134c3379f468ff
  13.         EAP-Message = 0x020600061900
  14.         NAS-Port-Type = Wireless-802.11
  15.         NAS-Port = 871
  16.         State = 0x19d453c8e6e0f4879c991b605f3eecdc
  17.         NAS-IP-Address = 10.1.1.110
  18.         NAS-Identifier = "ap-test"
  19.   Processing the authorize section of radiusd.conf
  20. modcall: entering group authorize for request 4
  21.   modcall[authorize]: module "preprocess" returns ok for request 4
  22.   modcall[authorize]: module "chap" returns noop for request 4
  23.   modcall[authorize]: module "mschap" returns noop for request 4
  24.     rlm_realm: No '@' in User-Name = "jt", looking up realm NULL
  25.     rlm_realm: No such realm "NULL"
  26.   modcall[authorize]: module "suffix" returns noop for request 4
  27.   rlm_eap: EAP packet type response id 6 length 6
  28.   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  29.   modcall[authorize]: module "eap" returns updated for request 4
  30. rlm_ldap: Entering ldap_groupcmp()
  31. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  32. radius_xlat:  '(posixAccount)(uid=jt))'
  33. rlm_ldap: ldap_get_conn: Checking Id: 0
  34. rlm_ldap: ldap_get_conn: Got Id: 0
  35. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  36. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  37. rlm_ldap::ldap_groupcmp: search failed
  38. rlm_ldap: ldap_release_conn: Release Id: 0
  39.     users: Matched entry DEFAULT at line 159
  40. rlm_ldap: Entering ldap_groupcmp()
  41. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  42. radius_xlat:  '(posixAccount)(uid=jt))'
  43. rlm_ldap: ldap_get_conn: Checking Id: 0
  44. rlm_ldap: ldap_get_conn: Got Id: 0
  45. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  46. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  47. rlm_ldap::ldap_groupcmp: search failed
  48. rlm_ldap: ldap_release_conn: Release Id: 0
  49. rlm_ldap: Entering ldap_groupcmp()
  50. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  51. radius_xlat:  '(posixAccount)(uid=jt))'
  52. rlm_ldap: ldap_get_conn: Checking Id: 0
  53. rlm_ldap: ldap_get_conn: Got Id: 0
  54. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  55. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  56. rlm_ldap::ldap_groupcmp: search failed
  57. rlm_ldap: ldap_release_conn: Release Id: 0
  58.   modcall[authorize]: module "files" returns ok for request 4
  59. modcall: leaving group authorize (returns updated) for request 4
  60.   rad_check_password:  Found Auth-Type EAP
  61. auth: type "EAP"
  62.   Processing the authenticate section of radiusd.conf
  63. modcall: entering group authenticate for request 4
  64.   rlm_eap: Request found, released from the list
  65.   rlm_eap: EAP/peap
  66.   rlm_eap: processing type peap
  67.   rlm_eap_peap: Authenticate
  68.   rlm_eap_tls: processing TLS
  69. rlm_eap_tls: Received EAP-TLS ACK message
  70.   rlm_eap_tls: ack handshake is finished
  71.   eaptls_verify returned 3
  72.   eaptls_process returned 3
  73.   rlm_eap_peap: EAPTLS_SUCCESS
  74.   modcall[authenticate]: module "eap" returns handled for request 4
  75. modcall: leaving group authenticate (returns handled) for request 4
  76. Sending Access-Challenge of id 127 to 10.1.1.110 port 1645
  77.         EAP-Message = 0x0107002019001703010015e9f906de4fc5b777bbe915d8ebffd58f6a2931036e
  78.         Message-Authenticator = 0x00000000000000000000000000000000
  79.         State = 0xcc2a2d151b3b6ad9cc7123cbfd557893
  80. Finished request 4
  81. Going to the next request
  82. Waking up in 6 seconds...
  83. rad_recv: Access-Request packet from host 10.1.1.110:1645, id=128, length=163
  84.         User-Name = "jt"
  85.         Framed-MTU = 1400
  86.         Called-Station-Id = "001a.6c5f.5100"
  87.         Calling-Station-Id = "0040.96a1.f472"
  88.         Service-Type = Login-User
  89.         Message-Authenticator = 0xaca41b4cad764b022ba7dade815906b1
  90.         EAP-Message = 0x0207001e19001703010013b4e933436de72b4e1313bd705721cfdf2fc901
  91.         NAS-Port-Type = Wireless-802.11
  92.         NAS-Port = 871
  93.         State = 0xcc2a2d151b3b6ad9cc7123cbfd557893
  94.         NAS-IP-Address = 10.1.1.110
  95.         NAS-Identifier = "ap-test"
  96.   Processing the authorize section of radiusd.conf
  97. modcall: entering group authorize for request 5
  98.   modcall[authorize]: module "preprocess" returns ok for request 5
  99.   modcall[authorize]: module "chap" returns noop for request 5
  100.   modcall[authorize]: module "mschap" returns noop for request 5
  101.     rlm_realm: No '@' in User-Name = "jt", looking up realm NULL
  102.     rlm_realm: No such realm "NULL"
  103.   modcall[authorize]: module "suffix" returns noop for request 5
  104.   rlm_eap: EAP packet type response id 7 length 30
  105.   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  106.   modcall[authorize]: module "eap" returns updated for request 5
  107. rlm_ldap: Entering ldap_groupcmp()
  108. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  109. radius_xlat:  '(posixAccount)(uid=jt))'
  110. rlm_ldap: ldap_get_conn: Checking Id: 0
  111. rlm_ldap: ldap_get_conn: Got Id: 0
  112. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  113. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  114. rlm_ldap::ldap_groupcmp: search failed
  115. rlm_ldap: ldap_release_conn: Release Id: 0
  116.     users: Matched entry DEFAULT at line 159
  117. rlm_ldap: Entering ldap_groupcmp()
  118. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  119. radius_xlat:  '(posixAccount)(uid=jt))'
  120. rlm_ldap: ldap_get_conn: Checking Id: 0
  121. rlm_ldap: ldap_get_conn: Got Id: 0
  122. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  123. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  124. rlm_ldap::ldap_groupcmp: search failed
  125. rlm_ldap: ldap_release_conn: Release Id: 0
  126. rlm_ldap: Entering ldap_groupcmp()
  127. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  128. radius_xlat:  '(posixAccount)(uid=jt))'
  129. rlm_ldap: ldap_get_conn: Checking Id: 0
  130. rlm_ldap: ldap_get_conn: Got Id: 0
  131. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  132. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  133. rlm_ldap::ldap_groupcmp: search failed
  134. rlm_ldap: ldap_release_conn: Release Id: 0
  135.   modcall[authorize]: module "files" returns ok for request 5
  136. modcall: leaving group authorize (returns updated) for request 5
  137.   rad_check_password:  Found Auth-Type EAP
  138. auth: type "EAP"
  139.   Processing the authenticate section of radiusd.conf
  140. modcall: entering group authenticate for request 5
  141.   rlm_eap: Request found, released from the list
  142.   rlm_eap: EAP/peap
  143.   rlm_eap: processing type peap
  144.   rlm_eap_peap: Authenticate
  145.   rlm_eap_tls: processing TLS
  146.   eaptls_verify returned 7
  147.   rlm_eap_tls: Done initial handshake
  148.   eaptls_process returned 7
  149.   rlm_eap_peap: EAPTLS_OK
  150.   rlm_eap_peap: Session established.  Decoding tunneled attributes.
  151.   rlm_eap_peap: Identity - jt
  152.   rlm_eap_peap: Tunneled data is valid.
  153.   PEAP: Got tunneled EAP-Message
  154.         EAP-Message = 0x02070007016a74
  155.   PEAP: Got tunneled identity of jt
  156.   PEAP: Setting default EAP type for tunneled EAP session.
  157.   PEAP: Setting User-Name to jt
  158.   PEAP: Sending tunneled request
  159.         EAP-Message = 0x02070007016a74
  160.         FreeRADIUS-Proxied-To = 127.0.0.1
  161.         User-Name = "jt"
  162.   Processing the authorize section of radiusd.conf
  163. modcall: entering group authorize for request 5
  164.   modcall[authorize]: module "preprocess" returns ok for request 5
  165.   modcall[authorize]: module "chap" returns noop for request 5
  166.   modcall[authorize]: module "mschap" returns noop for request 5
  167.     rlm_realm: No '@' in User-Name = "jt", looking up realm NULL
  168.     rlm_realm: No such realm "NULL"
  169.   modcall[authorize]: module "suffix" returns noop for request 5
  170.   rlm_eap: EAP packet type response id 7 length 7
  171.   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  172.   modcall[authorize]: module "eap" returns updated for request 5
  173. rlm_ldap: Entering ldap_groupcmp()
  174. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  175. radius_xlat:  '(posixAccount)(uid=jt))'
  176. rlm_ldap: ldap_get_conn: Checking Id: 0
  177. rlm_ldap: ldap_get_conn: Got Id: 0
  178. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  179. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  180. rlm_ldap::ldap_groupcmp: search failed
  181. rlm_ldap: ldap_release_conn: Release Id: 0
  182.     users: Matched entry DEFAULT at line 159
  183. rlm_ldap: Entering ldap_groupcmp()
  184. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  185. radius_xlat:  '(posixAccount)(uid=jt))'
  186. rlm_ldap: ldap_get_conn: Checking Id: 0
  187. rlm_ldap: ldap_get_conn: Got Id: 0
  188. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  189. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  190. rlm_ldap::ldap_groupcmp: search failed
  191. rlm_ldap: ldap_release_conn: Release Id: 0
  192. rlm_ldap: Entering ldap_groupcmp()
  193. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  194. radius_xlat:  '(posixAccount)(uid=jt))'
  195. rlm_ldap: ldap_get_conn: Checking Id: 0
  196. rlm_ldap: ldap_get_conn: Got Id: 0
  197. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  198. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  199. rlm_ldap::ldap_groupcmp: search failed
  200. rlm_ldap: ldap_release_conn: Release Id: 0
  201.   modcall[authorize]: module "files" returns ok for request 5
  202. modcall: leaving group authorize (returns updated) for request 5
  203.   rad_check_password:  Found Auth-Type EAP
  204. auth: type "EAP"
  205.   Processing the authenticate section of radiusd.conf
  206. modcall: entering group authenticate for request 5
  207.   rlm_eap: EAP Identity
  208.   rlm_eap: processing type mschapv2
  209. rlm_eap_mschapv2: Issuing Challenge
  210.   modcall[authenticate]: module "eap" returns handled for request 5
  211. modcall: leaving group authenticate (returns handled) for request 5
  212.   PEAP: Got tunneled reply RADIUS code 11
  213.         EAP-Message = 0x0108001c1a01080017107f4dbadd521cd9ac66687ce2ec3e9f216a74
  214.         Message-Authenticator = 0x00000000000000000000000000000000
  215.         State = 0x7cb848ea36d29610bfb594be40c2072a
  216.   PEAP: Processing from tunneled session code 0x8b6c4e0 11
  217.         EAP-Message = 0x0108001c1a01080017107f4dbadd521cd9ac66687ce2ec3e9f216a74
  218.         Message-Authenticator = 0x00000000000000000000000000000000
  219.         State = 0x7cb848ea36d29610bfb594be40c2072a
  220.   PEAP: Got tunneled Access-Challenge
  221.   modcall[authenticate]: module "eap" returns handled for request 5
  222. modcall: leaving group authenticate (returns handled) for request 5
  223. Sending Access-Challenge of id 128 to 10.1.1.110 port 1645
  224.         EAP-Message = 0x0108003319001703010028328b82e1b101ad9164e256ff4de61e882c54b32b9a4bb33faaceb022048a5657a6343524e5173584
  225.         Message-Authenticator = 0x00000000000000000000000000000000
  226.         State = 0xd72893f41dfd9e2e7fd38e6d2606af27
  227. Finished request 5
  228. Going to the next request
  229. Waking up in 6 seconds...
  230. rad_recv: Access-Request packet from host 10.1.1.110:1645, id=129, length=217
  231.         User-Name = "jt"
  232.         Framed-MTU = 1400
  233.         Called-Station-Id = "001a.6c5f.5100"
  234.         Calling-Station-Id = "0040.96a1.f472"
  235.         Service-Type = Login-User
  236.         Message-Authenticator = 0xa7191dbe7d3ca7a6dbf1efa258ee158e
  237.         EAP-Message = 0x0208005419001703010049e6bc9cd2805b2b9e89244e52ee970b323b9d04fb9f380ffbca3c7259c2eba62bb23bea8758ec4e0b729dc6efe2cc98d5c97b92f81ca0e3d52cbc1a547d8ae7b269fb1f231f7e303bc8
  238.         NAS-Port-Type = Wireless-802.11
  239.         NAS-Port = 871
  240.         State = 0xd72893f41dfd9e2e7fd38e6d2606af27
  241.         NAS-IP-Address = 10.1.1.110
  242.         NAS-Identifier = "ap-test"
  243.   Processing the authorize section of radiusd.conf
  244. modcall: entering group authorize for request 6
  245.   modcall[authorize]: module "preprocess" returns ok for request 6
  246.   modcall[authorize]: module "chap" returns noop for request 6
  247.   modcall[authorize]: module "mschap" returns noop for request 6
  248.     rlm_realm: No '@' in User-Name = "jt", looking up realm NULL
  249.     rlm_realm: No such realm "NULL"
  250.   modcall[authorize]: module "suffix" returns noop for request 6
  251.   rlm_eap: EAP packet type response id 8 length 84
  252.   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  253.   modcall[authorize]: module "eap" returns updated for request 6
  254. rlm_ldap: Entering ldap_groupcmp()
  255. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  256. radius_xlat:  '(posixAccount)(uid=jt))'
  257. rlm_ldap: ldap_get_conn: Checking Id: 0
  258. rlm_ldap: ldap_get_conn: Got Id: 0
  259. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  260. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  261. rlm_ldap::ldap_groupcmp: search failed
  262. rlm_ldap: ldap_release_conn: Release Id: 0
  263.     users: Matched entry DEFAULT at line 159
  264. rlm_ldap: Entering ldap_groupcmp()
  265. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  266. radius_xlat:  '(posixAccount)(uid=jt))'
  267. rlm_ldap: ldap_get_conn: Checking Id: 0
  268. rlm_ldap: ldap_get_conn: Got Id: 0
  269. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  270. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  271. rlm_ldap::ldap_groupcmp: search failed
  272. rlm_ldap: ldap_release_conn: Release Id: 0
  273. rlm_ldap: Entering ldap_groupcmp()
  274. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  275. radius_xlat:  '(posixAccount)(uid=jt))'
  276. rlm_ldap: ldap_get_conn: Checking Id: 0
  277. rlm_ldap: ldap_get_conn: Got Id: 0
  278. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  279. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  280. rlm_ldap::ldap_groupcmp: search failed
  281. rlm_ldap: ldap_release_conn: Release Id: 0
  282.   modcall[authorize]: module "files" returns ok for request 6
  283. modcall: leaving group authorize (returns updated) for request 6
  284.   rad_check_password:  Found Auth-Type EAP
  285. auth: type "EAP"
  286.   Processing the authenticate section of radiusd.conf
  287. modcall: entering group authenticate for request 6
  288.   rlm_eap: Request found, released from the list
  289.   rlm_eap: EAP/peap
  290.   rlm_eap: processing type peap
  291.   rlm_eap_peap: Authenticate
  292.   rlm_eap_tls: processing TLS
  293.   eaptls_verify returned 7
  294.   rlm_eap_tls: Done initial handshake
  295.   eaptls_process returned 7
  296.   rlm_eap_peap: EAPTLS_OK
  297.   rlm_eap_peap: Session established.  Decoding tunneled attributes.
  298.   rlm_eap_peap: EAP type mschapv2
  299.   rlm_eap_peap: Tunneled data is valid.
  300.   PEAP: Got tunneled EAP-Message
  301.         EAP-Message = 0x0208003d1a02080038316c3c814dc2b2bed7cf20b6fccc5a7cdc0000000000000000d5b1280026eb1487c1635ff6bdc22d0ff524f93999f55e22006a74
  302.   PEAP: Setting User-Name to jt
  303.   PEAP: Adding old state with 7c b8
  304.   PEAP: Sending tunneled request
  305.         EAP-Message = 0x0208003d1a02080038316c3c814dc2b2bed7cf20b6fccc5a7cdc0000000000000000d5b1280026eb1487c1635ff6bdc22d0ff524f93999f55e22006a74
  306.         FreeRADIUS-Proxied-To = 127.0.0.1
  307.         User-Name = "jt"
  308.         State = 0x7cb848ea36d29610bfb594be40c2072a
  309.   Processing the authorize section of radiusd.conf
  310. modcall: entering group authorize for request 6
  311.   modcall[authorize]: module "preprocess" returns ok for request 6
  312.   modcall[authorize]: module "chap" returns noop for request 6
  313.   modcall[authorize]: module "mschap" returns noop for request 6
  314.     rlm_realm: No '@' in User-Name = "jt", looking up realm NULL
  315.     rlm_realm: No such realm "NULL"
  316.   modcall[authorize]: module "suffix" returns noop for request 6
  317.   rlm_eap: EAP packet type response id 8 length 61
  318.   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  319.   modcall[authorize]: module "eap" returns updated for request 6
  320. rlm_ldap: Entering ldap_groupcmp()
  321. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  322. radius_xlat:  '(posixAccount)(uid=jt))'
  323. rlm_ldap: ldap_get_conn: Checking Id: 0
  324. rlm_ldap: ldap_get_conn: Got Id: 0
  325. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  326. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  327. rlm_ldap::ldap_groupcmp: search failed
  328. rlm_ldap: ldap_release_conn: Release Id: 0
  329.     users: Matched entry DEFAULT at line 159
  330. rlm_ldap: Entering ldap_groupcmp()
  331. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  332. radius_xlat:  '(posixAccount)(uid=jt))'
  333. rlm_ldap: ldap_get_conn: Checking Id: 0
  334. rlm_ldap: ldap_get_conn: Got Id: 0
  335. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  336. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  337. rlm_ldap::ldap_groupcmp: search failed
  338. rlm_ldap: ldap_release_conn: Release Id: 0
  339. rlm_ldap: Entering ldap_groupcmp()
  340. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  341. radius_xlat:  '(posixAccount)(uid=jt))'
  342. rlm_ldap: ldap_get_conn: Checking Id: 0
  343. rlm_ldap: ldap_get_conn: Got Id: 0
  344. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  345. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  346. rlm_ldap::ldap_groupcmp: search failed
  347. rlm_ldap: ldap_release_conn: Release Id: 0
  348.   modcall[authorize]: module "files" returns ok for request 6
  349. modcall: leaving group authorize (returns updated) for request 6
  350.   rad_check_password:  Found Auth-Type EAP
  351. auth: type "EAP"
  352.   Processing the authenticate section of radiusd.conf
  353. modcall: entering group authenticate for request 6
  354.   rlm_eap: Request found, released from the list
  355.   rlm_eap: EAP/mschapv2
  356.   rlm_eap: processing type mschapv2
  357.   Processing the authenticate section of radiusd.conf
  358. modcall: entering group MS-CHAP for request 6
  359.   rlm_mschap: No User-Password configured.  Cannot create LM-Password.
  360.   rlm_mschap: No User-Password configured.  Cannot create NT-Password.
  361.   rlm_mschap: Told to do MS-CHAPv2 for jt with NT-Password
  362. radius_xlat: Running registered xlat function of module mschap for string 'User-Name'
  363. radius_xlat: Running registered xlat function of module mschap for string 'NT-Domain'
  364.   rlm_mschap: No NT-Domain was found in the User-Name.
  365. radius_xlat: Running registered xlat function of module mschap for string 'Challenge'
  366.  mschap2: 7f
  367. radius_xlat: Running registered xlat function of module mschap for string 'NT-Response'
  368. radius_xlat:  '/usr/bin/ntlm_auth --request-nt-key --username=jt --domain= --challenge=ed636e41a0b537bd --nt-response=d5b1280026eb1487c1635ff6bdc22d0ff524f93999f55e22'
  369. Exec-Program: /usr/bin/ntlm_auth --request-nt-key --username=jt --domain= --challenge=ed636e41a0b537bd --nt-response=d5b1280026eb1487c1635ff6bdc22d0ff524f93999f55e22
  370. Exec-Program output: Reading winbind reply failed! (0xc0000001)
  371. Exec-Program-Wait: plaintext: Reading winbind reply failed! (0xc0000001)
  372. Exec-Program: returned: 1
  373.   rlm_mschap: External script failed.
  374.   rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  375.   modcall[authenticate]: module "mschap" returns reject for request 6
  376. modcall: leaving group MS-CHAP (returns reject) for request 6
  377.   rlm_eap: Freeing handler
  378.   modcall[authenticate]: module "eap" returns reject for request 6
  379. modcall: leaving group authenticate (returns reject) for request 6
  380. auth: Failed to validate the user.
  381.   PEAP: Got tunneled reply RADIUS code 3
  382.         MS-CHAP-Error = "\010E=691 R=1"
  383.         EAP-Message = 0x04080004
  384.         Message-Authenticator = 0x00000000000000000000000000000000
  385.   PEAP: Processing from tunneled session code 0x8b40460 3
  386.         MS-CHAP-Error = "\010E=691 R=1"
  387.         EAP-Message = 0x04080004
  388.         Message-Authenticator = 0x00000000000000000000000000000000
  389.   PEAP: Tunneled authentication was rejected.
  390.   rlm_eap_peap: FAILURE
  391.   modcall[authenticate]: module "eap" returns handled for request 6
  392. modcall: leaving group authenticate (returns handled) for request 6
  393. Sending Access-Challenge of id 129 to 10.1.1.110 port 1645
  394.         EAP-Message = 0x010900261900170301001bad96219a9eb912d616418100b9f4f71b9154e5c614d3618e5ac04a
  395.         Message-Authenticator = 0x00000000000000000000000000000000
  396.         State = 0x05b8f349e6be034e9e7903549b84d783
  397. Finished request 6
  398. Going to the next request
  399. Waking up in 6 seconds...
  400. rad_recv: Access-Request packet from host 10.1.1.110:1645, id=130, length=171
  401.         User-Name = "jt"
  402.         Framed-MTU = 1400
  403.         Called-Station-Id = "001a.6c5f.5100"
  404.         Calling-Station-Id = "0040.96a1.f472"
  405.         Service-Type = Login-User
  406.         Message-Authenticator = 0x14c82d583c10d692af4cdb9548cd4912
  407.         EAP-Message = 0x020900261900170301001be88c97a9a61f4622b0e8e4d5bd09c5eeaa7d311b4617df8bedf0a6
  408.         NAS-Port-Type = Wireless-802.11
  409.         NAS-Port = 871
  410.         State = 0x05b8f349e6be034e9e7903549b84d783
  411.         NAS-IP-Address = 10.1.1.110
  412.         NAS-Identifier = "ap-test"
  413.   Processing the authorize section of radiusd.conf
  414. modcall: entering group authorize for request 7
  415.   modcall[authorize]: module "preprocess" returns ok for request 7
  416.   modcall[authorize]: module "chap" returns noop for request 7
  417.   modcall[authorize]: module "mschap" returns noop for request 7
  418.     rlm_realm: No '@' in User-Name = "jt", looking up realm NULL
  419.     rlm_realm: No such realm "NULL"
  420.   modcall[authorize]: module "suffix" returns noop for request 7
  421.   rlm_eap: EAP packet type response id 9 length 38
  422.   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  423.   modcall[authorize]: module "eap" returns updated for request 7
  424. rlm_ldap: Entering ldap_groupcmp()
  425. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  426. radius_xlat:  '(posixAccount)(uid=jt))'
  427. rlm_ldap: ldap_get_conn: Checking Id: 0
  428. rlm_ldap: ldap_get_conn: Got Id: 0
  429. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  430. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  431. rlm_ldap::ldap_groupcmp: search failed
  432. rlm_ldap: ldap_release_conn: Release Id: 0
  433.     users: Matched entry DEFAULT at line 159
  434. rlm_ldap: Entering ldap_groupcmp()
  435. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  436. radius_xlat:  '(posixAccount)(uid=jt))'
  437. rlm_ldap: ldap_get_conn: Checking Id: 0
  438. rlm_ldap: ldap_get_conn: Got Id: 0
  439. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  440. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  441. rlm_ldap::ldap_groupcmp: search failed
  442. rlm_ldap: ldap_release_conn: Release Id: 0
  443. rlm_ldap: Entering ldap_groupcmp()
  444. radius_xlat:  'ou=users,dc=tfxschool,dc=com'
  445. radius_xlat:  '(posixAccount)(uid=jt))'
  446. rlm_ldap: ldap_get_conn: Checking Id: 0
  447. rlm_ldap: ldap_get_conn: Got Id: 0
  448. rlm_ldap: performing search in ou=users,dc=tfxschool,dc=com, with filter (posixAccount)(uid=jt))
  449. rlm_ldap: ldap_search() failed: Bad search filter: (posixAccount)(uid=jt))
  450. rlm_ldap::ldap_groupcmp: search failed
  451. rlm_ldap: ldap_release_conn: Release Id: 0
  452.   modcall[authorize]: module "files" returns ok for request 7
  453. modcall: leaving group authorize (returns updated) for request 7
  454.   rad_check_password:  Found Auth-Type EAP
  455. auth: type "EAP"
  456.   Processing the authenticate section of radiusd.conf
  457. modcall: entering group authenticate for request 7
  458.   rlm_eap: Request found, released from the list
  459.   rlm_eap: EAP/peap
  460.   rlm_eap: processing type peap
  461.   rlm_eap_peap: Authenticate
  462.   rlm_eap_tls: processing TLS
  463.   eaptls_verify returned 7
  464.   rlm_eap_tls: Done initial handshake
  465.   eaptls_process returned 7
  466.   rlm_eap_peap: EAPTLS_OK
  467.   rlm_eap_peap: Session established.  Decoding tunneled attributes.
  468.   rlm_eap_peap: Received EAP-TLV response.
  469.   rlm_eap_peap: Tunneled data is valid.
  470.   rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected earlier in this session.
  471.  rlm_eap: Handler failed in EAP/peap
  472.   rlm_eap: Failed in EAP select
  473.   modcall[authenticate]: module "eap" returns invalid for request 7
  474. modcall: leaving group authenticate (returns invalid) for request 7
  475. auth: Failed to validate the user.
  476. Delaying request 7 for 1 seconds
  477. Finished request 7
  478. Going to the next request
  479. Waking up in 6 seconds...
  480. rad_recv: Access-Request packet from host 10.1.1.110:1645, id=130, length=171
  481. Sending Access-Reject of id 130 to 10.1.1.110 port 1645
  482.         EAP-Message = 0x04090004
  483.         Message-Authenticator = 0x00000000000000000000000000000000
  484. --- Walking the entire request list ---
  485. Waking up in 1 seconds...
  486. --- Walking the entire request list ---
  487. Cleaning up request 0 ID 123 with timestamp 46244919
  488. Cleaning up request 1 ID 124 with timestamp 46244919
  489. Cleaning up request 2 ID 125 with timestamp 46244919
  490. Cleaning up request 3 ID 126 with timestamp 46244919
  491. Cleaning up request 4 ID 127 with timestamp 46244919
  492. Cleaning up request 5 ID 128 with timestamp 46244919
  493. Cleaning up request 6 ID 129 with timestamp 46244919
  494. Cleaning up request 7 ID 130 with timestamp 46244919
  495. Nothing to do.  Sleeping until we see a request.
  496. QObject::disconnect: Unexpected null parameter

advertising

Update the Post

Either update this post and resubmit it with changes, or make a new post.

You may also comment on this post.

update paste below
details of the post (optional)

Note: Only the paste content is required, though the following information can be useful to others.

Save name / title?

(space separated, optional)



Please note that information posted here will expire by default in one month. If you do not want it to expire, please set the expiry time above. If it is set to expire, web search engines will not be allowed to index it prior to it expiring. Items that are not marked to expire will be indexable by search engines. Be careful with your passwords. All illegal activities will be reported and any information will be handed over to the authorities, so be good.

comments powered by Disqus
worth-right
worth-right