Starting - reading configuration files ... reread_config: reading radiusd.conf Config: including file: /home/soft-local/freeradius-1.1.3/etc/raddb/proxy.conf Config: including file: /home/soft-local/freeradius-1.1.3/etc/raddb/clients.conf Config: including file: /home/soft-local/freeradius-1.1.3/etc/raddb/snmp.conf Config: including file: /home/soft-local/freeradius-1.1.3/etc/raddb/eap.conf Config: including file: /home/soft-local/freeradius-1.1.3/etc/raddb/sql.conf main: prefix = "/home/soft-local/freeradius-1.1.3" main: localstatedir = "/home/soft-local/freeradius-1.1.3/var" main: logdir = "/home/soft-local/freeradius-1.1.3/var/log/radius" main: libdir = "/home/soft-local/freeradius-1.1.3/lib" main: radacctdir = "/home/soft-local/freeradius-1.1.3/var/log/radius/radacct" main: hostname_lookups = no main: max_request_time = 30 main: cleanup_delay = 5 main: max_requests = 1024 main: delete_blocked_requests = 0 main: port = 20000 main: allow_core_dumps = no main: log_stripped_names = no main: log_file = "/home/soft-local/freeradius-1.1.3/var/log/radius/radius.log" main: log_auth = no main: log_auth_badpass = no main: log_auth_goodpass = no main: pidfile = "/home/soft-local/freeradius-1.1.3/var/run/radiusd/radiusd.pid" main: user = "radius" main: group = "radius" main: usercollide = no main: lower_user = "no" main: lower_pass = "no" main: nospace_user = "no" main: nospace_pass = "no" main: checkrad = "/home/soft-local/freeradius-1.1.3/sbin/checkrad" main: proxy_requests = yes proxy: retry_delay = 5 proxy: retry_count = 3 proxy: synchronous = no proxy: default_fallback = yes proxy: dead_time = 120 proxy: post_proxy_authorize = no proxy: wake_all_if_all_dead = no security: max_attributes = 200 security: reject_delay = 1 security: status_server = no main: debug_level = 0 read_config_files: reading dictionary read_config_files: reading naslist Using deprecated naslist file. Support for this will go away soon. read_config_files: reading clients read_config_files: reading realms radiusd: entering modules setup Module: Library search path is /home/soft-local/freeradius-1.1.3/lib Module: Loaded exec exec: wait = yes exec: program = "(null)" exec: input_pairs = "request" exec: output_pairs = "(null)" exec: packet_type = "(null)" rlm_exec: Wait=yes but no output defined. Did you mean output=none? Module: Instantiated exec (exec) Module: Loaded expr Module: Instantiated expr (expr) Module: Loaded PAP pap: encryption_scheme = "crypt" Module: Instantiated pap (pap) Module: Loaded CHAP Module: Instantiated chap (chap) Module: Loaded MS-CHAP mschap: use_mppe = yes mschap: require_encryption = no mschap: require_strong = no mschap: with_ntdomain_hack = no mschap: passwd = "(null)" mschap: ntlm_auth = "(null)" Module: Instantiated mschap (mschap) Module: Loaded System unix: cache = no unix: passwd = "(null)" unix: shadow = "(null)" unix: group = "(null)" unix: radwtmp = "/home/soft-local/freeradius-1.1.3/var/log/radius/radwtmp" unix: usegroup = no unix: cache_reload = 600 Module: Instantiated unix (unix) Module: Loaded eap eap: default_eap_type = "tls" eap: timer_expire = 60 eap: ignore_unknown_eap_types = no eap: cisco_accounting_username_bug = no tls: rsa_key_exchange = no tls: dh_key_exchange = yes tls: rsa_key_length = 512 tls: dh_key_length = 512 tls: verify_depth = 0 tls: CA_path = "(null)" tls: pem_file_type = yes tls: private_key_file = "/home/soft-local/freeradius-1.1.3/etc/raddb/certs/cert-srv.pem" tls: certificate_file = "/home/soft-local/freeradius-1.1.3/etc/raddb/certs/cert-srv.pem" tls: CA_file = "/home/soft-local/freeradius-1.1.3/etc/raddb/certs/demoCA/cacert.pem" tls: private_key_password = "XXXXXXXXXXXXXXX" tls: dh_file = "/home/soft-local/freeradius-1.1.3/etc/raddb/certs/dh" tls: random_file = "/dev/urandom" tls: fragment_size = 1024 tls: include_length = yes tls: check_crl = no tls: check_cert_cn = "(null)" tls: cipher_list = "(null)" tls: check_cert_issuer = "(null)" rlm_eap_tls: Loading the certificate file as a chain rlm_eap: Loaded and initialized type tls peap: default_eap_type = "mschapv2" peap: copy_request_to_tunnel = no peap: use_tunneled_reply = no peap: proxy_tunneled_request_as_eap = yes rlm_eap: Loaded and initialized type peap mschapv2: with_ntdomain_hack = no rlm_eap: Loaded and initialized type mschapv2 Module: Instantiated eap (eap) Module: Loaded preprocess preprocess: huntgroups = "/home/soft-local/freeradius-1.1.3/etc/raddb/huntgroups" preprocess: hints = "/home/soft-local/freeradius-1.1.3/etc/raddb/hints" preprocess: with_ascend_hack = no preprocess: ascend_channels_per_line = 23 preprocess: with_ntdomain_hack = no preprocess: with_specialix_jetstream_hack = no preprocess: with_cisco_vsa_hack = no preprocess: with_alvarion_vsa_hack = no Module: Instantiated preprocess (preprocess) Module: Loaded realm realm: format = "suffix" realm: delimiter = "@" realm: ignore_default = no realm: ignore_null = no Module: Instantiated realm (suffix) Module: Loaded files files: usersfile = "/home/soft-local/freeradius-1.1.3/etc/raddb/users" files: acctusersfile = "/home/soft-local/freeradius-1.1.3/etc/raddb/acct_users" files: preproxy_usersfile = "/home/soft-local/freeradius-1.1.3/etc/raddb/preproxy_users" files: compat = "no" Module: Instantiated files (files) Module: Loaded Acct-Unique-Session-Id acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" Module: Instantiated acct_unique (acct_unique) Module: Loaded detail detail: detailfile = "/home/soft-local/freeradius-1.1.3/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" detail: detailperm = 384 detail: dirperm = 493 detail: locking = no Module: Instantiated detail (detail) Module: Loaded radutmp radutmp: filename = "/home/soft-local/freeradius-1.1.3/var/log/radius/radutmp" radutmp: username = "%{User-Name}" radutmp: case_sensitive = yes radutmp: check_with_nas = yes radutmp: perm = 384 radutmp: callerid = yes Module: Instantiated radutmp (radutmp) Listening on authentication *:20000 Listening on accounting *:20001 Ready to process requests. rad_recv: Access-Request packet from host 192.168.100.100:1645, id=27, length=129 User-Name = "marcos" Framed-MTU = 1400 Called-Station-Id = "0011.5cc3.9570" Calling-Station-Id = "000c.f101.5c52" Service-Type = Login-User Message-Authenticator = 0x37d3c9209f48000c5ca2ad78d18708e2 EAP-Message = 0x0202000b016d6172636f73 NAS-Port-Type = Wireless-802.11 NAS-Port = 1460 NAS-IP-Address = 192.168.100.100 NAS-Identifier = "wlpb01" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 modcall[authorize]: module "mschap" returns noop for request 0 rlm_realm: No '@' in User-Name = "marcos", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 rlm_eap: EAP packet type response id 2 length 11 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 0 users: Matched entry DEFAULT at line 152 modcall[authorize]: module "files" returns ok for request 0 modcall: leaving group authorize (returns updated) for request 0 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 0 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 0 modcall: leaving group authenticate (returns handled) for request 0 Sending Access-Challenge of id 27 to 192.168.100.100 port 1645 EAP-Message = 0x010300060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x79b0f0a42a20b85416a878147adba30a Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.100.100:1645, id=28, length=248 User-Name = "marcos" Framed-MTU = 1400 Called-Station-Id = "0011.5cc3.9570" Calling-Station-Id = "000c.f101.5c52" Service-Type = Login-User Message-Authenticator = 0x9ff350b061e3eedfed1e6ded664bd911 EAP-Message = 0x020300700d800000006616030100610100005d03014506d590952544db5573e36bc09d8f8cba2f2d63f56d84ca7eeb453312159d36202b4d465cd5d435b8eb0c627fa4ff27b0795dfaec71a955413695125c9aee4ccb001600040005000a000900640062000300060013001200630100 NAS-Port-Type = Wireless-802.11 NAS-Port = 1460 State = 0x79b0f0a42a20b85416a878147adba30a NAS-IP-Address = 192.168.100.100 NAS-Identifier = "wlpb01" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1 modcall[authorize]: module "preprocess" returns ok for request 1 modcall[authorize]: module "chap" returns noop for request 1 modcall[authorize]: module "mschap" returns noop for request 1 rlm_realm: No '@' in User-Name = "marcos", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1 rlm_eap: EAP packet type response id 3 length 112 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1 users: Matched entry DEFAULT at line 152 modcall[authorize]: module "files" returns ok for request 1 modcall: leaving group authorize (returns updated) for request 1 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0800], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 00fb], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 1 modcall: leaving group authenticate (returns handled) for request 1 Sending Access-Challenge of id 28 to 192.168.100.100 port 1645 EAP-Message = 0x0104040a0dc000000954160301004a0200004603014506d566692714fa02e6f89209317094336cd6eddeff7492565b48ad846610be20d8ad6e7049a4d53ec078ae02e784b6e9e5cc1bf460255b4acabeaa159286d97400040016030108000b0007fc0007f900035930820355308202bea00302010202020099300d06092a864886f70d01010405003081e8310b3009060355040613024553311230100603550408130942617263656c6f6e61311230100603550407130942617263656c6f6e61312d302b060355040a1324556e69766572736974617420506f6c697465636e69636120646520436174616c756e7961313a3038060355040b1331446570 EAP-Message = 0x617274616d656e74206465204c6c656e6775617467657320692053697374656d657320496e666f726d6174696373312430220603550403131b4c61626f7261746f72692064652043616c63756c206465204c53493120301e06092a864886f70d01090116116c636c7369406c73692e7570632e656475301e170d3036303331353131313332375a170d3037303331353131313332375a3081dd310b3009060355040613024553311230100603550408130942617263656c6f6e61311230100603550407130942617263656c6f6e61313a3038060355040a1331446570617274616d656e74206465204c6c656e6775617467657320692053697374656d65 EAP-Message = 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 EAP-Message = 0x91583256a869367e9c5466ac251062bee160f0aa9b02fcb68b0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d010104050003818100bbb0de066a03fd34f7388d07e7b7ee970a94f282ab106b08cf4c9f97e7bea31b12e59ab186358520064aa951f383de696ee5c422e58817f423e7705bf6d2ae50c5e6c4fd93f4b86192df1d9d011b1687026ca502877badbca365267c828148e96260abc563fc9f17d0d97f533de7bc85f901a997e7882ad9b2a28a7c1cbd854a00049a30820496308203ffa003020102020100300d06092a864886f70d01010405003081e8310b300906035504061302455331 EAP-Message = 0x1230100603550408130942617263656c6f6e61311230 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x5bc970dd93025fe9c68b34d0406922e8 Finished request 1 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.100.100:1645, id=29, length=142 User-Name = "marcos" Framed-MTU = 1400 Called-Station-Id = "0011.5cc3.9570" Calling-Station-Id = "000c.f101.5c52" Service-Type = Login-User Message-Authenticator = 0x3166617a72c2a48a1dda08be4f8b7042 EAP-Message = 0x020400060d00 NAS-Port-Type = Wireless-802.11 NAS-Port = 1460 State = 0x5bc970dd93025fe9c68b34d0406922e8 NAS-IP-Address = 192.168.100.100 NAS-Identifier = "wlpb01" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 2 modcall[authorize]: module "preprocess" returns ok for request 2 modcall[authorize]: module "chap" returns noop for request 2 modcall[authorize]: module "mschap" returns noop for request 2 rlm_realm: No '@' in User-Name = "marcos", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 2 rlm_eap: EAP packet type response id 4 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 2 users: Matched entry DEFAULT at line 152 modcall[authorize]: module "files" returns ok for request 2 modcall: leaving group authorize (returns updated) for request 2 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 2 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 2 modcall: leaving group authenticate (returns handled) for request 2 Sending Access-Challenge of id 29 to 192.168.100.100 port 1645 EAP-Message = 0x0105040a0dc000000954100603550407130942617263656c6f6e61312d302b060355040a1324556e69766572736974617420506f6c697465636e69636120646520436174616c756e7961313a3038060355040b1331446570617274616d656e74206465204c6c656e6775617467657320692053697374656d657320496e666f726d6174696373312430220603550403131b4c61626f7261746f72692064652043616c63756c206465204c53493120301e06092a864886f70d01090116116c636c7369406c73692e7570632e656475301e170d3035303331343137353132345a170d3037303331343137353132345a3081e8310b30090603550406130245 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x0603550407130942617263656c6f6e61312d302b060355040a1324556e69766572736974617420506f6c697465636e69636120646520436174616c756e7961313a3038060355040b1331446570617274616d656e74206465204c6c656e6775617467657320692053697374656d657320496e666f726d6174696373312430220603550403131b4c61626f7261746f72692064652043616c63756c206465204c53493120301e06092a864886f70d01090116116c636c7369406c73692e7570632e656475820100300c0603551d13040530030101ff300d06092a864886f70d01010405000381810081b0b846c3e25483a04a623aec462f7bf4ca50018693 EAP-Message = 0xabd072b23cfbe07324a11376114a55c747c332408f2a Message-Authenticator = 0x00000000000000000000000000000000 State = 0x1de7dd42dec25f9c02a2806cd2370a74 Finished request 2 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.100.100:1645, id=30, length=142 User-Name = "marcos" Framed-MTU = 1400 Called-Station-Id = "0011.5cc3.9570" Calling-Station-Id = "000c.f101.5c52" Service-Type = Login-User Message-Authenticator = 0xe048380bce8efa329f921cc596a1b4ae EAP-Message = 0x020500060d00 NAS-Port-Type = Wireless-802.11 NAS-Port = 1460 State = 0x1de7dd42dec25f9c02a2806cd2370a74 NAS-IP-Address = 192.168.100.100 NAS-Identifier = "wlpb01" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 3 modcall[authorize]: module "preprocess" returns ok for request 3 modcall[authorize]: module "chap" returns noop for request 3 modcall[authorize]: module "mschap" returns noop for request 3 rlm_realm: No '@' in User-Name = "marcos", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 3 rlm_eap: EAP packet type response id 5 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 3 users: Matched entry DEFAULT at line 152 modcall[authorize]: module "files" returns ok for request 3 modcall: leaving group authorize (returns updated) for request 3 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 3 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 3 modcall: leaving group authenticate (returns handled) for request 3 Sending Access-Challenge of id 30 to 192.168.100.100 port 1645 EAP-Message = 0x0106015e0d800000095455d45d4215df6bdc4f46d9edbb871a16ffc6698918e9eb06b18f0a13e423771200242a84aafe81723213687aa103e2cfe07b0f10868f1ea9159cd62478879e30d9bb5ffbf40bbf519c057cca5319e8712901c3de16030100fb0d0000f30301024000ed00eb3081e8310b3009060355040613024553311230100603550408130942617263656c6f6e61311230100603550407130942617263656c6f6e61312d302b060355040a1324556e69766572736974617420506f6c697465636e69636120646520436174616c756e7961313a3038060355040b1331446570617274616d656e74206465204c6c656e677561746765732069 EAP-Message = 0x2053697374656d657320496e666f726d6174696373312430220603550403131b4c61626f7261746f72692064652043616c63756c206465204c53493120301e06092a864886f70d01090116116c636c7369406c73692e7570632e6564750e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x2ea30c662bff8a1b341190393ab09cd7 Finished request 3 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.100.100:1645, id=31, length=1253 User-Name = "marcos" Framed-MTU = 1400 Called-Station-Id = "0011.5cc3.9570" Calling-Station-Id = "000c.f101.5c52" Service-Type = Login-User Message-Authenticator = 0xed970c82e511b34d4c27a12357a76dc0 EAP-Message = 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 EAP-Message = 0x65204c53493120301e06092a864886f70d01090116116c636c7369406c73692e7570632e6564753022170d3036303930353130313531355a17113036313230313038303030302b30313030308185310b3009060355040613024553311230100603550408130942617263656c6f6e61311230100603550407130942617263656c6f6e61310c300a060355040a1303555043310c300a060355040b13034c5349310f300d060355040313066d6172636f733121301f06092a864886f70d01090116126d6172636f73406c73692e7570632e65647530819f300d06092a864886f70d010101050003818d0030818902818100d7f7baf3d069cabfc9332871a6 EAP-Message = 0xcd081a743ee4f1e1ed007e8c761cd0437b1e32c03fada5daea3896c969a24dcccba46224340fa9bcca9f38d984c3d9bd4d98d9ad928282592c0c64179700d4c4f3b103f48805de1e1b22ea471c16b5f7650f176fa9e1e4ce9996e5eb407c28d8e6b3be713ee0e91a56d3e244f73d286ed3293d0203010001a317301530130603551d25040c300a06082b06010505070302300d06092a864886f70d010104050003818100a126ae7b43333e40872068240013e2372caef9e4171f113253b2143e11f4d91ac5b72e373b415d7513c70dbebc5197b8064807de5f028f275bc97d33bf848cdb9f743c2e42f6961b6ac447b762538d226f14329a675e9d8fd8 EAP-Message = 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 EAP-Message = 0xa82588fffeecab9984a4603f19608de38e0f26a108f65c22c924d733a334a0b8b5a91d4e6d104c0f0e35d5b65d441eda8891684fa23414030100010116030100200fb75c363d44e40563f10b53b67445d02b1a6c4d7829b1a13445e2b2434d5e40 NAS-Port-Type = Wireless-802.11 NAS-Port = 1460 State = 0x2ea30c662bff8a1b341190393ab09cd7 NAS-IP-Address = 192.168.100.100 NAS-Identifier = "wlpb01" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 4 modcall[authorize]: module "preprocess" returns ok for request 4 modcall[authorize]: module "chap" returns noop for request 4 modcall[authorize]: module "mschap" returns noop for request 4 rlm_realm: No '@' in User-Name = "marcos", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 4 rlm_eap: EAP packet type response id 6 length 253 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 4 users: Matched entry DEFAULT at line 152 modcall[authorize]: module "files" returns ok for request 4 modcall: leaving group authorize (returns updated) for request 4 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 4 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 030f], Certificate chain-depth=1, error=0 --> User-Name = marcos --> BUF-Name = Laboratori de Calcul de LSI --> subject = /C=ES/ST=Barcelona/L=Barcelona/O=Universitat Politecnica de Catalunya/OU=Departament de Llenguatges i Sistemes Informatics/CN=Laboratori de Calcul de LSI/emailAddress=lclsi@lsi.upc.edu --> issuer = /C=ES/ST=Barcelona/L=Barcelona/O=Universitat Politecnica de Catalunya/OU=Departament de Llenguatges i Sistemes Informatics/CN=Laboratori de Calcul de LSI/emailAddress=lclsi@lsi.upc.edu --> verify return:1 chain-depth=0, error=0 --> User-Name = marcos --> BUF-Name = marcos --> subject = /C=ES/ST=Barcelona/L=Barcelona/O=UPC/OU=LSI/CN=marcos/emailAddress=marcos@lsi.upc.edu --> issuer = /C=ES/ST=Barcelona/L=Barcelona/O=Universitat Politecnica de Catalunya/OU=Departament de Llenguatges i Sistemes Informatics/CN=Laboratori de Calcul de LSI/emailAddress=lclsi@lsi.upc.edu --> verify return:1 TLS_accept: SSLv3 read client certificate A rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange TLS_accept: SSLv3 read client key exchange A rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], CertificateVerify TLS_accept: SSLv3 read certificate verify A rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001] rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 read finished A rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001] TLS_accept: SSLv3 write change cipher spec A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 write finished A TLS_accept: SSLv3 flush data (other): SSL negotiation finished successfully rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0) SSL Connection Established eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 4 modcall: leaving group authenticate (returns handled) for request 4 Sending Access-Challenge of id 31 to 192.168.100.100 port 1645 EAP-Message = 0x010700350d800000002b14030100010116030100205b8a5699e6b7d623352441c73c7a61f42709294711ace220aa7b3919bd5cf6cb Message-Authenticator = 0x00000000000000000000000000000000 State = 0x0e8a2a19c5c221241c566f7f66af3dca Finished request 4 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.100.100:1645, id=32, length=142 User-Name = "marcos" Framed-MTU = 1400 Called-Station-Id = "0011.5cc3.9570" Calling-Station-Id = "000c.f101.5c52" Service-Type = Login-User Message-Authenticator = 0xc8b0ddddf1383ec6c243a2763a8c927e EAP-Message = 0x020700060d00 NAS-Port-Type = Wireless-802.11 NAS-Port = 1460 State = 0x0e8a2a19c5c221241c566f7f66af3dca NAS-IP-Address = 192.168.100.100 NAS-Identifier = "wlpb01" Processing the authorize section of radiusd.conf modcall: entering group authorize for request 5 modcall[authorize]: module "preprocess" returns ok for request 5 modcall[authorize]: module "chap" returns noop for request 5 modcall[authorize]: module "mschap" returns noop for request 5 rlm_realm: No '@' in User-Name = "marcos", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 5 rlm_eap: EAP packet type response id 7 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 5 users: Matched entry DEFAULT at line 152 modcall[authorize]: module "files" returns ok for request 5 modcall: leaving group authorize (returns updated) for request 5 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 5 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 5 modcall: leaving group authenticate (returns ok) for request 5 Sending Access-Accept of id 32 to 192.168.100.100 port 1645 MS-MPPE-Recv-Key = 0x65074218856d0fb2455abcd6d423c2dfaa2f5952ef5c940271567827178727db MS-MPPE-Send-Key = 0x22bef8046739975f56e207898851a2a7d4f79ce2764d642cbc9f36793ef26b83 EAP-Message = 0x03070004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "marcos" Finished request 5 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 0 ID 27 with timestamp 4506d566 Cleaning up request 1 ID 28 with timestamp 4506d566 Cleaning up request 2 ID 29 with timestamp 4506d566 Cleaning up request 3 ID 30 with timestamp 4506d566 Cleaning up request 4 ID 31 with timestamp 4506d566 Cleaning up request 5 ID 32 with timestamp 4506d566 Nothing to do. Sleeping until we see a request.