Received Accounting-Response Id 46 from 10.16.127.247:1813 to 89.190.92.142:53866 length 20 (393) Received Accounting-Response packet from host 10.16.127.247 port 1813, id=46, length=20 (393) # Executing section post-proxy from file /etc/raddb/sites-enabled/default (393) post-proxy { (393) eap : No pre-existing handler found (393) [eap] = noop (393) } # post-proxy = noop (393) Sending Accounting-Response packet to host 10.100.255.250 port 1646, id=133, length=0 Sending Accounting-Response Id 133 from 89.190.92.142:1813 to 10.100.255.250:1646 (393) Finished request Waking up in 0.3 seconds. (393) Cleaning up request packet ID 133 with timestamp +13856 Ready to process requests Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 109 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x0201000f01616e6f6e796d6f757300 Message-Authenticator = 0x24d4d2d262560c28e7f7b2c894636a06 (394) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=109 (394) Calling-Station-Id = '0A-00-3E-40-9C-32' (394) User-Name = 'anonymous' (394) NAS-IP-Address = 10.6.1.90 (394) NAS-Port = 5 (394) NAS-Port-Type = Wireless-Other (394) Framed-MTU = 1020 (394) EAP-Message = 0x0201000f01616e6f6e796d6f757300 (394) Message-Authenticator = 0x24d4d2d262560c28e7f7b2c894636a06 (394) # Executing section authorize from file /etc/raddb/sites-enabled/default (394) authorize { (394) filter_username filter_username { (394) if (!&User-Name) (394) if (!&User-Name) -> FALSE (394) if (&User-Name =~ / /) (394) if (&User-Name =~ / /) -> FALSE (394) if (&User-Name =~ /@.*@/ ) (394) if (&User-Name =~ /@.*@/ ) -> FALSE (394) if (&User-Name =~ /\\.\\./ ) (394) if (&User-Name =~ /\\.\\./ ) -> FALSE (394) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (394) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (394) if (&User-Name =~ /\\.$/) (394) if (&User-Name =~ /\\.$/) -> FALSE (394) if (&User-Name =~ /@\\./) (394) if (&User-Name =~ /@\\./) -> FALSE (394) } # filter_username filter_username = notfound (394) [preprocess] = ok (394) [chap] = noop (394) [mschap] = noop (394) [digest] = noop (394) suffix : Checking for suffix after "@" (394) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (394) suffix : Found realm "NULL" (394) suffix : Adding Stripped-User-Name = "anonymous" (394) suffix : Adding Realm = "NULL" (394) suffix : Authentication realm is LOCAL (394) [suffix] = ok (394) eap : Peer sent code Response (2) ID 1 length 15 (394) eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (394) [eap] = ok (394) } # authorize = ok (394) Found Auth-Type = EAP (394) # Executing group from file /etc/raddb/sites-enabled/default (394) authenticate { (394) eap : Peer sent method Identity (1) (394) eap : Calling eap_md5 to process EAP data (394) eap_md5 : Issuing MD5 Challenge (394) eap : New EAP session, adding 'State' attribute to reply 0x78dc0ab078de0ee3 (394) [eap] = handled (394) } # authenticate = handled (394) Sending Access-Challenge packet to host 10.6.1.90 port 1236, id=0, length=0 (394) EAP-Message = 0x0102001604104e17d27eaaa68f959f0c192c8083e8e1 (394) Message-Authenticator = 0x00000000000000000000000000000000 (394) State = 0x78dc0ab078de0ee36f01bf10d02412ef Sending Access-Challenge Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 EAP-Message = 0x0102001604104e17d27eaaa68f959f0c192c8083e8e1 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x78dc0ab078de0ee36f01bf10d02412ef (394) Finished request Waking up in 0.3 seconds. Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 118 (394) Cleaning up request packet ID 0 with timestamp +13882 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' State = 0x78dc0ab078de0ee36f01bf10d02412ef NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x020200060315 Message-Authenticator = 0xd0eb3bbac4d04d26006f1f9e7378564c (395) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=118 (395) Calling-Station-Id = '0A-00-3E-40-9C-32' (395) User-Name = 'anonymous' (395) State = 0x78dc0ab078de0ee36f01bf10d02412ef (395) NAS-IP-Address = 10.6.1.90 (395) NAS-Port = 5 (395) NAS-Port-Type = Wireless-Other (395) Framed-MTU = 1020 (395) EAP-Message = 0x020200060315 (395) Message-Authenticator = 0xd0eb3bbac4d04d26006f1f9e7378564c (395) # Executing section authorize from file /etc/raddb/sites-enabled/default (395) authorize { (395) filter_username filter_username { (395) if (!&User-Name) (395) if (!&User-Name) -> FALSE (395) if (&User-Name =~ / /) (395) if (&User-Name =~ / /) -> FALSE (395) if (&User-Name =~ /@.*@/ ) (395) if (&User-Name =~ /@.*@/ ) -> FALSE (395) if (&User-Name =~ /\\.\\./ ) (395) if (&User-Name =~ /\\.\\./ ) -> FALSE (395) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (395) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (395) if (&User-Name =~ /\\.$/) (395) if (&User-Name =~ /\\.$/) -> FALSE (395) if (&User-Name =~ /@\\./) (395) if (&User-Name =~ /@\\./) -> FALSE (395) } # filter_username filter_username = notfound (395) [preprocess] = ok (395) [chap] = noop (395) [mschap] = noop (395) [digest] = noop (395) suffix : Checking for suffix after "@" (395) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (395) suffix : Found realm "NULL" (395) suffix : Adding Stripped-User-Name = "anonymous" (395) suffix : Adding Realm = "NULL" (395) suffix : Authentication realm is LOCAL (395) [suffix] = ok (395) eap : Peer sent code Response (2) ID 2 length 6 (395) eap : No EAP Start, assuming it's an on-going EAP conversation (395) [eap] = updated (395) [files] = noop (395) sql : EXPAND %{User-Name} (395) sql : --> anonymous (395) sql : SQL-User-Name set to 'anonymous' rlm_sql (sql): Reserved connection (255) (395) sql : EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id (395) sql : --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'anonymous' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'anonymous' ORDER BY id' (395) sql : EXPAND SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority (395) sql : --> SELECT groupname FROM radusergroup WHERE username = 'anonymous' ORDER BY priority rlm_sql (sql): Executing query: 'SELECT groupname FROM radusergroup WHERE username = 'anonymous' ORDER BY priority' (395) sql : User not found in any groups rlm_sql (sql): Released connection (255) rlm_sql (sql): 0 of 3 connections in use. Need more spares rlm_sql (sql): Opening additional connection (256) rlm_sql_mysql: Starting connect to MySQL server (395) [sql] = notfound (395) [expiration] = noop (395) [logintime] = noop (395) WARNING: pap : No "known good" password found for the user. Not setting Auth-Type (395) WARNING: pap : Authentication will fail unless a "known good" password is available (395) [pap] = noop (395) } # authorize = updated (395) Found Auth-Type = EAP (395) # Executing group from file /etc/raddb/sites-enabled/default (395) authenticate { (395) eap : Expiring EAP session with state 0x78dc0ab078de0ee3 (395) eap : Finished EAP session with state 0x78dc0ab078de0ee3 (395) eap : Previous EAP request found for state 0x78dc0ab078de0ee3, released from the list (395) eap : Peer sent method NAK (3) (395) eap : Found mutually acceptable type TTLS (21) (395) eap : Calling eap_ttls to process EAP data (395) eap_ttls : Initiate (395) eap_ttls : Start returned 1 (395) eap : New EAP session, adding 'State' attribute to reply 0x78dc0ab079df1fe3 (395) [eap] = handled (395) } # authenticate = handled (395) Sending Access-Challenge packet to host 10.6.1.90 port 1236, id=0, length=0 (395) EAP-Message = 0x010300061520 (395) Message-Authenticator = 0x00000000000000000000000000000000 (395) State = 0x78dc0ab079df1fe36f01bf10d02412ef Sending Access-Challenge Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 EAP-Message = 0x010300061520 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x78dc0ab079df1fe36f01bf10d02412ef (395) Finished request Waking up in 0.3 seconds. Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 180 (395) Cleaning up request packet ID 0 with timestamp +13882 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' State = 0x78dc0ab079df1fe36f01bf10d02412ef NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x0203004415800000003a1603010035010000310301a546268b81b9263396d49fb4602af3ac9fa3e6c54033302063c6ebf43ba72fb000000a0035002f00040005000a0100 Message-Authenticator = 0x2dc6e6d55ac489f029b801674a396fc2 (396) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=180 (396) Calling-Station-Id = '0A-00-3E-40-9C-32' (396) User-Name = 'anonymous' (396) State = 0x78dc0ab079df1fe36f01bf10d02412ef (396) NAS-IP-Address = 10.6.1.90 (396) NAS-Port = 5 (396) NAS-Port-Type = Wireless-Other (396) Framed-MTU = 1020 (396) EAP-Message = 0x0203004415800000003a1603010035010000310301a546268b81b9263396d49fb4602af3ac9fa3e6c54033302063c6ebf43ba72fb000000a0035002f00040005000a0100 (396) Message-Authenticator = 0x2dc6e6d55ac489f029b801674a396fc2 (396) # Executing section authorize from file /etc/raddb/sites-enabled/default (396) authorize { (396) filter_username filter_username { (396) if (!&User-Name) (396) if (!&User-Name) -> FALSE (396) if (&User-Name =~ / /) (396) if (&User-Name =~ / /) -> FALSE (396) if (&User-Name =~ /@.*@/ ) (396) if (&User-Name =~ /@.*@/ ) -> FALSE (396) if (&User-Name =~ /\\.\\./ ) (396) if (&User-Name =~ /\\.\\./ ) -> FALSE (396) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (396) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (396) if (&User-Name =~ /\\.$/) (396) if (&User-Name =~ /\\.$/) -> FALSE (396) if (&User-Name =~ /@\\./) (396) if (&User-Name =~ /@\\./) -> FALSE (396) } # filter_username filter_username = notfound (396) [preprocess] = ok (396) [chap] = noop (396) [mschap] = noop (396) [digest] = noop (396) suffix : Checking for suffix after "@" (396) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (396) suffix : Found realm "NULL" (396) suffix : Adding Stripped-User-Name = "anonymous" (396) suffix : Adding Realm = "NULL" (396) suffix : Authentication realm is LOCAL (396) [suffix] = ok (396) eap : Peer sent code Response (2) ID 3 length 68 (396) eap : Continuing tunnel setup (396) [eap] = ok (396) } # authorize = ok (396) Found Auth-Type = EAP (396) # Executing group from file /etc/raddb/sites-enabled/default (396) authenticate { (396) eap : Expiring EAP session with state 0x78dc0ab079df1fe3 (396) eap : Finished EAP session with state 0x78dc0ab079df1fe3 (396) eap : Previous EAP request found for state 0x78dc0ab079df1fe3, released from the list (396) eap : Peer sent method TTLS (21) (396) eap : EAP TTLS (21) (396) eap : Calling eap_ttls to process EAP data (396) eap_ttls : Authenticate (396) eap_ttls : processing EAP-TLS TLS Length 58 (396) eap_ttls : Length Included (396) eap_ttls : eaptls_verify returned 11 (396) eap_ttls : (other): before/accept initialization (396) eap_ttls : TLS_accept: before/accept initialization (396) eap_ttls : <<< TLS 1.0 Handshake [length 0035], ClientHello (396) eap_ttls : TLS_accept: SSLv3 read client hello A (396) eap_ttls : >>> TLS 1.0 Handshake [length 004a], ServerHello (396) eap_ttls : TLS_accept: SSLv3 write server hello A (396) eap_ttls : >>> TLS 1.0 Handshake [length 06ab], Certificate (396) eap_ttls : TLS_accept: SSLv3 write certificate A (396) eap_ttls : >>> TLS 1.0 Handshake [length 0004], ServerHelloDone (396) eap_ttls : TLS_accept: SSLv3 write server done A (396) eap_ttls : TLS_accept: SSLv3 flush data (396) eap_ttls : TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode (396) eap_ttls : eaptls_process returned 13 (396) eap : New EAP session, adding 'State' attribute to reply 0x78dc0ab07ad81fe3 (396) [eap] = handled (396) } # authenticate = handled (396) Sending Access-Challenge packet to host 10.6.1.90 port 1236, id=0, length=0 (396) EAP-Message = 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 (396) Message-Authenticator = 0x00000000000000000000000000000000 (396) State = 0x78dc0ab07ad81fe36f01bf10d02412ef Sending Access-Challenge Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 EAP-Message = 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 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x78dc0ab07ad81fe36f01bf10d02412ef (396) Finished request Waking up in 0.3 seconds. Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 118 (396) Cleaning up request packet ID 0 with timestamp +13882 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' State = 0x78dc0ab07ad81fe36f01bf10d02412ef NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x020400061500 Message-Authenticator = 0xe6ab21f59167d8cefd2ae5264d6576b5 (397) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=118 (397) Calling-Station-Id = '0A-00-3E-40-9C-32' (397) User-Name = 'anonymous' (397) State = 0x78dc0ab07ad81fe36f01bf10d02412ef (397) NAS-IP-Address = 10.6.1.90 (397) NAS-Port = 5 (397) NAS-Port-Type = Wireless-Other (397) Framed-MTU = 1020 (397) EAP-Message = 0x020400061500 (397) Message-Authenticator = 0xe6ab21f59167d8cefd2ae5264d6576b5 (397) # Executing section authorize from file /etc/raddb/sites-enabled/default (397) authorize { (397) filter_username filter_username { (397) if (!&User-Name) (397) if (!&User-Name) -> FALSE (397) if (&User-Name =~ / /) (397) if (&User-Name =~ / /) -> FALSE (397) if (&User-Name =~ /@.*@/ ) (397) if (&User-Name =~ /@.*@/ ) -> FALSE (397) if (&User-Name =~ /\\.\\./ ) (397) if (&User-Name =~ /\\.\\./ ) -> FALSE (397) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (397) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (397) if (&User-Name =~ /\\.$/) (397) if (&User-Name =~ /\\.$/) -> FALSE (397) if (&User-Name =~ /@\\./) (397) if (&User-Name =~ /@\\./) -> FALSE (397) } # filter_username filter_username = notfound (397) [preprocess] = ok (397) [chap] = noop (397) [mschap] = noop (397) [digest] = noop (397) suffix : Checking for suffix after "@" (397) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (397) suffix : Found realm "NULL" (397) suffix : Adding Stripped-User-Name = "anonymous" (397) suffix : Adding Realm = "NULL" (397) suffix : Authentication realm is LOCAL (397) [suffix] = ok (397) eap : Peer sent code Response (2) ID 4 length 6 (397) eap : Continuing tunnel setup (397) [eap] = ok (397) } # authorize = ok (397) Found Auth-Type = EAP (397) # Executing group from file /etc/raddb/sites-enabled/default (397) authenticate { (397) eap : Expiring EAP session with state 0x78dc0ab07ad81fe3 (397) eap : Finished EAP session with state 0x78dc0ab07ad81fe3 (397) eap : Previous EAP request found for state 0x78dc0ab07ad81fe3, released from the list (397) eap : Peer sent method TTLS (21) (397) eap : EAP TTLS (21) (397) eap : Calling eap_ttls to process EAP data (397) eap_ttls : Authenticate (397) eap_ttls : processing EAP-TLS (397) eap_ttls : Received TLS ACK (397) eap_ttls : Received TLS ACK (397) eap_ttls : ACK handshake fragment handler (397) eap_ttls : eaptls_verify returned 1 (397) eap_ttls : eaptls_process returned 13 (397) eap : New EAP session, adding 'State' attribute to reply 0x78dc0ab07bd91fe3 (397) [eap] = handled (397) } # authenticate = handled (397) Sending Access-Challenge packet to host 10.6.1.90 port 1236, id=0, length=0 (397) EAP-Message = 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 (397) Message-Authenticator = 0x00000000000000000000000000000000 (397) State = 0x78dc0ab07bd91fe36f01bf10d02412ef Sending Access-Challenge Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 EAP-Message = 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 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x78dc0ab07bd91fe36f01bf10d02412ef (397) Finished request Waking up in 0.3 seconds. Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 320 (397) Cleaning up request packet ID 0 with timestamp +13882 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' State = 0x78dc0ab07bd91fe36f01bf10d02412ef NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x020500d01580000000c61603010086100000820080a95b101710fd4dce80892e1467b5cc59dfe4d972ce206d7b60b822ef5486aa3a5460e77ae3c5f09ad76c3876b78e4c85cccaa9aacf7c5798a8f7f7e92afe58535c919dd3c14c4abb49dc711a4e3587ec3ac271718854f39469c5ba051a6cfa5dc8a3cc607f8c8ef28af0437503b02df8b29fcf197a88341badc5fd46654ee21814030100010116030100309434c289ebd3b5b0819b567edf17a51b4c55bfec25950321af268da47d226b3d307a0519330cf080c8ef1622b27b3fd7 Message-Authenticator = 0xd52e8ee5771d6f964d792a0550897c5d (398) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=320 (398) Calling-Station-Id = '0A-00-3E-40-9C-32' (398) User-Name = 'anonymous' (398) State = 0x78dc0ab07bd91fe36f01bf10d02412ef (398) NAS-IP-Address = 10.6.1.90 (398) NAS-Port = 5 (398) NAS-Port-Type = Wireless-Other (398) Framed-MTU = 1020 (398) EAP-Message = 0x020500d01580000000c61603010086100000820080a95b101710fd4dce80892e1467b5cc59dfe4d972ce206d7b60b822ef5486aa3a5460e77ae3c5f09ad76c3876b78e4c85cccaa9aacf7c5798a8f7f7e92afe58535c919dd3c14c4abb49dc711a4e3587ec3ac271718854f39469c5ba051a6cfa5dc8a3cc607f8c8ef28af0437503b02df8b29fcf197a88341badc5fd46654ee21814030100010116030100309434c289ebd3b5b0819b567edf17a51b4c55bfec25950321af268da47d226b3d307a0519330cf080c8ef1622b27b3fd7 (398) Message-Authenticator = 0xd52e8ee5771d6f964d792a0550897c5d (398) # Executing section authorize from file /etc/raddb/sites-enabled/default (398) authorize { (398) filter_username filter_username { (398) if (!&User-Name) (398) if (!&User-Name) -> FALSE (398) if (&User-Name =~ / /) (398) if (&User-Name =~ / /) -> FALSE (398) if (&User-Name =~ /@.*@/ ) (398) if (&User-Name =~ /@.*@/ ) -> FALSE (398) if (&User-Name =~ /\\.\\./ ) (398) if (&User-Name =~ /\\.\\./ ) -> FALSE (398) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (398) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (398) if (&User-Name =~ /\\.$/) (398) if (&User-Name =~ /\\.$/) -> FALSE (398) if (&User-Name =~ /@\\./) (398) if (&User-Name =~ /@\\./) -> FALSE (398) } # filter_username filter_username = notfound (398) [preprocess] = ok (398) [chap] = noop (398) [mschap] = noop (398) [digest] = noop (398) suffix : Checking for suffix after "@" (398) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (398) suffix : Found realm "NULL" (398) suffix : Adding Stripped-User-Name = "anonymous" (398) suffix : Adding Realm = "NULL" (398) suffix : Authentication realm is LOCAL (398) [suffix] = ok (398) eap : Peer sent code Response (2) ID 5 length 208 (398) eap : Continuing tunnel setup (398) [eap] = ok (398) } # authorize = ok (398) Found Auth-Type = EAP (398) # Executing group from file /etc/raddb/sites-enabled/default (398) authenticate { (398) eap : Expiring EAP session with state 0x78dc0ab07bd91fe3 (398) eap : Finished EAP session with state 0x78dc0ab07bd91fe3 (398) eap : Previous EAP request found for state 0x78dc0ab07bd91fe3, released from the list (398) eap : Peer sent method TTLS (21) (398) eap : EAP TTLS (21) (398) eap : Calling eap_ttls to process EAP data (398) eap_ttls : Authenticate (398) eap_ttls : processing EAP-TLS TLS Length 198 (398) eap_ttls : Length Included (398) eap_ttls : eaptls_verify returned 11 (398) eap_ttls : <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange (398) eap_ttls : TLS_accept: SSLv3 read client key exchange A (398) eap_ttls : <<< TLS 1.0 ChangeCipherSpec [length 0001] (398) eap_ttls : <<< TLS 1.0 Handshake [length 0010], Finished (398) eap_ttls : TLS_accept: SSLv3 read finished A (398) eap_ttls : >>> TLS 1.0 ChangeCipherSpec [length 0001] (398) eap_ttls : TLS_accept: SSLv3 write change cipher spec A (398) eap_ttls : >>> TLS 1.0 Handshake [length 0010], Finished (398) eap_ttls : TLS_accept: SSLv3 write finished A (398) eap_ttls : TLS_accept: SSLv3 flush data SSL: adding session 2c03dc31f7b8179baa6decbff6e341e7b3d744523b6b204300fa9a33b03bb979 to cache (398) eap_ttls : (other): SSL negotiation finished successfully SSL Connection Established (398) eap_ttls : eaptls_process returned 13 (398) eap : New EAP session, adding 'State' attribute to reply 0x78dc0ab07cda1fe3 (398) [eap] = handled (398) } # authenticate = handled (398) Sending Access-Challenge packet to host 10.6.1.90 port 1236, id=0, length=0 (398) EAP-Message = 0x0106004515800000003b1403010001011603010030201ba5099c5cc4ba9453f08b86d3a52eb2b7bb47cca12c0a53801616bf57a07d6c89d70df336ea444f9e7334d8d89f7f (398) Message-Authenticator = 0x00000000000000000000000000000000 (398) State = 0x78dc0ab07cda1fe36f01bf10d02412ef Sending Access-Challenge Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 EAP-Message = 0x0106004515800000003b1403010001011603010030201ba5099c5cc4ba9453f08b86d3a52eb2b7bb47cca12c0a53801616bf57a07d6c89d70df336ea444f9e7334d8d89f7f Message-Authenticator = 0x00000000000000000000000000000000 State = 0x78dc0ab07cda1fe36f01bf10d02412ef (398) Finished request Waking up in 0.3 seconds. Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 271 (398) Cleaning up request packet ID 0 with timestamp +13882 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' State = 0x78dc0ab07cda1fe36f01bf10d02412ef NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x0206009f1580000000951703010090725f012e95ed60015c51e7a5c956deef40ab25d464b7736843f5126e739f2ac682653ded1f4ac101a7793f29fbac00e1b8bf99944e5fbe7eca8a0f4f653c9ef713398742734e7934e34646affa96054e6cf52f7a5142922003db9754a49d0b75cbd562f74cd620b6bfc51f74bd728fc7cfc856ad46cbb5f7b301f281e81fe97398d677204c5fdf9115b756840881420b Message-Authenticator = 0x6dd548830eca45e22d734b4df0219d6d (399) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=271 (399) Calling-Station-Id = '0A-00-3E-40-9C-32' (399) User-Name = 'anonymous' (399) State = 0x78dc0ab07cda1fe36f01bf10d02412ef (399) NAS-IP-Address = 10.6.1.90 (399) NAS-Port = 5 (399) NAS-Port-Type = Wireless-Other (399) Framed-MTU = 1020 (399) EAP-Message = 0x0206009f1580000000951703010090725f012e95ed60015c51e7a5c956deef40ab25d464b7736843f5126e739f2ac682653ded1f4ac101a7793f29fbac00e1b8bf99944e5fbe7eca8a0f4f653c9ef713398742734e7934e34646affa96054e6cf52f7a5142922003db9754a49d0b75cbd562f74cd620b6bfc51f74bd728fc7cfc856ad46cbb5f7b301f281e81fe97398d677204c5fdf9115b756840881420b (399) Message-Authenticator = 0x6dd548830eca45e22d734b4df0219d6d (399) # Executing section authorize from file /etc/raddb/sites-enabled/default (399) authorize { (399) filter_username filter_username { (399) if (!&User-Name) (399) if (!&User-Name) -> FALSE (399) if (&User-Name =~ / /) (399) if (&User-Name =~ / /) -> FALSE (399) if (&User-Name =~ /@.*@/ ) (399) if (&User-Name =~ /@.*@/ ) -> FALSE (399) if (&User-Name =~ /\\.\\./ ) (399) if (&User-Name =~ /\\.\\./ ) -> FALSE (399) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (399) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (399) if (&User-Name =~ /\\.$/) (399) if (&User-Name =~ /\\.$/) -> FALSE (399) if (&User-Name =~ /@\\./) (399) if (&User-Name =~ /@\\./) -> FALSE (399) } # filter_username filter_username = notfound (399) [preprocess] = ok (399) [chap] = noop (399) [mschap] = noop (399) [digest] = noop (399) suffix : Checking for suffix after "@" (399) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (399) suffix : Found realm "NULL" (399) suffix : Adding Stripped-User-Name = "anonymous" (399) suffix : Adding Realm = "NULL" (399) suffix : Authentication realm is LOCAL (399) [suffix] = ok (399) eap : Peer sent code Response (2) ID 6 length 159 (399) eap : Continuing tunnel setup (399) [eap] = ok (399) } # authorize = ok (399) Found Auth-Type = EAP (399) # Executing group from file /etc/raddb/sites-enabled/default (399) authenticate { (399) eap : Expiring EAP session with state 0x78dc0ab07cda1fe3 (399) eap : Finished EAP session with state 0x78dc0ab07cda1fe3 (399) eap : Previous EAP request found for state 0x78dc0ab07cda1fe3, released from the list (399) eap : Peer sent method TTLS (21) (399) eap : EAP TTLS (21) (399) eap : Calling eap_ttls to process EAP data (399) eap_ttls : Authenticate (399) eap_ttls : processing EAP-TLS TLS Length 149 (399) eap_ttls : Length Included (399) eap_ttls : eaptls_verify returned 11 (399) eap_ttls : eaptls_process returned 7 (399) eap_ttls : Session established. Proceeding to decode tunneled attributes (399) eap_ttls : Got tunneled request User-Name = '0a-00-3e-40-9c-32' MS-CHAP-Challenge = 0xb50c0fd0e7d6c75fa2939e1a7ea91dff MS-CHAP2-Response = 0x3800d42c04706b5e584e4a63ee10cf2377e20000000000000000158af5d0b95b97e9991214a99956d0b3c61175854d94a792 (399) eap_ttls : Sending tunneled request (399) server inner-tunnel { (399) Request: User-Name = '0a-00-3e-40-9c-32' MS-CHAP-Challenge = 0xb50c0fd0e7d6c75fa2939e1a7ea91dff MS-CHAP2-Response = 0x3800d42c04706b5e584e4a63ee10cf2377e20000000000000000158af5d0b95b97e9991214a99956d0b3c61175854d94a792 (399) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (399) authorize { (399) [chap] = noop (399) mschap : Found MS-CHAP attributes. Setting 'Auth-Type = mschap' (399) [mschap] = ok (399) suffix : Checking for suffix after "@" (399) suffix : No '@' in User-Name = "0a-00-3e-40-9c-32", looking up realm NULL (399) suffix : Found realm "NULL" (399) suffix : Adding Stripped-User-Name = "0a-00-3e-40-9c-32" (399) suffix : Adding Realm = "NULL" (399) suffix : Authentication realm is LOCAL (399) [suffix] = ok (399) update control { (399) Proxy-To-Realm := 'LOCAL' (399) } # update control = noop (399) eap : No EAP-Message, not doing EAP (399) [eap] = noop (399) [files] = noop (399) sql : EXPAND %{User-Name} (399) sql : --> 0a-00-3e-40-9c-32 (399) sql : SQL-User-Name set to '0a-00-3e-40-9c-32' rlm_sql (sql): Reserved connection (256) (399) sql : EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id (399) sql : --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = '0a-00-3e-40-9c-32' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radcheck WHERE username = '0a-00-3e-40-9c-32' ORDER BY id' (399) sql : User found in radcheck table (399) sql : Check items matched (399) sql : EXPAND SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id (399) sql : --> SELECT id, username, attribute, value, op FROM radreply WHERE username = '0a-00-3e-40-9c-32' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radreply WHERE username = '0a-00-3e-40-9c-32' ORDER BY id' (399) sql : User found in radreply table (399) sql : EXPAND SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority (399) sql : --> SELECT groupname FROM radusergroup WHERE username = '0a-00-3e-40-9c-32' ORDER BY priority rlm_sql (sql): Executing query: 'SELECT groupname FROM radusergroup WHERE username = '0a-00-3e-40-9c-32' ORDER BY priority' (399) sql : User not found in any groups rlm_sql (sql): Released connection (256) (399) [sql] = ok (399) [expiration] = noop (399) [logintime] = noop (399) WARNING: pap : Auth-Type already set. Not setting to PAP (399) [pap] = noop (399) } # authorize = ok (399) Found Auth-Type = MSCHAP (399) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (399) Auth-Type MS-CHAP { (399) mschap : Found Cleartext-Password, hashing to create LM-Password (399) mschap : Found Cleartext-Password, hashing to create NT-Password (399) mschap : Creating challenge hash with username: 0a-00-3e-40-9c-32 (399) mschap : Client is using MS-CHAPv2 (399) mschap : Adding MS-CHAPv2 MPPE keys (399) [mschap] = ok (399) } # Auth-Type MS-CHAP = ok (399) # Executing section post-auth from file /etc/raddb/sites-enabled/inner-tunnel (399) post-auth { (399) sql : EXPAND .query (399) sql : --> .query (399) sql : Using query template 'query' rlm_sql (sql): Reserved connection (256) (399) sql : EXPAND %{User-Name} (399) sql : --> 0a-00-3e-40-9c-32 (399) sql : SQL-User-Name set to '0a-00-3e-40-9c-32' (399) sql : EXPAND INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') (399) sql : --> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '0a-00-3e-40-9c-32', '', 'Access-Accept', '2017-02-09 13:03:26') rlm_sql (sql): Executing query: 'INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '0a-00-3e-40-9c-32', '', 'Access-Accept', '2017-02-09 13:03:26')' rlm_sql (sql): Released connection (256) (399) [sql] = ok (399) } # post-auth = ok (399) Reply: Cambium-Canopy-HPENABLE = Enable Cambium-Canopy-HPDLCIR = 500 Cambium-Canopy-HPULCIR = 500 Cambium-Canopy-LPDLCIR = 300 Cambium-Canopy-LPULCIR = 300 Cambium-Canopy-DLBR = 3000 Cambium-Canopy-ULBR = 1000 MS-CHAP2-Success = 0x38533d33324335454243323037463238333944333736334145444543313445353242413337333737323039 MS-MPPE-Recv-Key = 0x6e34e7646052c658a35efc1bbae64876 MS-MPPE-Send-Key = 0x2b7b0915e7fed650c0aa8f132dd942d2 MS-MPPE-Encryption-Policy = Encryption-Allowed MS-MPPE-Encryption-Types = RC4-40or128-bit-Allowed (399) } # server inner-tunnel (399) eap_ttls : Got tunneled Access-Accept (399) eap_ttls : Got MS-CHAP2-Success, tunneling it to the client in a challenge (399) eap_ttls : sending tunneled reply attributes MS-CHAP2-Success = 0x38533d33324335454243323037463238333944333736334145444543313445353242413337333737323039 (399) eap_ttls : end tunneled reply attributes (399) eap : New EAP session, adding 'State' attribute to reply 0x78dc0ab07ddb1fe3 (399) [eap] = handled (399) } # authenticate = handled (399) Sending Access-Challenge packet to host 10.6.1.90 port 1236, id=0, length=0 (399) EAP-Message = 0x0107005f158000000055170301005091ab6a0ca8da7a4c9de8e06b63d9df2c0af84b771a8c39ac6997dafaf4fd8ea059d1662d4b4cc0626ffbb495fff79a432ca8001e85caa5572f335f8b8d97b7fdd32d4c4cfa2d78bacedf1452958fd1df (399) Message-Authenticator = 0x00000000000000000000000000000000 (399) State = 0x78dc0ab07ddb1fe36f01bf10d02412ef Sending Access-Challenge Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 EAP-Message = 0x0107005f158000000055170301005091ab6a0ca8da7a4c9de8e06b63d9df2c0af84b771a8c39ac6997dafaf4fd8ea059d1662d4b4cc0626ffbb495fff79a432ca8001e85caa5572f335f8b8d97b7fdd32d4c4cfa2d78bacedf1452958fd1df Message-Authenticator = 0x00000000000000000000000000000000 State = 0x78dc0ab07ddb1fe36f01bf10d02412ef (399) Finished request Waking up in 0.3 seconds. Received Access-Request Id 0 from 10.6.1.90:1236 to 89.190.92.142:1812 length 118 (399) Cleaning up request packet ID 0 with timestamp +13882 Calling-Station-Id = '0A-00-3E-40-9C-32' User-Name = 'anonymous' State = 0x78dc0ab07ddb1fe36f01bf10d02412ef NAS-IP-Address = 10.6.1.90 NAS-Port = 5 NAS-Port-Type = Wireless-Other Framed-MTU = 1020 EAP-Message = 0x020700061500 Message-Authenticator = 0xbdcb25d283f045f9e52896d8f3cb6c0c (400) Received Access-Request packet from host 10.6.1.90 port 1236, id=0, length=118 (400) Calling-Station-Id = '0A-00-3E-40-9C-32' (400) User-Name = 'anonymous' (400) State = 0x78dc0ab07ddb1fe36f01bf10d02412ef (400) NAS-IP-Address = 10.6.1.90 (400) NAS-Port = 5 (400) NAS-Port-Type = Wireless-Other (400) Framed-MTU = 1020 (400) EAP-Message = 0x020700061500 (400) Message-Authenticator = 0xbdcb25d283f045f9e52896d8f3cb6c0c (400) # Executing section authorize from file /etc/raddb/sites-enabled/default (400) authorize { (400) filter_username filter_username { (400) if (!&User-Name) (400) if (!&User-Name) -> FALSE (400) if (&User-Name =~ / /) (400) if (&User-Name =~ / /) -> FALSE (400) if (&User-Name =~ /@.*@/ ) (400) if (&User-Name =~ /@.*@/ ) -> FALSE (400) if (&User-Name =~ /\\.\\./ ) (400) if (&User-Name =~ /\\.\\./ ) -> FALSE (400) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) (400) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (400) if (&User-Name =~ /\\.$/) (400) if (&User-Name =~ /\\.$/) -> FALSE (400) if (&User-Name =~ /@\\./) (400) if (&User-Name =~ /@\\./) -> FALSE (400) } # filter_username filter_username = notfound (400) [preprocess] = ok (400) [chap] = noop (400) [mschap] = noop (400) [digest] = noop (400) suffix : Checking for suffix after "@" (400) suffix : No '@' in User-Name = "anonymous", looking up realm NULL (400) suffix : Found realm "NULL" (400) suffix : Adding Stripped-User-Name = "anonymous" (400) suffix : Adding Realm = "NULL" (400) suffix : Authentication realm is LOCAL (400) [suffix] = ok (400) eap : Peer sent code Response (2) ID 7 length 6 (400) eap : Continuing tunnel setup (400) [eap] = ok (400) } # authorize = ok (400) Found Auth-Type = EAP (400) # Executing group from file /etc/raddb/sites-enabled/default (400) authenticate { (400) eap : Expiring EAP session with state 0x78dc0ab07ddb1fe3 (400) eap : Finished EAP session with state 0x78dc0ab07ddb1fe3 (400) eap : Previous EAP request found for state 0x78dc0ab07ddb1fe3, released from the list (400) eap : Peer sent method TTLS (21) (400) eap : EAP TTLS (21) (400) eap : Calling eap_ttls to process EAP data (400) eap_ttls : Authenticate (400) eap_ttls : processing EAP-TLS (400) eap_ttls : Received TLS ACK (400) eap_ttls : Received TLS ACK (400) eap_ttls : ACK handshake is finished (400) eap_ttls : eaptls_verify returned 3 (400) eap_ttls : eaptls_process returned 3 (400) eap_ttls : Saving session 2c03dc31f7b8179baa6decbff6e341e7b3d744523b6b204300fa9a33b03bb979 vps 0x7f54f695f820 in the cache (400) eap : Freeing handler (400) [eap] = ok (400) } # authenticate = ok (400) # Executing section post-auth from file /etc/raddb/sites-enabled/default (400) post-auth { (400) sql : EXPAND .query (400) sql : --> .query (400) sql : Using query template 'query' rlm_sql (sql): Reserved connection (256) (400) sql : EXPAND %{User-Name} (400) sql : --> anonymous (400) sql : SQL-User-Name set to 'anonymous' (400) sql : EXPAND INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') (400) sql : --> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'anonymous', '', 'Access-Accept', '2017-02-09 13:03:26') rlm_sql (sql): Executing query: 'INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'anonymous', '', 'Access-Accept', '2017-02-09 13:03:26')' rlm_sql (sql): Released connection (256) (400) [sql] = ok (400) [exec] = noop (400) } # post-auth = ok (400) Sending Access-Accept packet to host 10.6.1.90 port 1236, id=0, length=0 (400) MS-MPPE-Recv-Key = 0xbb87a6612cb62ab47b3b9caacfcd2dc291d9e1f39c35c8ac077c8c15659f5b30 (400) MS-MPPE-Send-Key = 0x80ef21c9db7a62dc1aee708ab39fb3df29f403429e0283012ba72a65c4c74e75 (400) EAP-MSK = 0xbb87a6612cb62ab47b3b9caacfcd2dc291d9e1f39c35c8ac077c8c15659f5b3080ef21c9db7a62dc1aee708ab39fb3df29f403429e0283012ba72a65c4c74e75 (400) EAP-EMSK = 0x88e7bc62555c43e40c358d10135b636333bb63d124fbd9d4b1c9968b7c5f01155c6668f5d69ae3eecd12ce38eee5f683c82a49c9287d57121e17b436016d435c (400) EAP-Session-Id = 0x15a546268b81b9263396d49fb4602af3ac9fa3e6c54033302063c6ebf43ba72fb0589c5a8ea40d9e1a5f4c4c2b0dcb224b6c795f2277beeaa8c79aef2ed3c5ff1c (400) EAP-Message = 0x03070004 (400) Message-Authenticator = 0x00000000000000000000000000000000 (400) Stripped-User-Name = 'anonymous' Sending Access-Accept Id 0 from 89.190.92.142:1812 to 10.6.1.90:1236 MS-MPPE-Recv-Key = 0xbb87a6612cb62ab47b3b9caacfcd2dc291d9e1f39c35c8ac077c8c15659f5b30 MS-MPPE-Send-Key = 0x80ef21c9db7a62dc1aee708ab39fb3df29f403429e0283012ba72a65c4c74e75 EAP-Message = 0x03070004 Message-Authenticator = 0x00000000000000000000000000000000 (400) Finished request