Discussion:
problem with pap password normalization
Amstaff zg
2018-11-06 16:51:21 UTC
Permalink
Hi,
I have problem with pap password normalization when radius fetches
password from ldap in base64 format.

Here is example where it works:
FreeRADIUS Version 3.0.16 Copyright (C) 1999-2017 The FreeRADIUS
server project and contributors There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may
redistribute copies of FreeRADIUS under the terms of the GNU General
Public License For more information about these matters, see the file
named COPYRIGHT Starting - reading configuration files ... including
dictionary file /usr/share/freeradius/dictionary including dictionary
file /usr/share/freeradius/dictionary.dhcp including dictionary file
/usr/share/freeradius/dictionary.vqp including dictionary file
/etc/freeradius/3.0/dictionary including configuration file
/etc/freeradius/3.0/radiusd.conf including configuration file
/etc/freeradius/3.0/proxy.conf including configuration file
/etc/freeradius/3.0/clients.conf including files in directory
/etc/freeradius/3.0/mods-enabled/ including configuration file
/etc/freeradius/3.0/mods-enabled/detail including configuration file
/etc/freeradius/3.0/mods-enabled/exec including configuration file
/etc/freeradius/3.0/mods-enabled/detail.log including configuration
file /etc/freeradius/3.0/mods-enabled/ldap2 including configuration
file /etc/freeradius/3.0/mods-enabled/echo including configuration
file /etc/freeradius/3.0/mods-enabled/dynamic_clients including
configuration file /etc/freeradius/3.0/mods-enabled/attr_filter
including configuration file
/etc/freeradius/3.0/mods-enabled/ntlm_auth including configuration
file /etc/freeradius/3.0/mods-enabled/preprocess including
configuration file /etc/freeradius/3.0/mods-enabled/utf8 including
configuration file /etc/freeradius/3.0/mods-enabled/unpack including
configuration file /etc/freeradius/3.0/mods-enabled/replicate
including configuration file /etc/freeradius/3.0/mods-enabled/realm
including configuration file /etc/freeradius/3.0/mods-enabled/pap
including configuration file /etc/freeradius/3.0/mods-enabled/always
including configuration file /etc/freeradius/3.0/mods-enabled/expr
including configuration file /etc/freeradius/3.0/mods-enabled/linelog
including configuration file /etc/freeradius/3.0/mods-enabled/unix
including configuration file /etc/freeradius/3.0/mods-enabled/passwd
including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp
including configuration file
/etc/freeradius/3.0/mods-enabled/logintime including configuration
file /etc/freeradius/3.0/mods-enabled/ldap1 including configuration
file /etc/freeradius/3.0/mods-enabled/files including configuration
file /etc/freeradius/3.0/mods-enabled/mschap including configuration
file /etc/freeradius/3.0/mods-enabled/digest including configuration
file /etc/freeradius/3.0/mods-enabled/eap including configuration file
/etc/freeradius/3.0/mods-enabled/radutmp including configuration file
/etc/freeradius/3.0/mods-enabled/soh including configuration file
/etc/freeradius/3.0/mods-enabled/cache_eap including configuration
file /etc/freeradius/3.0/mods-enabled/expiration including
configuration file /etc/freeradius/3.0/mods-enabled/chap including
files in directory /etc/freeradius/3.0/policy.d/ including
configuration file /etc/freeradius/3.0/policy.d/group_authorization
including configuration file
/etc/freeradius/3.0/policy.d/canonicalization including configuration
file /etc/freeradius/3.0/policy.d/moonshot-targeted-ids including
configuration file /etc/freeradius/3.0/policy.d/filter including
configuration file /etc/freeradius/3.0/policy.d/control including
configuration file /etc/freeradius/3.0/policy.d/accounting including
configuration file /etc/freeradius/3.0/policy.d/operator-name
including configuration file /etc/freeradius/3.0/policy.d/cui
including configuration file /etc/freeradius/3.0/policy.d/dhcp
including configuration file /etc/freeradius/3.0/policy.d/debug
including configuration file /etc/freeradius/3.0/policy.d/eap
including configuration file /etc/freeradius/3.0/policy.d/abfab-tr
including files in directory /etc/freeradius/3.0/sites-enabled/
including configuration file /etc/freeradius/3.0/sites-enabled/default
including configuration file
/etc/freeradius/3.0/sites-enabled/inner-tunnel main { security { user
= "freerad" group = "freerad" allow_core_dumps = no } name =
"freeradius" prefix = "/usr" localstatedir = "/var" logdir =
"/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name =
"freeradius" prefix = "/usr" localstatedir = "/var" sbindir =
"/usr/sbin" logdir = "/var/log/freeradius" run_dir =
"/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir =
"/var/log/freeradius/radacct" hostname_lookups = no max_request_time =
30 cleanup_delay = 5 max_requests = 16384 pidfile =
"/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad"
debug_level = 0 proxy_requests = yes log { stripped_names = no auth =
no auth_badpass = no auth_goodpass = no colourise = yes msg_denied =
"You are already logged in - access denied" } resources { } security {
max_attributes = 200 reject_delay = 1.000000 status_server = yes } }
radiusd: #### Loading Realms and Home Servers #### proxy server {
retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120
wake_all_if_all_dead = no } home_server localhost { ipaddr =
123.456.789.1 port = 1812 type = "auth" secret = <<< secret >>>
response_window = 20.000000 response_timeouts = 1 max_outstanding =
65536 zombie_period = 40 status_check = "status-server" ping_interval
= 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3
revive_interval = 120 limit { max_connections = 16 max_requests = 0
lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd =
30 } } home_server_pool my_auth_failover { type = fail-over
home_server = localhost } realm example.com { auth_pool =
my_auth_failover } realm LOCAL { } radiusd: #### Loading Clients ####
client localhost { ipaddr = 123.456.789.1
require_message_authenticator = no secret = <<< secret >>> limit {
max_connections = 16 lifetime = 0 idle_timeout = 30 } } client
123.456.789.227/32 { require_message_authenticator = no secret = <<<
secret >>> shortname = "123.456.789.227" limit { max_connections = 16
lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.227/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.96/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.96" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.96/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.21/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.21" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.21/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.248/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.248" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.248/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.180/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.180" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.180/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.16/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.16" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.16/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.54/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.54" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.54/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.83/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.83" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.83/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.65/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.65" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.65/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.131/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.131" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.131/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.162/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.162" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.162/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.147/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.147" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.147/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.220/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.220" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.220/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.171/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.171" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.171/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.150/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.150" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.150/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.116/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.116" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.116/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.6/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.6" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.6/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.116/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.116" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.116/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.117/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.117" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.117/32. Please fix your
configuration Support for old-style clients will be removed in a
future release Debugger not attached # Creating Auth-Type = mschap #
Creating Auth-Type = digest # Creating Auth-Type = eap # Creating
Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type =
MS-CHAP # Creating Auth-Type = LDAP radiusd: #### Instantiating
modules #### modules { # Loaded module rlm_detail # Loading module
"detail" from file /etc/freeradius/3.0/mods-enabled/detail detail {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loaded module rlm_exec # Loading module
"exec" from file /etc/freeradius/3.0/mods-enabled/exec exec { wait =
no input_pairs = "request" shell_escape = yes timeout = 10 } # Loading
module "auth_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail auth_log { filename
= "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loading module "reply_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail reply_log {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loading module "pre_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail pre_proxy_log {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loading module "post_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail post_proxy_log {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loaded module rlm_ldap # Loading module
"ldap2" from file /etc/freeradius/3.0/mods-enabled/ldap2 ldap ldap2 {
server = "123.456.789.201" port = 636 identity =
"cn=admin,LDAP_SUFFIX" password = <<< secret >>> sasl { } user { scope
= "sub" access_positive = yes sasl { } } group { filter =
"(objectClass=groupOfNames)" scope = "sub" name_attribute = "cn"
membership_attribute = "memberOf" membership_filter =
"(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}}))"
cacheable_name = no cacheable_dn = no } client { scope = "sub" base_dn
= "" } profile { } options { ldap_debug = 40 chase_referrals = yes
rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle =
60 probes = 3 interval = 3 } tls { ca_file =
"/etc/freeradius/3.0/certs/ca.pem" ca_path =
"/etc/freeradius/3.0/certs/" certificate_file =
"/etc/freeradius/3.0/certs/server.pem" private_key_file =
"/etc/freeradius/3.0/certs/server.key" start_tls = no require_cert =
"allow" } } Creating attribute ldap2-LDAP-Group # Loading module
"echo" from file /etc/freeradius/3.0/mods-enabled/echo exec echo {
wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request"
output_pairs = "reply" shell_escape = yes } # Loaded module
rlm_dynamic_clients # Loading module "dynamic_clients" from file
/etc/freeradius/3.0/mods-enabled/dynamic_clients # Loaded module
rlm_attr_filter # Loading module "attr_filter.post-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.post-proxy { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/post-proxy" key =
"%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy"
from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.pre-proxy { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy" key =
"%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject"
from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.access_reject { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/access_reject" key =
"%{User-Name}" relaxed = no } # Loading module
"attr_filter.access_challenge" from file
/etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.access_challenge { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/access_challenge" key =
"%{User-Name}" relaxed = no } # Loading module
"attr_filter.accounting_response" from file
/etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.accounting_response { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/accounting_response" key
= "%{User-Name}" relaxed = no } # Loading module "ntlm_auth" from file
/etc/freeradius/3.0/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes
program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN
--username=%{mschap:User-Name} --password=%{User-Password}"
shell_escape = yes } # Loaded module rlm_preprocess # Loading module
"preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess
preprocess { huntgroups =
"/etc/freeradius/3.0/mods-config/preprocess/huntgroups" hints =
"/etc/freeradius/3.0/mods-config/preprocess/hints" with_ascend_hack =
no ascend_channels_per_line = 23 with_ntdomain_hack = no
with_specialix_jetstream_hack = no with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no } # Loaded module rlm_utf8 # Loading
module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8 # Loaded
module rlm_unpack # Loading module "unpack" from file
/etc/freeradius/3.0/mods-enabled/unpack # Loaded module rlm_replicate
# Loading module "replicate" from file
/etc/freeradius/3.0/mods-enabled/replicate # Loaded module rlm_realm #
Loading module "IPASS" from file
/etc/freeradius/3.0/mods-enabled/realm realm IPASS { format = "prefix"
delimiter = "/" ignore_default = no ignore_null = no } # Loading
module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm realm
suffix { format = "suffix" delimiter = "@" ignore_default = no
ignore_null = no } # Loading module "realmpercent" from file
/etc/freeradius/3.0/mods-enabled/realm realm realmpercent { format =
"suffix" delimiter = "%" ignore_default = no ignore_null = no } #
Loading module "ntdomain" from file
/etc/freeradius/3.0/mods-enabled/realm realm ntdomain { format =
"prefix" delimiter = "\\" ignore_default = no ignore_null = no } #
Loaded module rlm_pap # Loading module "pap" from file
/etc/freeradius/3.0/mods-enabled/pap pap { normalise = no } # Loaded
module rlm_always # Loading module "reject" from file
/etc/freeradius/3.0/mods-enabled/always always reject { rcode =
"reject" simulcount = 0 mpp = no } # Loading module "fail" from file
/etc/freeradius/3.0/mods-enabled/always always fail { rcode = "fail"
simulcount = 0 mpp = no } # Loading module "ok" from file
/etc/freeradius/3.0/mods-enabled/always always ok { rcode = "ok"
simulcount = 0 mpp = no } # Loading module "handled" from file
/etc/freeradius/3.0/mods-enabled/always always handled { rcode =
"handled" simulcount = 0 mpp = no } # Loading module "invalid" from
file /etc/freeradius/3.0/mods-enabled/always always invalid { rcode =
"invalid" simulcount = 0 mpp = no } # Loading module "userlock" from
file /etc/freeradius/3.0/mods-enabled/always always userlock { rcode =
"userlock" simulcount = 0 mpp = no } # Loading module "notfound" from
file /etc/freeradius/3.0/mods-enabled/always always notfound { rcode =
"notfound" simulcount = 0 mpp = no } # Loading module "noop" from file
/etc/freeradius/3.0/mods-enabled/always always noop { rcode = "noop"
simulcount = 0 mpp = no } # Loading module "updated" from file
/etc/freeradius/3.0/mods-enabled/always always updated { rcode =
"updated" simulcount = 0 mpp = no } # Loaded module rlm_expr # Loading
module "expr" from file /etc/freeradius/3.0/mods-enabled/expr expr {
safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
/äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module
rlm_linelog # Loading module "linelog" from file
/etc/freeradius/3.0/mods-enabled/linelog linelog { filename =
"/var/log/freeradius/linelog" escape_filenames = no syslog_severity =
"info" permissions = 384 format = "This is a log message for
%{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}"
} # Loading module "log_accounting" from file
/etc/freeradius/3.0/mods-enabled/linelog linelog log_accounting {
filename = "/var/log/freeradius/linelog-accounting" escape_filenames =
no syslog_severity = "info" permissions = 384 format = "" reference =
"Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module
rlm_unix # Loading module "unix" from file
/etc/freeradius/3.0/mods-enabled/unix unix { radwtmp =
"/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded
module rlm_passwd # Loading module "etc_passwd" from file
/etc/freeradius/3.0/mods-enabled/passwd passwd etc_passwd { filename =
"/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":"
ignore_nislike = no ignore_empty = yes allow_multiple_keys = no
hash_size = 100 } # Loaded module rlm_radutmp # Loading module
"sradutmp" from file /etc/freeradius/3.0/mods-enabled/sradutmp radutmp
sradutmp { filename = "/var/log/freeradius/sradutmp" username =
"%{User-Name}" case_sensitive = yes check_with_nas = yes permissions =
420 caller_id = no } # Loaded module rlm_logintime # Loading module
"logintime" from file /etc/freeradius/3.0/mods-enabled/logintime
logintime { minimum_timeout = 60 } # Loading module "ldap1" from file
/etc/freeradius/3.0/mods-enabled/ldap1 ldap ldap1 { server =
"123.456.789.121" port = 636 identity = "cn=admin,LDAP_SUFFIX"
password = <<< secret >>> sasl { } user { scope = "sub"
access_positive = yes sasl { } } group { filter =
"(objectClass=groupOfNames)" scope = "sub" name_attribute = "cn"
membership_attribute = "memberOf" membership_filter =
"(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}}))"
cacheable_name = no cacheable_dn = no } client { scope = "sub" base_dn
= "" } profile { } options { ldap_debug = 40 chase_referrals = yes
rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle =
60 probes = 3 interval = 3 } tls { ca_file =
"/etc/freeradius/3.0/certs/ca.pem" ca_path =
"/etc/freeradius/3.0/certs/" certificate_file =
"/etc/freeradius/3.0/certs/server.pem" private_key_file =
"/etc/freeradius/3.0/certs/server.key" start_tls = no require_cert =
"allow" } } Creating attribute ldap1-LDAP-Group # Loaded module
rlm_files # Loading module "files" from file
/etc/freeradius/3.0/mods-enabled/files files { filename =
"/etc/freeradius/3.0/mods-config/files/authorize" acctusersfile =
"/etc/freeradius/3.0/mods-config/files/accounting" preproxy_usersfile
= "/etc/freeradius/3.0/mods-config/files/pre-proxy" } # Loaded module
rlm_mschap # Loading module "mschap" from file
/etc/freeradius/3.0/mods-enabled/mschap mschap { use_mppe = yes
require_encryption = no require_strong = no with_ntdomain_hack = yes
passchange { } allow_retry = yes
winbind_retry_with_normalised_username = no } # Loaded module
rlm_digest # Loading module "digest" from file
/etc/freeradius/3.0/mods-enabled/digest # Loaded module rlm_eap #
Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap
eap { default_eap_type = "peap" timer_expire = 60
ignore_unknown_eap_types = no cisco_accounting_username_bug = no
max_sessions = 16384 } # Loading module "radutmp" from file
/etc/freeradius/3.0/mods-enabled/radutmp radutmp { filename =
"/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive
= yes check_with_nas = yes permissions = 384 caller_id = yes } #
Loaded module rlm_soh # Loading module "soh" from file
/etc/freeradius/3.0/mods-enabled/soh soh { dhcp = yes } # Loaded
module rlm_cache # Loading module "cache_eap" from file
/etc/freeradius/3.0/mods-enabled/cache_eap cache cache_eap { driver =
"rlm_cache_rbtree" key =
"%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15
max_entries = 0 epoch = 0 add_stats = no } # Loaded module
rlm_expiration # Loading module "expiration" from file
/etc/freeradius/3.0/mods-enabled/expiration # Loaded module rlm_chap #
Loading module "chap" from file /etc/freeradius/3.0/mods-enabled/chap
instantiate { } # Instantiating module "detail" from file
/etc/freeradius/3.0/mods-enabled/detail # Instantiating module
"auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in
detail output # Instantiating module "reply_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module
"pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log
# Instantiating module "post_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module
"ldap2" from file /etc/freeradius/3.0/mods-enabled/ldap2 rlm_ldap:
libldap vendor: OpenLDAP, version: 20445 rlm_ldap (ldap2): Couldn't
find configuration for accounting, will return NOOP for calls from
this section post-auth { reference = "." } rlm_ldap (ldap2):
Initialising connection pool pool { start = 5 min = 5 max = 10 spare =
3 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60
retry_delay = 1 spread = no } rlm_ldap (ldap2): Opening additional
connection (0), 1 of 10 pending slots used rlm_ldap (ldap2):
Connecting to ldap://123.456.789.201:636 TLS: warning: cacertdir not
implemented for gnutls rlm_ldap (ldap2): Waiting for bind result...
rlm_ldap (ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (1), 1 of 9 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (2), 1 of 8 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (3), 1 of 7 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (4), 1 of 6 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful # Instantiating module
"attr_filter.post-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/post-proxy # Instantiating
module "attr_filter.pre-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy # Instantiating
module "attr_filter.access_reject" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/access_reject
[/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check
item "FreeRADIUS-Response-Delay" found in filter list for realm
"DEFAULT". [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11
Check item "FreeRADIUS-Response-Delay-USec" found in filter list for
realm "DEFAULT". # Instantiating module "attr_filter.access_challenge"
from file /etc/freeradius/3.0/mods-enabled/attr_filter reading
pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_challenge
# Instantiating module "attr_filter.accounting_response" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/accounting_response #
Instantiating module "preprocess" from file
/etc/freeradius/3.0/mods-enabled/preprocess reading pairlist file
/etc/freeradius/3.0/mods-config/preprocess/huntgroups reading pairlist
file /etc/freeradius/3.0/mods-config/preprocess/hints # Instantiating
module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm #
Instantiating module "suffix" from file
/etc/freeradius/3.0/mods-enabled/realm # Instantiating module
"realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm #
Instantiating module "ntdomain" from file
/etc/freeradius/3.0/mods-enabled/realm # Instantiating module "pap"
from file /etc/freeradius/3.0/mods-enabled/pap # Instantiating module
"reject" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "fail" from file
/etc/freeradius/3.0/mods-enabled/always # Instantiating module "ok"
from file /etc/freeradius/3.0/mods-enabled/always # Instantiating
module "handled" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "invalid" from file
/etc/freeradius/3.0/mods-enabled/always # Instantiating module
"userlock" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "notfound" from file
/etc/freeradius/3.0/mods-enabled/always # Instantiating module "noop"
from file /etc/freeradius/3.0/mods-enabled/always # Instantiating
module "updated" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "linelog" from file
/etc/freeradius/3.0/mods-enabled/linelog # Instantiating module
"log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog #
Instantiating module "etc_passwd" from file
/etc/freeradius/3.0/mods-enabled/passwd rlm_passwd: nfields: 3
keyfield 0(User-Name) listable: no # Instantiating module "logintime"
from file /etc/freeradius/3.0/mods-enabled/logintime # Instantiating
module "ldap1" from file /etc/freeradius/3.0/mods-enabled/ldap1
rlm_ldap (ldap1): Couldn't find configuration for accounting, will
return NOOP for calls from this section post-auth { reference = "." }
rlm_ldap (ldap1): Initialising connection pool pool { start = 5 min =
5 max = 10 spare = 3 uses = 0 lifetime = 0 cleanup_interval = 30
idle_timeout = 60 retry_delay = 1 spread = no } rlm_ldap (ldap1):
Opening additional connection (0), 1 of 10 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (1), 1 of 9 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (2), 1 of 8 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (3), 1 of 7 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (4), 1 of 6 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful # Instantiating
module "files" from file /etc/freeradius/3.0/mods-enabled/files
reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize
reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting
reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy
# Instantiating module "mschap" from file
/etc/freeradius/3.0/mods-enabled/mschap rlm_mschap (mschap): using
internal authentication # Instantiating module "eap" from file
/etc/freeradius/3.0/mods-enabled/eap # Linked to sub-module
rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module
rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } #
Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config
tls-common { verify_depth = 0 ca_path = "/etc/freeradius/3.0/certs"
pem_file_type = yes private_key_file =
"/etc/freeradius/3.0/certs/server.key" certificate_file =
"/etc/freeradius/3.0/certs/server.pem" ca_file =
"/etc/freeradius/3.0/certs/ca.pem" dh_file =
"/etc/freeradius/3.0/certs/dh" fragment_size = 1024 include_length =
yes auto_chain = yes check_crl = no check_all_crl = no cipher_list =
"DEFAULT" cipher_server_preference = no ecdh_curve = "prime256v1"
tls_max_version = "" tls_min_version = "1.0" cache { enable = no
lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp
{ enable = no override_cert_url = yes url =
"http://123.456.789.1/ocsp/" use_nonce = yes timeout = 0 softfail = no
} } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common"
default_eap_type = "md5" copy_request_to_tunnel = no
use_tunneled_reply = no virtual_server = "inner-tunnel" include_length
= yes require_client_cert = no } tls: Using cached TLS configuration
from previous invocation # Linked to sub-module rlm_eap_peap peap {
tls = "tls-common" default_eap_type = "mschapv2"
copy_request_to_tunnel = no use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel"
soh = no require_client_cert = no } tls: Using cached TLS
configuration from previous invocation # Linked to sub-module
rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no }
# Instantiating module "cache_eap" from file
/etc/freeradius/3.0/mods-enabled/cache_eap rlm_cache (cache_eap):
Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked #
Instantiating module "expiration" from file
/etc/freeradius/3.0/mods-enabled/expiration } # modules radiusd: ####
Loading Virtual Servers #### server { # from file
/etc/freeradius/3.0/radiusd.conf } # server server default { # from
file /etc/freeradius/3.0/sites-enabled/default # Loading authenticate
{...} # Loading authorize {...} Ignoring "sql" (see
raddb/mods-available/README.rst) Ignoring "ldap" (see
raddb/mods-available/README.rst) # Loading preacct {...} # Loading
accounting {...} # Loading post-proxy {...} # Loading post-auth {...}
} # server default server inner-tunnel { # from file
/etc/freeradius/3.0/sites-enabled/inner-tunnel # Loading authenticate
{...} # Loading authorize {...} # Loading session {...} # Loading
post-proxy {...} # Loading post-auth {...} # Skipping contents of 'if'
as it is always 'false' --
/etc/freeradius/3.0/sites-enabled/inner-tunnel:44 } # server
inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen
{ type = "auth" ipaddr = * port = 0 limit { max_connections = 16
lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = *
port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 }
} listen { type = "auth" ipaddr = 123.456.789.1 port = 18120 }
Listening on auth address * port 1812 bound to server default
Listening on acct address * port 1813 bound to server default
Listening on auth address 123.456.789.1 port 18120 bound to server
inner-tunnel Listening on proxy address * port 41010 Ready to process
requests (0) Received Access-Request Id 64 from 123.456.789.116:33131
to 123.456.789.32:1812 length 166 (0) User-Name = "USERNAME" (0)
User-Password = "PASSWORD" (0) NAS-IP-Address = 123.456.789.1 (0)
NAS-Port = 2 (0) Service-Type = Outbound-User (0) Calling-Station-Id =
"123.456.789.90" (0) NAS-Identifier = "OpenVpn" (0) Acct-Session-Id =
"C9806713021203E5866CEBC480846902" (0) NAS-Port-Type = Virtual (0) #
Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default (0) authorize { (0) policy
filter_username { (0) if (&User-Name) { (0) if (&User-Name) -> TRUE
(0) if (&User-Name) { (0) if (&User-Name =~ / /) { (0) if (&User-Name
=~ / /) -> FALSE (0) if (&User-Name =~ /@[^@]*@/ ) { (0) if
(&User-Name =~ /@[^@]*@/ ) -> FALSE (0) if (&User-Name =~ /\.\./ ) {
(0) if (&User-Name =~ /\.\./ ) -> FALSE (0) if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) { (0) if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (0) if (&User-Name =~ /\.$/)
{ (0) if (&User-Name =~ /\.$/) -> FALSE (0) if (&User-Name =~ /@\./) {
(0) if (&User-Name =~ /@\./) -> FALSE (0) } # if (&User-Name) =
notfound (0) } # policy filter_username = notfound (0) [preprocess] =
ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0)
suffix: Checking for suffix after "@" (0) suffix: No '@' in User-Name
= "USERNAME", looking up realm NULL (0) suffix: No such realm "NULL"
(0) [suffix] = noop (0) eap: No EAP-Message, not doing EAP (0) [eap] =
noop (0) [files] = noop (0) redundant-load-balance group { rlm_ldap
(ldap2): Reserved connection (0) (0) ldap2: EXPAND
(uid=%{%{Stripped-User-Name}:-%{User-Name}}) (0) ldap2: -->
(uid=USERNAME) (0) ldap2: Performing search in "LDAP_SUFFIX" with
filter "(uid=USERNAME)", scope "sub" (0) ldap2: Waiting for search
result... (0) ldap2: User object found at DN
"uid=USERNAME,LDAP_SUFFIX" (0) ldap2: Processing user attributes (0)
ldap2: control:Password-With-Header += 'PASSWORD' rlm_ldap (ldap2):
Released connection (0) (0) [ldap2] = updated (0) } #
redundant-load-balance group = updated (0) [expiration] = noop (0)
[logintime] = noop (0) pap: No {...} in Password-With-Header,
re-writing to Cleartext-Password (0) pap: Removing
&control:Password-With-Header (0) [pap] = updated (0) policy
group_authorization { (0) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) { (0) Searching for user in group
"cn=rad_users,LDAP_SUFFIX" rlm_ldap (ldap1): Reserved connection (0)
(0) Using user DN from request "uid=USERNAME,LDAP_SUFFIX" (0) Checking
for user in group objects (0) EXPAND
(&(objectClass=groupOfNames)(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}})))
(0) --> (&(objectClass=groupOfNames)(|(member=uid\3dUSERNAME,LDAP_SUFFIX)(memberUid=USERNAME)))
(0) Performing search in "cn=rad_users,LDAP_SUFFIX" with filter
"(&(objectClass=groupOfNames)(|(member=uid\3dUSERNAME,LDAP_SUFFIX)(memberUid=USERNAME)))",
scope "sub" (0) Waiting for search result... ber_get_next failed. (0)
User found in group object "cn=rad_users,LDAP_SUFFIX" rlm_ldap
(ldap1): Released connection (0) (0) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) -> TRUE (0) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) { (0) [ok] = ok (0) } # if
((&ldap1-LDAP-Group[*] == "cn=rad_users,LDAP_SUFFIX") ||
(&ldap2-LDAP-Group[*] == "cn=rad_users,LDAP_SUFFIX")) = ok (0) ...
skipping else: Preceding "if" was taken (0) } # policy
group_authorization = ok (0) } # authorize = updated (0) Found
Auth-Type = PAP (0) # Executing group from file
/etc/freeradius/3.0/sites-enabled/default (0) Auth-Type PAP { (0) pap:
Login attempt with password (0) pap: Comparing with "known good"
Cleartext-Password (0) pap: User authenticated successfully (0) [pap]
= ok (0) } # Auth-Type PAP = ok (0) # Executing section post-auth from
file /etc/freeradius/3.0/sites-enabled/default (0) post-auth { (0)
update { (0) No attributes updated (0) } # update = noop (0) [exec] =
noop (0) policy remove_reply_message_if_eap { (0) if
(&reply:EAP-Message && &reply:Reply-Message) { (0) if
(&reply:EAP-Message && &reply:Reply-Message) -> FALSE (0) else { (0)
[noop] = noop (0) } # else = noop (0) } # policy
remove_reply_message_if_eap = noop (0) } # post-auth = noop (0) Sent
Access-Accept Id 64 from 123.456.789.32:1812 to 123.456.789.116:33131
length 0 (0) Finished request Waking up in 4.9 seconds. (1) Received
Accounting-Request Id 114 from 123.456.789.116:59396 to
123.456.789.32:1813 length 150 (1) User-Name = "USERNAME" (1)
NAS-IP-Address = 123.456.789.1 (1) NAS-Port = 2 (1) Service-Type =
Outbound-User (1) Framed-Protocol = PPP (1) Framed-IP-Address =
123.456.789.2 (1) Calling-Station-Id = "123.456.789.90" (1)
NAS-Identifier = "OpenVpn" (1) Acct-Status-Type = Start (1)
Acct-Session-Id = "C9806713021203E5866CEBC480846902" (1) NAS-Port-Type
= Virtual (1) # Executing section preacct from file
/etc/freeradius/3.0/sites-enabled/default (1) preacct { (1)
[preprocess] = ok (1) policy acct_unique { (1) update request { (1)
&Tmp-String-9 := "ai:" (1) } # update request = noop (1) if
(("%{hex:&Class}" =~ /^%{hex:&Tmp-String-9}/) && ("%{string:&Class}"
=~ /^ai:([0-9a-f]{32})/i)) { (1) EXPAND %{hex:&Class} (1) --> (1)
EXPAND ^%{hex:&Tmp-String-9} (1) --> ^61693a (1) if (("%{hex:&Class}"
=~ /^%{hex:&Tmp-String-9}/) && ("%{string:&Class}" =~
/^ai:([0-9a-f]{32})/i)) -> FALSE (1) else { (1) update request { (1)
EXPAND %{md5:%{User-Name},%{Acct-Session-ID},%{%{NAS-IPv6-Address}:-%{NAS-IP-Address}},%{NAS-Identifier},%{NAS-Port-ID},%{NAS-Port}}
(1) --> e921af7d96c3c96c1a861f22b003bdf1 (1) &Acct-Unique-Session-Id
:= e921af7d96c3c96c1a861f22b003bdf1 (1) } # update request = noop (1)
} # else = noop (1) } # policy acct_unique = noop (1) suffix: Checking
for suffix after "@" (1) suffix: No '@' in User-Name = "USERNAME",
looking up realm NULL (1) suffix: No such realm "NULL" (1) [suffix] =
noop (1) [files] = noop (1) } # preacct = ok (1) # Executing section
accounting from file /etc/freeradius/3.0/sites-enabled/default (1)
accounting { (1) detail: EXPAND
/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d
(1) detail: -->
/var/log/freeradius/radacct/123.456.789.116/detail-20181106 (1)
detail: /var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d
expands to /var/log/freeradius/radacct/123.456.789.116/detail-20181106
(1) detail: EXPAND %t (1) detail: --> Tue Nov 6 15:04:28 2018 (1)
[detail] = ok (1) [unix] = ok (1) [exec] = noop (1)
attr_filter.accounting_response: EXPAND %{User-Name} (1)
attr_filter.accounting_response: --> USERNAME (1)
attr_filter.accounting_response: Matched entry DEFAULT at line 12 (1)
[attr_filter.accounting_response] = updated (1) } # accounting =
updated (1) Sent Accounting-Response Id 114 from 123.456.789.32:1813
to 123.456.789.116:59396 length 0 (1) Finished request (1) Cleaning up
request packet ID 114 with timestamp +16 Waking up in 4.7 seconds. (0)
Cleaning up request packet ID 64 with timestamp +15 Ready to process
requests


Notice (0) pap: No {...} in Password-With-Header, re-writing to
Cleartext-Password


Request with error:

FreeRADIUS Version 3.0.16 Copyright (C) 1999-2017 The FreeRADIUS
server project and contributors There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may
redistribute copies of FreeRADIUS under the terms of the GNU General
Public License For more information about these matters, see the file
named COPYRIGHT Starting - reading configuration files ... including
dictionary file /usr/share/freeradius/dictionary including dictionary
file /usr/share/freeradius/dictionary.dhcp including dictionary file
/usr/share/freeradius/dictionary.vqp including dictionary file
/etc/freeradius/3.0/dictionary including configuration file
/etc/freeradius/3.0/radiusd.conf including configuration file
/etc/freeradius/3.0/proxy.conf including configuration file
/etc/freeradius/3.0/clients.conf including files in directory
/etc/freeradius/3.0/mods-enabled/ including configuration file
/etc/freeradius/3.0/mods-enabled/detail including configuration file
/etc/freeradius/3.0/mods-enabled/exec including configuration file
/etc/freeradius/3.0/mods-enabled/detail.log including configuration
file /etc/freeradius/3.0/mods-enabled/ldap2 including configuration
file /etc/freeradius/3.0/mods-enabled/echo including configuration
file /etc/freeradius/3.0/mods-enabled/dynamic_clients including
configuration file /etc/freeradius/3.0/mods-enabled/attr_filter
including configuration file
/etc/freeradius/3.0/mods-enabled/ntlm_auth including configuration
file /etc/freeradius/3.0/mods-enabled/preprocess including
configuration file /etc/freeradius/3.0/mods-enabled/utf8 including
configuration file /etc/freeradius/3.0/mods-enabled/unpack including
configuration file /etc/freeradius/3.0/mods-enabled/replicate
including configuration file /etc/freeradius/3.0/mods-enabled/realm
including configuration file /etc/freeradius/3.0/mods-enabled/pap
including configuration file /etc/freeradius/3.0/mods-enabled/always
including configuration file /etc/freeradius/3.0/mods-enabled/expr
including configuration file /etc/freeradius/3.0/mods-enabled/linelog
including configuration file /etc/freeradius/3.0/mods-enabled/unix
including configuration file /etc/freeradius/3.0/mods-enabled/passwd
including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp
including configuration file
/etc/freeradius/3.0/mods-enabled/logintime including configuration
file /etc/freeradius/3.0/mods-enabled/ldap1 including configuration
file /etc/freeradius/3.0/mods-enabled/files including configuration
file /etc/freeradius/3.0/mods-enabled/mschap including configuration
file /etc/freeradius/3.0/mods-enabled/digest including configuration
file /etc/freeradius/3.0/mods-enabled/eap including configuration file
/etc/freeradius/3.0/mods-enabled/radutmp including configuration file
/etc/freeradius/3.0/mods-enabled/soh including configuration file
/etc/freeradius/3.0/mods-enabled/cache_eap including configuration
file /etc/freeradius/3.0/mods-enabled/expiration including
configuration file /etc/freeradius/3.0/mods-enabled/chap including
files in directory /etc/freeradius/3.0/policy.d/ including
configuration file /etc/freeradius/3.0/policy.d/group_authorization
including configuration file
/etc/freeradius/3.0/policy.d/canonicalization including configuration
file /etc/freeradius/3.0/policy.d/moonshot-targeted-ids including
configuration file /etc/freeradius/3.0/policy.d/filter including
configuration file /etc/freeradius/3.0/policy.d/control including
configuration file /etc/freeradius/3.0/policy.d/accounting including
configuration file /etc/freeradius/3.0/policy.d/operator-name
including configuration file /etc/freeradius/3.0/policy.d/cui
including configuration file /etc/freeradius/3.0/policy.d/dhcp
including configuration file /etc/freeradius/3.0/policy.d/debug
including configuration file /etc/freeradius/3.0/policy.d/eap
including configuration file /etc/freeradius/3.0/policy.d/abfab-tr
including files in directory /etc/freeradius/3.0/sites-enabled/
including configuration file /etc/freeradius/3.0/sites-enabled/default
including configuration file
/etc/freeradius/3.0/sites-enabled/inner-tunnel main { security { user
= "freerad" group = "freerad" allow_core_dumps = no } name =
"freeradius" prefix = "/usr" localstatedir = "/var" logdir =
"/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name =
"freeradius" prefix = "/usr" localstatedir = "/var" sbindir =
"/usr/sbin" logdir = "/var/log/freeradius" run_dir =
"/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir =
"/var/log/freeradius/radacct" hostname_lookups = no max_request_time =
30 cleanup_delay = 5 max_requests = 16384 pidfile =
"/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad"
debug_level = 0 proxy_requests = yes log { stripped_names = no auth =
no auth_badpass = no auth_goodpass = no colourise = yes msg_denied =
"You are already logged in - access denied" } resources { } security {
max_attributes = 200 reject_delay = 1.000000 status_server = yes } }
radiusd: #### Loading Realms and Home Servers #### proxy server {
retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120
wake_all_if_all_dead = no } home_server localhost { ipaddr =
123.456.789.1 port = 1812 type = "auth" secret = <<< secret >>>
response_window = 20.000000 response_timeouts = 1 max_outstanding =
65536 zombie_period = 40 status_check = "status-server" ping_interval
= 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3
revive_interval = 120 limit { max_connections = 16 max_requests = 0
lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd =
30 } } home_server_pool my_auth_failover { type = fail-over
home_server = localhost } realm example.com { auth_pool =
my_auth_failover } realm LOCAL { } radiusd: #### Loading Clients ####
client localhost { ipaddr = 123.456.789.1
require_message_authenticator = no secret = <<< secret >>> limit {
max_connections = 16 lifetime = 0 idle_timeout = 30 } } client
123.456.789.227/32 { require_message_authenticator = no secret = <<<
secret >>> shortname = "123.456.789.227" limit { max_connections = 16
lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.227/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.96/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.96" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.96/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.21/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.21" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.21/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.248/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.248" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.248/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.180/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.180" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.180/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.16/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.16" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.16/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.54/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.54" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.54/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.83/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.83" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.83/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.65/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.65" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.65/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.131/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.131" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.131/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.162/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.162" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.162/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.147/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.147" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.147/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.220/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.220" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.220/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.171/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.171" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.171/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.150/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.150" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.150/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.116/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.116" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.116/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.6/32 { require_message_authenticator = no secret =
<<< secret >>> shortname = "123.456.789.6" limit { max_connections =
16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.6/32. Please fix your
configuration Support for old-style clients will be removed in a
future release client 123.456.789.116/32 {
require_message_authenticator = no secret = <<< secret >>> shortname =
"123.456.789.116" limit { max_connections = 16 lifetime = 0
idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field
found in client 123.456.789.116/32. Please fix your configuration
Support for old-style clients will be removed in a future release
client 123.456.789.117/32 { require_message_authenticator = no secret
= <<< secret >>> shortname = "123.456.789.117" limit { max_connections
= 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or
'ipv6addr' field found in client 123.456.789.117/32. Please fix your
configuration Support for old-style clients will be removed in a
future release Debugger not attached # Creating Auth-Type = mschap #
Creating Auth-Type = digest # Creating Auth-Type = eap # Creating
Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type =
MS-CHAP # Creating Auth-Type = LDAP radiusd: #### Instantiating
modules #### modules { # Loaded module rlm_detail # Loading module
"detail" from file /etc/freeradius/3.0/mods-enabled/detail detail {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loaded module rlm_exec # Loading module
"exec" from file /etc/freeradius/3.0/mods-enabled/exec exec { wait =
no input_pairs = "request" shell_escape = yes timeout = 10 } # Loading
module "auth_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail auth_log { filename
= "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loading module "reply_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail reply_log {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loading module "pre_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail pre_proxy_log {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loading module "post_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log detail post_proxy_log {
filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
header = "%t" permissions = 384 locking = no escape_filenames = no
log_packet_header = no } # Loaded module rlm_ldap # Loading module
"ldap2" from file /etc/freeradius/3.0/mods-enabled/ldap2 ldap ldap2 {
server = "123.456.789.201" port = 636 identity =
"cn=admin,LDAP_SUFFIX" password = <<< secret >>> sasl { } user { scope
= "sub" access_positive = yes sasl { } } group { filter =
"(objectClass=groupOfNames)" scope = "sub" name_attribute = "cn"
membership_attribute = "memberOf" membership_filter =
"(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}}))"
cacheable_name = no cacheable_dn = no } client { scope = "sub" base_dn
= "" } profile { } options { ldap_debug = 40 chase_referrals = yes
rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle =
60 probes = 3 interval = 3 } tls { ca_file =
"/etc/freeradius/3.0/certs/ca.pem" ca_path =
"/etc/freeradius/3.0/certs/" certificate_file =
"/etc/freeradius/3.0/certs/server.pem" private_key_file =
"/etc/freeradius/3.0/certs/server.key" start_tls = no require_cert =
"allow" } } Creating attribute ldap2-LDAP-Group # Loading module
"echo" from file /etc/freeradius/3.0/mods-enabled/echo exec echo {
wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request"
output_pairs = "reply" shell_escape = yes } # Loaded module
rlm_dynamic_clients # Loading module "dynamic_clients" from file
/etc/freeradius/3.0/mods-enabled/dynamic_clients # Loaded module
rlm_attr_filter # Loading module "attr_filter.post-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.post-proxy { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/post-proxy" key =
"%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy"
from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.pre-proxy { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy" key =
"%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject"
from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.access_reject { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/access_reject" key =
"%{User-Name}" relaxed = no } # Loading module
"attr_filter.access_challenge" from file
/etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.access_challenge { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/access_challenge" key =
"%{User-Name}" relaxed = no } # Loading module
"attr_filter.accounting_response" from file
/etc/freeradius/3.0/mods-enabled/attr_filter attr_filter
attr_filter.accounting_response { filename =
"/etc/freeradius/3.0/mods-config/attr_filter/accounting_response" key
= "%{User-Name}" relaxed = no } # Loading module "ntlm_auth" from file
/etc/freeradius/3.0/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes
program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN
--username=%{mschap:User-Name} --password=%{User-Password}"
shell_escape = yes } # Loaded module rlm_preprocess # Loading module
"preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess
preprocess { huntgroups =
"/etc/freeradius/3.0/mods-config/preprocess/huntgroups" hints =
"/etc/freeradius/3.0/mods-config/preprocess/hints" with_ascend_hack =
no ascend_channels_per_line = 23 with_ntdomain_hack = no
with_specialix_jetstream_hack = no with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no } # Loaded module rlm_utf8 # Loading
module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8 # Loaded
module rlm_unpack # Loading module "unpack" from file
/etc/freeradius/3.0/mods-enabled/unpack # Loaded module rlm_replicate
# Loading module "replicate" from file
/etc/freeradius/3.0/mods-enabled/replicate # Loaded module rlm_realm #
Loading module "IPASS" from file
/etc/freeradius/3.0/mods-enabled/realm realm IPASS { format = "prefix"
delimiter = "/" ignore_default = no ignore_null = no } # Loading
module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm realm
suffix { format = "suffix" delimiter = "@" ignore_default = no
ignore_null = no } # Loading module "realmpercent" from file
/etc/freeradius/3.0/mods-enabled/realm realm realmpercent { format =
"suffix" delimiter = "%" ignore_default = no ignore_null = no } #
Loading module "ntdomain" from file
/etc/freeradius/3.0/mods-enabled/realm realm ntdomain { format =
"prefix" delimiter = "\\" ignore_default = no ignore_null = no } #
Loaded module rlm_pap # Loading module "pap" from file
/etc/freeradius/3.0/mods-enabled/pap pap { normalise = no } # Loaded
module rlm_always # Loading module "reject" from file
/etc/freeradius/3.0/mods-enabled/always always reject { rcode =
"reject" simulcount = 0 mpp = no } # Loading module "fail" from file
/etc/freeradius/3.0/mods-enabled/always always fail { rcode = "fail"
simulcount = 0 mpp = no } # Loading module "ok" from file
/etc/freeradius/3.0/mods-enabled/always always ok { rcode = "ok"
simulcount = 0 mpp = no } # Loading module "handled" from file
/etc/freeradius/3.0/mods-enabled/always always handled { rcode =
"handled" simulcount = 0 mpp = no } # Loading module "invalid" from
file /etc/freeradius/3.0/mods-enabled/always always invalid { rcode =
"invalid" simulcount = 0 mpp = no } # Loading module "userlock" from
file /etc/freeradius/3.0/mods-enabled/always always userlock { rcode =
"userlock" simulcount = 0 mpp = no } # Loading module "notfound" from
file /etc/freeradius/3.0/mods-enabled/always always notfound { rcode =
"notfound" simulcount = 0 mpp = no } # Loading module "noop" from file
/etc/freeradius/3.0/mods-enabled/always always noop { rcode = "noop"
simulcount = 0 mpp = no } # Loading module "updated" from file
/etc/freeradius/3.0/mods-enabled/always always updated { rcode =
"updated" simulcount = 0 mpp = no } # Loaded module rlm_expr # Loading
module "expr" from file /etc/freeradius/3.0/mods-enabled/expr expr {
safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
/äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module
rlm_linelog # Loading module "linelog" from file
/etc/freeradius/3.0/mods-enabled/linelog linelog { filename =
"/var/log/freeradius/linelog" escape_filenames = no syslog_severity =
"info" permissions = 384 format = "This is a log message for
%{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}"
} # Loading module "log_accounting" from file
/etc/freeradius/3.0/mods-enabled/linelog linelog log_accounting {
filename = "/var/log/freeradius/linelog-accounting" escape_filenames =
no syslog_severity = "info" permissions = 384 format = "" reference =
"Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module
rlm_unix # Loading module "unix" from file
/etc/freeradius/3.0/mods-enabled/unix unix { radwtmp =
"/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded
module rlm_passwd # Loading module "etc_passwd" from file
/etc/freeradius/3.0/mods-enabled/passwd passwd etc_passwd { filename =
"/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":"
ignore_nislike = no ignore_empty = yes allow_multiple_keys = no
hash_size = 100 } # Loaded module rlm_radutmp # Loading module
"sradutmp" from file /etc/freeradius/3.0/mods-enabled/sradutmp radutmp
sradutmp { filename = "/var/log/freeradius/sradutmp" username =
"%{User-Name}" case_sensitive = yes check_with_nas = yes permissions =
420 caller_id = no } # Loaded module rlm_logintime # Loading module
"logintime" from file /etc/freeradius/3.0/mods-enabled/logintime
logintime { minimum_timeout = 60 } # Loading module "ldap1" from file
/etc/freeradius/3.0/mods-enabled/ldap1 ldap ldap1 { server =
"123.456.789.121" port = 636 identity = "cn=admin,LDAP_SUFFIX"
password = <<< secret >>> sasl { } user { scope = "sub"
access_positive = yes sasl { } } group { filter =
"(objectClass=groupOfNames)" scope = "sub" name_attribute = "cn"
membership_attribute = "memberOf" membership_filter =
"(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}}))"
cacheable_name = no cacheable_dn = no } client { scope = "sub" base_dn
= "" } profile { } options { ldap_debug = 40 chase_referrals = yes
rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle =
60 probes = 3 interval = 3 } tls { ca_file =
"/etc/freeradius/3.0/certs/ca.pem" ca_path =
"/etc/freeradius/3.0/certs/" certificate_file =
"/etc/freeradius/3.0/certs/server.pem" private_key_file =
"/etc/freeradius/3.0/certs/server.key" start_tls = no require_cert =
"allow" } } Creating attribute ldap1-LDAP-Group # Loaded module
rlm_files # Loading module "files" from file
/etc/freeradius/3.0/mods-enabled/files files { filename =
"/etc/freeradius/3.0/mods-config/files/authorize" acctusersfile =
"/etc/freeradius/3.0/mods-config/files/accounting" preproxy_usersfile
= "/etc/freeradius/3.0/mods-config/files/pre-proxy" } # Loaded module
rlm_mschap # Loading module "mschap" from file
/etc/freeradius/3.0/mods-enabled/mschap mschap { use_mppe = yes
require_encryption = no require_strong = no with_ntdomain_hack = yes
passchange { } allow_retry = yes
winbind_retry_with_normalised_username = no } # Loaded module
rlm_digest # Loading module "digest" from file
/etc/freeradius/3.0/mods-enabled/digest # Loaded module rlm_eap #
Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap
eap { default_eap_type = "peap" timer_expire = 60
ignore_unknown_eap_types = no cisco_accounting_username_bug = no
max_sessions = 16384 } # Loading module "radutmp" from file
/etc/freeradius/3.0/mods-enabled/radutmp radutmp { filename =
"/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive
= yes check_with_nas = yes permissions = 384 caller_id = yes } #
Loaded module rlm_soh # Loading module "soh" from file
/etc/freeradius/3.0/mods-enabled/soh soh { dhcp = yes } # Loaded
module rlm_cache # Loading module "cache_eap" from file
/etc/freeradius/3.0/mods-enabled/cache_eap cache cache_eap { driver =
"rlm_cache_rbtree" key =
"%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15
max_entries = 0 epoch = 0 add_stats = no } # Loaded module
rlm_expiration # Loading module "expiration" from file
/etc/freeradius/3.0/mods-enabled/expiration # Loaded module rlm_chap #
Loading module "chap" from file /etc/freeradius/3.0/mods-enabled/chap
instantiate { } # Instantiating module "detail" from file
/etc/freeradius/3.0/mods-enabled/detail # Instantiating module
"auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in
detail output # Instantiating module "reply_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module
"pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log
# Instantiating module "post_proxy_log" from file
/etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module
"ldap2" from file /etc/freeradius/3.0/mods-enabled/ldap2 rlm_ldap:
libldap vendor: OpenLDAP, version: 20445 rlm_ldap (ldap2): Couldn't
find configuration for accounting, will return NOOP for calls from
this section post-auth { reference = "." } rlm_ldap (ldap2):
Initialising connection pool pool { start = 5 min = 5 max = 10 spare =
3 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60
retry_delay = 1 spread = no } rlm_ldap (ldap2): Opening additional
connection (0), 1 of 10 pending slots used rlm_ldap (ldap2):
Connecting to ldap://123.456.789.201:636 TLS: warning: cacertdir not
implemented for gnutls rlm_ldap (ldap2): Waiting for bind result...
rlm_ldap (ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (1), 1 of 9 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (2), 1 of 8 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (3), 1 of 7 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful rlm_ldap (ldap2): Opening additional
connection (4), 1 of 6 pending slots used rlm_ldap (ldap2): Connecting
to ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented
for gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap
(ldap2): Bind successful # Instantiating module
"attr_filter.post-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/post-proxy # Instantiating
module "attr_filter.pre-proxy" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy # Instantiating
module "attr_filter.access_reject" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/access_reject
[/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check
item "FreeRADIUS-Response-Delay" found in filter list for realm
"DEFAULT". [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11
Check item "FreeRADIUS-Response-Delay-USec" found in filter list for
realm "DEFAULT". # Instantiating module "attr_filter.access_challenge"
from file /etc/freeradius/3.0/mods-enabled/attr_filter reading
pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_challenge
# Instantiating module "attr_filter.accounting_response" from file
/etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file
/etc/freeradius/3.0/mods-config/attr_filter/accounting_response #
Instantiating module "preprocess" from file
/etc/freeradius/3.0/mods-enabled/preprocess reading pairlist file
/etc/freeradius/3.0/mods-config/preprocess/huntgroups reading pairlist
file /etc/freeradius/3.0/mods-config/preprocess/hints # Instantiating
module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm #
Instantiating module "suffix" from file
/etc/freeradius/3.0/mods-enabled/realm # Instantiating module
"realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm #
Instantiating module "ntdomain" from file
/etc/freeradius/3.0/mods-enabled/realm # Instantiating module "pap"
from file /etc/freeradius/3.0/mods-enabled/pap # Instantiating module
"reject" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "fail" from file
/etc/freeradius/3.0/mods-enabled/always # Instantiating module "ok"
from file /etc/freeradius/3.0/mods-enabled/always # Instantiating
module "handled" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "invalid" from file
/etc/freeradius/3.0/mods-enabled/always # Instantiating module
"userlock" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "notfound" from file
/etc/freeradius/3.0/mods-enabled/always # Instantiating module "noop"
from file /etc/freeradius/3.0/mods-enabled/always # Instantiating
module "updated" from file /etc/freeradius/3.0/mods-enabled/always #
Instantiating module "linelog" from file
/etc/freeradius/3.0/mods-enabled/linelog # Instantiating module
"log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog #
Instantiating module "etc_passwd" from file
/etc/freeradius/3.0/mods-enabled/passwd rlm_passwd: nfields: 3
keyfield 0(User-Name) listable: no # Instantiating module "logintime"
from file /etc/freeradius/3.0/mods-enabled/logintime # Instantiating
module "ldap1" from file /etc/freeradius/3.0/mods-enabled/ldap1
rlm_ldap (ldap1): Couldn't find configuration for accounting, will
return NOOP for calls from this section post-auth { reference = "." }
rlm_ldap (ldap1): Initialising connection pool pool { start = 5 min =
5 max = 10 spare = 3 uses = 0 lifetime = 0 cleanup_interval = 30
idle_timeout = 60 retry_delay = 1 spread = no } rlm_ldap (ldap1):
Opening additional connection (0), 1 of 10 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (1), 1 of 9 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (2), 1 of 8 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (3), 1 of 7 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Opening additional connection (4), 1 of 6 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful # Instantiating
module "files" from file /etc/freeradius/3.0/mods-enabled/files
reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize
reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting
reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy
# Instantiating module "mschap" from file
/etc/freeradius/3.0/mods-enabled/mschap rlm_mschap (mschap): using
internal authentication # Instantiating module "eap" from file
/etc/freeradius/3.0/mods-enabled/eap # Linked to sub-module
rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module
rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } #
Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config
tls-common { verify_depth = 0 ca_path = "/etc/freeradius/3.0/certs"
pem_file_type = yes private_key_file =
"/etc/freeradius/3.0/certs/server.key" certificate_file =
"/etc/freeradius/3.0/certs/server.pem" ca_file =
"/etc/freeradius/3.0/certs/ca.pem" dh_file =
"/etc/freeradius/3.0/certs/dh" fragment_size = 1024 include_length =
yes auto_chain = yes check_crl = no check_all_crl = no cipher_list =
"DEFAULT" cipher_server_preference = no ecdh_curve = "prime256v1"
tls_max_version = "" tls_min_version = "1.0" cache { enable = no
lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp
{ enable = no override_cert_url = yes url =
"http://123.456.789.1/ocsp/" use_nonce = yes timeout = 0 softfail = no
} } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common"
default_eap_type = "md5" copy_request_to_tunnel = no
use_tunneled_reply = no virtual_server = "inner-tunnel" include_length
= yes require_client_cert = no } tls: Using cached TLS configuration
from previous invocation # Linked to sub-module rlm_eap_peap peap {
tls = "tls-common" default_eap_type = "mschapv2"
copy_request_to_tunnel = no use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel"
soh = no require_client_cert = no } tls: Using cached TLS
configuration from previous invocation # Linked to sub-module
rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no }
# Instantiating module "cache_eap" from file
/etc/freeradius/3.0/mods-enabled/cache_eap rlm_cache (cache_eap):
Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked #
Instantiating module "expiration" from file
/etc/freeradius/3.0/mods-enabled/expiration } # modules radiusd: ####
Loading Virtual Servers #### server { # from file
/etc/freeradius/3.0/radiusd.conf } # server server default { # from
file /etc/freeradius/3.0/sites-enabled/default # Loading authenticate
{...} # Loading authorize {...} Ignoring "sql" (see
raddb/mods-available/README.rst) Ignoring "ldap" (see
raddb/mods-available/README.rst) # Loading preacct {...} # Loading
accounting {...} # Loading post-proxy {...} # Loading post-auth {...}
} # server default server inner-tunnel { # from file
/etc/freeradius/3.0/sites-enabled/inner-tunnel # Loading authenticate
{...} # Loading authorize {...} # Loading session {...} # Loading
post-proxy {...} # Loading post-auth {...} # Skipping contents of 'if'
as it is always 'false' --
/etc/freeradius/3.0/sites-enabled/inner-tunnel:44 } # server
inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen
{ type = "auth" ipaddr = * port = 0 limit { max_connections = 16
lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = *
port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 }
} listen { type = "auth" ipaddr = 123.456.789.1 port = 18120 }
Listening on auth address * port 1812 bound to server default
Listening on acct address * port 1813 bound to server default
Listening on auth address 123.456.789.1 port 18120 bound to server
inner-tunnel Listening on proxy address * port 50185 Ready to process
requests (0) Received Access-Request Id 182 from 123.456.789.116:38689
to 123.456.789.32:1812 length 166 (0) User-Name = "USERNAME" (0)
User-Password = "PASSWORD" (0) NAS-IP-Address = 123.456.789.1 (0)
NAS-Port = 3 (0) Service-Type = Outbound-User (0) Calling-Station-Id =
"123.456.789.90" (0) NAS-Identifier = "OpenVpn" (0) Acct-Session-Id =
"032D1A71E0B09B5DEA33B7C16E4006AB" (0) NAS-Port-Type = Virtual (0) #
Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default (0) authorize { (0) policy
filter_username { (0) if (&User-Name) { (0) if (&User-Name) -> TRUE
(0) if (&User-Name) { (0) if (&User-Name =~ / /) { (0) if (&User-Name
=~ / /) -> FALSE (0) if (&User-Name =~ /@[^@]*@/ ) { (0) if
(&User-Name =~ /@[^@]*@/ ) -> FALSE (0) if (&User-Name =~ /\.\./ ) {
(0) if (&User-Name =~ /\.\./ ) -> FALSE (0) if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) { (0) if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (0) if (&User-Name =~ /\.$/)
{ (0) if (&User-Name =~ /\.$/) -> FALSE (0) if (&User-Name =~ /@\./) {
(0) if (&User-Name =~ /@\./) -> FALSE (0) } # if (&User-Name) =
notfound (0) } # policy filter_username = notfound (0) [preprocess] =
ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0)
suffix: Checking for suffix after "@" (0) suffix: No '@' in User-Name
= "USERNAME", looking up realm NULL (0) suffix: No such realm "NULL"
(0) [suffix] = noop (0) eap: No EAP-Message, not doing EAP (0) [eap] =
noop (0) [files] = noop (0) redundant-load-balance group { rlm_ldap
(ldap2): Closing connection (0): Hit idle_timeout, was idle for 61
seconds rlm_ldap (ldap2): You probably need to lower "min" rlm_ldap
(ldap2): Closing connection (1): Hit idle_timeout, was idle for 61
seconds rlm_ldap (ldap2): You probably need to lower "min" rlm_ldap
(ldap2): Closing connection (2): Hit idle_timeout, was idle for 61
seconds rlm_ldap (ldap2): You probably need to lower "min" rlm_ldap
(ldap2): Closing connection (3): Hit idle_timeout, was idle for 61
seconds rlm_ldap (ldap2): You probably need to lower "min" rlm_ldap
(ldap2): Closing connection (4): Hit idle_timeout, was idle for 61
seconds rlm_ldap (ldap2): You probably need to lower "min" rlm_ldap
(ldap2): 0 of 0 connections in use. You may need to increase "spare"
rlm_ldap (ldap2): Opening additional connection (5), 1 of 10 pending
slots used rlm_ldap (ldap2): Connecting to ldap://123.456.789.201:636
TLS: warning: cacertdir not implemented for gnutls rlm_ldap (ldap2):
Waiting for bind result... rlm_ldap (ldap2): Bind successful rlm_ldap
(ldap2): Reserved connection (5) (0) ldap2: EXPAND
(uid=%{%{Stripped-User-Name}:-%{User-Name}}) (0) ldap2: -->
(uid=USERNAME) (0) ldap2: Performing search in "LDAP_SUFFIX" with
filter "(uid=USERNAME)", scope "sub" (0) ldap2: Waiting for search
result... (0) ldap2: User object found at DN
"uid=USERNAME,LDAP_SUFFIX" (0) ldap2: Processing user attributes (0)
ldap2: control:Password-With-Header += 'PASSWORD' rlm_ldap (ldap2):
Released connection (5) Need 4 more connections to reach min
connections (5) rlm_ldap (ldap2): Opening additional connection (6), 1
of 9 pending slots used rlm_ldap (ldap2): Connecting to
ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented for
gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap (ldap2):
Bind successful (0) [ldap2] = updated (0) } # redundant-load-balance
group = updated (0) [expiration] = noop (0) [logintime] = noop (0)
pap: Normalizing Password-With-Header from base64 encoding, 28 bytes
-> 21 bytes (0) pap: Unknown header {{?v??w}} in Password-With-Header,
re-writing to Cleartext-Password (0) pap: Removing
&control:Password-With-Header (0) [pap] = updated (0) policy
group_authorization { (0) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) { (0) Searching for user in group
"cn=rad_users,LDAP_SUFFIX" rlm_ldap (ldap1): Closing connection (0):
Hit idle_timeout, was idle for 61 seconds rlm_ldap (ldap1): You
probably need to lower "min" rlm_ldap (ldap1): Closing connection (1):
Hit idle_timeout, was idle for 61 seconds rlm_ldap (ldap1): You
probably need to lower "min" rlm_ldap (ldap1): Closing connection (2):
Hit idle_timeout, was idle for 61 seconds rlm_ldap (ldap1): You
probably need to lower "min" rlm_ldap (ldap1): Closing connection (3):
Hit idle_timeout, was idle for 61 seconds rlm_ldap (ldap1): You
probably need to lower "min" rlm_ldap (ldap1): Closing connection (4):
Hit idle_timeout, was idle for 61 seconds rlm_ldap (ldap1): You
probably need to lower "min" rlm_ldap (ldap1): 0 of 0 connections in
use. You may need to increase "spare" rlm_ldap (ldap1): Opening
additional connection (5), 1 of 10 pending slots used rlm_ldap
(ldap1): Connecting to ldap://123.456.789.121:636 TLS: warning:
cacertdir not implemented for gnutls rlm_ldap (ldap1): Waiting for
bind result... rlm_ldap (ldap1): Bind successful rlm_ldap (ldap1):
Reserved connection (5) (0) Using user DN from request
"uid=USERNAME,LDAP_SUFFIX" (0) Checking for user in group objects (0)
EXPAND (&(objectClass=groupOfNames)(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}})))
(0) --> (&(objectClass=groupOfNames)(|(member=uid\3dUSERNAME\2cdc\3d5eurovpn\2cdc\3dcom)(memberUid=USERNAME)))
(0) Performing search in "cn=rad_users,LDAP_SUFFIX" with filter
"(&(objectClass=groupOfNames)(|(member=uid\3dUSERNAME\2cdc\3d5eurovpn\2cdc\3dcom)(memberUid=USERNAME)))",
scope "sub" (0) Waiting for search result... ber_get_next failed. (0)
User found in group object "cn=rad_users,LDAP_SUFFIX" rlm_ldap
(ldap1): Released connection (5) Need 4 more connections to reach min
connections (5) rlm_ldap (ldap1): Opening additional connection (6), 1
of 9 pending slots used rlm_ldap (ldap1): Connecting to
ldap://123.456.789.121:636 TLS: warning: cacertdir not implemented for
gnutls rlm_ldap (ldap1): Waiting for bind result... rlm_ldap (ldap1):
Bind successful (0) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) -> TRUE (0) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) { (0) [ok] = ok (0) } # if
((&ldap1-LDAP-Group[*] == "cn=rad_users,LDAP_SUFFIX") ||
(&ldap2-LDAP-Group[*] == "cn=rad_users,LDAP_SUFFIX")) = ok (0) ...
skipping else: Preceding "if" was taken (0) } # policy
group_authorization = ok (0) } # authorize = updated (0) Found
Auth-Type = PAP (0) # Executing group from file
/etc/freeradius/3.0/sites-enabled/default (0) Auth-Type PAP { (0) pap:
Login attempt with password (0) pap: Comparing with "known good"
Cleartext-Password (0) pap: ERROR: Cleartext password does not match
"known good" password (0) pap: Passwords don't match (0) [pap] =
reject (0) } # Auth-Type PAP = reject (0) Failed to authenticate the
user (0) Using Post-Auth-Type Reject (0) # Executing group from file
/etc/freeradius/3.0/sites-enabled/default (0) Post-Auth-Type REJECT {
(0) attr_filter.access_reject: EXPAND %{User-Name} (0)
attr_filter.access_reject: --> USERNAME (0) attr_filter.access_reject:
Matched entry DEFAULT at line 11 (0) [attr_filter.access_reject] =
updated (0) [eap] = noop (0) policy remove_reply_message_if_eap { (0)
if (&reply:EAP-Message && &reply:Reply-Message) { (0) if
(&reply:EAP-Message && &reply:Reply-Message) -> FALSE (0) else { (0)
[noop] = noop (0) } # else = noop (0) } # policy
remove_reply_message_if_eap = noop (0) } # Post-Auth-Type REJECT =
updated (0) Delaying response for 1.000000 seconds Waking up in 0.2
seconds. Waking up in 0.7 seconds. (1) Received Access-Request Id 182
from 123.456.789.116:41404 to 123.456.789.32:1812 length 166 (1)
User-Name = "USERNAME" (1) User-Password = "PASSWORD" (1)
NAS-IP-Address = 123.456.789.1 (1) NAS-Port = 3 (1) Service-Type =
Outbound-User (1) Calling-Station-Id = "123.456.789.90" (1)
NAS-Identifier = "OpenVpn" (1) Acct-Session-Id =
"032D1A71E0B09B5DEA33B7C16E4006AB" (1) NAS-Port-Type = Virtual (1) #
Executing section authorize from file
/etc/freeradius/3.0/sites-enabled/default (1) authorize { (1) policy
filter_username { (1) if (&User-Name) { (1) if (&User-Name) -> TRUE
(1) if (&User-Name) { (1) if (&User-Name =~ / /) { (1) if (&User-Name
=~ / /) -> FALSE (1) if (&User-Name =~ /@[^@]*@/ ) { (1) if
(&User-Name =~ /@[^@]*@/ ) -> FALSE (1) if (&User-Name =~ /\.\./ ) {
(1) if (&User-Name =~ /\.\./ ) -> FALSE (1) if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) { (1) if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (1) if (&User-Name =~ /\.$/)
{ (1) if (&User-Name =~ /\.$/) -> FALSE (1) if (&User-Name =~ /@\./) {
(1) if (&User-Name =~ /@\./) -> FALSE (1) } # if (&User-Name) =
notfound (1) } # policy filter_username = notfound (1) [preprocess] =
ok (1) [chap] = noop (1) [mschap] = noop (1) [digest] = noop (1)
suffix: Checking for suffix after "@" (1) suffix: No '@' in User-Name
= "USERNAME", looking up realm NULL (1) suffix: No such realm "NULL"
(1) [suffix] = noop (1) eap: No EAP-Message, not doing EAP (1) [eap] =
noop (1) [files] = noop (1) redundant-load-balance group { rlm_ldap
(ldap2): Reserved connection (5) (1) ldap2: EXPAND
(uid=%{%{Stripped-User-Name}:-%{User-Name}}) (1) ldap2: -->
(uid=USERNAME) (1) ldap2: Performing search in "LDAP_SUFFIX" with
filter "(uid=USERNAME)", scope "sub" (1) ldap2: Waiting for search
result... (1) ldap2: User object found at DN
"uid=USERNAME,LDAP_SUFFIX" (1) ldap2: Processing user attributes (1)
ldap2: control:Password-With-Header += 'PASSWORD' rlm_ldap (ldap2):
Released connection (5) Need 3 more connections to reach min
connections (5) rlm_ldap (ldap2): Opening additional connection (7), 1
of 8 pending slots used rlm_ldap (ldap2): Connecting to
ldap://123.456.789.201:636 TLS: warning: cacertdir not implemented for
gnutls rlm_ldap (ldap2): Waiting for bind result... rlm_ldap (ldap2):
Bind successful (1) [ldap2] = updated (1) } # redundant-load-balance
group = updated (1) [expiration] = noop (1) [logintime] = noop (1)
pap: Normalizing Password-With-Header from base64 encoding, 28 bytes
-> 21 bytes (1) pap: Unknown header {{?v??w}} in Password-With-Header,
re-writing to Cleartext-Password (1) pap: Removing
&control:Password-With-Header (1) [pap] = updated (1) policy
group_authorization { (1) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) { (1) Searching for user in group
"cn=rad_users,LDAP_SUFFIX" rlm_ldap (ldap1): Reserved connection (5)
(1) Using user DN from request "uid=USERNAME,LDAP_SUFFIX" (1) Checking
for user in group objects (1) EXPAND
(&(objectClass=groupOfNames)(|(member=%{control:Ldap-UserDn})(memberUid=%{%{Stripped-User-Name}:-%{User-Name}})))
(1) --> (&(objectClass=groupOfNames)(|(member=uid\3dUSERNAME,LDAP_SUFFIX)(memberUid=USERNAME)))
(1) Performing search in "cn=rad_users,LDAP_SUFFIX" with filter
"(&(objectClass=groupOfNames)(|(member=uid\3dUSERNAME,LDAP_SUFFIX)(memberUid=USERNAME)))",
scope "sub" (1) Waiting for search result... ber_get_next failed. (1)
User found in group object "cn=rad_users,LDAP_SUFFIX" rlm_ldap
(ldap1): Released connection (5) Need 3 more connections to reach min
connections (5) rlm_ldap (ldap1): Opening additional connection (7), 1
of 8 pending slots used rlm_ldap (ldap1): Connecting to
ldap://123.456.789.121:636 TLS: warning: cacertdir not implemented for
gnutls rlm_ldap (ldap1): Waiting for bind result... rlm_ldap (ldap1):
Bind successful (1) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) -> TRUE (1) if ((&ldap1-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX") || (&ldap2-LDAP-Group[*] ==
"cn=rad_users,LDAP_SUFFIX")) { (1) [ok] = ok (1) } # if
((&ldap1-LDAP-Group[*] == "cn=rad_users,LDAP_SUFFIX") ||
(&ldap2-LDAP-Group[*] == "cn=rad_users,LDAP_SUFFIX")) = ok (1) ...
skipping else: Preceding "if" was taken (1) } # policy
group_authorization = ok (1) } # authorize = updated (1) Found
Auth-Type = PAP (1) # Executing group from file
/etc/freeradius/3.0/sites-enabled/default (1) Auth-Type PAP { (1) pap:
Login attempt with password (1) pap: Comparing with "known good"
Cleartext-Password (1) pap: ERROR: Cleartext password does not match
"known good" password (1) pap: Passwords don't match (1) [pap] =
reject (1) } # Auth-Type PAP = reject (1) Failed to authenticate the
user (1) Using Post-Auth-Type Reject (1) # Executing group from file
/etc/freeradius/3.0/sites-enabled/default (1) Post-Auth-Type REJECT {
(1) attr_filter.access_reject: EXPAND %{User-Name} (1)
attr_filter.access_reject: --> USERNAME (1) attr_filter.access_reject:
Matched entry DEFAULT at line 11 (1) [attr_filter.access_reject] =
updated (1) [eap] = noop (1) policy remove_reply_message_if_eap { (1)
if (&reply:EAP-Message && &reply:Reply-Message) { (1) if
(&reply:EAP-Message && &reply:Reply-Message) -> FALSE (1) else { (1)
[noop] = noop (1) } # else = noop (1) } # policy
remove_reply_message_if_eap = noop (1) } # Post-Auth-Type REJECT =
updated (1) Delaying response for 1.000000 seconds (0) Sending delayed
response (0) Sent Access-Reject Id 182 from 123.456.789.32:1812 to
123.456.789.116:38689 length 20 Waking up in 0.2 seconds. Waking up in
0.6 seconds. (1) Sending delayed response (1) Sent Access-Reject Id
182 from 123.456.789.32:1812 to 123.456.789.116:41404 length 20 Waking
up in 3.0 seconds. (0) Cleaning up request packet ID 182 with
timestamp +61 Waking up in 0.9 seconds. (1) Cleaning up request packet
ID 182 with timestamp +62 Ready to process requests

I think line:

(1) pap: Normalizing Password-With-Header from base64 encoding, 28
bytes -> 21 bytes (1) pap: Unknown header {{?v??w}} in
Password-With-Header, re-writing to Cleartext-Password (1) pap:
Removing &control:Password-With-Header

is making this problem. pap module is trying to normalize password
from ldap no matter that

pap { normalise = no } is set.

Please help.

Regards,
Kreso

-
List info/subscribe/unsubscribe? See http://www.freeradius.org
Alan DeKok
2018-11-09 17:56:21 UTC
Permalink
Post by Amstaff zg
Hi,
I have problem with pap password normalization when radius fetches
password from ldap in base64 format.
FreeRADIUS Version 3.0.16 Copyright (C) 1999-2017 The FreeRADIUS
server project and contributors There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may
redistribute copies of FreeRADIUS under the terms of the GNU General
Public License For more information about these matters, see the file
The debug output has been *completely* mangled. It's been word wrapped to the point where it's almost impossible to see what's going on.
Post by Amstaff zg
(1) pap: Normalizing Password-With-Header from base64 encoding, 28
bytes -> 21 bytes (1) pap: Unknown header {{?v??w}} in
Removing &control:Password-With-Header
is making this problem. pap module is trying to normalize password
from ldap no matter that
pap { normalise = no } is set.
When you put the password into the "Password-With-Header" attribute, you are telling FreeRADIUS that the password has a header. So it makes no sense to say "yes, it has a header, but no, we don't want to look at that header".

If you want to use the password *as is* from LDAP, then assign it to the Cleartext-Password attribute. That won't look for headers, and will compare the passwords as-is.

Alan DeKok.


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.h
Amstaff zg
2018-11-12 11:14:55 UTC
Permalink
That worked,

Thank you.
Post by Alan DeKok
Post by Amstaff zg
Hi,
I have problem with pap password normalization when radius fetches
password from ldap in base64 format.
FreeRADIUS Version 3.0.16 Copyright (C) 1999-2017 The FreeRADIUS
server project and contributors There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may
redistribute copies of FreeRADIUS under the terms of the GNU General
Public License For more information about these matters, see the file
The debug output has been *completely* mangled. It's been word wrapped to the point where it's almost impossible to see what's going on.
Post by Amstaff zg
(1) pap: Normalizing Password-With-Header from base64 encoding, 28
bytes -> 21 bytes (1) pap: Unknown header {{?v??w}} in
Removing &control:Password-With-Header
is making this problem. pap module is trying to normalize password
from ldap no matter that
pap { normalise = no } is set.
When you put the password into the "Password-With-Header" attribute, you are telling FreeRADIUS that the password has a header. So it makes no sense to say "yes, it has a header, but no, we don't want to look at that header".
If you want to use the password *as is* from LDAP, then assign it to the Cleartext-Password attribute. That won't look for headers, and will compare the passwords as-is.
Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
-
List info/subscribe/unsubscribe? See http://www.freeradi

Loading...