FreeRADIUS / freeradius-server

FreeRADIUS - A multi-protocol policy server.
http://freeradius.org
GNU General Public License v2.0
2.11k stars 1.08k forks source link

when user is NOT a member of group from mysql DB the server crashes #1611

Closed lumirl closed 8 years ago

lumirl commented 8 years ago

Issue type

Users must be members of a group in SQL in order to get access to vpn or wifi. When they are members of a certain group then the server works fine. When they are NOT members of a group the server crashes. In this example the user is a member of only group openvpn and not wifi and is trying to connect to wifi... I have tried with 3.0.10 3.0.11 and now with development 3.1.0 - it alwyas crash at the same point.

In sites-enabled/default is added this: ... -sql

if (NAS-Identifier == "OpenVpn") { if (SQL-Group == "openvpn") { } else { reject } } ... In inner tunnel for peap is this: ... -sql if (SQL-Group == "wifi") { } else { reject } ...

Output of [radiusd|freeradius] -X showing issue ocurring

===============================================================
FreeRADIUS Version 3.1.0
Copyright (C) 1999-2016 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file /usr/local/freeradius3/share/freeradius/dictionary
including dictionary file /usr/local/freeradius3/share/freeradius/dictionary.dhcp
including dictionary file /usr/local/freeradius3/share/freeradius/dictionary.vqp
including dictionary file /usr/local/freeradius3/etc/raddb/dictionary
including configuration file /usr/local/freeradius3/etc/raddb/radiusd.conf
including configuration file /usr/local/freeradius3/etc/raddb/proxy.conf
including configuration file /usr/local/freeradius3/etc/raddb/clients.conf
including files in directory /usr/local/freeradius3/etc/raddb/mods-enabled/
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/files
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/sql
including configuration file /usr/local/freeradius3/etc/raddb/mods-config/sql/main/mysql/queries.conf
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/preprocess
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/eap
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/passwd
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/dhcp
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/cache_eap
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/replicate
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/logintime
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/unix
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/ntlm_auth
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/unpack
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/echo
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/expiration
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/soh
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/sradutmp
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/dynamic_clients
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/pap
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/utf8
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/radutmp
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/digest
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/expr
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/mschap
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/chap
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/detail
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/linelog
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/exec
including configuration file /usr/local/freeradius3/etc/raddb/mods-enabled/always
including files in directory /usr/local/freeradius3/etc/raddb/policy.d/
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/eap
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/accounting
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/cui
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/dhcp
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/vendor
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/filter
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/abfab-tr
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/debug
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/control
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/operator-name
including configuration file /usr/local/freeradius3/etc/raddb/policy.d/canonicalization
including files in directory /usr/local/freeradius3/etc/raddb/sites-enabled/
including configuration file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
including configuration file /usr/local/freeradius3/etc/raddb/sites-enabled/default
main {
 security {
        allow_core_dumps = no
 }
        name = "radiusd"
        prefix = "/usr/local/freeradius3"
        localstatedir = "/usr/local/freeradius3/var"
        logdir = "/usr/local/freeradius3/var/log/radius"
        run_dir = "/usr/local/freeradius3/var/run/radiusd"
}
main {
        name = "radiusd"
        prefix = "/usr/local/freeradius3"
        localstatedir = "/usr/local/freeradius3/var"
        sbindir = "/usr/local/freeradius3/sbin"
        logdir = "/usr/local/freeradius3/var/log/radius"
        run_dir = "/usr/local/freeradius3/var/run/radiusd"
        libdir = "/usr/local/freeradius3/lib"
        radacctdir = "/usr/local/freeradius3/var/log/radius/radacct"
        hostname_lookups = no
        max_request_time = 30
        cleanup_delay = 5
        continuation_timeout = 15
        max_requests = 16384
        pidfile = "/usr/local/freeradius3/var/run/radiusd/radiusd.pid"
        checkrad = "/usr/local/freeradius3/sbin/checkrad"
        debug_level = 0
        proxy_requests = yes
 log {
        stripped_names = no
        auth = no
        auth_badpass = no
        auth_goodpass = no
        colourise = yes
        msg_denied = "You are already logged in - access denied"
 }
 resources {
 }
 security {
        max_attributes = 200
        reject_delay = 1.000000
        status_server = yes
        allow_vulnerable_openssl = "no"
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
        retry_delay = 5
        retry_count = 3
        default_fallback = no
        dead_time = 120
        wake_all_if_all_dead = no
 }
 home_server localhost {
        ipaddr = 127.0.0.1
        port = 1812
        type = "auth"
        secret = <<< secret >>>
        response_window = 20.000000
        response_timeouts = 1
        max_outstanding = 65536
        zombie_period = 40
        status_check = "status-server"
        ping_interval = 30
        check_interval = 30
        check_timeout = 4
        num_answers_to_alive = 3
        revive_interval = 120
  limit {
        max_connections = 16
        max_requests = 0
        lifetime = 0
        idle_timeout = 0
  }
  coa {
        irt = 2
        mrt = 16
        mrc = 5
        mrd = 30
  }
 }
 home_server_pool my_auth_failover {
        type = fail-over
        home_server = localhost
 }
 realm example.com {
        auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
radiusd: #### Loading Clients ####
 client lumir_doma {
        ipaddr = 62.245.76.18
        require_message_authenticator = no
        secret = <<< secret >>>
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
 }
 client localhost {
        ipaddr = 127.0.0.1
        require_message_authenticator = no
        secret = <<< secret >>>
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
 }
Debugger not attached
 thread pool {
        start_servers = 5
        max_servers = 32
        min_spare_servers = 3
        max_spare_servers = 10
        max_requests_per_server = 0
        cleanup_delay = 5
        max_queue_size = 65536
        auto_limit_acct = no
 }
listen {
        type = "auth"
        ipaddr = 127.0.0.1
        port = 18120
        recv_buff = 0
}
  # Creating Auth-Type = PAP
  # Creating Auth-Type = CHAP
  # Creating Auth-Type = MS-CHAP
  # Creating Auth-Type = eap
listen {
        type = "auth"
        ipaddr = *
        port = 1816
        recv_buff = 0
   limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
   }
}
listen {
        type = "acct"
        ipaddr = *
        port = 1817
        recv_buff = 0
   limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
   }
}
  # Creating Auth-Type = digest
radiusd: #### Loading modules ####
 modules {
  # Loaded module "rlm_files"
  # Loading module "files" from file /usr/local/freeradius3/etc/raddb/mods-enabled/files
  files {
        filename = "/usr/local/freeradius3/etc/raddb/mods-config/files/authorize"
        acctusersfile = "/usr/local/freeradius3/etc/raddb/mods-config/files/accounting"
        preproxy_usersfile = "/usr/local/freeradius3/etc/raddb/mods-config/files/pre-proxy"
  }
  # Loaded module "rlm_sql"
  # Loading module "sql" from file /usr/local/freeradius3/etc/raddb/mods-enabled/sql
  sql {
        driver = "rlm_sql_mysql"
        server = "localhost"
        port = 0
        login = "radius"
        password = <<< secret >>>
        radius_db = "radius"
        read_groups = yes
        read_profiles = no
        read_clients = no
        delete_stale_sessions = no
        sql_user_name = "%{User-Name}"
        group_attribute = "SQL-Group"
        default_user_profile = ""
        client_query = "SELECT id, nasname, shortname, type, secret, server FROM nas"
        authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
        authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
        authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id"
        authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id"
        group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority"
        simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
        safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
   accounting {
        reference = "%{tolower:type.%{Acct-Status-Type}.query}"
    type {
     accounting-on {
        query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime   = '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress   = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
     }
     accounting-off {
        query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime   = '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress   = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
     }
     start {
        query = "INSERT INTO radacct (acctsessionid,            acctuniqueid,           username, realm,                        nasipaddress,           nasportid, nasporttype,         acctstarttime,               acctupdatetime, acctstoptime,           acctsessiontime,        acctauthentic, connectinfo_start,       connectinfo_stop,       acctinputoctets, acctoutputoctets,  calledstationid,         callingstationid, acctterminatecause,   servicetype,            framedprotocol, framedipaddress) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp}), FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}')"
        query = "UPDATE radacct SET acctstarttime       = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctupdatetime     = FROM_UNIXTIME(%{integer:Event-Timestamp}), connectinfo_start = '%{Connect-Info}' WHERE AcctUniqueId = '%{Acct-Unique-Session-Id}'"
     }
     interim-update {
        query = "UPDATE radacct SET acctupdatetime  = (@acctupdatetime_old:=acctupdatetime), acctupdatetime  = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctinterval    = %{integer:Event-Timestamp} - UNIX_TIMESTAMP(@acctupdatetime_old), framedipaddress = '%{Framed-IP-Address}', acctsessiontime = %{%{Acct-Session-Time}:-NULL}, acctinputoctets = '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}' WHERE AcctUniqueId = '%{Acct-Unique-Session-Id}'"
        query = "INSERT INTO radacct (acctsessionid,            acctuniqueid,           username, realm,                        nasipaddress,           nasportid, nasporttype,         acctstarttime,               acctupdatetime, acctstoptime,           acctsessiontime,        acctauthentic, connectinfo_start,       connectinfo_stop,       acctinputoctets, acctoutputoctets,  calledstationid,         callingstationid, acctterminatecause,   servicetype,            framedprotocol, framedipaddress) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp} - %{%{Acct-Session-Time}:-0}), FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, %{%{Acct-Session-Time}:-NULL}, '%{Acct-Authentic}', '%{Connect-Info}', '', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}')"
     }
     stop {
        query = "UPDATE radacct SET acctstoptime        = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime    = %{%{Acct-Session-Time}:-NULL}, acctinputoctets        = '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', acctterminatecause = '%{Acct-Terminate-Cause}', connectinfo_stop = '%{Connect-Info}' WHERE AcctUniqueId = '%{Acct-Unique-Session-Id}'"
        query = "INSERT INTO radacct (acctsessionid,            acctuniqueid,           username, realm,                        nasipaddress,           nasportid, nasporttype,         acctstarttime,               acctupdatetime, acctstoptime,           acctsessiontime,        acctauthentic, connectinfo_start,       connectinfo_stop,       acctinputoctets, acctoutputoctets,  calledstationid,         callingstationid, acctterminatecause,   servicetype,            framedprotocol, framedipaddress) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp} - %{%{Acct-Session-Time}:-0}), FROM_UNIXTIME(%{integer:Event-Timestamp}), FROM_UNIXTIME(%{integer:Event-Timestamp}), %{%{Acct-Session-Time}:-NULL}, '%{Acct-Authentic}', '', '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Acct-Terminate-Cause}', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}')"
     }
    }
   }
   post-auth {
        reference = ".query"
        query = "INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S')"
   }
  }
rlm_sql (sql) - Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
  # Loaded module "rlm_preprocess"
  # Loading module "preprocess" from file /usr/local/freeradius3/etc/raddb/mods-enabled/preprocess
  preprocess {
        huntgroups = "/usr/local/freeradius3/etc/raddb/mods-config/preprocess/huntgroups"
        hints = "/usr/local/freeradius3/etc/raddb/mods-config/preprocess/hints"
        with_ascend_hack = no
        ascend_channels_per_line = 23
        with_ntdomain_hack = no
        with_specialix_jetstream_hack = no
        with_cisco_vsa_hack = no
        with_alvarion_vsa_hack = no
  }
  # Loaded module "rlm_eap"
  # Loading module "eap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/eap
  eap {
        default_eap_type = "peap"
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = no
  }
   # Linked to sub-module rlm_eap_md5
   # Linked to sub-module rlm_eap_leap
   # Linked to sub-module rlm_eap_gtc
   gtc {
        challenge = "Password: "
        auth_type = "PAP"
   }
   # Linked to sub-module rlm_eap_tls
   tls {
        tls = "tls-common"
        require_client_cert = yes
        include_length = yes
   }
   tls-config tls-common {
        verify_depth = 0
        ca_path = "/usr/local/freeradius3/etc/raddb/certs"
        pem_file_type = yes
        private_key_file = "/usr/local/freeradius3/etc/raddb/certs/server.pem"
        certificate_file = "/usr/local/freeradius3/etc/raddb/certs/server.pem"
        ca_file = "/usr/local/freeradius3/etc/raddb/certs/ca.pem"
        private_key_password = <<< secret >>>
        dh_file = "/usr/local/freeradius3/etc/raddb/certs/dh"
        fragment_size = 1024
        auto_chain = yes
        check_crl = no
        cipher_list = "DEFAULT"
        allow_renegotiation = no
        ecdh_curve = "prime256v1"
    cache {
        lifetime = 86400
        verify = no
    }
    verify {
    }
    ocsp {
        enable = no
        override_cert_url = yes
        url = "http://127.0.0.1/ocsp/"
        use_nonce = yes
        timeout = 0
        softfail = no
    }
    staple {
        enable = no
        override_cert_url = yes
        url = "http://127.0.0.1/ocsp/"
        use_nonce = yes
        timeout = 0
        softfail = no
    }
   }
   # Linked to sub-module rlm_eap_ttls
   ttls {
        tls = "tls-common"
        copy_request_to_tunnel = no
        use_tunneled_reply = no
        virtual_server = "inner-tunnel"
        include_length = yes
        require_client_cert = no
   }
tls - Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_peap
   peap {
        tls = "tls-common"
        copy_request_to_tunnel = no
        use_tunneled_reply = no
        proxy_tunneled_request_as_eap = yes
        virtual_server = "inner-tunnel"
        soh = no
        require_client_cert = no
   }
tls - Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_mschapv2
   mschapv2 {
        with_ntdomain_hack = no
        send_error = no
   }
  # Loaded module "rlm_passwd"
  # Loading module "etc_passwd" from file /usr/local/freeradius3/etc/raddb/mods-enabled/passwd
  passwd etc_passwd {
        filename = "/etc/passwd"
        format = "*User-Name:Crypt-Password:"
        delimiter = ":"
        ignore_nislike = no
        ignore_empty = yes
        allow_multiple_keys = no
        hash_size = 100
  }
  # Loaded module "rlm_dhcp"
  # Loading module "dhcp" from file /usr/local/freeradius3/etc/raddb/mods-enabled/dhcp
  # Loaded module "rlm_attr_filter"
  # Loading module "attr_filter.post-proxy" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.post-proxy {
        filename = "/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/post-proxy"
        relaxed = no
  }
  # Loading module "attr_filter.pre-proxy" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.pre-proxy {
        filename = "/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/pre-proxy"
        relaxed = no
  }
  # Loading module "attr_filter.access_reject" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_reject {
        filename = "/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject"
        relaxed = no
  }
  # Loading module "attr_filter.access_challenge" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_challenge {
        filename = "/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_challenge"
        relaxed = no
  }
  # Loading module "attr_filter.accounting_response" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.accounting_response {
        filename = "/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/accounting_response"
        relaxed = no
  }
  # Loaded module "rlm_cache"
  # Loading module "cache_eap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/cache_eap
  cache cache_eap {
        driver = "rlm_cache_rbtree"
        ttl = 15
        max_entries = 0
        epoch = 0
        add_stats = no
  }
  # Loaded module "rlm_replicate"
  # Loading module "replicate" from file /usr/local/freeradius3/etc/raddb/mods-enabled/replicate
  # Loaded module "rlm_logintime"
  # Loading module "logintime" from file /usr/local/freeradius3/etc/raddb/mods-enabled/logintime
  logintime {
        minimum_timeout = 60
  }
  # Loaded module "rlm_unix"
  # Loading module "unix" from file /usr/local/freeradius3/etc/raddb/mods-enabled/unix
  unix {
        radwtmp = "/usr/local/freeradius3/var/log/radius/radwtmp"
  }
Creating attribute Unix-Group
  # Loaded module "rlm_exec"
  # Loading module "ntlm_auth" from file /usr/local/freeradius3/etc/raddb/mods-enabled/ntlm_auth
  exec ntlm_auth {
        wait = yes
        program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
        shell_escape = yes
  }
  # Loaded module "rlm_unpack"
  # Loading module "unpack" from file /usr/local/freeradius3/etc/raddb/mods-enabled/unpack
  # Loaded module "rlm_realm"
  # Loading module "IPASS" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  realm IPASS {
        format = "prefix"
        delimiter = "/"
        ignore_default = no
        ignore_null = no
  }
  # Loading module "suffix" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  realm suffix {
        format = "suffix"
        delimiter = "@"
        ignore_default = no
        ignore_null = no
  }
  # Loading module "realmpercent" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  realm realmpercent {
        format = "suffix"
        delimiter = "%"
        ignore_default = no
        ignore_null = no
  }
  # Loading module "ntdomain" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  realm ntdomain {
        format = "prefix"
        delimiter = "\\"
        ignore_default = no
        ignore_null = no
  }
  # Loading module "echo" from file /usr/local/freeradius3/etc/raddb/mods-enabled/echo
  exec echo {
        wait = yes
        program = "/bin/echo %{User-Name}"
        input_pairs = "request"
        output_pairs = "reply"
        shell_escape = yes
  }
  # Loaded module "rlm_expiration"
  # Loading module "expiration" from file /usr/local/freeradius3/etc/raddb/mods-enabled/expiration
  # Loaded module "rlm_soh"
  # Loading module "soh" from file /usr/local/freeradius3/etc/raddb/mods-enabled/soh
  soh {
        dhcp = yes
  }
  # Loaded module "rlm_radutmp"
  # Loading module "sradutmp" from file /usr/local/freeradius3/etc/raddb/mods-enabled/sradutmp
  radutmp sradutmp {
        filename = "/usr/local/freeradius3/var/log/radius/sradutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        permissions = 420
        caller_id = no
  }
  # Loaded module "rlm_dynamic_clients"
  # Loading module "dynamic_clients" from file /usr/local/freeradius3/etc/raddb/mods-enabled/dynamic_clients
  # Loaded module "rlm_pap"
  # Loading module "pap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/pap
  pap {
        normalise = yes
  }
  # Loaded module "rlm_utf8"
  # Loading module "utf8" from file /usr/local/freeradius3/etc/raddb/mods-enabled/utf8
  # Loading module "radutmp" from file /usr/local/freeradius3/etc/raddb/mods-enabled/radutmp
  radutmp {
        filename = "/usr/local/freeradius3/var/log/radius/radutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        permissions = 384
        caller_id = yes
  }
  # Loaded module "rlm_digest"
  # Loading module "digest" from file /usr/local/freeradius3/etc/raddb/mods-enabled/digest
  # Loaded module "rlm_expr"
  # Loading module "expr" from file /usr/local/freeradius3/etc/raddb/mods-enabled/expr
  expr {
        safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
  }
  # Loaded module "rlm_detail"
  # Loading module "auth_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  detail auth_log {
        filename = "/usr/local/freeradius3/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        escape_filenames = no
        log_packet_header = no
  }
  # Loading module "reply_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  detail reply_log {
        filename = "/usr/local/freeradius3/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        escape_filenames = no
        log_packet_header = no
  }
  # Loading module "pre_proxy_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  detail pre_proxy_log {
        filename = "/usr/local/freeradius3/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        escape_filenames = no
        log_packet_header = no
  }
  # Loading module "post_proxy_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  detail post_proxy_log {
        filename = "/usr/local/freeradius3/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        escape_filenames = no
        log_packet_header = no
  }
  # Loaded module "rlm_mschap"
  # Loading module "mschap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/mschap
  mschap {
        use_mppe = yes
        require_encryption = no
        require_strong = no
        with_ntdomain_hack = yes
   passchange {
   }
        allow_retry = yes
  }
  # Loaded module "rlm_chap"
  # Loading module "chap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/chap
  # Loading module "detail" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail
  detail {
        filename = "/usr/local/freeradius3/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        escape_filenames = no
        log_packet_header = no
  }
  # Loaded module "rlm_linelog"
  # Loading module "linelog" from file /usr/local/freeradius3/etc/raddb/mods-enabled/linelog
  linelog {
        destination = "file"
        delimiter = " "
   file {
        filename = "/usr/local/freeradius3/var/log/radius/linelog"
        permissions = 384
        escape_filenames = no
   }
   syslog {
        severity = "info"
   }
   unix {
   }
   tcp {
        port = 514
        timeout = 2.000000
   }
   udp {
        port = 514
        timeout = 2.000000
   }
  }
  # Loading module "log_accounting" from file /usr/local/freeradius3/etc/raddb/mods-enabled/linelog
  linelog log_accounting {
        destination = "file"
        delimiter = " "
   file {
        filename = "/usr/local/freeradius3/var/log/radius/linelog-accounting"
        permissions = 384
        escape_filenames = no
   }
   syslog {
        severity = "info"
   }
   unix {
   }
   tcp {
        timeout = 1000.000000
   }
   udp {
        timeout = 1000.000000
   }
  }
  # Loading module "exec" from file /usr/local/freeradius3/etc/raddb/mods-enabled/exec
  exec {
        wait = no
        input_pairs = "request"
        shell_escape = yes
        timeout = 10
  }
  # Loaded module "rlm_always"
  # Loading module "reject" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always reject {
        rcode = "reject"
        simulcount = 0
        mpp = no
  }
  # Loading module "fail" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always fail {
        rcode = "fail"
        simulcount = 0
        mpp = no
  }
  # Loading module "ok" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always ok {
        rcode = "ok"
        simulcount = 0
        mpp = no
  }
  # Loading module "handled" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always handled {
        rcode = "handled"
        simulcount = 0
        mpp = no
  }
  # Loading module "invalid" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always invalid {
        rcode = "invalid"
        simulcount = 0
        mpp = no
  }
  # Loading module "userlock" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always userlock {
        rcode = "userlock"
        simulcount = 0
        mpp = no
  }
  # Loading module "notfound" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always notfound {
        rcode = "notfound"
        simulcount = 0
        mpp = no
  }
  # Loading module "noop" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always noop {
        rcode = "noop"
        simulcount = 0
        mpp = no
  }
  # Loading module "updated" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  always updated {
        rcode = "updated"
        simulcount = 0
        mpp = no
  }
  instantiate {
  }
 } # modules
  # Instantiating module "files" from file /usr/local/freeradius3/etc/raddb/mods-enabled/files
      reading file /usr/local/freeradius3/etc/raddb/mods-config/files/authorize
      reading file /usr/local/freeradius3/etc/raddb/mods-config/files/accounting
      reading file /usr/local/freeradius3/etc/raddb/mods-config/files/pre-proxy
  # Instantiating module "sql" from file /usr/local/freeradius3/etc/raddb/mods-enabled/sql
rlm_sql_mysql - libmysql version: 5.5.47-MariaDB
   mysql {
    tls {
    }
        warnings = "auto"
   }
rlm_sql (sql) - Attempting to connect to database "radius"
rlm_sql (sql) - Initialising connection pool
   pool {
        start = 5
        min = 3
        max = 32
        spare = 10
        uses = 0
        lifetime = 0
        cleanup_interval = 30
        idle_timeout = 60
        connect_timeout = 3.000000
        held_trigger_min = 0.000000
        held_trigger_max = 0.500000
        retry_delay = 30
        spread = no
   }
rlm_sql (sql) - Opening additional connection (0), 1 of 32 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql_mysql - Connected to database 'radius' on Localhost via UNIX socket, server version 5.5.47-MariaDB, protocol version 10
rlm_sql (sql) - Opening additional connection (1), 1 of 31 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql_mysql - Connected to database 'radius' on Localhost via UNIX socket, server version 5.5.47-MariaDB, protocol version 10
rlm_sql (sql) - Opening additional connection (2), 1 of 30 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql_mysql - Connected to database 'radius' on Localhost via UNIX socket, server version 5.5.47-MariaDB, protocol version 10
rlm_sql (sql) - Opening additional connection (3), 1 of 29 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql_mysql - Connected to database 'radius' on Localhost via UNIX socket, server version 5.5.47-MariaDB, protocol version 10
rlm_sql (sql) - Opening additional connection (4), 1 of 28 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql_mysql - Connected to database 'radius' on Localhost via UNIX socket, server version 5.5.47-MariaDB, protocol version 10
  # Instantiating module "preprocess" from file /usr/local/freeradius3/etc/raddb/mods-enabled/preprocess
      reading file /usr/local/freeradius3/etc/raddb/mods-config/preprocess/huntgroups
      reading file /usr/local/freeradius3/etc/raddb/mods-config/preprocess/hints
  # Instantiating module "etc_passwd" from file /usr/local/freeradius3/etc/raddb/mods-enabled/passwd
  # Instantiating module "attr_filter.post-proxy" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
      reading file /usr/local/freeradius3/etc/raddb/mods-config/attr_filter/post-proxy
  # Instantiating module "attr_filter.pre-proxy" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
      reading file /usr/local/freeradius3/etc/raddb/mods-config/attr_filter/pre-proxy
  # Instantiating module "attr_filter.access_reject" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
      reading file /usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject
[/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay"      found in filter list for realm "DEFAULT".
[/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec"         found in filter list for realm "DEFAULT".
  # Instantiating module "attr_filter.access_challenge" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
      reading file /usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_challenge
  # Instantiating module "attr_filter.accounting_response" from file /usr/local/freeradius3/etc/raddb/mods-enabled/attr_filter
      reading file /usr/local/freeradius3/etc/raddb/mods-config/attr_filter/accounting_response
  # Instantiating module "cache_eap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/cache_eap
cache_eap - Driver rlm_cache_rbtree loaded and linked
  # Instantiating module "logintime" from file /usr/local/freeradius3/etc/raddb/mods-enabled/logintime
  # Instantiating module "IPASS" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  # Instantiating module "suffix" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  # Instantiating module "realmpercent" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  # Instantiating module "ntdomain" from file /usr/local/freeradius3/etc/raddb/mods-enabled/realm
  # Instantiating module "expiration" from file /usr/local/freeradius3/etc/raddb/mods-enabled/expiration
  # Instantiating module "pap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/pap
  # Instantiating module "auth_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
rlm_detail (auth_log) - 'User-Password' suppressed, will not appear in detail output
  # Instantiating module "reply_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  # Instantiating module "pre_proxy_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  # Instantiating module "post_proxy_log" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail.log
  # Instantiating module "mschap" from file /usr/local/freeradius3/etc/raddb/mods-enabled/mschap
mschap: using internal authentication
  # Instantiating module "detail" from file /usr/local/freeradius3/etc/raddb/mods-enabled/detail
  # Instantiating module "linelog" from file /usr/local/freeradius3/etc/raddb/mods-enabled/linelog
  # Instantiating module "log_accounting" from file /usr/local/freeradius3/etc/raddb/mods-enabled/linelog
  # Instantiating module "reject" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "fail" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "ok" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "handled" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "invalid" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "userlock" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "notfound" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "noop" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
  # Instantiating module "updated" from file /usr/local/freeradius3/etc/raddb/mods-enabled/always
radiusd: #### Loading Virtual Servers ####
server inner-tunnel { # from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
} # server inner-tunnel
server default { # from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
} # server default
radiusd: #### Opening IP addresses and Ports ####
Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
Listening on auth address * port 1816 bound to server default
Listening on acct address * port 1817 bound to server default
Listening on proxy address * port 33971
Ready to process requests
(1)  Received Access-Request Id 71 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 129
(1)    User-Name = "lumir"
(1)    NAS-IP-Address = 192.168.101.254
(1)    NAS-Identifier = "P660HW-T3"
(1)    Framed-MTU = 1496
(1)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(1)    Calling-Station-Id = "c4-42-02-64-71-65"
(1)    NAS-Port-Type = Wireless-802.11
(1)    EAP-Message = 0x0201000a016c756d6972
(1)    Message-Authenticator = 0xb62b73880d43ee3407d38597e34eeec6
(1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)    authorize {
(1)      filter_username {
(1)        if (&User-Name) {
(1)          if (&User-Name =~ / /) {
(1)            ...
(1)          }
(1)          if (&User-Name =~ /@[^@]*@/ ) {
(1)            ...
(1)          }
(1)          if (&User-Name =~ /\.\./ ) {
(1)            ...
(1)          }
(1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(1)            ...
(1)          }
(1)          if (&User-Name =~ /\.$/) {
(1)            ...
(1)          }
(1)          if (&User-Name =~ /@\./) {
(1)            ...
(1)          }
(1)        } # if (&User-Name) (notfound)
(1)      } # filter_username (notfound)
(1)      preprocess (ok)
(1)      chap (noop)
(1)      mschap (noop)
(1)      digest (noop)
(1)      suffix - Checking for suffix after "@"
(1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(1)      suffix - No such realm "NULL"
(1)      suffix (noop)
(1)      eap - Peer sent EAP Response (code 2) ID 1 length 10
(1)      eap - Peer sent EAP-Identity.  Returning 'ok' so we can short-circuit the rest of authorize
(1)      eap (ok)
(1)    } # authorize (ok)
(1)  Using 'Auth-Type = eap' for authenticate {...}
(1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)    Auth-Type eap {
(1)      eap - Peer sent packet with EAP method Identity (1)
(1)      eap - Calling submodule eap_peap to process data
(1)      eap_peap - Initiating new TLS session
(1)      eap - Sending EAP Request (code 1) ID 2 length 6
(1)      eap (handled)
(1)    } # Auth-Type eap (handled)
(1)  Using Post-Auth-Type Challenge
(1)  Post-Auth-Type sub-section not found.  Ignoring.
(1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)  Sent Access-Challenge Id 71 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(1)    EAP-Message = 0x010200061920
(1)    Message-Authenticator = 0x00000000000000000000000000000000
(1)    State = 0x01015600a8adc0b555f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           71
  Length:       64
  Vector:       0c49294cbde223dcc331b79dae894e61
  Data:         4f  08  01 02 00 06 19 20
                50  12  ba ac 98 17 ba 17 88 bf a2 15 ce 3d d8 5b 78 e1
                18  12  01 01 56 00 a8 ad c0 b5 55 f8 57 d8 56 81 52 d8
(1)  Finished request
Waking up in 4.9 seconds.
(2)  Received Access-Request Id 72 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 333
(2)    User-Name = "lumir"
(2)    NAS-IP-Address = 192.168.101.254
(2)    NAS-Identifier = "P660HW-T3"
(2)    Framed-MTU = 1496
(2)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(2)    Calling-Station-Id = "c4-42-02-64-71-65"
(2)    NAS-Port-Type = Wireless-802.11
(2)    EAP-Message = 0x020200c41980000000ba16030100b5010000b1030193f8014982372d41efaad64ab8974a5127b2667d02a47a4c84af7914b1a32a5e000048c014c00a00390038c00fc0050035c013c00900330032c00ec004002fc011c007c00cc00200050004c012c00800160013c00dc003000a0015001200090014001100080006000300ff01000040000b000403000102000a00340032000e000d0019000b000c00180009000a00160017000800060007001400150004000500120013000100020003000f00100011
(2)    State = 0x01015600a8adc0b555f857d8568152d8
(2)    Message-Authenticator = 0x80345538bdde656b54b702c2748c2114
(2,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2,1)    authorize {
(2,1)      filter_username {
(2,1)        if (&User-Name) {
(2,1)          if (&User-Name =~ / /) {
(2,1)            ...
(2,1)          }
(2,1)          if (&User-Name =~ /@[^@]*@/ ) {
(2,1)            ...
(2,1)          }
(2,1)          if (&User-Name =~ /\.\./ ) {
(2,1)            ...
(2,1)          }
(2,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(2,1)            ...
(2,1)          }
(2,1)          if (&User-Name =~ /\.$/) {
(2,1)            ...
(2,1)          }
(2,1)          if (&User-Name =~ /@\./) {
(2,1)            ...
(2,1)          }
(2,1)        } # if (&User-Name) (notfound)
(2,1)      } # filter_username (notfound)
(2,1)      preprocess (ok)
(2,1)      chap (noop)
(2,1)      mschap (noop)
(2,1)      digest (noop)
(2,1)      suffix - Checking for suffix after "@"
(2,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(2,1)      suffix - No such realm "NULL"
(2,1)      suffix (noop)
(2,1)      eap - Peer sent EAP Response (code 2) ID 2 length 196
(2,1)      eap - Continuing tunnel setup
(2,1)      eap (ok)
(2,1)    } # authorize (ok)
(2,1)  Using 'Auth-Type = eap' for authenticate {...}
(2,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2,1)    Auth-Type eap {
(2,1)      eap - Peer sent packet with EAP method PEAP (25)
(2,1)      eap - Calling submodule eap_peap to process data
(2,1)      eap_peap - Continuing EAP-TLS
(2,1)      eap_peap - Peer indicated complete TLS record size will be 186 bytes
(2,1)      eap_peap - Got complete TLS record, with length field (186 bytes)
(2,1)      eap_peap - [eap-tls verify] = complete
(2,1)      eap_peap - Handshake state - before/accept initialization
(2,1)      eap_peap - Handshake state - Server before/accept initialization
(2,1)      eap_peap - <<< recv handshake [length 181], client_hello
(2,1)      eap_peap - Handshake state - Server SSLv3 read client hello A
(2,1)      eap_peap - >>> send handshake [length 57], server_hello
(2,1)      eap_peap - Handshake state - Server SSLv3 write server hello A
(2,1)      eap_peap - >>> send handshake [length 2259], certificate
(2,1)      eap_peap - Handshake state - Server SSLv3 write certificate A
(2,1)      eap_peap - >>> send handshake [length 331], server_key_exchange
(2,1)      eap_peap - Handshake state - Server SSLv3 write key exchange A
(2,1)      eap_peap - >>> send handshake [length 4], server_hello_done
(2,1)      eap_peap - Handshake state - Server SSLv3 write server done A
(2,1)      eap_peap - Handshake state - Server SSLv3 flush data
(2,1)      eap_peap - Handshake state - Server SSLv3 read client certificate A
(2,1)      eap_peap - Need more data from client
(2,1)      eap_peap - Need more data from client
(2,1)      eap_peap - Complete TLS record (2671 bytes) larger than MTU (990 bytes), will fragment
(2,1)      eap_peap - Sending first TLS record fragment (990 bytes), 1681 bytes remaining
(2,1)      eap_peap - [eap-tls process] = handled
(2,1)      eap - Sending EAP Request (code 1) ID 3 length 1000
(2,1)      eap (handled)
(2,1)    } # Auth-Type eap (handled)
(2,1)  Using Post-Auth-Type Challenge
(2,1)  Post-Auth-Type sub-section not found.  Ignoring.
(2,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2,1)  Sent Access-Challenge Id 72 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(2,1)    EAP-Message = 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
(2,1)    Message-Authenticator = 0x00000000000000000000000000000000
(2,1)    State = 0x020356003056689b55f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           72
  Length:       1064
  Vector:       be4f698eb6a8b9250a40ab43a73bddaf
  Data:         4f  ff  01 03 03 e8 19 c0 00 00 0a 6f 16 03 01 00 39 02
                        00 00 35 03 01 4b d0 98 d1 33 fe a9 a4 80 ba 80
                        c8 9d a3 b0 09 47 29 83 ba 95 a9 57 af 9b 7b ad
                        d1 50 44 ba 0a 00 c0 14 00 00 0d ff 01 00 01 00
                        00 0b 00 04 03 00 01 02 16 03 01 08 d3 0b 00 08
                        cf 00 08 cc 00 03 de 30 82 03 da 30 82 02 c2 a0
                        03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7
                        0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55
                        04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c
                        06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07
                        0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06
                        03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e
                        63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09
                        01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65
                        2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45
                        78 61 6d 70 6c 65 20 43 65 72 74 69 66
                4f  ff  69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30
                        1e 17 0d 31 36 30 35 31 36 31 32 33 31 31 31 5a
                        17 0d 31 36 30 37 31 35 31 32 33 31 31 31 5a 30
                        7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f
                        30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31
                        15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c
                        65 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 0c
                        1a 45 78 61 6d 70 6c 65 20 53 65 72 76 65 72 20
                        43 65 72 74 69 66 69 63 61 74 65 31 20 30 1e 06
                        09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69
                        6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01
                        22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00
                        03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e0 0d
                        33 25 be ed f8 2d 4b bd 56 eb 4a e5 f8 b7 6e c6
                        b7 6d ea 43 c7 01 99 8d 4b 46 20 da eb 18 f8 35
                        bc fa 0b 3f be ba 35 f4 c9 7a f7 9a e1
                4f  ff  61 d6 34 99 09 b7 05 ac 7b e4 ba f2 34 01 61 5b
                        ec da 81 15 3b c7 ee 4e 73 f3 dc f6 67 5e fa d0
                        ea da 5f 1f be b1 20 7f 37 d8 09 0a a8 77 91 20
                        50 87 22 90 0d 34 d7 a6 83 d3 1e 61 86 dd 4e 91
                        dd 16 3f 73 d9 a5 d2 fa e5 a8 16 23 23 70 af f0
                        b8 45 a8 17 87 42 c5 76 aa db fb 02 61 c2 e8 f5
                        e3 b1 5b 26 d1 eb 5c 01 9f d4 e5 0f 1b a9 2b 7b
                        72 d4 be ff d9 c5 b1 fd 1e c4 1d fd 6e 6a e2 d0
                        2a 98 02 27 8b 12 dd 53 69 b8 7b bf 51 35 b8 4f
                        12 2f 8e 03 68 ff 65 69 73 5b 03 08 3d a9 50 b0
                        ba c5 47 7b 79 ef b3 7b 60 fa 09 65 f6 cd 3e 41
                        13 19 97 26 dc 2f bf e3 20 9d a6 12 6f b8 fe 61
                        ee c0 3a ee 74 43 53 61 81 17 e3 3e 63 ea f3 86
                        dd 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d
                        25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30
                        36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0
                4f  f3  29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e
                        65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d
                        70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86
                        48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 22 00
                        74 54 e2 62 d8 d3 39 0e a3 dd 1a 1f 39 8c 33 58
                        ee ea ce ca 76 3f 23 af c7 ec a9 f9 5f 01 8f 67
                        7c 72 c5 b1 8a 80 bd d3 8d 38 2f b0 09 6b c0 97
                        b3 5c 4e 52 1d e7 6a 39 f7 3f f0 ab 9d 29 52 0d
                        51 50 62 90 ff c0 5a a5 88 4e 2c 86 75 5f 77 6b
                        59 65 ce 8c ce 00 56 70 90 66 16 e9 6a fb 98 be
                        4a 6b a1 50 2a 50 b2 c5 80 e1 53 37 33 e7 26 13
                        31 76 6e 9e 96 e9 93 b7 fa 30 8d 25 91 0b 0f ce
                        d2 48 48 6d 3a 46 82 45 43 3c 18 e8 e5 6a 8f 28
                        73 5c ad cf 44 73 44 b5 5f 49 c2 68 f0 84 37 a9
                        f1 de d2 5f 62 0b f9 7e b0 1f 19 62 08 cb 04 8c
                        46
                50  12  73 22 c0 7c f9 57 a6 2b d2 64 d3 43 83 d7 69 8e
                18  12  02 03 56 00 30 56 68 9b 55 f8 57 d8 56 81 52 d8
(2,1)  Finished request
Waking up in 4.9 seconds.
(3)  Received Access-Request Id 73 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 143
(3)    User-Name = "lumir"
(3)    NAS-IP-Address = 192.168.101.254
(3)    NAS-Identifier = "P660HW-T3"
(3)    Framed-MTU = 1496
(3)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(3)    Calling-Station-Id = "c4-42-02-64-71-65"
(3)    NAS-Port-Type = Wireless-802.11
(3)    EAP-Message = 0x020300061900
(3)    State = 0x020356003056689b55f857d8568152d8
(3)    Message-Authenticator = 0x3391da86c651f06a7405b648ea4b8711
(3,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3,1)    authorize {
(3,1)      filter_username {
(3,1)        if (&User-Name) {
(3,1)          if (&User-Name =~ / /) {
(3,1)            ...
(3,1)          }
(3,1)          if (&User-Name =~ /@[^@]*@/ ) {
(3,1)            ...
(3,1)          }
(3,1)          if (&User-Name =~ /\.\./ ) {
(3,1)            ...
(3,1)          }
(3,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(3,1)            ...
(3,1)          }
(3,1)          if (&User-Name =~ /\.$/) {
(3,1)            ...
(3,1)          }
(3,1)          if (&User-Name =~ /@\./) {
(3,1)            ...
(3,1)          }
(3,1)        } # if (&User-Name) (notfound)
(3,1)      } # filter_username (notfound)
(3,1)      preprocess (ok)
(3,1)      chap (noop)
(3,1)      mschap (noop)
(3,1)      digest (noop)
(3,1)      suffix - Checking for suffix after "@"
(3,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(3,1)      suffix - No such realm "NULL"
(3,1)      suffix (noop)
(3,1)      eap - Peer sent EAP Response (code 2) ID 3 length 6
(3,1)      eap - Continuing tunnel setup
(3,1)      eap (ok)
(3,1)    } # authorize (ok)
(3,1)  Using 'Auth-Type = eap' for authenticate {...}
(3,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3,1)    Auth-Type eap {
(3,1)      eap - Peer sent packet with EAP method PEAP (25)
(3,1)      eap - Calling submodule eap_peap to process data
(3,1)      eap_peap - Continuing EAP-TLS
(3,1)      eap_peap - Peer ACKed our handshake fragment
(3,1)      eap_peap - [eap-tls verify] = request
(3,1)      eap_peap - Sending additional TLS record fragment (994 bytes), 687 bytes remaining
(3,1)      eap_peap - [eap-tls process] = handled
(3,1)      eap - Sending EAP Request (code 1) ID 4 length 1000
(3,1)      eap (handled)
(3,1)    } # Auth-Type eap (handled)
(3,1)  Using Post-Auth-Type Challenge
(3,1)  Post-Auth-Type sub-section not found.  Ignoring.
(3,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3,1)  Sent Access-Challenge Id 73 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(3,1)    EAP-Message = 0x010403e819406d556d1adb84fd6522aead14fb58f64cd01860210317aada8e1d57710cd4a68c022bb26add551e8def1c68195fd731a72c7749598d91f432341f91fb50c9b8a869bab9984f2f468cca7efc032b0004e8308204e4308203cca003020102020900b2615d8ab0877d99300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479301e170d3136303531363132333131315a170d3136303731353132333131315a308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100b1590974ecb26cb2533b7dceeca82a033820226a37212a3c0d2fbf3587a73dc2192b7b2548844821c5c66bf6df2a7db3fefaae9a0760336632ed13f630f0cda1a492800a3bf59fc48f636b09cf9356cacd7b549b64fd9e3db1c64e555cfa8cc9bf830e9f4fb23682e804ca373195e21ef816d9c09a731de55ddb9bf0c25db61c91ce585a11867251cb2860b528350b999ec9aaf03c83dbe7be412e5cdbc4d02c46cb4fc0e595d08232ebed9ca167c1e5b0fb70f25133d6b110b90c45440d261efb9768ba74c7bbab4db106b3d2f4657fb53af9bf40c026d7c1ef9e614987acfad5aad539310c700527c3f4e4998d0eee0ff7ce1c3584df801986fcbfc418913f0203010001a382013730820133301d0603551d0e0416041461d1179cd1ebcef0d1353925879d77f6baddd85e3081c80603551d230481c03081bd801461d1179cd1ebcef0d1353925879d77f6baddd85ea18199a48196308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479820900b2615d8ab0877d99300f0603551d13
(3,1)    Message-Authenticator = 0x00000000000000000000000000000000
(3,1)    State = 0x03015600a8adc0b555f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           73
  Length:       1064
  Vector:       0f87dbbadb72606cd338fb749a70af28
  Data:         4f  ff  01 04 03 e8 19 40 6d 55 6d 1a db 84 fd 65 22 ae
                        ad 14 fb 58 f6 4c d0 18 60 21 03 17 aa da 8e 1d
                        57 71 0c d4 a6 8c 02 2b b2 6a dd 55 1e 8d ef 1c
                        68 19 5f d7 31 a7 2c 77 49 59 8d 91 f4 32 34 1f
                        91 fb 50 c9 b8 a8 69 ba b9 98 4f 2f 46 8c ca 7e
                        fc 03 2b 00 04 e8 30 82 04 e4 30 82 03 cc a0 03
                        02 01 02 02 09 00 b2 61 5d 8a b0 87 7d 99 30 0d
                        06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93
                        31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30
                        0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12
                        30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65
                        72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61
                        6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a
                        86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40
                        65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06
                        03 55 04 03 0c 1d 45 78 61 6d 70 6c 65
                4f  ff  20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74
                        68 6f 72 69 74 79 30 1e 17 0d 31 36 30 35 31 36
                        31 32 33 31 31 31 5a 17 0d 31 36 30 37 31 35 31
                        32 33 31 31 31 5a 30 81 93 31 0b 30 09 06 03 55
                        04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c
                        06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07
                        0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06
                        03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e
                        63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09
                        01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65
                        2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45
                        78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61
                        74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22
                        30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03
                        82 01 0f 00 30 82 01 0a 02 82 01 01 00 b1 59 09
                        74 ec b2 6c b2 53 3b 7d ce ec a8 2a 03
                4f  ff  38 20 22 6a 37 21 2a 3c 0d 2f bf 35 87 a7 3d c2
                        19 2b 7b 25 48 84 48 21 c5 c6 6b f6 df 2a 7d b3
                        fe fa ae 9a 07 60 33 66 32 ed 13 f6 30 f0 cd a1
                        a4 92 80 0a 3b f5 9f c4 8f 63 6b 09 cf 93 56 ca
                        cd 7b 54 9b 64 fd 9e 3d b1 c6 4e 55 5c fa 8c c9
                        bf 83 0e 9f 4f b2 36 82 e8 04 ca 37 31 95 e2 1e
                        f8 16 d9 c0 9a 73 1d e5 5d db 9b f0 c2 5d b6 1c
                        91 ce 58 5a 11 86 72 51 cb 28 60 b5 28 35 0b 99
                        9e c9 aa f0 3c 83 db e7 be 41 2e 5c db c4 d0 2c
                        46 cb 4f c0 e5 95 d0 82 32 eb ed 9c a1 67 c1 e5
                        b0 fb 70 f2 51 33 d6 b1 10 b9 0c 45 44 0d 26 1e
                        fb 97 68 ba 74 c7 bb ab 4d b1 06 b3 d2 f4 65 7f
                        b5 3a f9 bf 40 c0 26 d7 c1 ef 9e 61 49 87 ac fa
                        d5 aa d5 39 31 0c 70 05 27 c3 f4 e4 99 8d 0e ee
                        0f f7 ce 1c 35 84 df 80 19 86 fc bf c4 18 91 3f
                        02 03 01 00 01 a3 82 01 37 30 82 01 33
                4f  f3  30 1d 06 03 55 1d 0e 04 16 04 14 61 d1 17 9c d1
                        eb ce f0 d1 35 39 25 87 9d 77 f6 ba dd d8 5e 30
                        81 c8 06 03 55 1d 23 04 81 c0 30 81 bd 80 14 61
                        d1 17 9c d1 eb ce f0 d1 35 39 25 87 9d 77 f6 ba
                        dd d8 5e a1 81 99 a4 81 96 30 81 93 31 0b 30 09
                        06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55
                        04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03
                        55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15
                        30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65
                        20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7
                        0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d
                        70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03
                        0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66
                        69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82
                        09 00 b2 61 5d 8a b0 87 7d 99 30 0f 06 03 55 1d
                        13
                50  12  2c 6e 11 61 9f 11 e7 08 69 d9 72 51 1f 34 21 c7
                18  12  03 01 56 00 a8 ad c0 b5 55 f8 57 d8 56 81 52 d8
(3,1)  Finished request
Waking up in 4.9 seconds.
(4)  Received Access-Request Id 74 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 143
(4)    User-Name = "lumir"
(4)    NAS-IP-Address = 192.168.101.254
(4)    NAS-Identifier = "P660HW-T3"
(4)    Framed-MTU = 1496
(4)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(4)    Calling-Station-Id = "c4-42-02-64-71-65"
(4)    NAS-Port-Type = Wireless-802.11
(4)    EAP-Message = 0x020400061900
(4)    State = 0x03015600a8adc0b555f857d8568152d8
(4)    Message-Authenticator = 0xbc89f22fd27c9a3d59e170f42c7afc89
(4,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4,1)    authorize {
(4,1)      filter_username {
(4,1)        if (&User-Name) {
(4,1)          if (&User-Name =~ / /) {
(4,1)            ...
(4,1)          }
(4,1)          if (&User-Name =~ /@[^@]*@/ ) {
(4,1)            ...
(4,1)          }
(4,1)          if (&User-Name =~ /\.\./ ) {
(4,1)            ...
(4,1)          }
(4,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(4,1)            ...
(4,1)          }
(4,1)          if (&User-Name =~ /\.$/) {
(4,1)            ...
(4,1)          }
(4,1)          if (&User-Name =~ /@\./) {
(4,1)            ...
(4,1)          }
(4,1)        } # if (&User-Name) (notfound)
(4,1)      } # filter_username (notfound)
(4,1)      preprocess (ok)
(4,1)      chap (noop)
(4,1)      mschap (noop)
(4,1)      digest (noop)
(4,1)      suffix - Checking for suffix after "@"
(4,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(4,1)      suffix - No such realm "NULL"
(4,1)      suffix (noop)
(4,1)      eap - Peer sent EAP Response (code 2) ID 4 length 6
(4,1)      eap - Continuing tunnel setup
(4,1)      eap (ok)
(4,1)    } # authorize (ok)
(4,1)  Using 'Auth-Type = eap' for authenticate {...}
(4,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4,1)    Auth-Type eap {
(4,1)      eap - Peer sent packet with EAP method PEAP (25)
(4,1)      eap - Calling submodule eap_peap to process data
(4,1)      eap_peap - Continuing EAP-TLS
(4,1)      eap_peap - Peer ACKed our handshake fragment
(4,1)      eap_peap - [eap-tls verify] = request
(4,1)      eap_peap - Sending final TLS record fragment (687 bytes)
(4,1)      eap_peap - [eap-tls process] = handled
(4,1)      eap - Sending EAP Request (code 1) ID 5 length 693
(4,1)      eap (handled)
(4,1)    } # Auth-Type eap (handled)
(4,1)  Using Post-Auth-Type Challenge
(4,1)  Post-Auth-Type sub-section not found.  Ignoring.
(4,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4,1)  Sent Access-Challenge Id 74 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(4,1)    EAP-Message = 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
(4,1)    Message-Authenticator = 0x00000000000000000000000000000000
(4,1)    State = 0x040756003056689b55f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           74
  Length:       755
  Vector:       9a1bb5523390cdfeffcbe77b2327a116
  Data:         4f  ff  01 05 02 b5 19 00 01 01 ff 04 05 30 03 01 01 ff
                        30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0
                        27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78
                        61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c
                        65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86
                        f7 0d 01 01 0b 05 00 03 82 01 01 00 16 e3 2e eb
                        ee 65 34 c0 5b 57 bc 6b f4 b3 f1 59 3d 69 22 a1
                        91 c3 75 4a 70 fa 07 d6 82 e2 d0 a5 0d 22 7f e7
                        c9 25 50 8d 09 ae 34 5b 72 6f 42 fb 9d bd 60 0c
                        01 a1 58 5c 27 17 ea 22 98 97 cf 21 65 e7 92 6a
                        a2 1c 15 32 46 d9 64 fa 7f 9f 6e 35 55 9e 50 c1
                        de b2 0a 3d 1d 55 74 26 6d 1b eb ac 20 60 3b d6
                        08 6f 17 f0 5f 24 c2 d5 2d ee 45 71 b2 8f 16 3a
                        7c e8 ad e6 4a 08 45 20 72 fe e5 ad bc 81 94 4e
                        b8 bd bc 15 c6 d2 a1 75 f1 58 37 12 3f df 5f 2d
                        ed ef ec d0 b3 bf 06 86 9c 48 94 74 05
                4f  ff  b5 cc 6a 79 b5 86 cf 15 07 0a 23 de f0 44 1b 45
                        b1 d4 14 78 9e ea e7 83 e0 5c b8 a3 51 ca a0 d3
                        ec 60 28 d9 41 2b 12 4f 12 d4 92 63 83 4d 6a a7
                        51 44 26 8e 59 8a 8b 01 75 42 a0 f8 80 9e 2d 05
                        c2 89 27 e2 c8 69 50 40 70 8f ad b6 b0 8d 24 12
                        73 d2 03 69 bd 64 6e f8 83 08 d0 06 d8 78 d2 16
                        03 01 01 4b 0c 00 01 47 03 00 17 41 04 f3 60 bc
                        1e 47 cb 3b 66 d6 91 81 a1 02 dc 97 13 46 78 56
                        8c cf a0 2a 8c df 36 18 bd 37 e5 ea 75 37 57 ea
                        63 5e 1c 59 d1 79 1e 19 02 24 47 f2 f6 ce 51 1e
                        a9 4d 27 8b d9 67 ac d9 23 06 76 e8 ec 01 00 03
                        68 7b ba 61 80 06 22 92 f3 a4 17 09 15 62 9c a0
                        47 0c 35 1c 0c a3 bb 1f 29 ca 55 3b 06 70 d8 90
                        4d 64 4a c7 96 da 1a 46 e6 da 5f 84 aa 57 d8 b8
                        93 b2 fe 94 34 b4 1f b5 24 1c 38 87 30 73 85 90
                        7e 44 4a 81 10 8e b0 62 b0 91 3d 92 01
                4f  bd  b0 a1 f8 9b b0 aa 6e 55 0c 92 1b 16 a1 ed 72 dc
                        95 bc 1d 31 13 b1 2b c0 79 c1 56 18 34 b2 b9 02
                        06 c1 f5 73 db f1 c0 e9 40 c1 07 e6 83 7f 45 ba
                        20 0f a0 ce e0 eb 21 ea 14 e0 1b 23 b2 bb 97 f6
                        04 91 d8 84 a4 8a 37 e2 9f 25 d6 6e 77 3c 19 04
                        e0 e1 c7 da 72 4d 93 36 99 c5 4f ee 8d b8 89 cc
                        ff a6 6e dc 09 f4 e9 d9 b8 5c 64 87 9b c7 62 4a
                        ad ba 4c 06 7d d7 98 ca 28 57 81 5d 75 d6 e4 91
                        fa ff 33 5b c4 a8 a4 d2 36 6c 2b 9c 09 92 3b 42
                        36 67 1c b4 ff 21 81 9d 56 cb 22 74 02 3e e9 d2
                        0d 0c e4 33 05 dc fc 6a 6b 01 3b 6f f2 ae 87 06
                        40 44 16 03 01 00 04 0e 00 00 00
                50  12  18 75 0d 91 37 26 08 ab 9c 88 6b 14 12 e3 d5 b1
                18  12  04 07 56 00 30 56 68 9b 55 f8 57 d8 56 81 52 d8
(4,1)  Finished request
Waking up in 4.8 seconds.
(5)  Received Access-Request Id 75 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 281
(5)    User-Name = "lumir"
(5)    NAS-IP-Address = 192.168.101.254
(5)    NAS-Identifier = "P660HW-T3"
(5)    Framed-MTU = 1496
(5)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(5)    Calling-Station-Id = "c4-42-02-64-71-65"
(5)    NAS-Port-Type = Wireless-802.11
(5)    EAP-Message = 0x0205009019800000008616030100461000004241042dbfd84587403aa23d7e11828383f178d0c0a39297563a313efdb524d66a17349a214f58a69967a6acacd2a3f6e904c351149dc0aa956602983a579e0655c944140301000101160301003085cc93ad2b98a7d4eb39130983fe3a37e72526f43b5fb55b5e1595daa5da4176dccdd04460c726107cc960f30a796be9
(5)    State = 0x040756003056689b55f857d8568152d8
(5)    Message-Authenticator = 0x6690a03319a5ee83348bd5d7dd454c50
(5,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5,1)    authorize {
(5,1)      filter_username {
(5,1)        if (&User-Name) {
(5,1)          if (&User-Name =~ / /) {
(5,1)            ...
(5,1)          }
(5,1)          if (&User-Name =~ /@[^@]*@/ ) {
(5,1)            ...
(5,1)          }
(5,1)          if (&User-Name =~ /\.\./ ) {
(5,1)            ...
(5,1)          }
(5,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(5,1)            ...
(5,1)          }
(5,1)          if (&User-Name =~ /\.$/) {
(5,1)            ...
(5,1)          }
(5,1)          if (&User-Name =~ /@\./) {
(5,1)            ...
(5,1)          }
(5,1)        } # if (&User-Name) (notfound)
(5,1)      } # filter_username (notfound)
(5,1)      preprocess (ok)
(5,1)      chap (noop)
(5,1)      mschap (noop)
(5,1)      digest (noop)
(5,1)      suffix - Checking for suffix after "@"
(5,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(5,1)      suffix - No such realm "NULL"
(5,1)      suffix (noop)
(5,1)      eap - Peer sent EAP Response (code 2) ID 5 length 144
(5,1)      eap - Continuing tunnel setup
(5,1)      eap (ok)
(5,1)    } # authorize (ok)
(5,1)  Using 'Auth-Type = eap' for authenticate {...}
(5,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5,1)    Auth-Type eap {
(5,1)      eap - Peer sent packet with EAP method PEAP (25)
(5,1)      eap - Calling submodule eap_peap to process data
(5,1)      eap_peap - Continuing EAP-TLS
(5,1)      eap_peap - Peer indicated complete TLS record size will be 134 bytes
(5,1)      eap_peap - Got complete TLS record, with length field (134 bytes)
(5,1)      eap_peap - [eap-tls verify] = complete
(5,1)      eap_peap - <<< recv handshake [length 70], client_key_exchange
(5,1)      eap_peap - Handshake state - Server SSLv3 read client key exchange A
(5,1)      eap_peap - Handshake state - Server SSLv3 read certificate verify A
(5,1)      eap_peap - <<< recv change_cipher_spec [length 1]
(5,1)      eap_peap - <<< recv handshake [length 16], finished
(5,1)      eap_peap - Handshake state - Server SSLv3 read finished A
(5,1)      eap_peap - >>> send change_cipher_spec [length 1]
(5,1)      eap_peap - Handshake state - Server SSLv3 write change cipher spec A
(5,1)      eap_peap - >>> send handshake [length 16], finished
(5,1)      eap_peap - Handshake state - Server SSLv3 write finished A
(5,1)      eap_peap - Handshake state - Server SSLv3 flush data
(5,1)      eap_peap - Handshake state - SSL negotiation finished successfully
(5,1)      eap_peap - Cipher suite: CDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1
(5,1)      eap_peap - Sending complete TLS record (59 bytes)
(5,1)      eap_peap - [eap-tls process] = handled
(5,1)      eap - Sending EAP Request (code 1) ID 6 length 65
(5,1)      eap (handled)
(5,1)    } # Auth-Type eap (handled)
(5,1)  Using Post-Auth-Type Challenge
(5,1)  Post-Auth-Type sub-section not found.  Ignoring.
(5,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5,1)  Sent Access-Challenge Id 75 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(5,1)    EAP-Message = 0x01060041190014030100010116030100308bf144aa7d64646318c347e5444596bb6ba8c10a591cf097fd955128f8ac0882293a5b1660cf13d38701ae3f82b528e2
(5,1)    Message-Authenticator = 0x00000000000000000000000000000000
(5,1)    State = 0x05015600a8adc0b555f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           75
  Length:       123
  Vector:       6c4bbfbd9dbca8335663f9bb57d9dc4d
  Data:         4f  43  01 06 00 41 19 00 14 03 01 00 01 01 16 03 01 00
                        30 8b f1 44 aa 7d 64 64 63 18 c3 47 e5 44 45 96
                        bb 6b a8 c1 0a 59 1c f0 97 fd 95 51 28 f8 ac 08
                        82 29 3a 5b 16 60 cf 13 d3 87 01 ae 3f 82 b5 28
                        e2
                50  12  e1 ec 91 88 16 38 9d 9f ca 46 a5 e3 63 1c c3 8d
                18  12  05 01 56 00 a8 ad c0 b5 55 f8 57 d8 56 81 52 d8
(5,1)  Finished request
Waking up in 4.8 seconds.
(6)  Received Access-Request Id 76 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 143
(6)    User-Name = "lumir"
(6)    NAS-IP-Address = 192.168.101.254
(6)    NAS-Identifier = "P660HW-T3"
(6)    Framed-MTU = 1496
(6)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(6)    Calling-Station-Id = "c4-42-02-64-71-65"
(6)    NAS-Port-Type = Wireless-802.11
(6)    EAP-Message = 0x020600061900
(6)    State = 0x05015600a8adc0b555f857d8568152d8
(6)    Message-Authenticator = 0xc853f92669abc99e4dc62e9c1bf992b2
(6,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6,1)    authorize {
(6,1)      filter_username {
(6,1)        if (&User-Name) {
(6,1)          if (&User-Name =~ / /) {
(6,1)            ...
(6,1)          }
(6,1)          if (&User-Name =~ /@[^@]*@/ ) {
(6,1)            ...
(6,1)          }
(6,1)          if (&User-Name =~ /\.\./ ) {
(6,1)            ...
(6,1)          }
(6,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(6,1)            ...
(6,1)          }
(6,1)          if (&User-Name =~ /\.$/) {
(6,1)            ...
(6,1)          }
(6,1)          if (&User-Name =~ /@\./) {
(6,1)            ...
(6,1)          }
(6,1)        } # if (&User-Name) (notfound)
(6,1)      } # filter_username (notfound)
(6,1)      preprocess (ok)
(6,1)      chap (noop)
(6,1)      mschap (noop)
(6,1)      digest (noop)
(6,1)      suffix - Checking for suffix after "@"
(6,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(6,1)      suffix - No such realm "NULL"
(6,1)      suffix (noop)
(6,1)      eap - Peer sent EAP Response (code 2) ID 6 length 6
(6,1)      eap - Continuing tunnel setup
(6,1)      eap (ok)
(6,1)    } # authorize (ok)
(6,1)  Using 'Auth-Type = eap' for authenticate {...}
(6,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6,1)    Auth-Type eap {
(6,1)      eap - Peer sent packet with EAP method PEAP (25)
(6,1)      eap - Calling submodule eap_peap to process data
(6,1)      eap_peap - Continuing EAP-TLS
(6,1)      eap_peap - Peer ACKed our handshake fragment.  handshake is finished
(6,1)      eap_peap - [eap-tls verify] = established
(6,1)      eap_peap - [eap-tls process] = established
(6,1)      eap_peap - Session established.  Decoding tunneled data
(6,1)      eap_peap - PEAP state TUNNEL ESTABLISHED
(6,1)      eap_peap - TLS application data to encrypt (5 bytes)
(6,1)      eap_peap - Sending complete TLS record (37 bytes)
(6,1)      eap - Sending EAP Request (code 1) ID 7 length 43
(6,1)      eap (handled)
(6,1)    } # Auth-Type eap (handled)
(6,1)  Using Post-Auth-Type Challenge
(6,1)  Post-Auth-Type sub-section not found.  Ignoring.
(6,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6,1)  Sent Access-Challenge Id 76 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(6,1)    EAP-Message = 0x0107002b1900170301002059717875dbbba9c75c97c10b21de04f2baf48045ff3c8068ac760fe50700cf6b
(6,1)    Message-Authenticator = 0x00000000000000000000000000000000
(6,1)    State = 0x060356003056689b55f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           76
  Length:       101
  Vector:       9639e4be9e036ed7086542d356c944a2
  Data:         4f  2d  01 07 00 2b 19 00 17 03 01 00 20 59 71 78 75 db
                        bb a9 c7 5c 97 c1 0b 21 de 04 f2 ba f4 80 45 ff
                        3c 80 68 ac 76 0f e5 07 00 cf 6b
                50  12  c2 03 f8 1d ba 2b 68 aa d2 73 81 9d 4e 41 a8 52
                18  12  06 03 56 00 30 56 68 9b 55 f8 57 d8 56 81 52 d8
(6,1)  Finished request
Waking up in 4.7 seconds.
(7)  Received Access-Request Id 77 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 180
(7)    User-Name = "lumir"
(7)    NAS-IP-Address = 192.168.101.254
(7)    NAS-Identifier = "P660HW-T3"
(7)    Framed-MTU = 1496
(7)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(7)    Calling-Station-Id = "c4-42-02-64-71-65"
(7)    NAS-Port-Type = Wireless-802.11
(7)    EAP-Message = 0x0207002b1900170301002099dc86e7184c7802424d9fb9a09188359abdddcffb0f6814796a4e9b5269cc6e
(7)    State = 0x060356003056689b55f857d8568152d8
(7)    Message-Authenticator = 0x61629d4c4334249b53019a1a15272621
(7,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7,1)    authorize {
(7,1)      filter_username {
(7,1)        if (&User-Name) {
(7,1)          if (&User-Name =~ / /) {
(7,1)            ...
(7,1)          }
(7,1)          if (&User-Name =~ /@[^@]*@/ ) {
(7,1)            ...
(7,1)          }
(7,1)          if (&User-Name =~ /\.\./ ) {
(7,1)            ...
(7,1)          }
(7,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(7,1)            ...
(7,1)          }
(7,1)          if (&User-Name =~ /\.$/) {
(7,1)            ...
(7,1)          }
(7,1)          if (&User-Name =~ /@\./) {
(7,1)            ...
(7,1)          }
(7,1)        } # if (&User-Name) (notfound)
(7,1)      } # filter_username (notfound)
(7,1)      preprocess (ok)
(7,1)      chap (noop)
(7,1)      mschap (noop)
(7,1)      digest (noop)
(7,1)      suffix - Checking for suffix after "@"
(7,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(7,1)      suffix - No such realm "NULL"
(7,1)      suffix (noop)
(7,1)      eap - Peer sent EAP Response (code 2) ID 7 length 43
(7,1)      eap - Continuing tunnel setup
(7,1)      eap (ok)
(7,1)    } # authorize (ok)
(7,1)  Using 'Auth-Type = eap' for authenticate {...}
(7,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7,1)    Auth-Type eap {
(7,1)      eap - Peer sent packet with EAP method PEAP (25)
(7,1)      eap - Calling submodule eap_peap to process data
(7,1)      eap_peap - Continuing EAP-TLS
(7,1)      eap_peap - Got complete TLS record (37 bytes)
(7,1)      eap_peap - [eap-tls verify] = complete
(7,1)      eap_peap - Decrypted TLS application data (6 bytes)
(7,1)      eap_peap - [eap-tls process] = complete
(7,1)      eap_peap - Session established.  Decoding tunneled data
(7,1)      eap_peap - PEAP state WAITING FOR INNER IDENTITY
(7,1)      eap_peap - Received EAP-Identity-Response
(7,1)      eap_peap - Got inner identity 'lumir'
(7,1)      eap_peap - Got tunneled request
(7,1)      eap_peap -   &EAP-Message = 0x0207000a016c756d6972
(7,1)      eap_peap - Setting &request:User-Name from tunnel (protected) identity "lumir"
(7,1)      eap_peap - Proxying tunneled request to virtual server "inner-tunnel"
(7,1)  Virtual server inner-tunnel received request
(7,1)    &EAP-Message = 0x0207000a016c756d6972
(7,1)    &FreeRADIUS-Proxied-To = 127.0.0.1
(7,1)    &User-Name = "lumir"
(7,1)  WARNING: Outer and inner identities are the same.  User privacy is compromised.
(7,1)  server inner-tunnel {
(7,1)    Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(7,1)      authorize {
(7,1)        filter_username {
(7,1)          if (&User-Name) {
(7,1)            if (&User-Name =~ / /) {
(7,1)              ...
(7,1)            }
(7,1)            if (&User-Name =~ /@[^@]*@/ ) {
(7,1)              ...
(7,1)            }
(7,1)            if (&User-Name =~ /\.\./ ) {
(7,1)              ...
(7,1)            }
(7,1)            if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(7,1)              ...
(7,1)            }
(7,1)            if (&User-Name =~ /\.$/) {
(7,1)              ...
(7,1)            }
(7,1)            if (&User-Name =~ /@\./) {
(7,1)              ...
(7,1)            }
(7,1)          } # if (&User-Name) (notfound)
(7,1)        } # filter_username (notfound)
(7,1)        chap (noop)
(7,1)        mschap (noop)
(7,1)        suffix - Checking for suffix after "@"
(7,1)        suffix - No '@' in User-Name = "lumir", looking up realm NULL
(7,1)        suffix - No such realm "NULL"
(7,1)        suffix (noop)
(7,1)        update control {
(7,1)          &control:Proxy-To-Realm := LOCAL
(7,1)        } # update control (noop)
(7,1)        eap - Peer sent EAP Response (code 2) ID 7 length 10
(7,1)        eap - Peer sent EAP-Identity.  Returning 'ok' so we can short-circuit the rest of authorize
(7,1)        eap (ok)
(7,1)      } # authorize (ok)
(7,1)    Using 'Auth-Type = eap' for authenticate {...}
(7,1)    Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(7,1)      Auth-Type eap {
(7,1)        eap - Peer sent packet with EAP method Identity (1)
(7,1)        eap - Calling submodule eap_peap to process data
(7,1)        eap_peap - Initiating new TLS session
(7,1)        eap - Sending EAP Request (code 1) ID 8 length 6
(7,1)        eap (handled)
(7,1)      } # Auth-Type eap (handled)
(7,1)  } # server inner-tunnel
(7,1)  Virtual server sending reply
(7,1)    &EAP-Message = 0x010800061920
(7,1)    &Message-Authenticator = 0x00000000000000000000000000000000
(7,1)      eap_peap - Got tunneled reply Access-Challenge
(7,1)      eap_peap -   &EAP-Message = 0x010800061920
(7,1)      eap_peap -   &Message-Authenticator = 0x00000000000000000000000000000000
(7,1)      eap_peap - Got tunneled Access-Challenge
(7,1)      eap_peap - TLS application data to encrypt (2 bytes)
(7,1)      eap_peap - Sending complete TLS record (37 bytes)
(7,1)      eap - Sending EAP Request (code 1) ID 8 length 43
(7,1)      eap (handled)
(7,1)    } # Auth-Type eap (handled)
(7,1)  Using Post-Auth-Type Challenge
(7,1)  Post-Auth-Type sub-section not found.  Ignoring.
(7,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7,1)  Sent Access-Challenge Id 77 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(7,1)    EAP-Message = 0x0108002b1900170301002082344bc7574b970ff8909affa1ee29bb40343616e80ce248966df0a0a68ae90d
(7,1)    Message-Authenticator = 0x00000000000000000000000000000000
(7,1)    State = 0x07015600a8adc0b555f857d8568152d8
  Socket:       23
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           77
  Length:       101
  Vector:       a21d32d0c13f84c40cf40698b38fa1f3
  Data:         4f  2d  01 08 00 2b 19 00 17 03 01 00 20 82 34 4b c7 57
                        4b 97 0f f8 90 9a ff a1 ee 29 bb 40 34 36 16 e8
                        0c e2 48 96 6d f0 a0 a6 8a e9 0d
                50  12  0a d5 5d 4a 0c cb 1e 0d 82 61 14 7e 33 71 38 f4
                18  12  07 01 56 00 a8 ad c0 b5 55 f8 57 d8 56 81 52 d8
(7,1)  Finished request
Waking up in 4.7 seconds.
(8)  Received Access-Request Id 78 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 180
(8)    User-Name = "lumir"
(8)    NAS-IP-Address = 192.168.101.254
(8)    NAS-Identifier = "P660HW-T3"
(8)    Framed-MTU = 1496
(8)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(8)    Calling-Station-Id = "c4-42-02-64-71-65"
(8)    NAS-Port-Type = Wireless-802.11
(8)    EAP-Message = 0x0208002b19001703010020b5b41781748607113f773831d56ba1394886e22c64ca21c821342783739dd3b9
(8)    State = 0x07015600a8adc0b555f857d8568152d8
(8)    Message-Authenticator = 0x17b4e6ebaddc3bd30f8e5f55926e99ac
(8,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8,1)    authorize {
(8,1)      filter_username {
(8,1)        if (&User-Name) {
(8,1)          if (&User-Name =~ / /) {
(8,1)            ...
(8,1)          }
(8,1)          if (&User-Name =~ /@[^@]*@/ ) {
(8,1)            ...
(8,1)          }
(8,1)          if (&User-Name =~ /\.\./ ) {
(8,1)            ...
(8,1)          }
(8,1)          if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(8,1)            ...
(8,1)          }
(8,1)          if (&User-Name =~ /\.$/) {
(8,1)            ...
(8,1)          }
(8,1)          if (&User-Name =~ /@\./) {
(8,1)            ...
(8,1)          }
(8,1)        } # if (&User-Name) (notfound)
(8,1)      } # filter_username (notfound)
(8,1)      preprocess (ok)
(8,1)      chap (noop)
(8,1)      mschap (noop)
(8,1)      digest (noop)
(8,1)      suffix - Checking for suffix after "@"
(8,1)      suffix - No '@' in User-Name = "lumir", looking up realm NULL
(8,1)      suffix - No such realm "NULL"
(8,1)      suffix (noop)
(8,1)      eap - Peer sent EAP Response (code 2) ID 8 length 43
(8,1)      eap - Continuing tunnel setup
(8,1)      eap (ok)
(8,1)    } # authorize (ok)
(8,1)  Using 'Auth-Type = eap' for authenticate {...}
(8,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8,1)    Auth-Type eap {
(8,1)      eap - Peer sent packet with EAP method PEAP (25)
(8,1)      eap - Calling submodule eap_peap to process data
(8,1)      eap_peap - Continuing EAP-TLS
(8,1)      eap_peap - Got complete TLS record (37 bytes)
(8,1)      eap_peap - [eap-tls verify] = complete
(8,1)      eap_peap - Decrypted TLS application data (10 bytes)
(8,1)      eap_peap - [eap-tls process] = complete
(8,1)      eap_peap - Session established.  Decoding tunneled data
(8,1)      eap_peap - PEAP state phase2
(8,1)      eap_peap - EAP method NAK (3)
(8,1)      eap_peap - Got tunneled request
(8,1)      eap_peap -   &EAP-Message = 0x0208000e03041a06051211173234
(8,1)      eap_peap - Setting &request:User-Name from tunnel (protected) identity "lumir"
(8,1)      eap_peap - Proxying tunneled request to virtual server "inner-tunnel"
(8,1)  Virtual server inner-tunnel received request
(8,1)    &EAP-Message = 0x0208000e03041a06051211173234
(8,1)    &FreeRADIUS-Proxied-To = 127.0.0.1
(8,1)    &User-Name = "lumir"
(8,1)  WARNING: Outer and inner identities are the same.  User privacy is compromised.
(8,1)  server inner-tunnel {
(8,1)    Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(8,1)      authorize {
(8,1)        filter_username {
(8,1)          if (&User-Name) {
(8,1)            if (&User-Name =~ / /) {
(8,1)              ...
(8,1)            }
(8,1)            if (&User-Name =~ /@[^@]*@/ ) {
(8,1)              ...
(8,1)            }
(8,1)            if (&User-Name =~ /\.\./ ) {
(8,1)              ...
(8,1)            }
(8,1)            if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(8,1)              ...
(8,1)            }
(8,1)            if (&User-Name =~ /\.$/) {
(8,1)              ...
(8,1)            }
(8,1)            if (&User-Name =~ /@\./) {
(8,1)              ...
(8,1)            }
(8,1)          } # if (&User-Name) (notfound)
(8,1)        } # filter_username (notfound)
(8,1)        chap (noop)
(8,1)        mschap (noop)
(8,1)        suffix - Checking for suffix after "@"
(8,1)        suffix - No '@' in User-Name = "lumir", looking up realm NULL
(8,1)        suffix - No such realm "NULL"
(8,1)        suffix (noop)
(8,1)        update control {
(8,1)          &control:Proxy-To-Realm := LOCAL
(8,1)        } # update control (noop)
(8,1)        eap - Peer sent EAP Response (code 2) ID 8 length 14
(8,1)        eap - Continuing on-going EAP conversation
(8,1)        eap (updated)
(8,1)        sql - EXPAND %{User-Name}
(8,1)        sql - --> lumir
(8,1)        sql - SQL-User-Name set to 'lumir'
(8,1)        sql - Closing connection (0): Hit idle_timeout, was idle for 247 seconds
rlm_sql_mysql - Socket destructor called, closing socket
(8,1)        sql - Closing connection (1): Hit idle_timeout, was idle for 247 seconds
rlm_sql_mysql - Socket destructor called, closing socket
(8,1)        sql - Closing connection (2): Hit idle_timeout, was idle for 247 seconds
(8,1)        sql - You probably need to lower "min"
rlm_sql_mysql - Socket destructor called, closing socket
(8,1)        sql - Closing connection (3): Hit idle_timeout, was idle for 247 seconds
(8,1)        sql - You probably need to lower "min"
rlm_sql_mysql - Socket destructor called, closing socket
(8,1)        sql - Closing connection (4): Hit idle_timeout, was idle for 247 seconds
(8,1)        sql - You probably need to lower "min"
rlm_sql_mysql - Socket destructor called, closing socket
(8,1)        sql - 0 of 0 connections in use.  You  may need to increase "spare"
(8,1)        sql - Opening additional connection (5), 1 of 32 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql_mysql - Connected to database 'radius' on Localhost via UNIX socket, server version 5.5.47-MariaDB, protocol version 10
(8,1)        sql - Reserved connection (5)
(8,1)        sql - EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id
(8,1)        sql - --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'lumir' ORDER BY id
(8,1)        sql - Executing select query: SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'lumir' ORDER BY id
(8,1)        sql - User found in radcheck table
(8,1)        sql - Conditional check items matched, merging assignment check items
(8,1)        sql -   &Cleartext-Password := "xxxxx"
(8,1)        sql - EXPAND SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id
(8,1)        sql - --> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'lumir' ORDER BY id
(8,1)        sql - Executing select query: SELECT id, username, attribute, value, op FROM radreply WHERE username = 'lumir' ORDER BY id
(8,1)        sql - EXPAND SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority
(8,1)        sql - --> SELECT groupname FROM radusergroup WHERE username = 'lumir' ORDER BY priority
(8,1)        sql - Executing select query: SELECT groupname FROM radusergroup WHERE username = 'lumir' ORDER BY priority
(8,1)        sql - User found in the group table
(8,1)        sql - EXPAND SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id
(8,1)        sql - --> SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'openvpn' ORDER BY id
(8,1)        sql - Executing select query: SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'openvpn' ORDER BY id
(8,1)        sql - Group "openvpn": Conditional check items matched
(8,1)        sql - Group "openvpn": Merging assignment check items
(8,1)        sql - EXPAND SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id
(8,1)        sql - --> SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'openvpn' ORDER BY id
(8,1)        sql - Executing select query: SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'openvpn' ORDER BY id
ASSERT FAILED src/modules/rlm_sql/rlm_sql.c[959]: reply_tmp != NULL
CAUGHT SIGNAL: Aborted
Backtrace of last 37 frames:
/usr/local/freeradius3/lib/libfreeradius-radius.so(fr_fault+0x115)[0x7fb726dfb5f2]
/usr/local/freeradius3/lib/libfreeradius-server.so(rad_assert_fail+0x46)[0x7fb72706c82a]
/usr/local/freeradius3/lib/rlm_sql.so(+0x5041)[0x7fb72454b041]
/usr/local/freeradius3/lib/rlm_sql.so(+0x6213)[0x7fb72454c213]
./sbin/radiusd[0x419089]
./sbin/radiusd[0x41a51f]
./sbin/radiusd[0x41abc5]
./sbin/radiusd(modcall+0x96)[0x41af5c]
./sbin/radiusd[0x42e5d9]
./sbin/radiusd(process_authorize+0x22)[0x42e621]
./sbin/radiusd(rad_authenticate+0x288)[0x4111ba]
./sbin/radiusd(rad_virtual_server+0x526)[0x411f72]
/usr/local/freeradius3/lib/libfreeradius-eap.so(eap_virtual_server+0x18a)[0x7fb726be33bd]
/usr/local/freeradius3/lib/rlm_eap_peap.so(eap_peap_process+0xd26)[0x7fb720bc4afe]
/usr/local/freeradius3/lib/rlm_eap_peap.so(+0x23bf)[0x7fb720bc23bf]
/usr/local/freeradius3/lib/rlm_eap.so(+0x36e2)[0x7fb7217e66e2]
/usr/local/freeradius3/lib/rlm_eap.so(eap_method_select+0x424)[0x7fb7217e7077]
/usr/local/freeradius3/lib/rlm_eap.so(+0x244f)[0x7fb7217e544f]
./sbin/radiusd[0x419089]
./sbin/radiusd[0x41a51f]
./sbin/radiusd[0x41abc5]
./sbin/radiusd(modcall+0x96)[0x41af5c]
./sbin/radiusd[0x42e5d9]
./sbin/radiusd(process_authenticate+0x22)[0x42e645]
./sbin/radiusd[0x410d8d]
./sbin/radiusd(rad_authenticate+0x563)[0x411495]
./sbin/radiusd[0x44683e]
./sbin/radiusd(request_enqueue+0x62)[0x441f4e]
./sbin/radiusd[0x44550e]
./sbin/radiusd(request_receive+0x262)[0x447077]
./sbin/radiusd[0x41f577]
./sbin/radiusd[0x44e430]
/usr/local/freeradius3/lib/libfreeradius-radius.so(fr_event_loop+0x5aa)[0x7fb726e26d99]
./sbin/radiusd(radius_event_process+0x26)[0x45038b]
./sbin/radiusd(main+0xcd3)[0x434d9f]
/lib64/libc.so.6(__libc_start_main+0xf5)[0x7fb72507db15]
./sbin/radiusd[0x4101f9]
No panic action set
_EXIT(1) CALLED src/lib/debug.c[754]

===============================================================

## Full backtrace from LLDB or GDB
===============================================================
 gdb /usr/local/freeradius3/sbin/radiusd
GNU gdb (GDB) Red Hat Enterprise Linux 7.6.1-80.el7
Copyright (C) 2013 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>...
Reading symbols from /usr/local/freeradius3/sbin/radiusd...done.
(gdb) run -xfl stdout
Starting program: /usr/local/freeradius3/sbin/radiusd -xfl stdout
run -xfl stdout
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
FreeRADIUS Version 3.1.0
Copyright (C) 1999-2016 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Detaching after fork from child process 138102.
Starting - reading configuration files ...
Found debugger attached
rlm_sql (sql) - Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
tls - Using cached TLS configuration from previous invocation
tls - Using cached TLS configuration from previous invocation
Creating attribute Unix-Group
rlm_sql_mysql - libmysql version: 5.5.47-MariaDB
[New Thread 0x7fffee48a700 (LWP 138103)]
[Thread 0x7fffee48a700 (LWP 138103) exited]
rlm_sql (sql) - Attempting to connect to database "radius"
rlm_sql (sql) - Opening additional connection (0), 1 of 32 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql (sql) - Opening additional connection (1), 1 of 31 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql (sql) - Opening additional connection (2), 1 of 30 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql (sql) - Opening additional connection (3), 1 of 29 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
rlm_sql (sql) - Opening additional connection (4), 1 of 28 pending slots used
rlm_sql_mysql - Starting connect to MySQL server
[/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay"      found in filter list for realm "DEFAULT".
[/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec"         found in filter list for realm "DEFAULT".
rlm_detail (auth_log) - 'User-Password' suppressed, will not appear in detail output
mschap: using internal authentication
[New Thread 0x7fffee48a700 (LWP 138109)]
[New Thread 0x7fffed872700 (LWP 138110)]
[New Thread 0x7fffed071700 (LWP 138111)]
[New Thread 0x7fffec870700 (LWP 138112)]
[New Thread 0x7fffe7fff700 (LWP 138113)]
radiusd: #### Opening IP addresses and Ports ####
Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
Listening on auth address * port 1816 bound to server default
Listening on acct address * port 1817 bound to server default
Listening on proxy address * port 60996
Ready to process requests
Waking up in 0.3 seconds.
(1)  Received Access-Request Id 80 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 129
(1)    User-Name = "lumir"
(1)    NAS-IP-Address = 192.168.101.254
(1)    NAS-Identifier = "P660HW-T3"
(1)    Framed-MTU = 1496
(1)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(1)    Calling-Station-Id = "c4-42-02-64-71-65"
(1)    NAS-Port-Type = Wireless-802.11
(1)    EAP-Message = 0x0201000a016c756d6972
(1)    Message-Authenticator = 0x3fe933c1537c75858d5ba4e96f8b2dd6
(1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)  Sent Access-Challenge Id 80 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(1)    EAP-Message = 0x010200061920
(1)    Message-Authenticator = 0x00000000000000000000000000000000
(1)    State = 0x0101bb005216dd98b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           80
  Length:       64
  Vector:       e41b5e49c98f6de29ce3e8bdd5c5e745
  Data:         4f  08  01 02 00 06 19 20
                50  12  46 14 7c ea 4f 27 93 5e 0c f7 d2 59 7a b6 88 2c
                18  12  01 01 bb 00 52 16 dd 98 b8 09 ba 07 bb 14 ad a1
Waking up in 0.2 seconds.
(2)  Received Access-Request Id 81 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 333
(2)    User-Name = "lumir"
(2)    NAS-IP-Address = 192.168.101.254
(2)    NAS-Identifier = "P660HW-T3"
(2)    Framed-MTU = 1496
(2)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(2)    Calling-Station-Id = "c4-42-02-64-71-65"
(2)    NAS-Port-Type = Wireless-802.11
(2)    EAP-Message = 0x020200c41980000000ba16030100b5010000b103018cf410a18826d47fe65059f0f9bdd112a65f7602c0ac6099d335c21f1cdb4857000048c014c00a00390038c00fc0050035c013c00900330032c00ec004002fc011c007c00cc00200050004c012c00800160013c00dc003000a0015001200090014001100080006000300ff01000040000b000403000102000a00340032000e000d0019000b000c00180009000a00160017000800060007001400150004000500120013000100020003000f00100011
(2)    State = 0x0101bb005216dd98b809ba07bb14ada1
(2)    Message-Authenticator = 0xd3631915e8d7dfaa5293f9d3673d9357
(2,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2,1)  Sent Access-Challenge Id 81 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(2,1)    EAP-Message = 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
(2,1)    Message-Authenticator = 0x00000000000000000000000000000000
(2,1)    State = 0x0203bb00caed75b6b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           81
  Length:       1064
  Vector:       0dbb62e0d7afefcfd8ba2014b674ef9d
  Data:         4f  ff  01 03 03 e8 19 c0 00 00 0a 6f 16 03 01 00 39 02
                        00 00 35 03 01 b4 20 54 05 a0 f7 63 be 80 ea 07
                        8b 78 aa 9a d7 62 ea 3c 58 fe 84 32 e2 30 d3 0e
                        53 66 12 66 98 00 c0 14 00 00 0d ff 01 00 01 00
                        00 0b 00 04 03 00 01 02 16 03 01 08 d3 0b 00 08
                        cf 00 08 cc 00 03 de 30 82 03 da 30 82 02 c2 a0
                        03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7
                        0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55
                        04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c
                        06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07
                        0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06
                        03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e
                        63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09
                        01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65
                        2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45
                        78 61 6d 70 6c 65 20 43 65 72 74 69 66
                4f  ff  69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30
                        1e 17 0d 31 36 30 35 31 36 31 32 33 31 31 31 5a
                        17 0d 31 36 30 37 31 35 31 32 33 31 31 31 5a 30
                        7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f
                        30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31
                        15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c
                        65 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 0c
                        1a 45 78 61 6d 70 6c 65 20 53 65 72 76 65 72 20
                        43 65 72 74 69 66 69 63 61 74 65 31 20 30 1e 06
                        09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69
                        6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01
                        22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00
                        03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e0 0d
                        33 25 be ed f8 2d 4b bd 56 eb 4a e5 f8 b7 6e c6
                        b7 6d ea 43 c7 01 99 8d 4b 46 20 da eb 18 f8 35
                        bc fa 0b 3f be ba 35 f4 c9 7a f7 9a e1
                4f  ff  61 d6 34 99 09 b7 05 ac 7b e4 ba f2 34 01 61 5b
                        ec da 81 15 3b c7 ee 4e 73 f3 dc f6 67 5e fa d0
                        ea da 5f 1f be b1 20 7f 37 d8 09 0a a8 77 91 20
                        50 87 22 90 0d 34 d7 a6 83 d3 1e 61 86 dd 4e 91
                        dd 16 3f 73 d9 a5 d2 fa e5 a8 16 23 23 70 af f0
                        b8 45 a8 17 87 42 c5 76 aa db fb 02 61 c2 e8 f5
                        e3 b1 5b 26 d1 eb 5c 01 9f d4 e5 0f 1b a9 2b 7b
                        72 d4 be ff d9 c5 b1 fd 1e c4 1d fd 6e 6a e2 d0
                        2a 98 02 27 8b 12 dd 53 69 b8 7b bf 51 35 b8 4f
                        12 2f 8e 03 68 ff 65 69 73 5b 03 08 3d a9 50 b0
                        ba c5 47 7b 79 ef b3 7b 60 fa 09 65 f6 cd 3e 41
                        13 19 97 26 dc 2f bf e3 20 9d a6 12 6f b8 fe 61
                        ee c0 3a ee 74 43 53 61 81 17 e3 3e 63 ea f3 86
                        dd 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d
                        25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30
                        36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0
                4f  f3  29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e
                        65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d
                        70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86
                        48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 22 00
                        74 54 e2 62 d8 d3 39 0e a3 dd 1a 1f 39 8c 33 58
                        ee ea ce ca 76 3f 23 af c7 ec a9 f9 5f 01 8f 67
                        7c 72 c5 b1 8a 80 bd d3 8d 38 2f b0 09 6b c0 97
                        b3 5c 4e 52 1d e7 6a 39 f7 3f f0 ab 9d 29 52 0d
                        51 50 62 90 ff c0 5a a5 88 4e 2c 86 75 5f 77 6b
                        59 65 ce 8c ce 00 56 70 90 66 16 e9 6a fb 98 be
                        4a 6b a1 50 2a 50 b2 c5 80 e1 53 37 33 e7 26 13
                        31 76 6e 9e 96 e9 93 b7 fa 30 8d 25 91 0b 0f ce
                        d2 48 48 6d 3a 46 82 45 43 3c 18 e8 e5 6a 8f 28
                        73 5c ad cf 44 73 44 b5 5f 49 c2 68 f0 84 37 a9
                        f1 de d2 5f 62 0b f9 7e b0 1f 19 62 08 cb 04 8c
                        46
                50  12  00 4d c7 90 f5 d4 59 53 02 7e 53 13 7b 5f 40 a4
                18  12  02 03 bb 00 ca ed 75 b6 b8 09 ba 07 bb 14 ad a1
Waking up in 0.1 seconds.
(3)  Received Access-Request Id 82 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 143
(3)    User-Name = "lumir"
(3)    NAS-IP-Address = 192.168.101.254
(3)    NAS-Identifier = "P660HW-T3"
(3)    Framed-MTU = 1496
(3)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(3)    Calling-Station-Id = "c4-42-02-64-71-65"
(3)    NAS-Port-Type = Wireless-802.11
(3)    EAP-Message = 0x020300061900
(3)    State = 0x0203bb00caed75b6b809ba07bb14ada1
(3)    Message-Authenticator = 0xbcc1b0c720aa17dc70a12a697429a18c
(3,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3,1)  Sent Access-Challenge Id 82 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(3,1)    EAP-Message = 0x010403e819406d556d1adb84fd6522aead14fb58f64cd01860210317aada8e1d57710cd4a68c022bb26add551e8def1c68195fd731a72c7749598d91f432341f91fb50c9b8a869bab9984f2f468cca7efc032b0004e8308204e4308203cca003020102020900b2615d8ab0877d99300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479301e170d3136303531363132333131315a170d3136303731353132333131315a308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100b1590974ecb26cb2533b7dceeca82a033820226a37212a3c0d2fbf3587a73dc2192b7b2548844821c5c66bf6df2a7db3fefaae9a0760336632ed13f630f0cda1a492800a3bf59fc48f636b09cf9356cacd7b549b64fd9e3db1c64e555cfa8cc9bf830e9f4fb23682e804ca373195e21ef816d9c09a731de55ddb9bf0c25db61c91ce585a11867251cb2860b528350b999ec9aaf03c83dbe7be412e5cdbc4d02c46cb4fc0e595d08232ebed9ca167c1e5b0fb70f25133d6b110b90c45440d261efb9768ba74c7bbab4db106b3d2f4657fb53af9bf40c026d7c1ef9e614987acfad5aad539310c700527c3f4e4998d0eee0ff7ce1c3584df801986fcbfc418913f0203010001a382013730820133301d0603551d0e0416041461d1179cd1ebcef0d1353925879d77f6baddd85e3081c80603551d230481c03081bd801461d1179cd1ebcef0d1353925879d77f6baddd85ea18199a48196308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479820900b2615d8ab0877d99300f0603551d13
(3,1)    Message-Authenticator = 0x00000000000000000000000000000000
(3,1)    State = 0x0301bb005216dd98b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           82
  Length:       1064
  Vector:       5727be50e44dd16b4968c08dbca5a013
  Data:         4f  ff  01 04 03 e8 19 40 6d 55 6d 1a db 84 fd 65 22 ae
                        ad 14 fb 58 f6 4c d0 18 60 21 03 17 aa da 8e 1d
                        57 71 0c d4 a6 8c 02 2b b2 6a dd 55 1e 8d ef 1c
                        68 19 5f d7 31 a7 2c 77 49 59 8d 91 f4 32 34 1f
                        91 fb 50 c9 b8 a8 69 ba b9 98 4f 2f 46 8c ca 7e
                        fc 03 2b 00 04 e8 30 82 04 e4 30 82 03 cc a0 03
                        02 01 02 02 09 00 b2 61 5d 8a b0 87 7d 99 30 0d
                        06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93
                        31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30
                        0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12
                        30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65
                        72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61
                        6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a
                        86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40
                        65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06
                        03 55 04 03 0c 1d 45 78 61 6d 70 6c 65
                4f  ff  20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74
                        68 6f 72 69 74 79 30 1e 17 0d 31 36 30 35 31 36
                        31 32 33 31 31 31 5a 17 0d 31 36 30 37 31 35 31
                        32 33 31 31 31 5a 30 81 93 31 0b 30 09 06 03 55
                        04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c
                        06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07
                        0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06
                        03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e
                        63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09
                        01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65
                        2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45
                        78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61
                        74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22
                        30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03
                        82 01 0f 00 30 82 01 0a 02 82 01 01 00 b1 59 09
                        74 ec b2 6c b2 53 3b 7d ce ec a8 2a 03
                4f  ff  38 20 22 6a 37 21 2a 3c 0d 2f bf 35 87 a7 3d c2
                        19 2b 7b 25 48 84 48 21 c5 c6 6b f6 df 2a 7d b3
                        fe fa ae 9a 07 60 33 66 32 ed 13 f6 30 f0 cd a1
                        a4 92 80 0a 3b f5 9f c4 8f 63 6b 09 cf 93 56 ca
                        cd 7b 54 9b 64 fd 9e 3d b1 c6 4e 55 5c fa 8c c9
                        bf 83 0e 9f 4f b2 36 82 e8 04 ca 37 31 95 e2 1e
                        f8 16 d9 c0 9a 73 1d e5 5d db 9b f0 c2 5d b6 1c
                        91 ce 58 5a 11 86 72 51 cb 28 60 b5 28 35 0b 99
                        9e c9 aa f0 3c 83 db e7 be 41 2e 5c db c4 d0 2c
                        46 cb 4f c0 e5 95 d0 82 32 eb ed 9c a1 67 c1 e5
                        b0 fb 70 f2 51 33 d6 b1 10 b9 0c 45 44 0d 26 1e
                        fb 97 68 ba 74 c7 bb ab 4d b1 06 b3 d2 f4 65 7f
                        b5 3a f9 bf 40 c0 26 d7 c1 ef 9e 61 49 87 ac fa
                        d5 aa d5 39 31 0c 70 05 27 c3 f4 e4 99 8d 0e ee
                        0f f7 ce 1c 35 84 df 80 19 86 fc bf c4 18 91 3f
                        02 03 01 00 01 a3 82 01 37 30 82 01 33
                4f  f3  30 1d 06 03 55 1d 0e 04 16 04 14 61 d1 17 9c d1
                        eb ce f0 d1 35 39 25 87 9d 77 f6 ba dd d8 5e 30
                        81 c8 06 03 55 1d 23 04 81 c0 30 81 bd 80 14 61
                        d1 17 9c d1 eb ce f0 d1 35 39 25 87 9d 77 f6 ba
                        dd d8 5e a1 81 99 a4 81 96 30 81 93 31 0b 30 09
                        06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55
                        04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03
                        55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15
                        30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65
                        20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7
                        0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d
                        70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03
                        0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66
                        69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82
                        09 00 b2 61 5d 8a b0 87 7d 99 30 0f 06 03 55 1d
                        13
                50  12  f2 2a 47 df 29 c8 98 88 75 74 84 fa f5 8a 4c 18
                18  12  03 01 bb 00 52 16 dd 98 b8 09 ba 07 bb 14 ad a1
(4)  Received Access-Request Id 83 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 143
(4)    User-Name = "lumir"
(4)    NAS-IP-Address = 192.168.101.254
(4)    NAS-Identifier = "P660HW-T3"
(4)    Framed-MTU = 1496
(4)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(4)    Calling-Station-Id = "c4-42-02-64-71-65"
(4)    NAS-Port-Type = Wireless-802.11
(4)    EAP-Message = 0x020400061900
(4)    State = 0x0301bb005216dd98b809ba07bb14ada1
(4)    Message-Authenticator = 0xe8d155f9d8dc7ee4f5e6b21c255c31b4
(4,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4,1)  Sent Access-Challenge Id 83 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(4,1)    EAP-Message = 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
(4,1)    Message-Authenticator = 0x00000000000000000000000000000000
(4,1)    State = 0x0407bb00caed75b6b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           83
  Length:       755
  Vector:       4376fcc504cc37a33d6f45f0dccb5444
  Data:         4f  ff  01 05 02 b5 19 00 01 01 ff 04 05 30 03 01 01 ff
                        30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0
                        27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78
                        61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c
                        65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86
                        f7 0d 01 01 0b 05 00 03 82 01 01 00 16 e3 2e eb
                        ee 65 34 c0 5b 57 bc 6b f4 b3 f1 59 3d 69 22 a1
                        91 c3 75 4a 70 fa 07 d6 82 e2 d0 a5 0d 22 7f e7
                        c9 25 50 8d 09 ae 34 5b 72 6f 42 fb 9d bd 60 0c
                        01 a1 58 5c 27 17 ea 22 98 97 cf 21 65 e7 92 6a
                        a2 1c 15 32 46 d9 64 fa 7f 9f 6e 35 55 9e 50 c1
                        de b2 0a 3d 1d 55 74 26 6d 1b eb ac 20 60 3b d6
                        08 6f 17 f0 5f 24 c2 d5 2d ee 45 71 b2 8f 16 3a
                        7c e8 ad e6 4a 08 45 20 72 fe e5 ad bc 81 94 4e
                        b8 bd bc 15 c6 d2 a1 75 f1 58 37 12 3f df 5f 2d
                        ed ef ec d0 b3 bf 06 86 9c 48 94 74 05
                4f  ff  b5 cc 6a 79 b5 86 cf 15 07 0a 23 de f0 44 1b 45
                        b1 d4 14 78 9e ea e7 83 e0 5c b8 a3 51 ca a0 d3
                        ec 60 28 d9 41 2b 12 4f 12 d4 92 63 83 4d 6a a7
                        51 44 26 8e 59 8a 8b 01 75 42 a0 f8 80 9e 2d 05
                        c2 89 27 e2 c8 69 50 40 70 8f ad b6 b0 8d 24 12
                        73 d2 03 69 bd 64 6e f8 83 08 d0 06 d8 78 d2 16
                        03 01 01 4b 0c 00 01 47 03 00 17 41 04 ce 61 fb
                        99 06 b9 46 70 c7 d8 05 bf e8 60 48 95 37 70 4f
                        f6 6b 5a bc 80 50 b0 c9 f1 df cf 19 85 4c 6a f7
                        b7 e6 be 24 27 b5 bf c9 29 84 22 a6 66 82 ae 74
                        02 d7 c5 17 3c e2 4a 08 8c cc e8 d5 30 01 00 87
                        45 8a d0 10 7b 2a d8 6c ed b8 71 f8 2d 13 35 a9
                        69 cb 06 18 d3 c4 1b 91 63 24 23 ff 45 79 4d 09
                        04 81 91 8a d7 a9 e0 cd 98 fa ed af 21 2d 2d 56
                        d0 78 0e bd 91 5a 2a ad 31 8f ef e9 3e bd 88 fb
                        7a 87 67 98 50 02 ef 95 47 74 a1 75 79
                4f  bd  ff 94 7a dc 73 ec 41 e6 2c 14 5a e4 83 2e 3a 78
                        f6 48 08 18 50 b8 c6 27 95 e0 a2 2a 2c 71 31 9b
                        f2 03 00 dc 71 aa af 67 40 b3 60 01 c8 5e 50 fa
                        60 1a 55 14 31 63 42 b1 45 4f 2e ae a5 a5 70 50
                        00 0b a0 d8 dc 4f 5b 46 2b 3b 4f 33 3b 55 89 1a
                        1d a8 2a 75 fc 3c 83 fd fc c3 5c 98 b5 a6 70 1b
                        1a 16 b7 d5 40 ee 7f 38 ad fb 88 8b a5 c8 23 8a
                        79 37 94 60 2f 9b 62 03 be 6c 14 69 2d 90 f0 8c
                        c0 52 9e 00 2a cc 06 9c 96 01 d1 cc 70 27 46 40
                        e8 e4 4f d7 ae f3 9f 17 5b c9 dc ad fc 42 22 2a
                        73 ae 72 68 74 ab 9f 5a ea 0d 77 6d 2d 5d df 0b
                        9e 51 16 03 01 00 04 0e 00 00 00
                50  12  85 67 72 48 a7 03 8d e9 e2 b6 cf a2 16 d2 c2 cb
                18  12  04 07 bb 00 ca ed 75 b6 b8 09 ba 07 bb 14 ad a1
(5)  Received Access-Request Id 84 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 281
(5)    User-Name = "lumir"
(5)    NAS-IP-Address = 192.168.101.254
(5)    NAS-Identifier = "P660HW-T3"
(5)    Framed-MTU = 1496
(5)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(5)    Calling-Station-Id = "c4-42-02-64-71-65"
(5)    NAS-Port-Type = Wireless-802.11
(5)    EAP-Message = 0x02050090198000000086160301004610000042410460f96eb306980e6ce40765a4e37974f93a1f96458e3ca61a0ea91172c06afbf3389bbbc884cc075753e6f1dc073e0cce979c2b083b8b23194e154cfdf2f537081403010001011603010030b21cd42c792646067528e2a0b1f55ec6398b4acf2364990eb63336acb45c033e7ec453a664106310f9fd8fde3e88b73d
(5)    State = 0x0407bb00caed75b6b809ba07bb14ada1
(5)    Message-Authenticator = 0xa99f58f76e4f200b415473140fa22f13
(5,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5,1)  Sent Access-Challenge Id 84 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(5,1)    EAP-Message = 0x01060041190014030100010116030100307e2f3844225f9f444f71c38ebd493594574ec79b422357bb298cf4a35ea5183c2b01c0bd0f32523583c964b6a5d10da1
(5,1)    Message-Authenticator = 0x00000000000000000000000000000000
(5,1)    State = 0x0501bb005216dd98b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           84
  Length:       123
  Vector:       8b2cd4bf991361ad3d23eebdcbf3787f
  Data:         4f  43  01 06 00 41 19 00 14 03 01 00 01 01 16 03 01 00
                        30 7e 2f 38 44 22 5f 9f 44 4f 71 c3 8e bd 49 35
                        94 57 4e c7 9b 42 23 57 bb 29 8c f4 a3 5e a5 18
                        3c 2b 01 c0 bd 0f 32 52 35 83 c9 64 b6 a5 d1 0d
                        a1
                50  12  7c 22 39 98 e2 55 7b 5f b3 85 77 c5 20 3f dd 2f
                18  12  05 01 bb 00 52 16 dd 98 b8 09 ba 07 bb 14 ad a1
Waking up in 0.1 seconds.
(6)  Received Access-Request Id 85 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 143
(6)    User-Name = "lumir"
(6)    NAS-IP-Address = 192.168.101.254
(6)    NAS-Identifier = "P660HW-T3"
(6)    Framed-MTU = 1496
(6)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(6)    Calling-Station-Id = "c4-42-02-64-71-65"
(6)    NAS-Port-Type = Wireless-802.11
(6)    EAP-Message = 0x020600061900
(6)    State = 0x0501bb005216dd98b809ba07bb14ada1
(6)    Message-Authenticator = 0x5f1f0d361673987cba451a2948afbbec
(6,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6,1)  Sent Access-Challenge Id 85 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(6,1)    EAP-Message = 0x0107002b19001703010020690205d581fea3583edbaa509e5a4e2febef1bc01c6b7eeaea38373463b06daf
(6,1)    Message-Authenticator = 0x00000000000000000000000000000000
(6,1)    State = 0x0603bb00caed75b6b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           85
  Length:       101
  Vector:       20e1044888ee0b3f84369305c82e9620
  Data:         4f  2d  01 07 00 2b 19 00 17 03 01 00 20 69 02 05 d5 81
                        fe a3 58 3e db aa 50 9e 5a 4e 2f eb ef 1b c0 1c
                        6b 7e ea ea 38 37 34 63 b0 6d af
                50  12  2e fc 80 4f 52 01 ed b9 26 6a 10 16 89 f0 17 4a
                18  12  06 03 bb 00 ca ed 75 b6 b8 09 ba 07 bb 14 ad a1
(7)  Received Access-Request Id 86 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 180
(7)    User-Name = "lumir"
(7)    NAS-IP-Address = 192.168.101.254
(7)    NAS-Identifier = "P660HW-T3"
(7)    Framed-MTU = 1496
(7)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(7)    Calling-Station-Id = "c4-42-02-64-71-65"
(7)    NAS-Port-Type = Wireless-802.11
(7)    EAP-Message = 0x0207002b190017030100202019096efd2b1be917b353b3b0fa6360e8b5dee109e371c2ec4d1df7822403cf
(7)    State = 0x0603bb00caed75b6b809ba07bb14ada1
(7)    Message-Authenticator = 0x4367e00be491cbda1ae2714caedb7449
(7,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7,1)      eap_peap - Got inner identity 'lumir'
(7,1)  Virtual server inner-tunnel received request
(7,1)    &EAP-Message = 0x0207000a016c756d6972
(7,1)    &FreeRADIUS-Proxied-To = 127.0.0.1
(7,1)    &User-Name = "lumir"
(7,1)  WARNING: Outer and inner identities are the same.  User privacy is compromised.
(7,1)  server inner-tunnel {
(7,1)    Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(7,1)          &control:Proxy-To-Realm := LOCAL
(7,1)    Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(7,1)  } # server inner-tunnel
(7,1)  Virtual server sending reply
(7,1)    &EAP-Message = 0x010800061920
(7,1)    &Message-Authenticator = 0x00000000000000000000000000000000
(7,1)  Running Post-Auth-Type Challenge from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7,1)  Sent Access-Challenge Id 86 from 81.2.216.206:1816 to 62.245.76.18:1028 via eth0 length 0
(7,1)    EAP-Message = 0x0108002b19001703010020a78825955d7d777b26ca6b3d940b0cce1de7d6e1df9ba381174c63af86bd65b4
(7,1)    Message-Authenticator = 0x00000000000000000000000000000000
(7,1)    State = 0x0701bb005216dd98b809ba07bb14ada1
  Socket:       27
  Proto:        17
  Src IP:       81.2.216.206
    port:       1816
  Dst IP:       62.245.76.18
    port:       1028
  Code:         (11) Access-Challenge
  Id:           86
  Length:       101
  Vector:       c20bf731809ce9613478e90219a8f8d3
  Data:         4f  2d  01 08 00 2b 19 00 17 03 01 00 20 a7 88 25 95 5d
                        7d 77 7b 26 ca 6b 3d 94 0b 0c ce 1d e7 d6 e1 df
                        9b a3 81 17 4c 63 af 86 bd 65 b4
                50  12  68 8c 95 23 d1 20 8e d2 e3 c1 07 f5 5e f6 18 fe
                18  12  07 01 bb 00 52 16 dd 98 b8 09 ba 07 bb 14 ad a1
(8)  Received Access-Request Id 87 from 62.245.76.18:1028 to 81.2.216.206:1816 via eth0 length 180
(8)    User-Name = "lumir"
(8)    NAS-IP-Address = 192.168.101.254
(8)    NAS-Identifier = "P660HW-T3"
(8)    Framed-MTU = 1496
(8)    Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(8)    Calling-Station-Id = "c4-42-02-64-71-65"
(8)    NAS-Port-Type = Wireless-802.11
(8)    EAP-Message = 0x0208002b190017030100204d2a1bdb30ed93e3a7daec956f77b12053ea92b4696a411ea10cd2c3387d5385
(8)    State = 0x0701bb005216dd98b809ba07bb14ada1
(8)    Message-Authenticator = 0xad5b16f65e8d5553bd9247b59457b19f
(8,1)  Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8,1)  Running Auth-Type eap from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8,1)  Virtual server inner-tunnel received request
(8,1)    &EAP-Message = 0x0208000e03041a06051211173234
(8,1)    &FreeRADIUS-Proxied-To = 127.0.0.1
(8,1)    &User-Name = "lumir"
(8,1)  WARNING: Outer and inner identities are the same.  User privacy is compromised.
(8,1)  server inner-tunnel {
(8,1)    Running section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(8,1)          &control:Proxy-To-Realm := LOCAL
ASSERT FAILED src/modules/rlm_sql/rlm_sql.c[959]: reply_tmp != NULL
RAISING SIGNAL: Aborted

Program received signal SIGABRT, Aborted.
[Switching to Thread 0x7fffe7fff700 (LWP 138113)]
0x00007ffff61b1fcb in raise () from /lib64/libpthread.so.0
Missing separate debuginfos, use: debuginfo-install glibc-2.17-106.el7_2.6.x86_64 pcre-8.32-15.el7_2.1.x86_64
(gdb) run -xfl stdout
The program being debugged has been started already.
Start it from the beginning? (y or n) n
Program not restarted.
(gdb) bt
#0  0x00007ffff61b1fcb in raise () from /lib64/libpthread.so.0
#1  0x00007ffff7949548 in fr_fault (sig=6) at src/lib/debug.c:650
#2  0x00007ffff7bba82a in rad_assert_fail (file=0x7ffff509d383 "src/modules/rlm_sql/rlm_sql.c", line=959, expr=0x7ffff509db9a "reply_tmp != NULL") at src/main/util.c:468
#3  0x00007ffff5099041 in rlm_sql_process_groups (inst=0xaa2630, request=0xf33fd0, handle=0x7fffe7ffbe70, do_fall_through=0x7fffe7ffbe5c) at src/modules/rlm_sql/rlm_sql.c:959
#4  0x00007ffff509a213 in mod_authorize (instance=0xaa2630, request=0xf33fd0) at src/modules/rlm_sql/rlm_sql.c:1362
#5  0x0000000000419089 in unlang_module (component=MOD_AUTHORIZE, sp=0xeffca0, request=0xf33fd0) at src/main/interpreter.c:97
#6  0x000000000041a51f in unlang_single (request=0xf33fd0, stack=0x7fffe7ffbfd0, presult=0x7fffe7ffbf84, priority=0x7fffe7ffbf88) at src/main/interpreter.c:679
#7  0x000000000041abc5 in unlang_interpret (request=0xf33fd0, stack=0x7fffe7ffbfd0, presult=0x7fffe7ffcad8, ppriority=0x7fffe7ffcadc) at src/main/interpreter.c:883
#8  0x000000000041af5c in modcall (component=MOD_AUTHORIZE, c=0xef9970, request=0xf33fd0) at src/main/interpreter.c:1032
#9  0x000000000042e5d9 in indexed_modcall (comp=MOD_AUTHORIZE, idx=0, request=0xf33fd0) at src/main/modules.c:2105
#10 0x000000000042e621 in process_authorize (autz_type=0, request=0xf33fd0) at src/main/modules.c:2120
#11 0x00000000004111ba in rad_authenticate (request=0xf33fd0) at src/main/auth.c:435
#12 0x0000000000411f72 in rad_virtual_server (request=0xf33fd0) at src/main/auth.c:771
#13 0x00007ffff77313bd in eap_virtual_server (request=0xf32a60, fake=0xf33fd0, eap_session=0x7fffe8000b00, virtual_server=0xe6f360 "inner-tunnel")
    at src/modules/rlm_eap/libeap/eapcommon.c:444
#14 0x00007ffff1712afe in eap_peap_process (eap_session=0x7fffe8000b00, tls_session=0x7fffe80033f0, auth_type_eap=9492674) at src/modules/rlm_eap/types/rlm_eap_peap/peap.c:938
#15 0x00007ffff17103bf in mod_process (arg=0xe6b6b0, eap_session=0x7fffe8000b00) at src/modules/rlm_eap/types/rlm_eap_peap/rlm_eap_peap.c:308
#16 0x00007ffff23346e2 in eap_module_call (module=0xe57e30, eap_session=0x7fffe8000b00) at src/modules/rlm_eap/eap.c:176
#17 0x00007ffff2335077 in eap_method_select (inst=0xaaee10, eap_session=0x7fffe8000b00) at src/modules/rlm_eap/eap.c:407
#18 0x00007ffff233344f in mod_authenticate (instance=0xaaee10, request=0xf32a60) at src/modules/rlm_eap/rlm_eap.c:201
#19 0x0000000000419089 in unlang_module (component=MOD_AUTHENTICATE, sp=0xf03ac0, request=0xf32a60) at src/main/interpreter.c:97
#20 0x000000000041a51f in unlang_single (request=0xf32a60, stack=0x7fffe7ffd4f0, presult=0x7fffe7ffd4a4, priority=0x7fffe7ffd4a8) at src/main/interpreter.c:679
#21 0x000000000041abc5 in unlang_interpret (request=0xf32a60, stack=0x7fffe7ffd4f0, presult=0x7fffe7ffdff8, ppriority=0x7fffe7ffdffc) at src/main/interpreter.c:883
#22 0x000000000041af5c in modcall (component=MOD_AUTHENTICATE, c=0xf03750, request=0xf32a60) at src/main/interpreter.c:1032
#23 0x000000000042e5d9 in indexed_modcall (comp=MOD_AUTHENTICATE, idx=9492674, request=0xf32a60) at src/main/modules.c:2105
#24 0x000000000042e645 in process_authenticate (auth_type=9492674, request=0xf32a60) at src/main/modules.c:2128
#25 0x0000000000410d8d in rad_check_password (request=0xf32a60) at src/main/auth.c:251
#26 0x0000000000411495 in rad_authenticate (request=0xf32a60) at src/main/auth.c:516
#27 0x000000000044683e in request_running (request=0xf32a60, action=FR_ACTION_RUN) at src/main/process.c:1441
#28 0x0000000000442a25 in request_handler_thread (arg=0xf1adf0) at src/main/threads.c:723
#29 0x00007ffff61aadc5 in start_thread () from /lib64/libpthread.so.0
#30 0x00007ffff5ca0ced in clone () from /lib64/libc.so.6
(gdb)
===============================================================
alandekok commented 8 years ago

I've pushed a fix for v3.1.x. The gdb backtrace was exactly what I needed to fix it.

Looking at v3.0.x, I can't see where a similar crash would occur. Can you post a gdb backtrace for v3.0.x HEAD?

lumirl commented 8 years ago

I donno what is a gdb HEAD backtrace but I did the same as is written in your howto... If i should do any other tests then I need your instructions how to do them...

In 3.0.11 it crashes not always. Sometimes - usually the first time it send access reject but the second time it's always a crash.

Here is gdb output:
====================================================================
 gdb ./sbin/radiusd
GNU gdb (GDB) Red Hat Enterprise Linux 7.6.1-80.el7
Copyright (C) 2013 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>...
Reading symbols from /usr/local/freeradius3/sbin/radiusd...done.
(gdb) run -xfl stdout
Starting program: /usr/local/freeradius3/./sbin/radiusd -xfl stdout
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Copyright (C) 1999-2016 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Detaching after fork from child process 76779.
Starting - reading configuration files ...
Found debugger attached
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
Creating attribute Unix-Group
rlm_sql_mysql: libmysql version: 5.5.47-MariaDB
[New Thread 0x7fffef7f2700 (LWP 76780)]
[Thread 0x7fffef7f2700 (LWP 76780) exited]
rlm_sql (sql): Attempting to connect to database "radius"
rlm_sql (sql): Initialising connection pool
rlm_sql (sql): Opening additional connection (0), 1 of 32 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql (sql): Opening additional connection (1), 1 of 31 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql (sql): Opening additional connection (2), 1 of 30 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql (sql): Opening additional connection (3), 1 of 29 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql (sql): Opening additional connection (4), 1 of 28 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
tls: Using cached TLS configuration from previous invocation
tls: Using cached TLS configuration from previous invocation
[/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay"      found in filter list for realm "DEFAULT".
[/usr/local/freeradius3/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec"         found in filter list for realm "DEFAULT".
rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
rlm_mschap (mschap): using internal authentication
[New Thread 0x7fffef7f2700 (LWP 76786)]
[New Thread 0x7fffedcc3700 (LWP 76787)]
[New Thread 0x7fffed4c2700 (LWP 76788)]
[New Thread 0x7fffeccc1700 (LWP 76789)]
[New Thread 0x7fffe7fff700 (LWP 76790)]
radiusd: #### Opening IP addresses and Ports ####
Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
Listening on auth address * port 1816 bound to server default
Listening on acct address * port 1817 bound to server default
Listening on proxy address * port 54722
Ready to process requests
Waking up in 0.3 seconds.
(0) Received Accounting-Request Id 238 from 62.245.76.18:1029 to 81.2.216.206:1817 length 129
(0)   User-Name = "lumir"
(0)   NAS-Identifier = "P660HW-T3"
(0)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(0)   Calling-Station-Id = "c4-42-02-64-71-65"
(0)   Acct-Status-Type = Interim-Update
(0)   Acct-Input-Octets = 26936
(0)   Acct-Output-Octets = 118238
(0)   Acct-Input-Packets = 258
(0)   Acct-Output-Packets = 265
(0)   Acct-Session-Time = 80
(0)   Acct-Input-Gigawords = 0
(0)   Acct-Output-Gigawords = 0
(0) # Executing section preacct from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(0)           &Acct-Unique-Session-Id := a7e046ae9383d3c8e00f80b98aecd15a
(0) # Executing section accounting from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
rlm_sql (sql): Reserved connection (0)
(0) sql: SQL query returned: success
(0) sql: 17 record(s) updated
rlm_sql (sql): Released connection (0)
rlm_sql (sql): Need 5 more connections to reach 10 spares
rlm_sql (sql): Opening additional connection (5), 1 of 27 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
(0) Sent Accounting-Response Id 238 from 81.2.216.206:1817 to 62.245.76.18:1029 length 0
Ready to process requests
Waking up in 0.3 seconds.
(1) Received Accounting-Request Id 239 from 62.245.76.18:1029 to 81.2.216.206:1817 length 129
(1)   User-Name = "lumir"
(1)   NAS-Identifier = "P660HW-T3"
(1)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(1)   Calling-Station-Id = "c4-42-02-64-71-65"
(1)   Acct-Status-Type = Interim-Update
(1)   Acct-Input-Octets = 26936
(1)   Acct-Output-Octets = 118238
(1)   Acct-Input-Packets = 258
(1)   Acct-Output-Packets = 265
(1)   Acct-Session-Time = 90
(1)   Acct-Input-Gigawords = 0
(1)   Acct-Output-Gigawords = 0
(1) # Executing section preacct from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(1)           &Acct-Unique-Session-Id := a7e046ae9383d3c8e00f80b98aecd15a
(1) # Executing section accounting from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
rlm_sql (sql): Reserved connection (1)
(1) sql: SQL query returned: success
(1) sql: 17 record(s) updated
rlm_sql (sql): Released connection (1)
rlm_sql (sql): Need 4 more connections to reach 10 spares
rlm_sql (sql): Opening additional connection (6), 1 of 26 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
(1) Sent Accounting-Response Id 239 from 81.2.216.206:1817 to 62.245.76.18:1029 length 0
Ready to process requests
Waking up in 0.3 seconds.
(2) Received Accounting-Request Id 240 from 62.245.76.18:1029 to 81.2.216.206:1817 length 141
(2)   User-Name = "lumir"
(2)   NAS-Identifier = "P660HW-T3"
(2)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(2)   Calling-Station-Id = "c4-42-02-64-71-65"
(2)   Acct-Status-Type = Stop
(2)   Acct-Input-Octets = 26936
(2)   Acct-Output-Octets = 118238
(2)   Acct-Input-Packets = 258
(2)   Acct-Output-Packets = 265
(2)   Acct-Delay-Time = 0
(2)   Acct-Session-Time = 93
(2)   Acct-Terminate-Cause = Lost-Carrier
(2)   Acct-Input-Gigawords = 0
(2)   Acct-Output-Gigawords = 0
(2) # Executing section preacct from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(2)           &Acct-Unique-Session-Id := a7e046ae9383d3c8e00f80b98aecd15a
(2) # Executing section accounting from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
rlm_sql (sql): Reserved connection (2)
(2) sql: SQL query returned: success
(2) sql: 17 record(s) updated
rlm_sql (sql): Released connection (2)
rlm_sql (sql): Need 3 more connections to reach 10 spares
rlm_sql (sql): Opening additional connection (7), 1 of 25 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
(2) Sent Accounting-Response Id 240 from 81.2.216.206:1817 to 62.245.76.18:1029 length 0
Ready to process requests
Waking up in 0.3 seconds.
(3) Received Access-Request Id 241 from 62.245.76.18:1028 to 81.2.216.206:1816 length 129
(3)   User-Name = "lumir"
(3)   NAS-IP-Address = 192.168.101.254
(3)   NAS-Identifier = "P660HW-T3"
(3)   Framed-MTU = 1496
(3)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(3)   Calling-Station-Id = "c4-42-02-64-71-65"
(3)   NAS-Port-Type = Wireless-802.11
(3)   EAP-Message = 0x0201000a016c756d6972
(3)   Message-Authenticator = 0xc50735bf83ef6addd64fb4657cc17ef5
(3) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3) eap: EAP session adding &reply:State = 0x1a481f971a4a067a
(3) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(3) Sent Access-Challenge Id 241 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(3)   EAP-Message = 0x010200061920
(3)   Message-Authenticator = 0x00000000000000000000000000000000
(3)   State = 0x1a481f971a4a067ac89016a059ab3729
Waking up in 0.3 seconds.
(4) Received Access-Request Id 242 from 62.245.76.18:1028 to 81.2.216.206:1816 length 333
(4)   User-Name = "lumir"
(4)   NAS-IP-Address = 192.168.101.254
(4)   NAS-Identifier = "P660HW-T3"
(4)   Framed-MTU = 1496
(4)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(4)   Calling-Station-Id = "c4-42-02-64-71-65"
(4)   NAS-Port-Type = Wireless-802.11
(4)   EAP-Message = 0x020200c41980000000ba16030100b5010000b10301bc42029cfb6c93299990e47bfafe47d6bd7abb0ca9a741a1989ca419264bdcab000048c014c00a00390038c00fc0050035c013c00900330032c00ec004002fc011c007c00cc00200050004c012c00800160013c00dc003000a001500120009001400
(4)   State = 0x1a481f971a4a067ac89016a059ab3729
(4)   Message-Authenticator = 0xdc518bc7738c7f3b9d2a765224978d6e
(4) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4) eap: Expiring EAP session with state 0x1a481f971a4a067a
(4) eap: Finished EAP session with state 0x1a481f971a4a067a
(4) eap: Previous EAP request found for state 0x1a481f971a4a067a, released from the list
(4) eap: EAP session adding &reply:State = 0x1a481f971b4b067a
(4) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(4) Sent Access-Challenge Id 242 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(4)   EAP-Message = 0x010303ec19c000000a8f1603010059020000550301d0ec6fba2269f0da0b05741190a46acba2e93a10d03b76f1148e9c525bae732b2023425814d17cf875914b653f5ca2f06ba6823c70fef241392d60a1bd41614283c01400000dff01000100000b00040300010216030108d30b0008cf0008cc0003de
(4)   Message-Authenticator = 0x00000000000000000000000000000000
(4)   State = 0x1a481f971b4b067ac89016a059ab3729
Waking up in 0.2 seconds.
(5) Received Access-Request Id 243 from 62.245.76.18:1028 to 81.2.216.206:1816 length 143
(5)   User-Name = "lumir"
(5)   NAS-IP-Address = 192.168.101.254
(5)   NAS-Identifier = "P660HW-T3"
(5)   Framed-MTU = 1496
(5)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(5)   Calling-Station-Id = "c4-42-02-64-71-65"
(5)   NAS-Port-Type = Wireless-802.11
(5)   EAP-Message = 0x020300061900
(5)   State = 0x1a481f971b4b067ac89016a059ab3729
(5)   Message-Authenticator = 0xf5bb40fbda3854ac6f1acb086d48182e
(5) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5) eap: Expiring EAP session with state 0x1a481f971b4b067a
(5) eap: Finished EAP session with state 0x1a481f971b4b067a
(5) eap: Previous EAP request found for state 0x1a481f971b4b067a, released from the list
(5) eap: EAP session adding &reply:State = 0x1a481f97184c067a
(5) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(5) Sent Access-Challenge Id 243 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(5)   EAP-Message = 0x010403e819400a5747e1cfc015d21f4ae374aaf440359214dea76f6bf450b59c9a7b43e0c25f38970fedbcb51ec28aaf7fabe577346986d2d381cdf688196d13105d0009d5ed5bb7a08ac48561f5a6aa5fc8ed87202d9e23c1b4c4f73599fa17d923f9efc6fa2a0e6acfca1c08f31c0004e8308204e430
(5)   Message-Authenticator = 0x00000000000000000000000000000000
(5)   State = 0x1a481f97184c067ac89016a059ab3729
Waking up in 0.2 seconds.
(6) Received Access-Request Id 244 from 62.245.76.18:1028 to 81.2.216.206:1816 length 143
(6)   User-Name = "lumir"
(6)   NAS-IP-Address = 192.168.101.254
(6)   NAS-Identifier = "P660HW-T3"
(6)   Framed-MTU = 1496
(6)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(6)   Calling-Station-Id = "c4-42-02-64-71-65"
(6)   NAS-Port-Type = Wireless-802.11
(6)   EAP-Message = 0x020400061900
(6)   State = 0x1a481f97184c067ac89016a059ab3729
(6)   Message-Authenticator = 0xa4ee3508c1e3a24c39a78a97ff9bef41
(6) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6) eap: Expiring EAP session with state 0x1a481f97184c067a
(6) eap: Finished EAP session with state 0x1a481f97184c067a
(6) eap: Previous EAP request found for state 0x1a481f97184c067a, released from the list
(6) eap: EAP session adding &reply:State = 0x1a481f97194d067a
(6) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(6) Sent Access-Challenge Id 244 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(6)   EAP-Message = 0x010502d1190020417574686f72697479820900d516dbd495d0f03d300f0603551d130101ff040530030101ff30360603551d1f042f302d302ba029a0278625687474703a2f2f7777772e6578616d706c652e6f72672f6578616d706c655f63612e63726c300d06092a864886f70d01010b050003820101
(6)   Message-Authenticator = 0x00000000000000000000000000000000
(6)   State = 0x1a481f97194d067ac89016a059ab3729
Waking up in 0.2 seconds.
(7) Received Access-Request Id 245 from 62.245.76.18:1028 to 81.2.216.206:1816 length 281
(7)   User-Name = "lumir"
(7)   NAS-IP-Address = 192.168.101.254
(7)   NAS-Identifier = "P660HW-T3"
(7)   Framed-MTU = 1496
(7)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(7)   Calling-Station-Id = "c4-42-02-64-71-65"
(7)   NAS-Port-Type = Wireless-802.11
(7)   EAP-Message = 0x020500901980000000861603010046100000424104f614aaadbfaa1c01ab0e5d3b7312cc64c9c1061a7fce000907c9c95767c44ec20645e6336e071b66221728b892275ab017307f96461efbe7b10ff833e0276dbc1403010001011603010030273ce63c08b0d0dec7e1dc4f622c027d29c7c2ec92363c
(7)   State = 0x1a481f97194d067ac89016a059ab3729
(7)   Message-Authenticator = 0xfb883fd8c7a20c544f23bd4d6cd194e9
(7) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7) eap: Expiring EAP session with state 0x1a481f97194d067a
(7) eap: Finished EAP session with state 0x1a481f97194d067a
(7) eap: Previous EAP request found for state 0x1a481f97194d067a, released from the list
(7) eap: EAP session adding &reply:State = 0x1a481f971e4e067a
(7) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(7) Sent Access-Challenge Id 245 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(7)   EAP-Message = 0x0106004119001403010001011603010030471dea12bd95450cb1d72f4cff8dd22ae48bf2d9309f9a9e2b562dcc9ebd704ca7fd1722518aa87ff21d1038fea42a16
(7)   Message-Authenticator = 0x00000000000000000000000000000000
(7)   State = 0x1a481f971e4e067ac89016a059ab3729
Waking up in 0.1 seconds.
(8) Received Access-Request Id 246 from 62.245.76.18:1028 to 81.2.216.206:1816 length 143
(8)   User-Name = "lumir"
(8)   NAS-IP-Address = 192.168.101.254
(8)   NAS-Identifier = "P660HW-T3"
(8)   Framed-MTU = 1496
(8)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(8)   Calling-Station-Id = "c4-42-02-64-71-65"
(8)   NAS-Port-Type = Wireless-802.11
(8)   EAP-Message = 0x020600061900
(8)   State = 0x1a481f971e4e067ac89016a059ab3729
(8)   Message-Authenticator = 0xdfab60a9c5c3a9b0c10d8b0e8cc96fa7
(8) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8) eap: Expiring EAP session with state 0x1a481f971e4e067a
(8) eap: Finished EAP session with state 0x1a481f971e4e067a
(8) eap: Previous EAP request found for state 0x1a481f971e4e067a, released from the list
(8) eap: EAP session adding &reply:State = 0x1a481f971f4f067a
(8) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(8) Sent Access-Challenge Id 246 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(8)   EAP-Message = 0x0107002b1900170301002092772c6084d7a2cc06332090e75181439b49eca897d04a08a26f6983768f187d
(8)   Message-Authenticator = 0x00000000000000000000000000000000
(8)   State = 0x1a481f971f4f067ac89016a059ab3729
Waking up in 0.1 seconds.
(9) Received Access-Request Id 247 from 62.245.76.18:1028 to 81.2.216.206:1816 length 180
(9)   User-Name = "lumir"
(9)   NAS-IP-Address = 192.168.101.254
(9)   NAS-Identifier = "P660HW-T3"
(9)   Framed-MTU = 1496
(9)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(9)   Calling-Station-Id = "c4-42-02-64-71-65"
(9)   NAS-Port-Type = Wireless-802.11
(9)   EAP-Message = 0x0207002b19001703010020d106c3c3baf4bdd60c5b5b7ed47588fce2263adc14ed4bc8315565bd37f99a6e
(9)   State = 0x1a481f971f4f067ac89016a059ab3729
(9)   Message-Authenticator = 0x74ef4e417f49e35242e8296709851cf8
(9) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(9) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(9) eap: Expiring EAP session with state 0x1a481f971f4f067a
(9) eap: Finished EAP session with state 0x1a481f971f4f067a
(9) eap: Previous EAP request found for state 0x1a481f971f4f067a, released from the list
(9) eap_peap: Got inner identity 'lumir'
(9) Virtual server inner-tunnel received request
(9)   EAP-Message = 0x0207000a016c756d6972
(9)   FreeRADIUS-Proxied-To = 127.0.0.1
(9)   User-Name = "lumir"
(9) WARNING: Outer and inner identities are the same.  User privacy is compromised.
(9) server inner-tunnel {
(9)   # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(9)         &Proxy-To-Realm := LOCAL
(9)   # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(9) eap: EAP session adding &reply:State = 0xf6ce16b8f6c60c60
(9) } # server inner-tunnel
(9) Virtual server sending reply
(9)   EAP-Message = 0x0108002b1a0108002610cc4cd1ff5417a393c12aee74842f330c667265657261646975732d332e302e3131
(9)   Message-Authenticator = 0x00000000000000000000000000000000
(9)   State = 0xf6ce16b8f6c60c60a2ecbd579aa43c60
(9) eap_peap: Got tunneled reply RADIUS code 11
(9) eap_peap:   EAP-Message = 0x0108002b1a0108002610cc4cd1ff5417a393c12aee74842f330c667265657261646975732d332e302e3131
(9) eap_peap:   Message-Authenticator = 0x00000000000000000000000000000000
(9) eap_peap:   State = 0xf6ce16b8f6c60c60a2ecbd579aa43c60
(9) eap: EAP session adding &reply:State = 0x1a481f971c40067a
(9) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(9) Sent Access-Challenge Id 247 from 81.2.216.206:1816 to 62.245.76.18:1028 length 0
(9)   EAP-Message = 0x0108004b1900170301004085c806d7c231f52cb9a1c0537e5bcb007e7077336b23e6814b6a55857e3e606dde17d703d2d118020b7dcb66c704687fa1b4822bc180967fb27e6b1ef96248ea
(9)   Message-Authenticator = 0x00000000000000000000000000000000
(9)   State = 0x1a481f971c40067ac89016a059ab3729
Waking up in 0.1 seconds.
(10) Received Access-Request Id 248 from 62.245.76.18:1028 to 81.2.216.206:1816 length 244
(10)   User-Name = "lumir"
(10)   NAS-IP-Address = 192.168.101.254
(10)   NAS-Identifier = "P660HW-T3"
(10)   Framed-MTU = 1496
(10)   Called-Station-Id = "00-02-cf-b4-27-e7:VOIP"
(10)   Calling-Station-Id = "c4-42-02-64-71-65"
(10)   NAS-Port-Type = Wireless-802.11
(10)   EAP-Message = 0x0208006b1900170301006016f9d0113af9a6ef5dfc13be957f9a13f1761ce3fffa8afc10e1902599e64ab1b683d648fac24286f301c7224a12b369718b3bfc3fb23dff6c209c09fef44b11d81ffab9403be2dd00a670075eb15bc928f1dc9f1fd4c58a46864273f3cb8a8b
(10)   State = 0x1a481f971c40067ac89016a059ab3729
(10)   Message-Authenticator = 0xb1fc0ac1f839fb3939c2adf09115303a
(10) # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(10) # Executing group from file /usr/local/freeradius3/etc/raddb/sites-enabled/default
(10) eap: Expiring EAP session with state 0xf6ce16b8f6c60c60
(10) eap: Finished EAP session with state 0x1a481f971c40067a
(10) eap: Previous EAP request found for state 0x1a481f971c40067a, released from the list
(10) Virtual server inner-tunnel received request
(10)   EAP-Message = 0x020800401a0208003b318942a6ff58d566a6beeccfd4758b232c0000000000000000bdcc7c3bd440bdba9638102405da8a03b39591dffd4180c0006c756d6972
(10)   FreeRADIUS-Proxied-To = 127.0.0.1
(10)   User-Name = "lumir"
(10)   State = 0xf6ce16b8f6c60c60a2ecbd579aa43c60
(10) WARNING: Outer and inner identities are the same.  User privacy is compromised.
(10) server inner-tunnel {
(10)   # Executing section authorize from file /usr/local/freeradius3/etc/raddb/sites-enabled/inner-tunnel
(10)         &Proxy-To-Realm := LOCAL
rlm_sql (sql): Reserved connection (3)
rlm_sql (sql): Released connection (3)
rlm_sql (sql): Need 2 more connections to reach 10 spares
rlm_sql (sql): Opening additional connection (8), 1 of 24 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
(10)       sql_groupcmp
rlm_sql (sql): Reserved connection (4)
rlm_sql (sql): Released connection (4)
(10)       sql_groupcmp finished: User is NOT a member of group wifi

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x7fffeccc1700 (LWP 76789)]
paircompare (request=request@entry=0x99ac70, req_list=0x7fffe8001540, check=check@entry=0x7fffe80098a0, rep_list=rep_list@entry=0x0)
    at src/main/pair.c:537
537                                     if ((auth_item->da == from) || (!from)) {
Missing separate debuginfos, use: debuginfo-install glibc-2.17-106.el7_2.6.x86_64 pcre-8.32-15.el7_2.1.x86_64
(gdb) bt
#0  paircompare (request=request@entry=0x99ac70, req_list=0x7fffe8001540, check=check@entry=0x7fffe80098a0, rep_list=rep_list@entry=0x0)
    at src/main/pair.c:537
#1  0x00007ffff7bb8521 in cond_cmp_values (request=0x99ac70, lhs_type=<optimized out>, lhs=<optimized out>, lhs_len=<optimized out>,
    rhs_type=PW_TYPE_STRING, rhs=0x7fffeccbf1d0, rhs_len=4, c=<optimized out>, c=<optimized out>) at src/main/evaluate.c:315
#2  0x00007ffff7bb8951 in cond_normalise_and_cmp (request=0x99ac70, c=c@entry=0x8bc9c0, lhs_type=lhs_type@entry=PW_TYPE_INVALID,
    lhs_enumv=lhs_enumv@entry=0x0, lhs=lhs@entry=0x0, lhs_len=lhs_len@entry=0) at src/main/evaluate.c:585
#3  0x00007ffff7bb928c in radius_evaluate_map (request=request@entry=0x99ac70, modreturn=modreturn@entry=2, depth=depth@entry=0, c=c@entry=0x8bc9c0)
    at src/main/evaluate.c:654
#4  0x00007ffff7bb9380 in radius_evaluate_cond (request=request@entry=0x99ac70, modreturn=2, depth=depth@entry=0, c=0x8bc9c0) at src/main/evaluate.c:750
#5  0x0000000000424c77 in modcall_recurse (request=<optimized out>, component=MOD_AUTHORIZE, depth=1, entry=entry@entry=0x7fffeccbf728,
    do_next_sibling=true) at src/main/modcall.c:479
#6  0x00000000004249c9 in modcall_child (request=<optimized out>, component=<optimized out>, depth=<optimized out>, entry=0x7fffeccbf710,
    c=<optimized out>, result=0x7fffeccbf584, do_next_sibling=true) at src/main/modcall.c:408
#7  0x0000000000424b9e in modcall_recurse (request=request@entry=0x99ac70, component=component@entry=MOD_AUTHORIZE, depth=depth@entry=0,
    entry=entry@entry=0x7fffeccbf710, do_next_sibling=do_next_sibling@entry=true) at src/main/modcall.c:785
#8  0x0000000000425db3 in modcall (component=component@entry=MOD_AUTHORIZE, c=c@entry=0x96cff0, request=request@entry=0x99ac70)
    at src/main/modcall.c:1130
#9  0x0000000000420c8d in indexed_modcall (comp=comp@entry=MOD_AUTHORIZE, idx=idx@entry=0, request=request@entry=0x99ac70) at src/main/modules.c:1028
#10 0x0000000000421c1f in process_authorize (autz_type=autz_type@entry=0, request=request@entry=0x99ac70) at src/main/modules.c:2123
#11 0x0000000000410916 in rad_authenticate (request=request@entry=0x99ac70) at src/main/auth.c:489
#12 0x00000000004111f4 in rad_virtual_server (request=request@entry=0x99ac70) at src/main/auth.c:812
#13 0x00007fffee3d6909 in eappeap_process (handler=handler@entry=0x7fffdc000ba0, tls_session=tls_session@entry=0x7fffdc0023d0, auth_type_eap=2497330)
    at src/modules/rlm_eap/types/rlm_eap_peap/peap.c:1006
#14 0x00007fffee3d4b8a in mod_process (arg=0x952de0, handler=0x7fffdc000ba0) at src/modules/rlm_eap/types/rlm_eap_peap/rlm_eap_peap.c:328
#15 0x00007ffff2862672 in eap_module_call (handler=handler@entry=0x7fffdc000ba0, module=<optimized out>, module=<optimized out>)
    at src/modules/rlm_eap/eap.c:202
#16 0x00007ffff2862b93 in eap_method_select (inst=inst@entry=0x8e8160, handler=handler@entry=0x7fffdc000ba0) at src/modules/rlm_eap/eap.c:464
#17 0x00007ffff2861a39 in mod_authenticate (instance=0x8e8160, request=0x999c60) at src/modules/rlm_eap/rlm_eap.c:286
#18 0x000000000042589f in call_modsingle (request=0x999c60, sp=0x972e90, component=MOD_AUTHENTICATE) at src/main/modcall.c:302
#19 modcall_recurse (request=<optimized out>, component=MOD_AUTHENTICATE, depth=1, entry=entry@entry=0x7fffeccc0628, do_next_sibling=true)
    at src/main/modcall.c:574
#20 0x00000000004249c9 in modcall_child (request=<optimized out>, component=<optimized out>, depth=<optimized out>, entry=0x7fffeccc0610,
    c=<optimized out>, result=0x7fffeccc0484, do_next_sibling=true) at src/main/modcall.c:408
#21 0x0000000000424b9e in modcall_recurse (request=request@entry=0x999c60, component=component@entry=MOD_AUTHENTICATE, depth=depth@entry=0,
    entry=entry@entry=0x7fffeccc0610, do_next_sibling=do_next_sibling@entry=true) at src/main/modcall.c:785
#22 0x0000000000425db3 in modcall (component=component@entry=MOD_AUTHENTICATE, c=c@entry=0x972d90, request=request@entry=0x999c60)
    at src/main/modcall.c:1130
#23 0x0000000000420c8d in indexed_modcall (comp=comp@entry=MOD_AUTHENTICATE, idx=idx@entry=2497330, request=request@entry=0x999c60)
    at src/main/modules.c:1028
#24 0x0000000000421c2c in process_authenticate (auth_type=auth_type@entry=2497330, request=request@entry=0x999c60) at src/main/modules.c:2131
#25 0x0000000000410cce in rad_check_password (request=0x999c60) at src/main/auth.c:252
---Type <return> to continue, or q <return> to quit---
#26 rad_authenticate (request=0x999c60) at src/main/auth.c:570
#27 0x00000000004335d2 in request_running (request=0x999c60, action=<optimized out>) at src/main/process.c:1527
#28 0x000000000042c994 in request_handler_thread (arg=0x988c10) at src/main/threads.c:690
#29 0x00007ffff63e6dc5 in start_thread () from /lib64/libpthread.so.0
#30 0x00007ffff5edcced in clone () from /lib64/libc.so.6

====================================================================
alandekok commented 8 years ago

I believe that issue has already been fixed in the v3.0.x branch. Please try that instead of 3.0.11.

lumirl commented 8 years ago

After I have downloaded latest 3.0.x branch using git it's working... I didn't know that latest stable 3.0.11 version has known bugs inside. Maybe you can put some info on the webpage to inform other users that there are some bugs in latest version and that they should use git to get all fixes... Thank you very much for your time!

arr2036 commented 8 years ago

The only way a stable version wouldn't have know bugs if is we released a new stable version every time we found a bug?

This is why I think version numbers are for weak minded people and are detrimental to the software industry as a whole.

alanbuxey commented 8 years ago

..all software has bugs. of course the latest stable has known issues - eventually once all the KNOWN issues are known to be okay, the next version comes out - 3.0.12 - but you already have the pre-release of that with the HEAD version. thats better for you than eg me with my $$NETWORKVENDOR where I have to wait until engineers give me advanced access to special release code after weeks of emails....

On 18 May 2016 at 20:41, lumirl notifications@github.com wrote:

After I have downloaded latest 3.0.x branch using git it's working... I didn't know that latest stable 3.0.11 version has known bugs inside. Maybe you can put some info on the webpage to inform other users that there are some bugs in latest version and that they should use git to get all fixes... Thank you very much for your time!

— You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub https://github.com/FreeRADIUS/freeradius-server/issues/1611#issuecomment-220135760