• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Freeradius2 + DDWRT WPA2 Enterprise

Scheduled Pinned Locked Moved Wireless
10 Posts 2 Posters 8.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    Mazzokun
    last edited by Jan 30, 2013, 10:59 AM

    Hi guys! I planned pfSense so that my users can authenticate with WPA2 Enterprise. PfSense and the DDWRT router can communicate and authenticate users using EAP-TTLS. My ddwrt router is a ciscoE1000.
    This is my EAP config:

    /usr/local/etc/raddb/eap.conf
    Array	### EAP
    	eap {
    		default_eap_type = ttls
    		timer_expire     = 60
    		ignore_unknown_eap_types = no
    		cisco_accounting_username_bug = yes
    		max_sessions = 4096
    
    		### DISABLED WEAK EAP TYPES MD5, GTC, LEAP ###
    
    		### EAP-TLS and EAP-TLS with OCSP support
    		tls {
    			certdir = ${confdir}/certs
    			cadir = ${confdir}/certs
    			private_key_password = whatever
    			private_key_file = ${certdir}/server_key.pem
    			certificate_file = ${certdir}/server_cert.pem
    			CA_file = ${cadir}/ca_cert.pem
    			dh_file = ${certdir}/dh
    			random_file = ${certdir}/random
    			fragment_size = 1024
    			include_length = yes
    		#	check_crl = yes
    			CA_path = ${cadir}
    			### check_cert_issuer = "/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd/emailAddress=test@mycomp.com/CN=myca" ###
    			### check_cert_cn = %{User-Name} ###
    			cipher_list = "DEFAULT"
    			ecdh_curve = "prime256v1"
    			cache {
    			      enable = no
    			      lifetime = 24
    			      max_entries = 255
    			}
    			verify {
    		#     		tmpdir = /tmp/radiusd
    		#    		client = "/path/to/openssl verify -CApath  %{TLS-Client-Cert-Filename}"
    			}
    			ocsp {
    			      enable = no
    			      override_cert_url = no
    			      url = "http://127.0.0.1/ocsp/"
    			}
    		}
    
    		### EAP-TTLS
    		ttls {
    			default_eap_type = mschapv2
    			copy_request_to_tunnel = yes
    			use_tunneled_reply = yes
    			include_length = yes
    		}	### end ttls	
    
    		### EAP-PEAP
    		peap {
    			default_eap_type = tls
    			copy_request_to_tunnel = yes
    			use_tunneled_reply = yes
    		#	proxy_tunneled_request_as_eap = yes
    			### MS SoH Server is disabled ###
    		}
    		mschapv2 {
    		#	send_error = no
    		}	
    	}
    

    This is my radius config:

    /usr/local/etc/raddb/radiusd.conf
    prefix = /usr/local
    exec_prefix = ${prefix}
    sysconfdir = ${prefix}/etc
    localstatedir = /var
    sbindir = ${exec_prefix}/sbin
    logdir = ${localstatedir}/log
    raddbdir = ${sysconfdir}/raddb
    radacctdir = ${logdir}/radacct
    confdir = ${raddbdir}
    run_dir = ${localstatedir}/run
    libdir = ${exec_prefix}/lib/freeradius-2.1.12
    pidfile = ${run_dir}/radiusd.pid
    db_dir = ${raddbdir}
    name = radiusd
    #chroot = /path/to/chroot/directory
    #user = freeradius
    #group = freeradius
    
    ###############################################################################
    ### Is not present in freeradius 2.x radiusd.conf anymore but it was in 1.x ###
    ### delete_blocked_requests = no                                            ###
    ### usercollide = no                                                        ###
    ### lower_user = no                                                         ###
    ### lower_pass = no                                                         ###
    ### nospace_user = no                                                       ###
    ### nospace_pass = no                                                       ###
    ###############################################################################
    
    max_request_time = 30
    cleanup_delay = 5
    max_requests = 1024
    hostname_lookups = no
    allow_core_dumps = no
    regular_expressions = yes
    extended_expressions = no
    listen {
    		type = auth
    		ipaddr = 192.168.1.1
    		port = 1812
    }
    listen {
    		type = acct
    		ipaddr = 192.168.1.1
    		port = 1813
    }
    
    log {
    	destination = syslog
    	file = ${logdir}/radius.log
    	syslog_facility = daemon
    	stripped_names = no
    	auth = yes
    	auth_badpass = yes
    	auth_goodpass = yes
    	msg_goodpass = ""
    	msg_badpass = ""
    }
    
    checkrad = ${sbindir}/checkrad
    security {
    	max_attributes = 200
    	reject_delay = 1
    	status_server = no
    }
    
    ### disbale proxy module. In most environments we do not need to proxy requests to another RADIUS PROXY server
    #proxy_requests = yes
    #$INCLUDE  proxy.conf
    $INCLUDE  clients.conf
    thread pool {
    	start_servers = 5
    	max_servers = 32
    	min_spare_servers = 3
    	max_spare_servers = 10
    	max_queue_size = 65536
    	max_requests_per_server = 0
    }
    
    modules {
    	$INCLUDE ${confdir}/modules/
    	$INCLUDE eap.conf
    	### Dis-/Enable sql.conf INCLUDE
    	#$INCLUDE sql.conf
    
    	### Dis-/Enable sql/mysql/counter.conf INCLUDE
    	#$INCLUDE sql/mysql/counter.conf
    
    	#$INCLUDE sqlippool.conf
    }
    
    instantiate {
    
    	exec
    	expr
    	daily
    	weekly
    	monthly
    	forever
    	expiration
    	logintime
    	### Dis-/Enable sql instatiate
    	#sql
    }
    $INCLUDE policy.conf
    $INCLUDE sites-enabled/
    
    

    And this is my client config:

    /usr/local/etc/raddb/clients.conf
    
    client "DDWRT" {
    	ipaddr = 192.168.1.3
    	proto = tcp
    	secret = b2biIJP3kifQDljSzj
    	require_message_authenticator = no
    	max_connections = 16
    	shortname = DDWRT
    	nastype = other
    	### login = !root ###
    	### password = someadminpass ###
    }
    

    This is my SystemLog

    Jan 30 11:21:13	radiusd[12412]: Ready to process requests.
    Jan 30 11:21:13	radiusd[12409]: Loaded virtual server <default>
    Jan 30 11:21:11	php: /pkg_edit.php: The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
    Jan 30 11:21:11	radiusd[9699]: Exiting normally.
    Jan 30 11:21:11	radiusd[9699]: Signalled to terminate
    Jan 30 11:21:10	check_reload_status: Syncing firewall
    Jan 30 11:18:48	radiusd[9699]: Login OK: [iPad/<via auth-type="EAP">] (from client DDWRT port 62 cli 3cd0f80ed5a5)
    Jan 30 11:18:48	radiusd[9699]: Login OK: [iPad/<via auth-type="EAP">] (from client DDWRT port 62 cli 3cd0f80ed5a5)
    Jan 30 11:18:48	radiusd[9699]: Login OK: [iPad/<via auth-type="mschap">] (from client DDWRT port 0 via TLS tunnel)
    Jan 30 11:18:48	radiusd[9699]: Login OK: [iPad/<via auth-type="mschap">] (from client DDWRT port 0 via TLS tunnel)
    Jan 30 11:18:20	radiusd[9699]: Ready to process requests.
    Jan 30 11:18:20	radiusd[9383]: Loaded virtual server <default>
    Jan 30 11:18:18	php: /pkg_edit.php: The command '/usr/local/etc/rc.d/radiusd.sh stop' returned exit code '1', the output was 'radiusd not running?'
    Jan 30 11:18:18	radiusd[55432]: Exiting normally.
    Jan 30 11:18:18	radiusd[55432]: Signalled to terminate
    Jan 30 11:18:17	check_reload_status: Syncing firewall
    Jan 30 11:17:18	radiusd[55432]: Login OK: [iPad/<via auth-type="EAP">] (from client DDWRT port 62 cli 3cd0f80ed5a5)
    Jan 30 11:17:18	radiusd[55432]: Login OK: [iPad/<via auth-type="EAP">] (from client DDWRT port 62 cli 3cd0f80ed5a5)
    Jan 30 11:17:18	radiusd[55432]: Login OK: [iPad/<via auth-type="mschap">] (from client DDWRT port 0 via TLS tunnel)
    Jan 30 11:17:18	radiusd[55432]: Login OK: [iPad/<via auth-type="mschap">] (from client DDWRT port 0 via TLS tunnel)
    Jan 30 11:15:22	apinger: rrdtool respawning too fast, waiting 300s.
    Jan 30 11:14:22	apinger: Error while feeding rrdtool: Broken pipe</via></via></via></via></default></via></via></via></via></default>
    

    The problem is that iPhone/iPad users can authenticate and can surf internet for about 1 minute, than internet stop but they are still connect to the WiFi.  ???
    If I authenticate with my macbookpro I don't have any problem :o
    I tried to change every config but also my iPad/iPhone has this problem.
    Can anyone help???  :)

    1 Reply Last reply Reply Quote 0
    • N
      Nachtfalke
      last edited by Jan 30, 2013, 3:56 PM

      Do all changes and configuration in the GUI.
      Then stop the radiusd service on the GUI

      ssh to your pfsense and run:

      radiusd -X
      

      This runs freeradius in debug mode and you will see everything what is happening.
      Read the debug carefully from top to down and freeradius will tell you what it is doing. You can post the debug output here, too, but make sure that there is no sensitive data in it like passwords or something like that.

      1 Reply Last reply Reply Quote 0
      • M
        Mazzokun
        last edited by Jan 31, 2013, 7:25 AM Jan 30, 2013, 9:23 PM

        Here is my iPad access log:```
        Last login: Wed Jan 30 21:30:39 on ttys000
        Mac-Pro-di-Davide:~ Davide$ ssh admin@192.168.1.1
        Password:
        *** Welcome to pfSense 2.0.2-RELEASE-pfSense (amd64) on wifi ***

        WAN (wan)                -> vr0        -> 192.168.1.1
          LAN (lan)                -> rl0        -> 13.3.19.89

        1. Logout (SSH only)                  8) Shell
        2. Assign Interfaces                  9) pfTop
        3. Set interface(s) IP address      10) Filter Logs
        4. Reset webConfigurator password    11) Restart webConfigurator
        5. Reset to factory defaults        12) pfSense Developer Shell
        6. Reboot system                    13) Upgrade from console
        7. Halt system                      14) Disable Secure Shell (sshd)
        8. Ping host

        Enter an option: 8

        [2.0.2-RELEASE][admin@wifi.crnew]/root(1): radiusd -X
        FreeRADIUS Version 2.1.12, for host amd64-portbld-freebsd8.1, built on Jun 19 2012 at 08:36:32
        Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
        There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
        PARTICULAR PURPOSE.
        You may redistribute copies of FreeRADIUS under the terms of the
        GNU General Public License v2.
        Starting - reading configuration files ...
        including configuration file /usr/local/etc/raddb/radiusd.conf
        including configuration file /usr/local/etc/raddb/clients.conf
        including files in directory /usr/local/etc/raddb/modules/
        including configuration file /usr/local/etc/raddb/modules/wimax
        including configuration file /usr/local/etc/raddb/modules/always
        including configuration file /usr/local/etc/raddb/modules/attr_filter
        including configuration file /usr/local/etc/raddb/modules/attr_rewrite
        including configuration file /usr/local/etc/raddb/modules/chap
        including configuration file /usr/local/etc/raddb/modules/checkval
        including configuration file /usr/local/etc/raddb/modules/counter
        including configuration file /usr/local/etc/raddb/modules/cui
        including configuration file /usr/local/etc/raddb/modules/detail
        including configuration file /usr/local/etc/raddb/modules/detail.example.com
        including configuration file /usr/local/etc/raddb/modules/detail.log
        including configuration file /usr/local/etc/raddb/modules/digest
        including configuration file /usr/local/etc/raddb/modules/dynamic_clients
        including configuration file /usr/local/etc/raddb/modules/echo
        including configuration file /usr/local/etc/raddb/modules/etc_group
        including configuration file /usr/local/etc/raddb/modules/exec
        including configuration file /usr/local/etc/raddb/modules/expiration
        including configuration file /usr/local/etc/raddb/modules/expr
        including configuration file /usr/local/etc/raddb/modules/files
        including configuration file /usr/local/etc/raddb/modules/inner-eap
        including configuration file /usr/local/etc/raddb/modules/ippool
        including configuration file /usr/local/etc/raddb/modules/krb5
        including configuration file /usr/local/etc/raddb/modules/ldap
        including configuration file /usr/local/etc/raddb/modules/linelog
        including configuration file /usr/local/etc/raddb/modules/logintime
        including configuration file /usr/local/etc/raddb/modules/mac2ip
        including configuration file /usr/local/etc/raddb/modules/mschap
        including configuration file /usr/local/etc/raddb/modules/mac2vlan
        including configuration file /usr/local/etc/raddb/modules/ntlm_auth
        including configuration file /usr/local/etc/raddb/modules/opendirectory
        including configuration file /usr/local/etc/raddb/modules/otp
        including configuration file /usr/local/etc/raddb/modules/pam
        including configuration file /usr/local/etc/raddb/modules/pap
        including configuration file /usr/local/etc/raddb/modules/passwd
        including configuration file /usr/local/etc/raddb/modules/perl
        including configuration file /usr/local/etc/raddb/modules/policy
        including configuration file /usr/local/etc/raddb/modules/preprocess
        including configuration file /usr/local/etc/raddb/modules/radutmp
        including configuration file /usr/local/etc/raddb/modules/realm
        including configuration file /usr/local/etc/raddb/modules/redis
        including configuration file /usr/local/etc/raddb/modules/rediswho
        including configuration file /usr/local/etc/raddb/modules/replicate
        including configuration file /usr/local/etc/raddb/modules/smbpasswd
        including configuration file /usr/local/etc/raddb/modules/smsotp
        including configuration file /usr/local/etc/raddb/modules/soh
        including configuration file /usr/local/etc/raddb/modules/sql_log
        including configuration file /usr/local/etc/raddb/modules/sqlcounter_expire_on_login
        including configuration file /usr/local/etc/raddb/modules/sradutmp
        including configuration file /usr/local/etc/raddb/modules/unix
        including configuration file /usr/local/etc/raddb/modules/acct_unique
        including configuration file /usr/local/etc/raddb/modules/motp
        including configuration file /usr/local/etc/raddb/modules/datacounter_acct
        including configuration file /usr/local/etc/raddb/eap.conf
        including configuration file /usr/local/etc/raddb/policy.conf
        including files in directory /usr/local/etc/raddb/sites-enabled/
        including configuration file /usr/local/etc/raddb/sites-enabled/default
        main {
        allow_core_dumps = no
        }
        including dictionary file /usr/local/etc/raddb/dictionary
        main {
        name = "radiusd"
        prefix = "/usr/local"
        localstatedir = "/var"
        sbindir = "/usr/local/sbin"
        logdir = "/var/log"
        run_dir = "/var/run"
        libdir = "/usr/local/lib/freeradius-2.1.12"
        radacctdir = "/var/log/radacct"
        hostname_lookups = no
        max_request_time = 30
        cleanup_delay = 5
        max_requests = 1024
        pidfile = "/var/run/radiusd.pid"
        checkrad = "/usr/local/sbin/checkrad"
        debug_level = 0
        proxy_requests = yes
        log {
        stripped_names = no
        auth = yes
        auth_badpass = yes
        auth_goodpass = yes
        msg_badpass = ""
        msg_goodpass = ""
        }
        security {
        max_attributes = 200
        reject_delay = 1
        status_server = no
        }
        }
        radiusd: #### Loading Realms and Home Servers ####
        radiusd: #### Loading Clients ####
        client DDWRT {
        ipaddr = 192.168.1.3
        require_message_authenticator = no
        secret = "b2biIJP3kifQDljSzj"
        shortname = "DDWRT"
        nastype = "other"
        }
        radiusd: #### Instantiating modules ####
        instantiate {
        Module: Linked to module rlm_exec
        Module: Instantiating module "exec" from file /usr/local/etc/raddb/modules/exec
          exec {
        wait = no
        input_pairs = "request"
        shell_escape = yes
          }
        Module: Linked to module rlm_expr
        Module: Instantiating module "expr" from file /usr/local/etc/raddb/modules/expr
        Module: Linked to module rlm_counter
        Module: Instantiating module "daily" from file /usr/local/etc/raddb/modules/counter
          counter daily {
        filename = "/var/log/radacct/timecounter/db.daily"
        key = "User-Name"
        reset = "daily"
        count-attribute = "Acct-Session-Time"
        counter-name = "Daily-Session-Time"
        check-name = "Max-Daily-Session"
        reply-name = "Session-Timeout"
        cache-size = 5000
          }
        rlm_counter: Counter attribute Daily-Session-Time is number 11273
        rlm_counter: Current Time: 1359579930 [2013-01-30 22:05:30], Next reset 1359586800 [2013-01-31 00:00:00]
        Module: Instantiating module "weekly" from file /usr/local/etc/raddb/modules/counter
          counter weekly {
        filename = "/var/log/radacct/timecounter/db.weekly"
        key = "User-Name"
        reset = "weekly"
        count-attribute = "Acct-Session-Time"
        counter-name = "Weekly-Session-Time"
        check-name = "Max-Weekly-Session"
        reply-name = "Session-Timeout"
        cache-size = 5000
          }
        rlm_counter: Counter attribute Weekly-Session-Time is number 11275
        rlm_counter: Current Time: 1359579930 [2013-01-30 22:05:30], Next reset 1359846000 [2013-02-03 00:00:00]
        Module: Instantiating module "monthly" from file /usr/local/etc/raddb/modules/counter
          counter monthly {
        filename = "/var/log/radacct/timecounter/db.monthly"
        key = "User-Name"
        reset = "monthly"
        count-attribute = "Acct-Session-Time"
        counter-name = "Monthly-Session-Time"
        check-name = "Max-Monthly-Session"
        reply-name = "Session-Timeout"
        cache-size = 5000
          }
        rlm_counter: Counter attribute Monthly-Session-Time is number 11277
        rlm_counter: Current Time: 1359579930 [2013-01-30 22:05:30], Next reset 1359673200 [2013-02-01 00:00:00]
        Module: Instantiating module "forever" from file /usr/local/etc/raddb/modules/counter
          counter forever {
        filename = "/var/log/radacct/timecounter/db.forever"
        key = "User-Name"
        reset = "never"
        count-attribute = "Acct-Session-Time"
        counter-name = "Forever-Session-Time"
        check-name = "Max-Forever-Session"
        reply-name = "Session-Timeout"
        cache-size = 5000
          }
        rlm_counter: Counter attribute Forever-Session-Time is number 11279
        rlm_counter: Current Time: 1359579930 [2013-01-30 22:05:30], Next reset 0 [2013-01-30 22:00:00]
        Module: Linked to module rlm_expiration
        Module: Instantiating module "expiration" from file /usr/local/etc/raddb/modules/expiration
          expiration {
        reply-message = "Password Has Expired  "
          }
        Module: Linked to module rlm_logintime
        Module: Instantiating module "logintime" from file /usr/local/etc/raddb/modules/logintime
          logintime {
        reply-message = "You are calling outside your allowed timespan  "
        minimum-timeout = 60
          }
        }
        radiusd: #### Loading Virtual Servers ####
        server { # from file /usr/local/etc/raddb/radiusd.conf
        modules {
          Module: Creating Auth-Type = MOTP
          Module: Creating Auth-Type = digest
          Module: Creating Autz-Type = Status-Server
          Module: Creating Acct-Type = Status-Server
          Module: Creating Post-Auth-Type = REJECT
        Module: Checking authenticate {...} for more modules to load
        Module: Linked to module rlm_pap
        Module: Instantiating module "pap" from file /usr/local/etc/raddb/modules/pap
          pap {
        encryption_scheme = "auto"
        auto_header = no
          }
        Module: Linked to module rlm_chap
        Module: Instantiating module "chap" from file /usr/local/etc/raddb/modules/chap
        Module: Linked to module rlm_mschap
        Module: Instantiating module "mschap" from file /usr/local/etc/raddb/modules/mschap
          mschap {
        use_mppe = yes
        require_encryption = no
        require_strong = no
        with_ntdomain_hack = yes
        allow_retry = yes
          }
        Module: Instantiating module "motp" from file /usr/local/etc/raddb/modules/motp
          exec motp {
        wait = yes
        program = "/usr/local/bin/bash /usr/local/etc/raddb/scripts/otpverify.sh %{request:User-Name} %{request:User-Password} %{reply:MOTP-Init-Secret} %{reply:MOTP-PIN} %{reply:MOTP-Offset}"
        input_pairs = "request"
        shell_escape = yes
          }
        Module: Linked to module rlm_digest
        Module: Instantiating module "digest" from file /usr/local/etc/raddb/modules/digest
        Module: Linked to module rlm_unix
        Module: Instantiating module "unix" from file /usr/local/etc/raddb/modules/unix
          unix {
        radwtmp = "/var/log/radwtmp"
          }
        Module: Linked to module rlm_eap
        Module: Instantiating module "eap" from file /usr/local/etc/raddb/eap.conf
          eap {
        default_eap_type = "ttls"
        timer_expire = 60
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = yes
        max_sessions = 4096
          }
        Module: Linked to sub-module rlm_eap_tls
        Module: Instantiating eap-tls
          tls {
        rsa_key_exchange = no
        dh_key_exchange = yes
        rsa_key_length = 512
        dh_key_length = 512
        verify_depth = 0
        CA_path = "/usr/local/etc/raddb/certs"
        pem_file_type = yes
        private_key_file = "/usr/local/etc/raddb/certs/server_key.pem"
        certificate_file = "/usr/local/etc/raddb/certs/server_cert.pem"
        CA_file = "/usr/local/etc/raddb/certs/ca_cert.pem"
        private_key_password = "whatever"
        dh_file = "/usr/local/etc/raddb/certs/dh"
        random_file = "/usr/local/etc/raddb/certs/random"
        fragment_size = 1024
        include_length = yes
        check_crl = no
        cipher_list = "DEFAULT"
        ecdh_curve = "prime256v1"
            cache {
        enable = no
        lifetime = 24
        max_entries = 255
            }
            verify {
            }
            ocsp {
        enable = no
        override_cert_url = no
        url = "http://127.0.0.1/ocsp/"
            }
          }
        Module: Linked to sub-module rlm_eap_ttls
        Module: Instantiating eap-ttls
          ttls {
        default_eap_type = "mschapv2"
        copy_request_to_tunnel = yes
        use_tunneled_reply = yes
        include_length = yes
          }
        Module: Linked to sub-module rlm_eap_peap
        Module: Instantiating eap-peap
          peap {
        default_eap_type = "tls"
        copy_request_to_tunnel = yes
        use_tunneled_reply = yes
        proxy_tunneled_request_as_eap = yes
        soh = no
          }
        Module: Linked to sub-module rlm_eap_mschapv2
        Module: Instantiating eap-mschapv2
          mschapv2 {
        with_ntdomain_hack = no
        send_error = no
          }
        Module: Checking authorize {...} for more modules to load
        Module: Linked to module rlm_preprocess
        Module: Instantiating module "preprocess" from file /usr/local/etc/raddb/modules/preprocess
          preprocess {
        huntgroups = "/usr/local/etc/raddb/huntgroups"
        hints = "/usr/local/etc/raddb/hints"
        with_ascend_hack = no
        ascend_channels_per_line = 23
        with_ntdomain_hack = no
        with_specialix_jetstream_hack = no
        with_cisco_vsa_hack = no
        with_alvarion_vsa_hack = no
          }
        Module: Linked to module rlm_realm
        Module: Instantiating module "suffix" from file /usr/local/etc/raddb/modules/realm
          realm suffix {
        format = "suffix"
        delimiter = "@"
        ignore_default = no
        ignore_null = yes
          }
        Module: Instantiating module "ntdomain" from file /usr/local/etc/raddb/modules/realm
          realm ntdomain {
        format = "prefix"
        delimiter = ""
        ignore_default = no
        ignore_null = yes
          }
        Module: Linked to module rlm_files
        Module: Instantiating module "files" from file /usr/local/etc/raddb/modules/files
          files {
        usersfile = "/usr/local/etc/raddb/users"
        acctusersfile = "/usr/local/etc/raddb/acct_users"
        preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
        compat = "no"
          }
        Module: Linked to module rlm_checkval
        Module: Instantiating module "checkval" from file /usr/local/etc/raddb/modules/checkval
          checkval {
        item-name = "Calling-Station-Id"
        check-name = "Calling-Station-Id"
        data-type = "string"
        notfound-reject = no
          }
        rlm_checkval: Registered name Calling-Station-Id for attribute 31
        Module: Checking preacct {...} for more modules to load
        Module: Linked to module rlm_acct_unique
        Module: Instantiating module "acct_unique" from file /usr/local/etc/raddb/modules/acct_unique
          acct_unique {
        key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
          }
        Module: Checking accounting {...} for more modules to load
        Module: Linked to module rlm_detail
        Module: Instantiating module "detail" from file /usr/local/etc/raddb/modules/detail
          detail {
        detailfile = "/var/log/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
        header = "%t"
        detailperm = 384
        dirperm = 493
        locking = no
        log_packet_header = no
          }
        Module: Instantiating module "datacounterdaily" from file /usr/local/etc/raddb/modules/datacounter_acct
          exec datacounterdaily {
        wait = yes
        program = "/bin/sh /usr/local/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} daily %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
        input_pairs = "request"
        shell_escape = yes
          }
        Module: Instantiating module "datacounterweekly" from file /usr/local/etc/raddb/modules/datacounter_acct
          exec datacounterweekly {
        wait = yes
        program = "/bin/sh /usr/local/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} weekly %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
        input_pairs = "request"
        shell_escape = yes
          }
        Module: Instantiating module "datacountermonthly" from file /usr/local/etc/raddb/modules/datacounter_acct
          exec datacountermonthly {
        wait = yes
        program = "/bin/sh /usr/local/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} monthly %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
        input_pairs = "request"
        shell_escape = yes
          }
        Module: Instantiating module "datacounterforever" from file /usr/local/etc/raddb/modules/datacounter_acct
          exec datacounterforever {
        wait = yes
        program = "/bin/sh /usr/local/etc/raddb/scripts/datacounter_acct.sh %{request:User-Name} forever %{request:Acct-Input-Octets} %{request:Acct-Output-Octets}"
        input_pairs = "request"
        shell_escape = yes
          }
        Module: Linked to module rlm_radutmp
        Module: Instantiating module "radutmp" from file /usr/local/etc/raddb/modules/radutmp
          radutmp {
        filename = "/var/log/radutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        perm = 384
        callerid = yes
          }
        Module: Linked to module rlm_attr_filter
        Module: Instantiating module "attr_filter.accounting_response" from file /usr/local/etc/raddb/modules/attr_filter
          attr_filter attr_filter.accounting_response {
        attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
        key = "%{User-Name}"
        relaxed = no
          }
        Module: Checking session {...} for more modules to load
        Module: Checking pre-proxy {...} for more modules to load
        Module: Instantiating module "attr_filter.pre-proxy" from file /usr/local/etc/raddb/modules/attr_filter
          attr_filter attr_filter.pre-proxy {
        attrsfile = "/usr/local/etc/raddb/attrs.pre-proxy"
        key = "%{Realm}"
        relaxed = no
          }
        Module: Checking post-proxy {...} for more modules to load
        Module: Instantiating module "attr_filter.post-proxy" from file /usr/local/etc/raddb/modules/attr_filter
          attr_filter attr_filter.post-proxy {
        attrsfile = "/usr/local/etc/raddb/attrs"
        key = "%{Realm}"
        relaxed = no
          }
        Module: Checking post-auth {...} for more modules to load
        Module: Instantiating module "attr_filter.access_reject" from file /usr/local/etc/raddb/modules/attr_filter
          attr_filter attr_filter.access_reject {
        attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
        key = "%{User-Name}"
        relaxed = no
          }
        } # modules
        } # server
        radiusd: #### Opening IP addresses and Ports ####
        listen {
        type = "auth"
        ipaddr = 192.168.1.1
        port = 1812
        }
        Listening on authentication address 192.168.1.1 port 1812
        Listening on proxy address 192.168.1.1 port 1814
        Ready to process requests.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=121
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020000090169506164
        Message-Authenticator = 0x2dda3209920a160194db88409e0287e1

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 0 length 9
        [eap] No EAP Start, assuming it's an on-going EAP conversation
        ++[eap] returns updated
        [files] users: Matched entry iPad at line 97
        ++[files] returns ok
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[daily] returns noop
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[weekly] returns noop
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[monthly] returns noop
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[forever] returns noop
        rlm_checkval: Item Name: Calling-Station-Id, Value: a46706941f29
        rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
        ++[checkval] returns notfound
        ++[expiration] returns noop
        ++[logintime] returns noop
        [pap] WARNING: Auth-Type already set.  Not setting to PAP
        ++[pap] returns noop
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] EAP Identity
        [eap] processing type tls
        [tls] Initiate
        [tls] Start returned 1
        ++[eap] returns handled
        Sending Access-Challenge of id 1 to 192.168.1.3 port 32777
        EAP-Message = 0x010100061520
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x94215fb794204acd45d98454623e2c2b
        Finished request 0.
        Going to the next request
        Waking up in 4.9 seconds.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=296
        Cleaning up request 0 ID 1 with timestamp +25
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        State = 0x94215fb794204acd45d98454623e2c2b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020100a615800000009c160301009701000093030151098b34151f242280f30e9d2f0cc80621b979cd44485afda47f1371fdf4bf4a00005800ffc024c023c00ac009c007c008c028c027c014c013c011c012c026c025c02ac029c004c005c002c003c00ec00fc00cc00d003d003c002f000500040035000a0067006b003300390016c006c010c001c00b003b0002000101000012000a00080006001700180019000b00020100
        Message-Authenticator = 0x333630872965c0dfba9a698e36eac0c2

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 1 length 166
        [eap] Continuing tunnel setup.
        ++[eap] returns ok
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] Request found, released from the list
        [eap] EAP/ttls
        [eap] processing type ttls
        [ttls] Authenticate
        [ttls] processing EAP-TLS
          TLS Length 156
        [ttls] Length Included
        [ttls] eaptls_verify returned 11
        [ttls]    (other): before/accept initialization
        [ttls]    TLS_accept: before/accept initialization
        [ttls] <<< TLS 1.0 Handshake [length 0097], ClientHello 
        [ttls]    TLS_accept: SSLv3 read client hello A
        [ttls] >>> TLS 1.0 Handshake [length 0031], ServerHello 
        [ttls]    TLS_accept: SSLv3 write server hello A
        [ttls] >>> TLS 1.0 Handshake [length 085f], Certificate 
        [ttls]    TLS_accept: SSLv3 write certificate A
        [ttls] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone 
        [ttls]    TLS_accept: SSLv3 write server done A
        [ttls]    TLS_accept: SSLv3 flush data
        [ttls]    TLS_accept: Need to read more data: SSLv3 read client certificate A
        In SSL Handshake Phase
        In SSL Accept mode 
        [ttls] eaptls_process returned 13
        ++[eap] returns handled
        Sending Access-Challenge of id 1 to 192.168.1.3 port 32777
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 0x7e1c99d4d260cf7162e45dd7
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x94215fb795234acd45d98454623e2c2b
        Finished request 1.
        Going to the next request
        Waking up in 4.9 seconds.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=136
        Cleaning up request 1 ID 1 with timestamp +25
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        State = 0x94215fb795234acd45d98454623e2c2b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020200061500
        Message-Authenticator = 0xa7a6a8828361fe3f3641feb4e2ac10e2

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 2 length 6
        [eap] Continuing tunnel setup.
        ++[eap] returns ok
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] Request found, released from the list
        [eap] EAP/ttls
        [eap] processing type ttls
        [ttls] Authenticate
        [ttls] processing EAP-TLS
        [ttls] Received TLS ACK
        [ttls] ACK handshake fragment handler
        [ttls] eaptls_verify returned 1
        [ttls] eaptls_process returned 13
        ++[eap] returns handled
        Sending Access-Challenge of id 1 to 192.168.1.3 port 32777
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 0xaa8a55e19ad3ef23f0963c5db75e69654d9cc8554ab5035c0e884cd57bdc58e7fc0da1257b337034a853b48fcd6afa64500b0fac22c4be2db936e4ecdb7aa84d28aa1d8b8ff7febfdeaf972282628ce9a88deaff369d0394c7d3809d488d1cd31cd392c1ae5cf2b6b6bea354101e025ceb7bd9a41ef62e6c9727eafca242f004631e1f36c0f76c0f7e3c34562c2035957015589b9772101c0b0838f9609b9ffbeb3c068f12dadba6d6eaec42c8ce52f42abc1af7154a5a1f79ce328788301f4596b6c56611caed630203010001a381d03081cd301d0603551d0e04160414ac3e27e1ee72a134ac1eff279ba44eadc42f8e2330819d0603551d23048195
        EAP-Message = 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
        EAP-Message = 0xb8960c9c801097dd1e941b16
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x94215fb796224acd45d98454623e2c2b
        Finished request 2.
        Going to the next request
        Waking up in 4.9 seconds.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=136
        Cleaning up request 2 ID 1 with timestamp +25
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        State = 0x94215fb796224acd45d98454623e2c2b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020300061500
        Message-Authenticator = 0x4a2d6deb865440b3426564b7fd5b36ed

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 3 length 6
        [eap] Continuing tunnel setup.
        ++[eap] returns ok
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] Request found, released from the list
        [eap] EAP/ttls
        [eap] processing type ttls
        [ttls] Authenticate
        [ttls] processing EAP-TLS
        [ttls] Received TLS ACK
        [ttls] ACK handshake fragment handler
        [ttls] eaptls_verify returned 1
        [ttls] eaptls_process returned 13
        ++[eap] returns handled
        Sending Access-Challenge of id 1 to 192.168.1.3 port 32777
        EAP-Message = 0x010400c11580000008a390f514b521b67360c591cc78f7ecd97594a7823a57db3373fd940fd3cc0b47871454e476139cc53356ff2d30133229385a11432d34662a879b24a86e3d7b66f2f78dde1089628b4313c842ddea969da40440d6624a5c936878a6bb52a45745d9738a680b983bec2b70a5ff5a26bb113fa383deaf90199ad05aba595ab4841a72885bd534e0b8e6dcb71ee801c81fb7b191ab6d675094af7420b81075b8a8f5cced9b47e2dab1732a68f759d5497b16030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x94215fb797254acd45d98454623e2c2b
        Finished request 3.
        Going to the next request
        Waking up in 4.9 seconds.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=338
        Cleaning up request 3 ID 1 with timestamp +25
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        State = 0x94215fb797254acd45d98454623e2c2b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020400d01580000000c61603010086100000820080c46bf4b5b790b71c130f1987e9bdfca5c175e98e85b532ae72d7f0ab38c251fa6825f39a9920a07defe8be9156a7946858c4b03b8319364a9b83b4bb09edfdb6e6357d93d9ef416e48ebb263328adde16d7b00d906bab729f9438fcaa48e425ef87d59716169a27084240f500998ad86ab82139578e29bba9bc94bdbdd1276b21403010001011603010030c10530e8095e96c3509891ff8491db4673d2a15368f71618b80dc4c399558df7795c78800a1e49b3f9e16892a3997e2b
        Message-Authenticator = 0xe5e0b7c956b13c669db1717b79f17ae0

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 4 length 208
        [eap] Continuing tunnel setup.
        ++[eap] returns ok
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] Request found, released from the list
        [eap] EAP/ttls
        [eap] processing type ttls
        [ttls] Authenticate
        [ttls] processing EAP-TLS
          TLS Length 198
        [ttls] Length Included
        [ttls] eaptls_verify returned 11
        [ttls] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange 
        [ttls]    TLS_accept: SSLv3 read client key exchange A
        [ttls] <<< TLS 1.0 ChangeCipherSpec [length 0001] 
        [ttls] <<< TLS 1.0 Handshake [length 0010], Finished 
        [ttls]    TLS_accept: SSLv3 read finished A
        [ttls] >>> TLS 1.0 ChangeCipherSpec [length 0001] 
        [ttls]    TLS_accept: SSLv3 write change cipher spec A
        [ttls] >>> TLS 1.0 Handshake [length 0010], Finished 
        [ttls]    TLS_accept: SSLv3 write finished A
        [ttls]    TLS_accept: SSLv3 flush data
        [ttls]    (other): SSL negotiation finished successfully
        SSL Connection Established
        [ttls] eaptls_process returned 13
        ++[eap] returns handled
        Sending Access-Challenge of id 1 to 192.168.1.3 port 32777
        EAP-Message = 0x0105004515800000003b140301000101160301003034a486d8966d41cd37c59248c94f49154ad12fb37a110eede1a5aaba0f10bdf406862cfb279bfdf7d9255ed4b83d7014
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x94215fb790244acd45d98454623e2c2b
        Finished request 4.
        Going to the next request
        Waking up in 4.9 seconds.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=273
        Cleaning up request 4 ID 1 with timestamp +25
        WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
        WARNING: !! EAP session for state 0x94215fb790244acd did not finish!
        WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
        WARNING: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        State = 0x94215fb790244acd45d98454623e2c2b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x0205008f1580000000851703010080e9c572c5c0c62b307dda87c740eccd3c857f9f0e873b66027f1a2d6c51393b5cda2e7545f50dcc284fecf7820da49c435e37e97fe311c0b3b3156cd6e9d8d3f7fba9fb4b31c085b12f9725b5e227a3c93c3e56f334d4d9d5d8e635ec8f397abf608ae8b10bce5f9a66d9d52a15140a34e9e4f6b24e09bc1e9602359797ca1b53
        Message-Authenticator = 0x6d2b616ca1f36e48bf97173dbe2df119

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 5 length 143
        [eap] Continuing tunnel setup.
        ++[eap] returns ok
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] Request found, released from the list
        [eap] EAP/ttls
        [eap] processing type ttls
        [ttls] Authenticate
        [ttls] processing EAP-TLS
          TLS Length 133
        [ttls] Length Included
        [ttls] eaptls_verify returned 11
        [ttls] eaptls_process returned 7
        [ttls] Session established.  Proceeding to decode tunneled attributes.
        [ttls] Got tunneled request
        User-Name = "iPad"
        MS-CHAP-Challenge = 0x093490bc65840024aba84788d4c925b0
        MS-CHAP2-Response = 0x2900323f20a14542a33cd3688fdbc05c59790000000000000000a1015e46a2f08832b788e34de32c764abae001d13997106a
        FreeRADIUS-Proxied-To = 127.0.0.1
        [ttls] Sending tunneled request
        User-Name = "iPad"
        MS-CHAP-Challenge = 0x093490bc65840024aba84788d4c925b0
        MS-CHAP2-Response = 0x2900323f20a14542a33cd3688fdbc05c59790000000000000000a1015e46a2f08832b788e34de32c764abae001d13997106a
        FreeRADIUS-Proxied-To = 127.0.0.1
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        server  {

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        [mschap] Found MS-CHAP attributes.  Setting 'Auth-Type  = mschap'
        ++[mschap] returns ok
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] No EAP-Message, not doing EAP
        ++[eap] returns noop
        [files] users: Matched entry iPad at line 97
        ++[files] returns ok
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[daily] returns noop
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[weekly] returns noop
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[monthly] returns noop
        rlm_counter: Entering module authorize code
        rlm_counter: Could not find Check item value pair
        ++[forever] returns noop
        rlm_checkval: Item Name: Calling-Station-Id, Value: a46706941f29
        rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
        ++[checkval] returns notfound
        ++[expiration] returns noop
        ++[logintime] returns noop
        [pap] WARNING: Auth-Type already set.  Not setting to PAP
        ++[pap] returns noop
        Found Auth-Type = MSCHAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group MS-CHAP {...}
        [mschap] Creating challenge hash with username: iPad
        [mschap] Told to do MS-CHAPv2 for iPad with NT-Password
        [mschap] adding MS-CHAPv2 MPPE keys
        ++[mschap] returns ok
        expand:  ->
        Login OK: [iPad/<via auth-type="mschap">] (from client DDWRT port 34 cli a46706941f29 via TLS tunnel)

        Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group post-auth {...}
        ++[exec] returns noop
        } # server
        [ttls] Got tunneled reply code 2
        MS-CHAP2-Success = 0x29533d30323331463037313036394235453637324144384433303836323241413532464534453341304131
        MS-MPPE-Recv-Key = 0xcb7a8c4763ceeda8fc01cf337f19d95f
        MS-MPPE-Send-Key = 0xb5180abe5eaba9a027bb9c2788d3a770
        MS-MPPE-Encryption-Policy = 0x00000001
        MS-MPPE-Encryption-Types = 0x00000006
        [ttls] Got tunneled Access-Accept
        [ttls] Got MS-CHAP2-Success, tunneling it to the client in a challenge.
        ++[eap] returns handled
        Sending Access-Challenge of id 1 to 192.168.1.3 port 32777
        EAP-Message = 0x0106005f1580000000551703010050133518df9e7df1d120d561933a4b10717cadf25efa4b79d6a27af8a79b1a85f9d3874761a3b49231003304c538cf901deef171379ee87f731f42fdef2f10cd96b0e9acd65bf5a7ffd1ee64980f9ee0f4
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x94215fb791274acd45d98454623e2c2b
        Finished request 5.
        Going to the next request
        Waking up in 4.9 seconds.
        rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=1, length=136
        Cleaning up request 5 ID 1 with timestamp +29
        User-Name = "iPad"
        NAS-IP-Address = 192.168.1.3
        Called-Station-Id = "c2c1c00e689e"
        Calling-Station-Id = "a46706941f29"
        NAS-Identifier = "c2c1c00e689e"
        NAS-Port = 34
        Framed-MTU = 1400
        State = 0x94215fb791274acd45d98454623e2c2b
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020600061500
        Message-Authenticator = 0x0061b2da35be299e47214ce0dbe7e4ff

        Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authorize {...}
        ++[preprocess] returns ok
        ++[chap] returns noop
        ++[mschap] returns noop
        ++[digest] returns noop
        [suffix] No '@' in User-Name = "iPad", skipping NULL due to config.
        ++[suffix] returns noop
        [ntdomain] No '' in User-Name = "iPad", skipping NULL due to config.
        ++[ntdomain] returns noop
        [eap] EAP packet type response id 6 length 6
        [eap] Continuing tunnel setup.
        ++[eap] returns ok
        Found Auth-Type = EAP

        Executing group from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group authenticate {...}
        [eap] Request found, released from the list
        [eap] EAP/ttls
        [eap] processing type ttls
        [ttls] Authenticate
        [ttls] processing EAP-TLS
        [ttls] Received TLS ACK
        [ttls] ACK handshake is finished
        [ttls] eaptls_verify returned 3
        [ttls] eaptls_process returned 3
        [ttls] Using saved attributes from the original Access-Accept
        [eap] Freeing handler
        ++[eap] returns ok
        expand:  ->
        Login OK: [iPad/<via auth-type="EAP">] (from client DDWRT port 34 cli a46706941f29)

        Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default

        +- entering group post-auth {...}
        ++[exec] returns noop
        Sending Access-Accept of id 1 to 192.168.1.3 port 32777
        MS-MPPE-Recv-Key = 0xe4a80c1afc4de09ba8cdeb129584bc73f261c65d2584c914eda9f5c7da46fb9c
        MS-MPPE-Send-Key = 0x9c2d77fa68aa2e2aa533669a550422a3b4e2ce15cf07415c447d7679f08c9889
        EAP-Message = 0x03060004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "iPad"
        Finished request 6.
        Going to the next request
        Waking up in 4.9 seconds.
        Cleaning up request 6 ID 1 with timestamp +29
        Ready to process requests.</via></via>

        
        When I tap "renew the lease" on the iPad the internet works for an another minute then internet stop again to work but the ipad not disconnect from wifi…
        1 Reply Last reply Reply Quote 0
        • M
          Mazzokun
          last edited by Jan 31, 2013, 7:28 AM

          And this is my Mac log..

          Ready to process requests.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=121
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x0200000901694d6163
          	Message-Authenticator = 0x9c13a03c07eab38a110a59e874aac850
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 0 length 9
          [eap] No EAP Start, assuming it's an on-going EAP conversation
          ++[eap] returns updated
          [files] users: Matched entry iMac at line 93
          ++[files] returns ok
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[daily] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[weekly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[monthly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[forever] returns noop
          rlm_checkval: Item Name: Calling-Station-Id, Value: 6470020d9a60
          rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
          ++[checkval] returns notfound
          ++[expiration] returns noop
          ++[logintime] returns noop
          [pap] WARNING: Auth-Type already set.  Not setting to PAP
          ++[pap] returns noop
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] EAP Identity
          [eap] processing type tls
          [tls] Initiate
          [tls] Start returned 1
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x010100061520
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0x1382b4531383a10a15b5f944c410db05
          Finished request 0.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=258
          Cleaning up request 0 ID 0 with timestamp +19
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0x1382b4531383a10a15b5f944c410db05
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x0201008015800000007616030100710100006d030151098d55a1e9f1029eddfe94d5826dabc35538e36d55033adea4d9a38fa1d5c100003200ffc00ac009c007c008c014c013c011c012c004c005c002c003c00ec00fc00cc00d002f000500040035000a00330039001601000012000a00080006001700180019000b00020100
          	Message-Authenticator = 0xb38e5665f025282cdd55e467378bc591
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 1 length 128
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
            TLS Length 118
          [ttls] Length Included
          [ttls] eaptls_verify returned 11 
          [ttls]     (other): before/accept initialization
          [ttls]     TLS_accept: before/accept initialization
          [ttls] <<< TLS 1.0 Handshake [length 0071], ClientHello  
          [ttls]     TLS_accept: SSLv3 read client hello A
          [ttls] >>> TLS 1.0 Handshake [length 0031], ServerHello  
          [ttls]     TLS_accept: SSLv3 write server hello A
          [ttls] >>> TLS 1.0 Handshake [length 085f], Certificate  
          [ttls]     TLS_accept: SSLv3 write certificate A
          [ttls] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
          [ttls]     TLS_accept: SSLv3 write server done A
          [ttls]     TLS_accept: SSLv3 flush data
          [ttls]     TLS_accept: Need to read more data: SSLv3 read client certificate A
          In SSL Handshake Phase 
          In SSL Accept mode  
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 0x7e1c99d4d260cf7162e45dd7
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0x1382b4531280a10a15b5f944c410db05
          Finished request 1.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=136
          Cleaning up request 1 ID 0 with timestamp +19
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0x1382b4531280a10a15b5f944c410db05
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020200061500
          	Message-Authenticator = 0x6578b31271da2ff6dde8d4919c6a41af
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 2 length 6
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
          [ttls] Received TLS ACK
          [ttls] ACK handshake fragment handler
          [ttls] eaptls_verify returned 1 
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 0x3081928014ac3e27e1ee72a134ac1eff279ba44eadc42f8e23a177a4753073310b300906035504061302495431123010060355040813094c6f6d626172646961310e300c060355040713054372656d61310e300c060355040a13054c41303337311c301a06092a864886f70d010901160d776966694063726e65772e697431123010060355040313094153492043724e6577820100300c0603551d13040530030101ff300d06092a864886f70d010105050003820101004a8160c41cb815ff4d18004e6b5b6577aa1dafae6d2df70468cb60ce283a2a7377e43ae5e94c85a9aeefc0fe39006f44d853511b0a53923b2fd9021331fca457eb2e6ab807bd
          	EAP-Message = 0xb8960c9c801097dd1e941b16
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0x1382b4531181a10a15b5f944c410db05
          Finished request 2.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=136
          Cleaning up request 2 ID 0 with timestamp +19
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0x1382b4531181a10a15b5f944c410db05
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020300061500
          	Message-Authenticator = 0xb2da3df775ec12ab2444101216280070
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 3 length 6
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
          [ttls] Received TLS ACK
          [ttls] ACK handshake fragment handler
          [ttls] eaptls_verify returned 1 
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x010400c11580000008a390f514b521b67360c591cc78f7ecd97594a7823a57db3373fd940fd3cc0b47871454e476139cc53356ff2d30133229385a11432d34662a879b24a86e3d7b66f2f78dde1089628b4313c842ddea969da40440d6624a5c936878a6bb52a45745d9738a680b983bec2b70a5ff5a26bb113fa383deaf90199ad05aba595ab4841a72885bd534e0b8e6dcb71ee801c81fb7b191ab6d675094af7420b81075b8a8f5cced9b47e2dab1732a68f759d5497b16030100040e000000
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0x1382b4531086a10a15b5f944c410db05
          Finished request 3.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=338
          Cleaning up request 3 ID 0 with timestamp +19
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0x1382b4531086a10a15b5f944c410db05
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020400d01580000000c616030100861000008200807519ef6cceff086f5962e26838788737a663c820392d1ac0984721aef30ed723e3121fc67619c5092261418f9e51c6ad7dd13d777cb9b717dcc532289aca026efa1158093f90f83d5605fa62c950ca9a454bdda956f9e2a30dbcbb220d6308c6cf7102a6a3f343f03b282902d5ce3f3b5b08f18045f2fde0a1912d3c3f8474ce1403010001011603010030b3fc54f8577174dbdb756eaed7bb01c4a76dcc243253bd5eaaf4b53aae7786b567ceb9bc6939d26f75bb407a84a441f6
          	Message-Authenticator = 0x1375ab587846a1b863e131ffead4d770
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 4 length 208
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
            TLS Length 198
          [ttls] Length Included
          [ttls] eaptls_verify returned 11 
          [ttls] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
          [ttls]     TLS_accept: SSLv3 read client key exchange A
          [ttls] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
          [ttls] <<< TLS 1.0 Handshake [length 0010], Finished  
          [ttls]     TLS_accept: SSLv3 read finished A
          [ttls] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
          [ttls]     TLS_accept: SSLv3 write change cipher spec A
          [ttls] >>> TLS 1.0 Handshake [length 0010], Finished  
          [ttls]     TLS_accept: SSLv3 write finished A
          [ttls]     TLS_accept: SSLv3 flush data
          [ttls]     (other): SSL negotiation finished successfully
          SSL Connection Established 
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x0105004515800000003b1403010001011603010030deb0819e1dd9d78b553158e57147f6013cb6fb491a52fe3124275b891d43bcbfd5b186690c3d3e7700441a4592e2c979
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0x1382b4531787a10a15b5f944c410db05
          Finished request 4.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=273
          Cleaning up request 4 ID 0 with timestamp +19
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0x1382b4531787a10a15b5f944c410db05
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x0205008f1580000000851703010080e169a44d3e65f0149ef956cc91a1b62133eeaab1da6e23203c5c98320ae38f3d03adf4db9cda266899e118c939b4764a3b571a22d467d4d0986812b0717323d61c91c64c0074eb7efa372c3baf43101d05656f0c0e6a6afc813f544dcf75da09c907b455862201f72fdb7fcaccc99bf00ca852ec36e95e504c054bdc649db15a
          	Message-Authenticator = 0xb013f9209430b2c372e3aeb7f61f9dfc
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 5 length 143
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
            TLS Length 133
          [ttls] Length Included
          [ttls] eaptls_verify returned 11 
          [ttls] eaptls_process returned 7 
          [ttls] Session established.  Proceeding to decode tunneled attributes.
          [ttls] Got tunneled request
          	User-Name = "iMac"
          	MS-CHAP-Challenge = 0xcc6298cba8b161bb9d0a4838d5eca2e2
          	MS-CHAP2-Response = 0xb2005c6e16fc1911a9b0edc83554da5ca61300000000000000005ef4841a62476db0ef14b3f8a5cca03e5476d29e76e8ca8b
          	FreeRADIUS-Proxied-To = 127.0.0.1
          [ttls] Sending tunneled request
          	User-Name = "iMac"
          	MS-CHAP-Challenge = 0xcc6298cba8b161bb9d0a4838d5eca2e2
          	MS-CHAP2-Response = 0xb2005c6e16fc1911a9b0edc83554da5ca61300000000000000005ef4841a62476db0ef14b3f8a5cca03e5476d29e76e8ca8b
          	FreeRADIUS-Proxied-To = 127.0.0.1
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	NAS-Port-Type = Wireless-802.11
          server  {
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          [mschap] Found MS-CHAP attributes.  Setting 'Auth-Type  = mschap'
          ++[mschap] returns ok
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] No EAP-Message, not doing EAP
          ++[eap] returns noop
          [files] users: Matched entry iMac at line 93
          ++[files] returns ok
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[daily] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[weekly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[monthly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[forever] returns noop
          rlm_checkval: Item Name: Calling-Station-Id, Value: 6470020d9a60
          rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
          ++[checkval] returns notfound
          ++[expiration] returns noop
          ++[logintime] returns noop
          [pap] WARNING: Auth-Type already set.  Not setting to PAP
          ++[pap] returns noop
          Found Auth-Type = MSCHAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group MS-CHAP {...}
          [mschap] Creating challenge hash with username: iMac
          [mschap] Told to do MS-CHAPv2 for iMac with NT-Password
          [mschap] adding MS-CHAPv2 MPPE keys
          ++[mschap] returns ok
          	expand:  -> 
          Login OK: [iMac/<via auth-type="mschap">] (from client DDWRT port 55 cli 6470020d9a60 via TLS tunnel) 
          # Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group post-auth {...}
          ++[exec] returns noop
          } # server 
          [ttls] Got tunneled reply code 2
          	MS-CHAP2-Success = 0xb2533d41314344433146424339424435323734353730343636344643343630383038383943423046354546
          	MS-MPPE-Recv-Key = 0x3ee5a67f518f8b217f447340af5ba72b
          	MS-MPPE-Send-Key = 0x316bd72d945b07ebc91e2b3189cc1851
          	MS-MPPE-Encryption-Policy = 0x00000001
          	MS-MPPE-Encryption-Types = 0x00000006
          [ttls] Got tunneled Access-Accept
          [ttls] Got MS-CHAP2-Success, tunneling it to the client in a challenge.
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x0106005f15800000005517030100500d6d01deb451305ab16ef800d9add4426a3c25ee51ba0f9771e0d293d3e68a5e214684d5beb70b054d7079aea5859721ab49e470079163c2d8e0ce358281f662b2325c32c168abcb5e1687b16bd5ec39
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0x1382b4531684a10a15b5f944c410db05
          Finished request 5.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=136
          Cleaning up request 5 ID 0 with timestamp +19
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0x1382b4531684a10a15b5f944c410db05
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020600061500
          	Message-Authenticator = 0x82131b8787036731112f17082ec2f991
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 6 length 6
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
          [ttls] Received TLS ACK
          [ttls] ACK handshake is finished
          [ttls] eaptls_verify returned 3 
          [ttls] eaptls_process returned 3 
          [ttls] Using saved attributes from the original Access-Accept
          [eap] Freeing handler
          ++[eap] returns ok
          	expand:  -> 
          Login OK: [iMac/<via auth-type="EAP">] (from client DDWRT port 55 cli 6470020d9a60) 
          # Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group post-auth {...}
          ++[exec] returns noop
          Sending Access-Accept of id 0 to 192.168.1.3 port 32777
          	MS-MPPE-Recv-Key = 0xacd8f46fa3435add4f44b48f482ae3ca0c6f45def714628188203c1d1381fabd
          	MS-MPPE-Send-Key = 0x9c50355c211a8a7cb426fd13937679181d243de4798118f1ebebee1ecf0697c7
          	EAP-Message = 0x03060004
          	Message-Authenticator = 0x00000000000000000000000000000000
          	User-Name = "iMac"
          Finished request 6.
          Going to the next request
          Waking up in 4.9 seconds.
          Cleaning up request 6 ID 0 with timestamp +19
          Ready to process requests.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=121
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x0200000901694d6163
          	Message-Authenticator = 0x26d2daa1b284cba289422cb984790f54
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 0 length 9
          [eap] No EAP Start, assuming it's an on-going EAP conversation
          ++[eap] returns updated
          [files] users: Matched entry iMac at line 93
          ++[files] returns ok
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[daily] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[weekly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[monthly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[forever] returns noop
          rlm_checkval: Item Name: Calling-Station-Id, Value: 6470020d9a60
          rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
          ++[checkval] returns notfound
          ++[expiration] returns noop
          ++[logintime] returns noop
          [pap] WARNING: Auth-Type already set.  Not setting to PAP
          ++[pap] returns noop
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] EAP Identity
          [eap] processing type tls
          [tls] Initiate
          [tls] Start returned 1
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x010100061520
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0xa5bdaa33a5bcbf7615f7075b5970b3e6
          Finished request 7.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=258
          Cleaning up request 7 ID 0 with timestamp +53
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0xa5bdaa33a5bcbf7615f7075b5970b3e6
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x0201008015800000007616030100710100006d030151098d77823e23f340fce39737aca017500381c02046d067aa630d5e0dc3331b00003200ffc00ac009c007c008c014c013c011c012c004c005c002c003c00ec00fc00cc00d002f000500040035000a00330039001601000012000a00080006001700180019000b00020100
          	Message-Authenticator = 0x353ad6a41749680aef6eff6fe4cc15e7
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 1 length 128
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
            TLS Length 118
          [ttls] Length Included
          [ttls] eaptls_verify returned 11 
          [ttls]     (other): before/accept initialization
          [ttls]     TLS_accept: before/accept initialization
          [ttls] <<< TLS 1.0 Handshake [length 0071], ClientHello  
          [ttls]     TLS_accept: SSLv3 read client hello A
          [ttls] >>> TLS 1.0 Handshake [length 0031], ServerHello  
          [ttls]     TLS_accept: SSLv3 write server hello A
          [ttls] >>> TLS 1.0 Handshake [length 085f], Certificate  
          [ttls]     TLS_accept: SSLv3 write certificate A
          [ttls] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
          [ttls]     TLS_accept: SSLv3 write server done A
          [ttls]     TLS_accept: SSLv3 flush data
          [ttls]     TLS_accept: Need to read more data: SSLv3 read client certificate A
          In SSL Handshake Phase 
          In SSL Accept mode  
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 0x7e1c99d4d260cf7162e45dd7
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0xa5bdaa33a4bfbf7615f7075b5970b3e6
          Finished request 8.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=136
          Cleaning up request 8 ID 0 with timestamp +53
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0xa5bdaa33a4bfbf7615f7075b5970b3e6
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020200061500
          	Message-Authenticator = 0x0deceb8155ceaab4e82ac3791c2f3420
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 2 length 6
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
          [ttls] Received TLS ACK
          [ttls] ACK handshake fragment handler
          [ttls] eaptls_verify returned 1 
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 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
          	EAP-Message = 0x3081928014ac3e27e1ee72a134ac1eff279ba44eadc42f8e23a177a4753073310b300906035504061302495431123010060355040813094c6f6d626172646961310e300c060355040713054372656d61310e300c060355040a13054c41303337311c301a06092a864886f70d010901160d776966694063726e65772e697431123010060355040313094153492043724e6577820100300c0603551d13040530030101ff300d06092a864886f70d010105050003820101004a8160c41cb815ff4d18004e6b5b6577aa1dafae6d2df70468cb60ce283a2a7377e43ae5e94c85a9aeefc0fe39006f44d853511b0a53923b2fd9021331fca457eb2e6ab807bd
          	EAP-Message = 0xb8960c9c801097dd1e941b16
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0xa5bdaa33a7bebf7615f7075b5970b3e6
          Finished request 9.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=136
          Cleaning up request 9 ID 0 with timestamp +53
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0xa5bdaa33a7bebf7615f7075b5970b3e6
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020300061500
          	Message-Authenticator = 0x60c86b636fd6ea3523e9a202e489b241
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 3 length 6
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
          [ttls] Received TLS ACK
          [ttls] ACK handshake fragment handler
          [ttls] eaptls_verify returned 1 
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x010400c11580000008a390f514b521b67360c591cc78f7ecd97594a7823a57db3373fd940fd3cc0b47871454e476139cc53356ff2d30133229385a11432d34662a879b24a86e3d7b66f2f78dde1089628b4313c842ddea969da40440d6624a5c936878a6bb52a45745d9738a680b983bec2b70a5ff5a26bb113fa383deaf90199ad05aba595ab4841a72885bd534e0b8e6dcb71ee801c81fb7b191ab6d675094af7420b81075b8a8f5cced9b47e2dab1732a68f759d5497b16030100040e000000
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0xa5bdaa33a6b9bf7615f7075b5970b3e6
          Finished request 10.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=338
          Cleaning up request 10 ID 0 with timestamp +53
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0xa5bdaa33a6b9bf7615f7075b5970b3e6
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020400d01580000000c6160301008610000082008069173536bfc7ee7791552aacdda0fd3882cccf197f2b475cdd65eb8914f8ab8745241a58ac414edaac3b7ae66c3b29a53851c104a39706a834cc8d9971218652dff6b445a052bfde4edfab808c5f7d8f5bf218bf9a70413c0379c60c03adaaf3e5e3f3e731be93c4b6b0c778effd2f045b3e80de55328a8b452584c19eb5c7641403010001011603010030e7cf383fbf1575586b46afc7b602b833819a628c3bb5b2b09e6d5185952e72bb11285e2ef0bbfd05b4c59b57b2385414
          	Message-Authenticator = 0xf82c8d3c547ad0eab25ca945056bdcd3
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 4 length 208
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
            TLS Length 198
          [ttls] Length Included
          [ttls] eaptls_verify returned 11 
          [ttls] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
          [ttls]     TLS_accept: SSLv3 read client key exchange A
          [ttls] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
          [ttls] <<< TLS 1.0 Handshake [length 0010], Finished  
          [ttls]     TLS_accept: SSLv3 read finished A
          [ttls] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
          [ttls]     TLS_accept: SSLv3 write change cipher spec A
          [ttls] >>> TLS 1.0 Handshake [length 0010], Finished  
          [ttls]     TLS_accept: SSLv3 write finished A
          [ttls]     TLS_accept: SSLv3 flush data
          [ttls]     (other): SSL negotiation finished successfully
          SSL Connection Established 
          [ttls] eaptls_process returned 13 
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x0105004515800000003b14030100010116030100309f29009a79ccfde28f7ae3a940426ec7d38df955b8c2f612a939f267e2a93664f867d3d23400685f9515bce439da11ca
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0xa5bdaa33a1b8bf7615f7075b5970b3e6
          Finished request 11.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=273
          Cleaning up request 11 ID 0 with timestamp +53
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0xa5bdaa33a1b8bf7615f7075b5970b3e6
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x0205008f15800000008517030100800c5401a9205d3b231283767efe5cab504bbc8ea3bf23a0252e6e2fb0e25c44052167860c7a038ca15d4aff84a641c68de621bfe99c581b25fbe4f206b67fe7479a67e988e7d9266f0a11fa30bc508a77fc41bd132335d8b695eb08719bcece3529a75bdaf74bdad04a9f083fedb6158227293542619d0f7eb74e2973dca89682
          	Message-Authenticator = 0xd746bd69bc1d78c782da3a672584b123
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 5 length 143
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
            TLS Length 133
          [ttls] Length Included
          [ttls] eaptls_verify returned 11 
          [ttls] eaptls_process returned 7 
          [ttls] Session established.  Proceeding to decode tunneled attributes.
          [ttls] Got tunneled request
          	User-Name = "iMac"
          	MS-CHAP-Challenge = 0x216e6d7055b6953d0c5c274e8c711562
          	MS-CHAP2-Response = 0x930032134e0db83e0e739dd1f9deab504b8b0000000000000000358813952bcb09e1da295f0db3f0c422c3b62833ea0d27ee
          	FreeRADIUS-Proxied-To = 127.0.0.1
          [ttls] Sending tunneled request
          	User-Name = "iMac"
          	MS-CHAP-Challenge = 0x216e6d7055b6953d0c5c274e8c711562
          	MS-CHAP2-Response = 0x930032134e0db83e0e739dd1f9deab504b8b0000000000000000358813952bcb09e1da295f0db3f0c422c3b62833ea0d27ee
          	FreeRADIUS-Proxied-To = 127.0.0.1
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	NAS-Port-Type = Wireless-802.11
          server  {
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          [mschap] Found MS-CHAP attributes.  Setting 'Auth-Type  = mschap'
          ++[mschap] returns ok
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] No EAP-Message, not doing EAP
          ++[eap] returns noop
          [files] users: Matched entry iMac at line 93
          ++[files] returns ok
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[daily] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[weekly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[monthly] returns noop
          rlm_counter: Entering module authorize code
          rlm_counter: Could not find Check item value pair
          ++[forever] returns noop
          rlm_checkval: Item Name: Calling-Station-Id, Value: 6470020d9a60
          rlm_checkval: Could not find attribute named Calling-Station-Id in check pairs
          ++[checkval] returns notfound
          ++[expiration] returns noop
          ++[logintime] returns noop
          [pap] WARNING: Auth-Type already set.  Not setting to PAP
          ++[pap] returns noop
          Found Auth-Type = MSCHAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group MS-CHAP {...}
          [mschap] Creating challenge hash with username: iMac
          [mschap] Told to do MS-CHAPv2 for iMac with NT-Password
          [mschap] adding MS-CHAPv2 MPPE keys
          ++[mschap] returns ok
          	expand:  -> 
          Login OK: [iMac/<via auth-type="mschap">] (from client DDWRT port 55 cli 6470020d9a60 via TLS tunnel) 
          # Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group post-auth {...}
          ++[exec] returns noop
          } # server 
          [ttls] Got tunneled reply code 2
          	MS-CHAP2-Success = 0x93533d39374131363033353637343945314339393946433543413433463645334434433344304433443941
          	MS-MPPE-Recv-Key = 0x05c970907689df9dbe77e699083a3adf
          	MS-MPPE-Send-Key = 0x82c190c2664540b58c0386a3cb0ca4e0
          	MS-MPPE-Encryption-Policy = 0x00000001
          	MS-MPPE-Encryption-Types = 0x00000006
          [ttls] Got tunneled Access-Accept
          [ttls] Got MS-CHAP2-Success, tunneling it to the client in a challenge.
          ++[eap] returns handled
          Sending Access-Challenge of id 0 to 192.168.1.3 port 32777
          	EAP-Message = 0x0106005f1580000000551703010050f9c88cad381982a1f0ae154e0f519e88b6fbcdbd7896333fb06ab6524ae714b6e2731e77747135858c4952f2f2a8c3c5a36c3f4d4d2f7330ff69d11fb10754113cfb05d8bd0983ab6e9ddbd223ba875f
          	Message-Authenticator = 0x00000000000000000000000000000000
          	State = 0xa5bdaa33a0bbbf7615f7075b5970b3e6
          Finished request 12.
          Going to the next request
          Waking up in 4.9 seconds.
          rad_recv: Access-Request packet from host 192.168.1.3 port 32777, id=0, length=136
          Cleaning up request 12 ID 0 with timestamp +53
          	User-Name = "iMac"
          	NAS-IP-Address = 192.168.1.3
          	Called-Station-Id = "c2c1c00e689e"
          	Calling-Station-Id = "6470020d9a60"
          	NAS-Identifier = "c2c1c00e689e"
          	NAS-Port = 55
          	Framed-MTU = 1400
          	State = 0xa5bdaa33a0bbbf7615f7075b5970b3e6
          	NAS-Port-Type = Wireless-802.11
          	EAP-Message = 0x020600061500
          	Message-Authenticator = 0x6c0cd455b83db547049df27c1c4d0f04
          # Executing section authorize from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authorize {...}
          ++[preprocess] returns ok
          ++[chap] returns noop
          ++[mschap] returns noop
          ++[digest] returns noop
          [suffix] No '@' in User-Name = "iMac", skipping NULL due to config.
          ++[suffix] returns noop
          [ntdomain] No '\' in User-Name = "iMac", skipping NULL due to config.
          ++[ntdomain] returns noop
          [eap] EAP packet type response id 6 length 6
          [eap] Continuing tunnel setup.
          ++[eap] returns ok
          Found Auth-Type = EAP
          # Executing group from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group authenticate {...}
          [eap] Request found, released from the list
          [eap] EAP/ttls
          [eap] processing type ttls
          [ttls] Authenticate
          [ttls] processing EAP-TLS
          [ttls] Received TLS ACK
          [ttls] ACK handshake is finished
          [ttls] eaptls_verify returned 3 
          [ttls] eaptls_process returned 3 
          [ttls] Using saved attributes from the original Access-Accept
          [eap] Freeing handler
          ++[eap] returns ok
          	expand:  -> 
          Login OK: [iMac/<via auth-type="EAP">] (from client DDWRT port 55 cli 6470020d9a60) 
          # Executing section post-auth from file /usr/local/etc/raddb/sites-enabled/default
          +- entering group post-auth {...}
          ++[exec] returns noop
          Sending Access-Accept of id 0 to 192.168.1.3 port 32777
          	MS-MPPE-Recv-Key = 0xe9344df21fd77df35a00cb75110bf1d978d4572954c5747f069ccd42fd5ecfaa
          	MS-MPPE-Send-Key = 0xe79c8437ca1b7bf9655c2312af508f4d8f747dd6023456f8049ef7c070844927
          	EAP-Message = 0x03060004
          	Message-Authenticator = 0x00000000000000000000000000000000
          	User-Name = "iMac"
          Finished request 13.
          Going to the next request
          Waking up in 4.9 seconds.
          Cleaning up request 13 ID 0 with timestamp +53
          Ready to process requests.</via></via></via></via> 
          

          I'm still on internet after 20 :o minutes…
          I can't understand wher's the problem...
          Do you understand something?? :)

          1 Reply Last reply Reply Quote 0
          • N
            Nachtfalke
            last edited by Jan 31, 2013, 10:21 AM

            Hmm,

            I am no freeradius log expert but I do not see anything strange…

            But if you say, that the WLAN connection still exists but there is a problem with the IP address then perhaps you need to search somewhere else.
            You can try to add a static IP tor your devices and try again if it then is working.

            Further tyr if this problem exists if both are connected at the same time and if it does not exist when only one device is connected (only your iPad)

            1 Reply Last reply Reply Quote 0
            • M
              Mazzokun
              last edited by Jan 31, 2013, 11:35 AM

              well.. I changed the security authentication… I use open wifi with the pfsense CaptivePortal... and... tatatadaaa.. same problem!!!!
              the mac can connect to cp and can surf internet for ALL time.. iPhone/iPad after a minute are still connect to the wifi network but can't surf internet... :'(
              than i think is a freeradius2 problem because when I used freeradius there weren't these problems...  :-[

              so.. what can I do? reinstall freeradius2?  ??? ???

              1 Reply Last reply Reply Quote 0
              • N
                Nachtfalke
                last edited by Jan 31, 2013, 12:24 PM

                Can you try to increase:
                "Expiration of EAP-Response / EAP-Request List" to lets say 120s and try again.

                I don't think it is a freeradius problem. perhaps a problem of the supplicant installed on iPad/iPhone
                If the MAC is working with the same settings and other devices do not work - then it is probably not a RADIUS issue.

                1 Reply Last reply Reply Quote 0
                • M
                  Mazzokun
                  last edited by Feb 1, 2013, 10:29 AM

                  OK, after a hard reset of pfsense and ddwrt now I've understand!! ;D ;D ;D
                  Are you good with iptables?
                  Into my ddwrt I have 2 network: public(13.3.89.X) and private (192.168.1.X).
                  but in both pfsense and ddwrt firewall I have the rule that public network ( with wpa2 enterprise) can't access private network..
                  BUT the RADIUS is into the private network!!
                  I post an example image  :D```
                  https://dl.dropbox.com/u/28376825/foto.JPG

                  So, if i put into DDWRT iptables the rule that private network can **only** access to pfsense RADIUS port than It should works..!! Do you know the iptables to do this???  :)
                  1 Reply Last reply Reply Quote 0
                  • N
                    Nachtfalke
                    last edited by Feb 1, 2013, 7:46 PM

                    Sorry, I do not have any experience with iptables.
                    Probably asking google will give you better answers ;)

                    1 Reply Last reply Reply Quote 0
                    • M
                      Mazzokun
                      last edited by Feb 2, 2013, 8:27 AM

                      It is a DDWRT Bug..!!
                      I discovered that the encryption agent is using the wrong bridge interface.
                      Thank You very much  :D
                      Now I'll go into DDWRT forum to get help for this Bug  ;)

                      1 Reply Last reply Reply Quote 0
                      10 out of 10
                      • First post
                        10/10
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received