Ошибка 691: Доступ запрещен, поскольку такое имя пользователя или пароль недопустимы в этом домене.
А вот Radiusd по -xxyz пишет:
Код: Выделить всё
rad_recv: Access-Request packet from host 127.0.0.1:12336, id=216, length=69
--- Walking the entire request list ---
Waking up in 31 seconds...
Threads: total/active/spare threads = 5/0/5
Thread 1 got semaphore
Thread 1 handling request 0, (1 handled so far)
Service-Type = Framed-User
Framed-Protocol = PPP
User-Name = "testuser"
Calling-Station-Id = "192.168.0.124"
NAS-IP-Address = 192.168.0.220
NAS-Port = 0
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
radius_xlat: '/usr/abills/libexec/rauth.pl pre_auth'
Exec-Program: /usr/abills/libexec/rauth.pl pre_auth
Exec-Program output: Auth-Type := Accept
Exec-Program-Wait: value-pairs: Auth-Type := Accept
Exec-Program: returned: 0
modcall[authorize]: module "pre_auth" returns ok for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
users: Matched entry DEFAULT at line 74
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns ok for request 0
rad_check_password: Found Auth-Type Accept
rad_check_password: Auth-Type = Accept, accepting the user
radius_xlat: '/usr/abills/libexec/rauth.pl'
Exec-Program: /usr/abills/libexec/rauth.pl
Exec-Program output: Acct-Interim-Interval = 60, Session-Timeout = 708705, PPPD-Upstream-Speed-Limit = 128, Octets-Direction = 1, Framed-IP-Address = 192.168.1.137, Session-Octets-Limit = 52428800, Framed-IP-Netmask = 255.255.255.255, PPPD-Downstream-Speed-Limit = 0,
Exec-Program-Wait: value-pairs: Acct-Interim-Interval = 60, Session-Timeout = 708705, PPPD-Upstream-Speed-Limit = 128, Octets-Direction = 1, Framed-IP-Address = 192.168.1.137, Session-Octets-Limit = 52428800, Framed-IP-Netmask = 255.255.255.255, PPPD-Downstream-Speed-Limit = 0,
Exec-Program: returned: 0
Sending Access-Accept of id 216 to 127.0.0.1:12336
Acct-Interim-Interval = 60
Session-Timeout = 708705
PPPD-Upstream-Speed-Limit = 128
Octets-Direction = 1
Framed-IP-Address = 192.168.1.137
Session-Octets-Limit = 52428800
Framed-IP-Netmask = 255.255.255.255
PPPD-Downstream-Speed-Limit = 0
Finished request 0
Going to the next request
Thread 1 waiting to be assigned a request
--- Walking the entire request list ---
Cleaning up request 0 ID 216 with timestamp 45b616ce
Nothing to do. Sleeping until we see a request.
Код: Выделить всё
Jan 23 19:08:12 glagol pptpd[6090]: MGR: Launching /usr/sbin/pptpctrl to handle client
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: local address = 192.168.0.220
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: remote address = 192.168.1.1
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: pppd options file = /etc/ppp/options.pptpd
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Client 192.168.0.124 control connection started
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Received PPTP Control Message (type: 1)
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Made a START CTRL CONN RPLY packet
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: I wrote 156 bytes to the client.
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Sent packet to client
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Received PPTP Control Message (type: 7)
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Set parameters to 100000000 maxbps, 64 window size
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Made a OUT CALL RPLY packet
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Starting call (launching pppd, opening GRE)
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: pty_fd = 4
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: tty_fd = 5
Jan 23 19:08:12 glagol pptpd[6091]: CTRL (PPPD Launcher): program binary = /usr/sbin/pppd
Jan 23 19:08:12 glagol pptpd[6091]: CTRL (PPPD Launcher): local address = 192.168.0.220
Jan 23 19:08:12 glagol pptpd[6091]: CTRL (PPPD Launcher): remote address = 192.168.1.1
Jan 23 19:08:12 glagol pppd[6091]: Plugin radius.so loaded.
Jan 23 19:08:12 glagol pppd[6091]: RADIUS plugin initialized.
Jan 23 19:08:12 glagol pppd[6091]: Plugin radattr.so loaded.
Jan 23 19:08:12 glagol pppd[6091]: RADATTR plugin initialized.
Jan 23 19:08:12 glagol pppd[6091]: Plugin /usr/lib/pptpd/pptpd-logwtmp.so loaded.
Jan 23 19:08:12 glagol pppd[6091]: pptpd-logwtmp: $Version$
Jan 23 19:08:12 glagol pppd[6091]: pppd 2.4.3 started by root, uid 0
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: I wrote 32 bytes to the client.
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Sent packet to client
Jan 23 19:08:12 glagol pppd[6091]: using channel 29
Jan 23 19:08:12 glagol pppd[6091]: Using interface ppp0
Jan 23 19:08:12 glagol pppd[6091]: Connect: ppp0 <--> /dev/pts/7
Jan 23 19:08:12 glagol pppd[6091]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <auth chap MS-v2> <magic 0xfee11d2f> <pcomp> <accomp>]
Jan 23 19:08:12 glagol syslog-ng[4763]: Changing permissions on special file /dev/xconsole
Jan 23 19:08:12 glagol syslog-ng[4763]: Changing permissions on special file /dev/tty10
Jan 23 19:08:12 glagol pptpd[6090]: GRE: Bad checksum from pppd.
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Received PPTP Control Message (type: 15)
Jan 23 19:08:12 glagol pptpd[6090]: CTRL: Got a SET LINK INFO packet with standard ACCMs
Jan 23 19:08:12 glagol pppd[6091]: rcvd [LCP ConfReq id=0x0 <mru 1400> <magic 0x10e45569> <pcomp> <accomp> <callback CBCP>]
Jan 23 19:08:12 glagol pppd[6091]: sent [LCP ConfRej id=0x0 <callback CBCP>]
Jan 23 19:08:12 glagol pppd[6091]: rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0x10e45569> <pcomp> <accomp>]
Jan 23 19:08:12 glagol pppd[6091]: sent [LCP ConfAck id=0x1 <mru 1400> <magic 0x10e45569> <pcomp> <accomp>]
Jan 23 19:08:14 glagol pppd[6091]: sent [LCP ConfReq id=0x1 <asyncmap 0x0> <auth chap MS-v2> <magic 0xfee11d2f> <pcomp> <accomp>]
Jan 23 19:08:14 glagol pptpd[6090]: CTRL: Received PPTP Control Message (type: 15)
Jan 23 19:08:14 glagol pptpd[6090]: CTRL: Ignored a SET LINK INFO packet with real ACCMs!
Jan 23 19:08:14 glagol pppd[6091]: rcvd [LCP ConfAck id=0x1 <asyncmap 0x0> <auth chap MS-v2> <magic 0xfee11d2f> <pcomp> <accomp>]
Jan 23 19:08:14 glagol pppd[6091]: sent [LCP EchoReq id=0x0 magic=0xfee11d2f]
Jan 23 19:08:14 glagol pppd[6091]: sent [CHAP Challenge id=0xb8 <b0296e873d0ba1fb35a99ab62120fec7>, name = "glagol"]
Jan 23 19:08:14 glagol pppd[6091]: rcvd [LCP code=0xc id=0x2 10 e4 55 69 4d 53 52 41 53 56 35 2e 31 30]
Jan 23 19:08:14 glagol pppd[6091]: sent [LCP CodeRej id=0x2 0c 02 00 12 10 e4 55 69 4d 53 52 41 53 56 35 2e 31 30]
Jan 23 19:08:14 glagol pppd[6091]: rcvd [LCP code=0xc id=0x3 10 e4 55 69 4d 53 52 41 53 2d 31 2d 49 54]
Jan 23 19:08:14 glagol pppd[6091]: sent [LCP CodeRej id=0x3 0c 03 00 12 10 e4 55 69 4d 53 52 41 53 2d 31 2d 49 54]
Jan 23 19:08:14 glagol pppd[6091]: rcvd [LCP EchoRep id=0x0 magic=0x10e45569]
Jan 23 19:08:14 glagol pppd[6091]: rcvd [CHAP Response id=0xb8 <8384a056ecec04bfa18d733d85fecf470000000000000000ce16e1c914a37680b10e99835412f5029fc52a8e9261f2d600>, name = "testuser"]
Jan 23 19:08:14 glagol pppd[6091]: rc_avpair_new: unknown attribute 11
Jan 23 19:08:14 glagol pppd[6091]: rc_avpair_new: unknown attribute 25
Jan 23 19:08:15 glagol pppd[6091]: rc_avpair_gen: received unknown attribute 85 of length 4: 0x0000003C
Jan 23 19:08:15 glagol pppd[6091]: RADATTR plugin wrote 5 line(s) to file /var/run/radattr.ppp0.
Jan 23 19:08:15 glagol pppd[6091]:
Jan 23 19:08:15 glagol pppd[6091]: Peer testuser failed CHAP authentication
Jan 23 19:08:15 glagol pppd[6091]: sent [CHAP Failure id=0xb8 ""]
Jan 23 19:08:15 glagol pppd[6091]: sent [LCP TermReq id=0x4 "Authentication failed"]
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Received PPTP Control Message (type: 15)
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Got a SET LINK INFO packet with standard ACCMs
Jan 23 19:08:15 glagol pppd[6091]: rcvd [LCP TermAck id=0x4 "Authentication failed"]
Jan 23 19:08:15 glagol pppd[6091]: Connection terminated.
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Received PPTP Control Message (type: 12)
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Made a CALL DISCONNECT RPLY packet
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Received CALL CLR request (closing call)
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Reaping child PPP[6091]
Jan 23 19:08:15 glagol pppd[6091]: RADATTR plugin removed file /var/run/radattr.ppp0.
Jan 23 19:08:15 glagol pppd[6091]: Exit.
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Client 192.168.0.124 control connection finished
Jan 23 19:08:15 glagol pptpd[6090]: CTRL: Exiting now
Jan 23 19:08:15 glagol pptpd[31512]: MGR: Reaped child 6090
Jan 23 19:08:17 glagol ifup: No configuration found for ppp0
Jan 23 19:08:18 glagol ifdown: No configuration found for ppp0
Jan 23 19:08:18 glagol ifdown: Nevertheless the interface will be shut down.
Jan 23 19:08:18 glagol ifdown-ppp: failed to bring interface ppp0 down
Jan 23 19:08:18 glagol ifdown-ppp: failed to bring interface ppp0 down