[strongSwan-dev] as for the test result of EAP-TTLS-Radius (it says "PASS" but seems NOT)

Andreas Steffen andreas.steffen at strongswan.org
Mon Feb 22 14:51:55 CET 2016


there are two connection setups in this scenario:

- EAP-TTLS authentication of client carol is successful because the
   passwords on the client and RADIUS side match.

- EAP-TTLS authentication of client dave fails because the passwords
   on the client and RADIUS side differ.

Best regards


On 22.02.2016 10:32, yukou katori wrote:
> Hi,
> It says "Passed" but it looks "fail" in the log:
> 205	rw-eap-ttls-radius
> <https://www.strongswan.org/uml/testresults/ikev2/rw-eap-ttls-radius/index.html>
> passed
> <https://www.strongswan.org/uml/testresults/ikev2/rw-eap-ttls-radius/console.log>
> https://www.strongswan.org/uml/testresults/ikev2/rw-eap-ttls-radius/console.log
> log:
> sending packet: from[4500] to[4500] (76 bytes)
> establishing connection 'home' failed
> No leaks detected, 1 suppressed by whitelist
> If you have PASS configuration and result, please forward to us kindly.
> Regards,
> _______________________________________________
> Dev mailing list
> Dev at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/dev

Andreas Steffen                         andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution!          www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4275 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/dev/attachments/20160222/9aa4b5cf/attachment.bin>

More information about the Dev mailing list