[strongSwan-dev] as for the test result of EAP-TTLS-Radius (it says "PASS" but seems NOT)

yukou katori k10lie.tech at yahoo.co.uk
Mon Feb 22 15:00:31 CET 2016

Sorry, I missed it! I found it.

    On Monday, 22 February 2016, 22:51, Andreas Steffen <andreas.steffen at strongswan.org> wrote:


there are two connection setups in this scenario:

- EAP-TTLS authentication of client carol is successful because the
  passwords on the client and RADIUS side match.

- EAP-TTLS authentication of client dave fails because the passwords
  on the client and RADIUS side differ.

Best regards


On 22.02.2016 10:32, yukou katori wrote:
> Hi,
> It says "Passed" but it looks "fail" in the log:
> 205    rw-eap-ttls-radius
> <https://www.strongswan.org/uml/testresults/ikev2/rw-eap-ttls-radius/index.html>
> passed
> <https://www.strongswan.org/uml/testresults/ikev2/rw-eap-ttls-radius/console.log>
> https://www.strongswan.org/uml/testresults/ikev2/rw-eap-ttls-radius/console.log
> log:
> sending packet: from[4500] to[4500] (76 bytes)
> establishing connection 'home' failed
> No leaks detected, 1 suppressed by whitelist
> If you have PASS configuration and result, please forward to us kindly.
> Regards,
> _______________________________________________
> Dev mailing list
> Dev at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/dev

Andreas Steffen                        andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution!          www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/dev/attachments/20160222/57372f2b/attachment.html>

More information about the Dev mailing list