Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
log_type
stringclasses
2 values
result
stringclasses
2 values
realm_tld
stringclasses
8 values
outer_identity_type
stringclasses
5 values
realm_signal
stringclasses
6 values
failure_category
stringlengths
0
29
failure_layer
stringclasses
6 values
severity
stringclasses
5 values
rarity
stringclasses
4 values
origin
stringclasses
3 values
raw_log
stringlengths
36
76
human_explanation
stringlengths
103
190
operator_hint
stringlengths
67
144
3.0.0
radius_auth
FAIL
tr
anonymous
syntactically_valid
tls_handshake_failure
tls
high
occasional
client
eap_ttls: TLS Alert read:fatal:unknown CA
The supplicant does not trust the RADIUS server certificate. TLS handshake aborted before inner authentication.
Deploy the correct CA certificate to the client device via MDM or manual configuration. Verify the server certificate chain is complete.
3.0.0
radius_auth
FAIL
edu
institutional_format
syntactically_valid
certificate_error
tls
high
rare
institution
TLS_accept: error in SSLv3 read client certificate verify
Client presented a certificate that could not be verified. May indicate expired client cert or wrong PKI chain.
Check client certificate validity dates and issuing CA. Ensure RADIUS server trusts the client CA if mutual TLS is required.
3.0.0
radius_auth
FAIL
tr
institutional_format
syntactically_valid
eap_method_mismatch
eap
medium
occasional
client
rlm_eap: No mutually acceptable types found
Server and client could not agree on an EAP method. Client may be configured for PEAP while server enforces EAP-TTLS.
Ensure EAP-TTLS with PAP inner method is configured on the supplicant. Check EAP type ordering on the server.
3.0.0
radius_auth
FAIL
tr
institutional_format
syntactically_valid
eap_cleartext_required
eap
medium
occasional
client
rlm_eap_md5: Cleartext-Password is required for EAP-MD5 authentication
Client attempted EAP-MD5 which requires a cleartext password on the server side. Not compatible with hashed credential stores.
Disable EAP-MD5 on the client. Only EAP-TTLS or PEAP should be used in federated environments.
3.0.0
radius_auth
FAIL
edu
anonymous
syntactically_valid
eap_inner_auth_failure
eap
medium
common
client
Login incorrect (eap_ttls_pap: User not found)
Inner PAP authentication failed. Username or password is incorrect, or the user does not exist in the home server database.
Verify credentials at the home RADIUS server. Check user database synchronization if LDAP/AD backend is used.
3.0.0
radius_auth
FAIL
tr
institutional_format
syntactically_valid
policy_reject
policy
medium
common
institution
Login incorrect (No Auth-Type found)
Authentication request was received but no authentication method was selected by policy. Likely a realm routing or module configuration issue.
Review realm handling and Auth-Type assignment in the authorize section. Ensure the correct module is triggered for this realm.
3.0.0
fticks
FAIL
com
institutional_format
well_known_public_domain
policy_reject
policy
low
common
client
F-TICKS/eduroam/1.0#RESULT=FAIL#REALM=<public-mail-domain>#
Request uses a well-known public email domain (e.g. gmail, hotmail) as the realm. These are rejected by federation policy as they do not represent institutional identities.
Educate users to configure their supplicant with their institutional credentials, not personal email accounts.
3.0.0
fticks
FAIL
net
numeric_identifier
auto_generated_pattern
auto_generated_realm_rejected
policy
low
occasional
client
F-TICKS/eduroam/1.0#RESULT=FAIL#REALM=<auto-generated-sim-realm>#
Realm matches a known auto-generated pattern (e.g. SIM-based or supplicant default). These do not correspond to any real institution and are dropped by federation policy.
Filter these realms at the proxy boundary. If SIM-based EAP is expected, configure appropriate realm routing for 3GPP-style realms.
3.0.0
fticks
FAIL
local
institutional_format
misrouted_local_subdomain
misrouted_local_subdomain
policy
low
rare
institution
F-TICKS/eduroam/1.0#RESULT=FAIL#REALM=<local.subdomain>#
A local or internal subdomain was incorrectly routed to the national proxy. The institution's supplicant is likely misconfigured to send requests externally instead of handling them locally.
Add a realm routing rule at the institution to handle this subdomain locally. Do not forward internal realms to the federation.
3.0.0
fticks
FAIL
de
anonymous
syntactically_valid
realm_not_found
radius_proxy
high
occasional
federation
rlm_realm: No such realm: <unknown-realm>
The proxying server has no routing rule for the requested realm. The home institution may not be registered in the federation or the realm string is mistyped.
Verify the realm is registered in the federation NAPTR/DNS or the proxy routing table. Contact the home institution administrator.
3.0.0
radius_auth
FAIL
nl
anonymous
syntactically_valid
timeout_or_no_response
radius_proxy
high
rare
federation
Reached max_requests: dropping request
The upstream home RADIUS server did not respond within the timeout window. Likely a connectivity issue, overload, or server outage at the home institution.
Check connectivity to the home institution RADIUS server. Review timeout and retry settings. Contact home institution NOC if the issue persists.
3.0.0
radius_auth
FAIL
edu
unknown
unknown
proxy_error
radius_proxy
critical
ultra_rare
federation
EAP packets of the same session received from two different upstream servers
EAP session continuity was broken because successive RADIUS packets arrived from different upstream servers. This breaks the stateful TLS tunnel.
Ensure upstream load balancers use EAP-session-aware persistence (sticky sessions). Review proxy failover configuration.
3.0.0
fticks
FAIL
org
malformed
malformed_realm
invalid_realm_format
identity
low
rare
client
F-TICKS/eduroam/1.0#RESULT=FAIL#REALM=..double.dot..example#
Realm contains invalid syntax (e.g. consecutive dots, missing TLD). Cannot be routed in the federation.
Identify the supplicant generating malformed realms and correct the 802.1X profile. Consider dropping syntactically invalid realms at the proxy.
3.0.0
fticks
OK
tr
anonymous
syntactically_valid
common
client
F-TICKS/eduroam/1.0#RESULT=OK#VISCOUNTRY=TR#
Successful authentication via roaming. Client used anonymous outer identity as recommended for privacy-preserving EAP-TTLS.
No action required. This is the expected successful authentication pattern.
3.0.0
radius_auth
OK
de
anonymous
syntactically_valid
common
federation
Login OK: [anonymous] (from client <visited-nas>)
International roaming user authenticated successfully via EAP-TTLS with anonymous outer identity. Request proxied to home institution and accepted.
No action required. Standard successful international roaming flow.

FreeRADIUS / 802.1X Authentication Failure Taxonomy Dataset

Maintained by: Gökhan Eryol · DeepWakeTech
Navigating networks, securing futures.

PyPI License: MIT GitHub


About the Author

Gökhan Eryol has over 18 years of hands-on experience operating, deploying, and supporting federated 802.1X / eduroam infrastructure. During this period he has been involved in national and international eduroam community work, participated in GÉANT conferences and working groups, and provided FreeRADIUS training and consultancy to universities and research institutions across Turkey. He currently operates independently through DeepWakeTech, offering network infrastructure consultancy, advanced troubleshooting, and FreeRADIUS specialist support.


Dataset Summary

This is a synthetic taxonomy reference dataset for FreeRADIUS / 802.1X authentication events in federated (eduroam-style) environments.

The records in this dataset were not collected from any production network. They were generated in a simulated 802.1X lab environment, guided by 18 years of operational knowledge of authentication failure patterns, misconfiguration scenarios, and federation routing behaviors observed in real-world deployments.

The dataset is designed to:

  • Document and standardize the classification of 802.1X / FreeRADIUS authentication failures
  • Provide a reusable taxonomy for researchers, operators, and tool developers
  • Serve as a reference for building detection rules, alert logic, or classification pipelines

This is a taxonomy reference dataset, not a training dataset.
Each record represents one distinct failure type or authentication pattern. The dataset is intentionally compact — it is meant to illustrate the full classification space, not to provide volume for statistical model training.
For extended datasets, annotated corpora, or collaboration on training data, contact the author via the discussion tab or through DeepWakeTech.


What is Covered

Authentication Outcomes

result Meaning
OK Authentication succeeded
FAIL Authentication failed at some layer

Log Sources

log_type Description
fticks F-TICKS/eduroam/1.0 — the GÉANT standard event logging protocol used in eduroam federations
radius_auth FreeRADIUS authentication log — per-request decision log with EAP method and failure details

Failure Categories

failure_category failure_layer Description
tls_handshake_failure tls TLS negotiation failed (e.g. unknown CA, cipher mismatch)
certificate_error tls Client or server certificate could not be validated
eap_method_mismatch eap Server and client could not agree on an EAP type
eap_inner_auth_failure eap Inner credentials (PAP/MSCHAPv2) rejected by home server
eap_cleartext_required eap Client requested EAP-MD5 which requires cleartext passwords
policy_reject policy Rejected by RADIUS policy (no Auth-Type, explicit deny, etc.)
auto_generated_realm_rejected policy Auto-generated realm (SIM-based, supplicant default) dropped by federation policy
misrouted_local_subdomain policy Internal subdomain incorrectly forwarded to national proxy
invalid_realm_format identity Realm is syntactically malformed and cannot be routed
realm_not_found radius_proxy No routing rule exists for the requested realm
timeout_or_no_response radius_proxy Home RADIUS server did not respond within timeout
proxy_error radius_proxy RADIUS proxy chain error (e.g. session split across servers)

(empty) — result is OK, no failure occurred.

Outer Identity Types

outer_identity_type Description
anonymous Explicit anonymous outer identity (anonymous@realm) — privacy-preserving, recommended
institutional_format Follows user@domain institutional email pattern
numeric_identifier Numeric-only local part (often auto-generated or SIM-derived)
malformed Syntactically invalid identity string
unknown Could not be classified

Realm Signals

realm_signal Description
syntactically_valid Realm is well-formed and could correspond to a real institution
auto_generated_pattern Matches known patterns of auto-generated realms (SIM-based, supplicant defaults)
well_known_public_domain Public email provider domain (not an institutional identity)
misrouted_local_subdomain Internal/local subdomain incorrectly sent to the federation
malformed_realm Syntactically invalid realm (double dots, missing TLD, etc.)
unknown Could not be classified

Severity and Rarity

Field Values
severity low · medium · high · critical
rarity common · occasional · rare · ultra_rare

Origin

origin Meaning
client Root cause is on the end-user device / supplicant
institution Root cause is at the home or visited institution RADIUS server
federation Root cause is in the federation proxy layer
unknown Cannot be determined from log context

Schema (v3.0.0)

Each JSONL record:

{
  "schema_version": "3.0.0",
  "log_type": "fticks | radius_auth",
  "result": "OK | FAIL",
  "realm_tld": "tr | edu | com | ...",
  "outer_identity_type": "anonymous | institutional_format | numeric_identifier | malformed | unknown",
  "realm_signal": "syntactically_valid | auto_generated_pattern | well_known_public_domain | misrouted_local_subdomain | malformed_realm | unknown",
  "failure_category": "tls_handshake_failure | certificate_error | eap_method_mismatch | ... | (empty if OK)",
  "failure_layer": "tls | eap | policy | identity | radius_proxy | (empty if OK)",
  "severity": "low | medium | high | critical | (empty if OK)",
  "rarity": "common | occasional | rare | ultra_rare",
  "origin": "client | institution | federation | unknown",
  "raw_log": "(simulated log excerpt — no real hostnames or IP addresses)",
  "human_explanation": "Plain-language description of the failure and its likely cause.",
  "operator_hint": "Practical troubleshooting guidance for network operators."
}

Sample Record

{
  "schema_version": "3.0.0",
  "log_type": "radius_auth",
  "result": "FAIL",
  "realm_tld": "tr",
  "outer_identity_type": "anonymous",
  "realm_signal": "syntactically_valid",
  "failure_category": "tls_handshake_failure",
  "failure_layer": "tls",
  "severity": "high",
  "rarity": "occasional",
  "origin": "client",
  "raw_log": "eap_ttls: TLS Alert read:fatal:unknown CA",
  "human_explanation": "The supplicant does not trust the RADIUS server certificate. TLS handshake aborted before inner authentication.",
  "operator_hint": "Deploy the correct CA certificate to the client device via MDM or manual configuration. Verify the server certificate chain is complete."
}

Coverage of This Release

This release contains 15 records, one per distinct failure/success category:

# log_type result failure_category failure_layer severity rarity
1 radius_auth FAIL tls_handshake_failure tls high occasional
2 radius_auth FAIL certificate_error tls high rare
3 radius_auth FAIL eap_method_mismatch eap medium occasional
4 radius_auth FAIL eap_cleartext_required eap medium occasional
5 radius_auth FAIL eap_inner_auth_failure eap medium common
6 radius_auth FAIL policy_reject policy medium common
7 fticks FAIL policy_reject policy low common
8 fticks FAIL auto_generated_realm_rejected policy low occasional
9 fticks FAIL misrouted_local_subdomain policy low rare
10 fticks FAIL realm_not_found radius_proxy high occasional
11 radius_auth FAIL timeout_or_no_response radius_proxy high rare
12 radius_auth FAIL proxy_error radius_proxy critical ultra_rare
13 fticks FAIL invalid_realm_format identity low rare
14 fticks OK (none) common
15 radius_auth OK (none) common

Intended Use

  • Reference taxonomy for 802.1X / eduroam failure classification
  • Building alert rules, detection logic, or log parsing pipelines
  • Academic research on federated AAA systems
  • Operator training and documentation
  • Schema interoperability for institutions processing their own RADIUS logs

Out-of-Scope Uses

  • Direct use as a machine learning training corpus (see contact note below)
  • Any attempt to re-identify individuals or institutions
  • Commercial use (CC BY-NC 4.0 license applies)

Extended Dataset / Collaboration

This release documents the classification space. For larger annotated datasets, extended rare-failure corpora, or collaboration on ML training data for 802.1X log classification, please open a Discussion on this page or reach out via DeepWakeTech.


Reproduce / Extend

The schema and taxonomy are designed to be institution-agnostic. Any organization operating a FreeRADIUS server in a federated 802.1X environment can map their own log output to this schema.

The open-source reference parser is available on PyPI:

pip install eduroam-log-parser

It parses both F-TICKS and FreeRADIUS Auth: log lines, applies deterministic SHA-256 pseudonymisation, and outputs structured JSONL records using the same taxonomy documented here.

GitHub: gokhaneryol/eduroam-log-parser
PyPI: pypi.org/project/eduroam-log-parser


License

Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)

Commercial use is not permitted without prior written agreement.


Citation

@dataset{eryol2025freeradius,
  author    = {Eryol, Gökhan},
  title     = {FreeRADIUS / 802.1X Authentication Failure Taxonomy Dataset},
  year      = {2025},
  publisher = {HuggingFace},
  url       = {https://huggingface.co/datasets/gokhaneryol/freeradius-8021x-log-dataset}
}

Dataset version: v3.0.0 — Gökhan Eryol · DeepWakeTech

Downloads last month
25