eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Identity - ppcse01 rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled identity of ppcse01 PEAP: Setting default EAP type for tunneled EAP session. PEAP: Setting User-Name to ppcse01 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1057 modcall[authorize]: module "preprocess" returns ok for request 1057 modcall[authorize]: module "chap" returns noop for request 1057 modcall[authorize]: module "mschap" returns noop for request 1057 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1057 rlm_eap: EAP packet type response id 8 length 12 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1057 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1057 modcall: group authorize returns updated for request 1057 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1057 rlm_eap: EAP Identity rlm_eap: processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge rlm_eap: RT Modif EAP-Type = 26 EAP-LENGTH = 28 modcall[authenticate]: module "eap" returns handled for request 1057 modcall: group authenticate returns handled for request 1057 PEAP: Got tunneled Access-Challenge rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 91 modcall[authenticate]: module "eap" returns handled for request 1057 modcall: group authenticate returns handled for request 1057 Sending Access-Challenge of id 228 to 192.168.105.206:1645 EAP-Message = 0x0109006019001703010018e862a5e7ef6271ecf57a1e9b0d7895f3d803cd249e33ba0c17030100381097afd07da7fef7f5c24685be3da2111f4ba06c4422d9bff38ea5ce97eb0d2c0906622a95e2d7bd2c9faab7257840a0a976464346a142d7 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x6323b543165f673888f160fe0aa0693d Finished request 1057 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=229, length=257 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0xa68f17dcd5bedbe27ebd9e3f35c4babb EAP-Message = 0x0209008019001703010018adcd3bd07450f9095c707c6f35995d1638d062e53dba1fd61703010058131b67b9eb6cec348e4f7126023f17926e848b6ea5b3ed6bc15be32453573b52cf8eb91bf4109fa04db28c8ac509c6d5f02857c46fd2a95ca506a086e504ebc8bc0ee66dca5682f3cfe500d02a97facac36fe2eee6b96a4b NAS-Port-Type = Wireless-802.11 NAS-Port = 1886 State = 0x6323b543165f673888f160fe0aa0693d NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1058 modcall[authorize]: module "preprocess" returns ok for request 1058 modcall[authorize]: module "chap" returns noop for request 1058 modcall[authorize]: module "mschap" returns noop for request 1058 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1058 rlm_eap: EAP packet type response id 9 length 128 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1058 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1058 modcall: group authorize returns updated for request 1058 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1058 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: EAP type mschapv2 rlm_eap_peap: Tunneled data is valid. PEAP: Setting User-Name to ppcse01 PEAP: Adding old state with d7 ca Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1058 modcall[authorize]: module "preprocess" returns ok for request 1058 modcall[authorize]: module "chap" returns noop for request 1058 modcall[authorize]: module "mschap" returns noop for request 1058 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1058 rlm_eap: EAP packet type response id 9 length 66 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1058 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1058 modcall: group authorize returns updated for request 1058 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1058 rlm_eap: Request found, released from the list rlm_eap: EAP/mschapv2 rlm_eap: processing type mschapv2 Processing the authenticate section of radiusd.conf modcall: entering group Auth-Type for request 1058 rlm_mschap: Told to do MS-CHAPv2 for ppcse01 with NT-Password rlm_mschap: adding MS-CHAPv2 MPPE keys modcall[authenticate]: module "mschap" returns ok for request 1058 modcall: group Auth-Type returns ok for request 1058 MSCHAP Success rlm_eap: RT Modif EAP-Type = 26 EAP-LENGTH = 46 modcall[authenticate]: module "eap" returns handled for request 1058 modcall: group authenticate returns handled for request 1058 PEAP: Got tunneled Access-Challenge rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 107 modcall[authenticate]: module "eap" returns handled for request 1058 modcall: group authenticate returns handled for request 1058 Sending Access-Challenge of id 229 to 192.168.105.206:1645 EAP-Message = 0x010a0070190017030100183542babd1f2da63d0654ed4bc887f8fce88db4b37d0b671d1703010048b176b1a3b7223accc603b984ab5acbe247393f297ff5aa13d8832df5d7153ff90b00eeff79f9cf71959492b9bd5034267c788f82546c4b70b5aa4532ac36d589f0a6838174871dce Message-Authenticator = 0x00000000000000000000000000000000 State = 0x580cb9229e88b98b08b2f0a836e38c81 Finished request 1058 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=230, length=193 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x6ed24aef29ceb24c08bfb838b0acc769 EAP-Message = 0x020a00401900170301001890c964bc0de36ccccb9c2bf5b39b855f6d5990fc2b7fbbda17030100181cfa0fd71b904d8c356ad4993d5f64be32665d41dd985a07 NAS-Port-Type = Wireless-802.11 NAS-Port = 1886 State = 0x580cb9229e88b98b08b2f0a836e38c81 NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1059 modcall[authorize]: module "preprocess" returns ok for request 1059 modcall[authorize]: module "chap" returns noop for request 1059 modcall[authorize]: module "mschap" returns noop for request 1059 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1059 rlm_eap: EAP packet type response id 10 length 64 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1059 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1059 modcall: group authorize returns updated for request 1059 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1059 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: EAP type mschapv2 rlm_eap_peap: Tunneled data is valid. PEAP: Setting User-Name to ppcse01 PEAP: Adding old state with 5e a2 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1059 modcall[authorize]: module "preprocess" returns ok for request 1059 modcall[authorize]: module "chap" returns noop for request 1059 modcall[authorize]: module "mschap" returns noop for request 1059 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1059 rlm_eap: EAP packet type response id 10 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1059 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1059 modcall: group authorize returns updated for request 1059 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1059 rlm_eap: Request found, released from the list rlm_eap: EAP/mschapv2 rlm_eap: processing type mschapv2 rlm_eap: RT Modif EAP-Type = 0 EAP-LENGTH = 0 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 1059 modcall: group authenticate returns ok for request 1059 PEAP: Tunneled authentication was successful. rlm_eap_peap: SUCCESS rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 67 modcall[authenticate]: module "eap" returns handled for request 1059 modcall: group authenticate returns handled for request 1059 Sending Access-Challenge of id 230 to 192.168.105.206:1645 EAP-Message = 0x010b004819001703010018ca4746c4443bce7221f94074fe9cf0692fd07131da0c71b71703010020e9c8add6d7d1111bf179e2b944b59a818ff5837b2c90f62cad4466f025b309e3 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x3ff8edcb03d9a1c930fc7b4c04e7d6fe Finished request 1059 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=231, length=201 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x2990240f5ec8bb3d030639e8cd8b1e26 EAP-Message = 0x020b004819001703010018a579945a77854fc3d4857e82ff3205089854082feb0169d517030100203e30ee6f2dcd4489a6904a9dff2b803aecc3ee57f3d41c385a047f20cb4ce07c NAS-Port-Type = Wireless-802.11 NAS-Port = 1886 State = 0x3ff8edcb03d9a1c930fc7b4c04e7d6fe NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1060 modcall[authorize]: module "preprocess" returns ok for request 1060 modcall[authorize]: module "chap" returns noop for request 1060 modcall[authorize]: module "mschap" returns noop for request 1060 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1060 rlm_eap: EAP packet type response id 11 length 72 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1060 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1060 modcall: group authorize returns updated for request 1060 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1060 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Received EAP-TLV response. rlm_eap_peap: Tunneled data is valid. rlm_eap_peap: Success rlm_eap: RT Modif EAP-Type = 0 EAP-LENGTH = 0 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 1060 modcall: group authenticate returns ok for request 1060 Sending Access-Accept of id 231 to 192.168.105.206:1645 MS-MPPE-Recv-Key = 0x9b4b151f3c570921fbb6012490d6966d4191354d966967212fcf4880675b15bf MS-MPPE-Send-Key = 0xe079f449f1b3e81852a906c320529671561d997848db21cd7d9fa67edd9a9143 EAP-Message = 0x030b0004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "ppcse01" Finished request 1060 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=232, length=123 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x9c89cf090f757191ee65d788b19ca3e6 EAP-Message = 0x0202000c0170706373653031 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1061 modcall[authorize]: module "preprocess" returns ok for request 1061 modcall[authorize]: module "chap" returns noop for request 1061 modcall[authorize]: module "mschap" returns noop for request 1061 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1061 rlm_eap: EAP packet type response id 2 length 12 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1061 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1061 modcall: group authorize returns updated for request 1061 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1061 rlm_eap: EAP Identity rlm_eap: processing type leap rlm_eap_leap: Stage 2 rlm_eap_leap: Issuing AP Challenge rlm_eap_leap: Successfully initiated rlm_eap: RT Modif EAP-Type = 17 EAP-LENGTH = 18 modcall[authenticate]: module "eap" returns handled for request 1061 modcall: group authenticate returns handled for request 1061 Sending Access-Challenge of id 232 to 192.168.105.206:1645 EAP-Message = 0x01030017110100081f4369df9e03bdb170706373653031 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf46a5ed44ab5bd897034d0902a663758 Finished request 1061 Going to the next request --- Walking the entire request list --- Cleaning up request 1041 ID 212 with timestamp 43844cd4 Cleaning up request 1042 ID 213 with timestamp 43844cd4 Cleaning up request 1043 ID 214 with timestamp 43844cd4 Cleaning up request 1044 ID 215 with timestamp 43844cd4 Cleaning up request 1045 ID 216 with timestamp 43844cd4 Cleaning up request 1046 ID 217 with timestamp 43844cd4 Cleaning up request 1047 ID 218 with timestamp 43844cd4 Cleaning up request 1048 ID 219 with timestamp 43844cd4 Cleaning up request 1049 ID 220 with timestamp 43844cd4 Cleaning up request 1050 ID 221 with timestamp 43844cd4 Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=233, length=135 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x7dece7cea0ca59ace2187a4815aab6fa EAP-Message = 0x020300060319 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0xf46a5ed44ab5bd897034d0902a663758 NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1062 modcall[authorize]: module "preprocess" returns ok for request 1062 modcall[authorize]: module "chap" returns noop for request 1062 modcall[authorize]: module "mschap" returns noop for request 1062 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1062 rlm_eap: EAP packet type response id 3 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1062 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1062 modcall: group authorize returns updated for request 1062 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1062 rlm_eap: Request found, released from the list rlm_eap: EAP NAK rlm_eap: EAP-NAK asked for EAP-Type/peap rlm_eap: processing type tls rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 1 modcall[authenticate]: module "eap" returns handled for request 1062 modcall: group authenticate returns handled for request 1062 Sending Access-Challenge of id 233 to 192.168.105.206:1645 EAP-Message = 0x010400061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4dafcd2a0565270ee154741ad40a3150 Finished request 1062 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=234, length=261 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x0edfc083d20946195a3596c59c0df7fa EAP-Message = 0x0204008419800000007a16030100750100007103013e7d66999802aea606b65271513542c3011ed86e3af5dcb54d1c8dda2723cd8520c45133d645e2cd3375c931f032cf2d7c44830a0b37155ba8b71b969829fed5a6002a00160013006600150012000a0005000400070009006300650060006200610064001400110003000600080100 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0x4dafcd2a0565270ee154741ad40a3150 NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1063 modcall[authorize]: module "preprocess" returns ok for request 1063 modcall[authorize]: module "chap" returns noop for request 1063 modcall[authorize]: module "mschap" returns noop for request 1063 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1063 rlm_eap: EAP packet type response id 4 length 132 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1063 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1063 modcall: group authorize returns updated for request 1063 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1063 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0075], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0657], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone TLS_accept: SSLv3 write server done A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 1029 modcall[authenticate]: module "eap" returns handled for request 1063 modcall: group authenticate returns handled for request 1063 Sending Access-Challenge of id 234 to 192.168.105.206:1645 EAP-Message = 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 EAP-Message = 0x6d65732064496e666f726d6174696f6e73310f300d06035504031306416c6164696e301e170d3035303330323137303630355a170d3131303330313137303630355a30818e310b3009060355040613024652311830160603550408130f426f756368652064752052686f6e6531123010060355040713094d61727365696c6c653110300e060355040a1307532e4e2e432e4d312d302b060355040b1324446972656374696f6e206465732053797374656d65732064496e666f726d6174696f6e733110300e060355040313075365727665757230819f300d06092a864886f70d010101050003818d0030818902818100bd4c4e645c943579e460778c97 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x3430315a30818d310b30090603550406130246523118 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xfbfb2257d412256cf213fb0e88b4b93f Finished request 1063 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=235, length=135 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0xa21dcdba74c288ecdae4c333c9ca40b2 EAP-Message = 0x020500061900 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0xfbfb2257d412256cf213fb0e88b4b93f NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1064 modcall[authorize]: module "preprocess" returns ok for request 1064 modcall[authorize]: module "chap" returns noop for request 1064 modcall[authorize]: module "mschap" returns noop for request 1064 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1064 rlm_eap: EAP packet type response id 5 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1064 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1064 modcall: group authorize returns updated for request 1064 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1064 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 693 modcall[authenticate]: module "eap" returns handled for request 1064 modcall: group authenticate returns handled for request 1064 Sending Access-Challenge of id 235 to 192.168.105.206:1645 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x5504031306416c6164696e820900ae8982732e68f44c300c0603551d13040530030101ff300d06092a864886f70d010104050003818100c40b97fe678cd7e60b1eaebeb8b6a28a95446309861361d6fd05add2611454358a1d9e0950ceafbf1c9cd66f81121c93160c330a679eedc5921fb2e6a98b70e9c1dc69163a16aa604d55e9138a48b57c7f70cc6ec0177a8af5a7b273cdeadb460f46db79201e931fcd00fdd609e22425698b5524d23f5a88324d3a9b9a6754f316030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x177e783c987e78bed0b0d0a61d01220f Finished request 1064 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=236, length=329 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x4eb237a05890b09d3ece1ee2b36c7506 EAP-Message = 0x020600c81980000000be1603010086100000820080b855d07d77bdb8a3767fbd26ed20296146b0a7e6fdd1ac3b3e109f601684739bf5e1da5e435dab304eb59d8f13fdc518dc605f4be50bb3fc5adb22be9f8341f0849ae1a10a5ba12cc5cccf38d873561108e474a7e7e49c84251cbaa2b01e3bce7fb4221223f6fa408cf600efedac7f2ead8a54d568776b808bd8a631465e57ae1403010001011603010028e8f9e1fd7fe71aaa28147f3d17164db90fbe931c5fe7c767275690e407e0e6508633bc0cb893eb4b NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0x177e783c987e78bed0b0d0a61d01220f NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1065 modcall[authorize]: module "preprocess" returns ok for request 1065 modcall[authorize]: module "chap" returns noop for request 1065 modcall[authorize]: module "mschap" returns noop for request 1065 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1065 rlm_eap: EAP packet type response id 6 length 200 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1065 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1065 modcall: group authorize returns updated for request 1065 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1065 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange TLS_accept: SSLv3 read client key exchange A rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001] rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 read finished A rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001] TLS_accept: SSLv3 write change cipher spec A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished TLS_accept: SSLv3 write finished A TLS_accept: SSLv3 flush data (other): SSL negotiation finished successfully SSL Connection Established eaptls_process returned 13 rlm_eap_peap: EAPTLS_HANDLED rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 52 modcall[authenticate]: module "eap" returns handled for request 1065 modcall: group authenticate returns handled for request 1065 Sending Access-Challenge of id 236 to 192.168.105.206:1645 EAP-Message = 0x0107003919001403010001011603010028aee03778d0b38b03a25e0e1cb6151548fc4bcb52c74d955ee4ff30160559208013488a796822fb1a Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf55820435643ec888fce6ae2af85f1dc Finished request 1065 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=237, length=135 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0xcce391db6d8551a42c04e2e7ebf277ba EAP-Message = 0x020700061900 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0xf55820435643ec888fce6ae2af85f1dc NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1066 modcall[authorize]: module "preprocess" returns ok for request 1066 modcall[authorize]: module "chap" returns noop for request 1066 modcall[authorize]: module "mschap" returns noop for request 1066 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1066 rlm_eap: EAP packet type response id 7 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1066 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1066 modcall: group authorize returns updated for request 1066 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1066 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap_peap: EAPTLS_SUCCESS rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 67 modcall[authenticate]: module "eap" returns handled for request 1066 modcall: group authenticate returns handled for request 1066 Sending Access-Challenge of id 237 to 192.168.105.206:1645 EAP-Message = 0x010800481900170301001895f03049520571e10f963e34fec06d5f37c8fc58578d2e251703010020844e99adda50007c604589e81b23b66b0355740e66409f7698e37d2b56af0517 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x215f8500da25190d6977d3dd880b948f Finished request 1066 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=238, length=201 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x16849530dd7815325549f2f4ac94fa0c EAP-Message = 0x02080048190017030100183dd702139d594281eef0f70ed73cba9faefbe4522e98bdc11703010020249ae441f3f98227c6dca3e221f0451b40d93205157942554c4eeaf33638b5d7 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0x215f8500da25190d6977d3dd880b948f NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1067 modcall[authorize]: module "preprocess" returns ok for request 1067 modcall[authorize]: module "chap" returns noop for request 1067 modcall[authorize]: module "mschap" returns noop for request 1067 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1067 rlm_eap: EAP packet type response id 8 length 72 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1067 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1067 modcall: group authorize returns updated for request 1067 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1067 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Identity - ppcse01 rlm_eap_peap: Tunneled data is valid. PEAP: Got tunneled identity of ppcse01 PEAP: Setting default EAP type for tunneled EAP session. PEAP: Setting User-Name to ppcse01 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1067 modcall[authorize]: module "preprocess" returns ok for request 1067 modcall[authorize]: module "chap" returns noop for request 1067 modcall[authorize]: module "mschap" returns noop for request 1067 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1067 rlm_eap: EAP packet type response id 8 length 12 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1067 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1067 modcall: group authorize returns updated for request 1067 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1067 rlm_eap: EAP Identity rlm_eap: processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge rlm_eap: RT Modif EAP-Type = 26 EAP-LENGTH = 28 modcall[authenticate]: module "eap" returns handled for request 1067 modcall: group authenticate returns handled for request 1067 PEAP: Got tunneled Access-Challenge rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 91 modcall[authenticate]: module "eap" returns handled for request 1067 modcall: group authenticate returns handled for request 1067 Sending Access-Challenge of id 238 to 192.168.105.206:1645 EAP-Message = 0x0109006019001703010018746a29033dacd9578ddd30c2a4db56356c1c455e12ba108e1703010038fed9a92bf9cbb9638767d514d0b5b7a7f1c32dd48d71f79992b6aa3abedc1b57410f3bdb946c4f735edade25643bc02ee088026c172cc1dd Message-Authenticator = 0x00000000000000000000000000000000 State = 0x944b0f3e4025a877d0177cb0ac60e4fd Finished request 1067 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=239, length=257 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x094f767a521ca4a45db841a1e43740dc EAP-Message = 0x02090080190017030100186fe4e401a6d5f908c3efc365ead6200e61815e76112c75ef1703010058fbafb140ca67b90d0d09655c85b34f25bbe93c0bcbe46b9c665faf528c6fe32e7803d3df4fe83e1c8cfabca35629bff7012d668558d8fca52b79093c50812706278927a3d89f1405fe671c60823039c19a99586fcc3d23f5 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0x944b0f3e4025a877d0177cb0ac60e4fd NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1068 modcall[authorize]: module "preprocess" returns ok for request 1068 modcall[authorize]: module "chap" returns noop for request 1068 modcall[authorize]: module "mschap" returns noop for request 1068 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1068 rlm_eap: EAP packet type response id 9 length 128 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1068 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1068 modcall: group authorize returns updated for request 1068 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1068 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: EAP type mschapv2 rlm_eap_peap: Tunneled data is valid. PEAP: Setting User-Name to ppcse01 PEAP: Adding old state with 76 d4 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1068 modcall[authorize]: module "preprocess" returns ok for request 1068 modcall[authorize]: module "chap" returns noop for request 1068 modcall[authorize]: module "mschap" returns noop for request 1068 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1068 rlm_eap: EAP packet type response id 9 length 66 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1068 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1068 modcall: group authorize returns updated for request 1068 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1068 rlm_eap: Request found, released from the list rlm_eap: EAP/mschapv2 rlm_eap: processing type mschapv2 Processing the authenticate section of radiusd.conf modcall: entering group Auth-Type for request 1068 rlm_mschap: Told to do MS-CHAPv2 for ppcse01 with NT-Password rlm_mschap: adding MS-CHAPv2 MPPE keys modcall[authenticate]: module "mschap" returns ok for request 1068 modcall: group Auth-Type returns ok for request 1068 MSCHAP Success rlm_eap: RT Modif EAP-Type = 26 EAP-LENGTH = 46 modcall[authenticate]: module "eap" returns handled for request 1068 modcall: group authenticate returns handled for request 1068 PEAP: Got tunneled Access-Challenge rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 107 modcall[authenticate]: module "eap" returns handled for request 1068 modcall: group authenticate returns handled for request 1068 Sending Access-Challenge of id 239 to 192.168.105.206:1645 EAP-Message = 0x010a007019001703010018e2f9426abe83da69c8f5d51e6a508f28b64cb817ce2cdc501703010048c4c31299db9240ce7fc448bec11e5f2cc2cdb1e71824ff23a7873461f691f2c2618a467321a17aef89944eae469ed4ac7bf097d5f6a3d64e6809f169e6a8387b92ff35ff633c636a Message-Authenticator = 0x00000000000000000000000000000000 State = 0x96ca03e5a817dbd11ec472aa8f12a559 Finished request 1068 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=240, length=193 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0xd287c970ba2feed48e00bbffbc9b104a EAP-Message = 0x020a004019001703010018a26170419c8c60ed1cb35cc31ff78491fe0195e63bbd7d211703010018e05f6b3960399500d80e3be96767c200564d143f3be0e18c NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0x96ca03e5a817dbd11ec472aa8f12a559 NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1069 modcall[authorize]: module "preprocess" returns ok for request 1069 modcall[authorize]: module "chap" returns noop for request 1069 modcall[authorize]: module "mschap" returns noop for request 1069 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1069 rlm_eap: EAP packet type response id 10 length 64 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1069 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1069 modcall: group authorize returns updated for request 1069 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1069 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: EAP type mschapv2 rlm_eap_peap: Tunneled data is valid. PEAP: Setting User-Name to ppcse01 PEAP: Adding old state with df f3 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1069 modcall[authorize]: module "preprocess" returns ok for request 1069 modcall[authorize]: module "chap" returns noop for request 1069 modcall[authorize]: module "mschap" returns noop for request 1069 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1069 rlm_eap: EAP packet type response id 10 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1069 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1069 modcall: group authorize returns updated for request 1069 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1069 rlm_eap: Request found, released from the list rlm_eap: EAP/mschapv2 rlm_eap: processing type mschapv2 rlm_eap: RT Modif EAP-Type = 0 EAP-LENGTH = 0 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 1069 modcall: group authenticate returns ok for request 1069 PEAP: Tunneled authentication was successful. rlm_eap_peap: SUCCESS rlm_eap: RT Modif EAP-Type = 25 EAP-LENGTH = 67 modcall[authenticate]: module "eap" returns handled for request 1069 modcall: group authenticate returns handled for request 1069 Sending Access-Challenge of id 240 to 192.168.105.206:1645 EAP-Message = 0x010b004819001703010018a13f6abfae2b21d67077cb99ebd5d3f59e5c4c6acefcabfe1703010020b3fe70a0ee248506e3ffbd669ebabf432d7d5c3504a4f4ca60d3e6730ecfe271 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x3247aa87defc63a3ece7c477abe65126 Finished request 1069 Going to the next request Waking up in 3 seconds... rad_recv: Access-Request packet from host 192.168.105.206:1645, id=241, length=201 User-Name = "ppcse01" Framed-MTU = 1400 Called-Station-Id = "0013.c48a.b3e0" Calling-Station-Id = "0002.b3db.c6ed" Service-Type = Login-User Message-Authenticator = 0x879476ef4e9b04296799c04d0bc0ddc1 EAP-Message = 0x020b00481900170301001803b833b0804198616bc41a1ef46048950d0c0b1db774af1e170301002064123d44880784cd03ab1353343cc26b14321b2a0ca9109b124d3b15401d8d63 NAS-Port-Type = Wireless-802.11 NAS-Port = 1887 State = 0x3247aa87defc63a3ece7c477abe65126 NAS-IP-Address = 192.168.105.206 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 1070 modcall[authorize]: module "preprocess" returns ok for request 1070 modcall[authorize]: module "chap" returns noop for request 1070 modcall[authorize]: module "mschap" returns noop for request 1070 rlm_realm: No '@' in User-Name = "ppcse01", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 1070 rlm_eap: EAP packet type response id 11 length 72 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 1070 users: Matched entry ppcse01 at line 109 modcall[authorize]: module "files" returns ok for request 1070 modcall: group authorize returns updated for request 1070 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 1070 rlm_eap: Request found, released from the list rlm_eap: EAP/peap rlm_eap: processing type peap rlm_eap_peap: Authenticate rlm_eap_tls: processing TLS eaptls_verify returned 7 rlm_eap_tls: Done initial handshake eaptls_process returned 7 rlm_eap_peap: EAPTLS_OK rlm_eap_peap: Session established. Decoding tunneled attributes. rlm_eap_peap: Received EAP-TLV response. rlm_eap_peap: Tunneled data is valid. rlm_eap_peap: Success rlm_eap: RT Modif EAP-Type = 0 EAP-LENGTH = 0 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 1070 modcall: group authenticate returns ok for request 1070 Sending Access-Accept of id 241 to 192.168.105.206:1645 MS-MPPE-Recv-Key = 0x6b3c9d7d87d3e0e91bcc6d01eadd1d04bd61eaccb6cc1f28974d879bdf06b212 MS-MPPE-Send-Key = 0x0a3da097589990dc2ccce99f1c66eb176e19552f8a4a43482fd5770d8d2ca338 EAP-Message = 0x030b0004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "ppcse01" Finished request 1070 Going to the next request Waking up in 3 seconds... --- Walking the entire request list --- Cleaning up request 1051 ID 222 with timestamp 43844cd7 Cleaning up request 1052 ID 223 with timestamp 43844cd7 Cleaning up request 1053 ID 224 with timestamp 43844cd7 Cleaning up request 1054 ID 225 with timestamp 43844cd7 Cleaning up request 1055 ID 226 with timestamp 43844cd7 Cleaning up request 1056 ID 227 with timestamp 43844cd7 Cleaning up request 1057 ID 228 with timestamp 43844cd7 Cleaning up request 1058 ID 229 with timestamp 43844cd7 Cleaning up request 1059 ID 230 with timestamp 43844cd7 Cleaning up request 1060 ID 231 with timestamp 43844cd7 Waking up in 3 seconds... --- Walking the entire request list --- Cleaning up request 1061 ID 232 with timestamp 43844cda Cleaning up request 1062 ID 233 with timestamp 43844cda Cleaning up request 1063 ID 234 with timestamp 43844cda Cleaning up request 1064 ID 235 with timestamp 43844cda Cleaning up request 1065 ID 236 with timestamp 43844cda Cleaning up request 1066 ID 237 with timestamp 43844cda Cleaning up request 1067 ID 238 with timestamp 43844cda Cleaning up request 1068 ID 239 with timestamp 43844cda Cleaning up request 1069 ID 240 with timestamp 43844cda Cleaning up request 1070 ID 241 with timestamp 43844cda Nothing to do. Sleeping until we see a request.