rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 43 modcall: group authenticate returns handled for request 43 Sending Access-Challenge of id 202 to 192.168.1.252:3955 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 0x01cb000a0d8000000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x985abcd6f92370288ac26e5ebfb238ab Finished request 43 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 40 ID 199 with timestamp 43be0f41 Cleaning up request 41 ID 200 with timestamp 43be0f41 Cleaning up request 42 ID 201 with timestamp 43be0f41 Cleaning up request 43 ID 202 with timestamp 43be0f41 Nothing to do. Sleeping until we see a request. rad_recv: Access-Request packet from host 192.168.1.252:3956, id=200, length=156 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 EAP-Message = 0x02c8002201686f73742f4e6f7465626f6f6b2d414b2e616b2d7365727665722e6465 Message-Authenticator = 0xbbb62720adca593d3cd474e4e48fd49d Processing the authorize section of radiusd.conf modcall: entering group authorize for request 44 modcall[authorize]: module "preprocess" returns ok for request 44 modcall[authorize]: module "chap" returns noop for request 44 modcall[authorize]: module "mschap" returns noop for request 44 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 44 rlm_eap: EAP packet type response id 200 length 34 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 44 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 44 modcall: group authorize returns updated for request 44 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 44 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 44 modcall: group authenticate returns handled for request 44 Sending Access-Challenge of id 200 to 192.168.1.252:3956 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 0x01c900060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x6e91f50fb689bd1e3e34042045fb7876 Finished request 44 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.252:3957, id=201, length=220 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 State = 0x6e91f50fb689bd1e3e34042045fb7876 EAP-Message = 0x02c900500d800000004616030100410100003d030143bda65c315bac2e6d6380caabb622395c2ec5b54b22791b5485e9ef64b3ab8100001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0xe962954313adae0ca1b3482c729a09ea Processing the authorize section of radiusd.conf modcall: entering group authorize for request 45 modcall[authorize]: module "preprocess" returns ok for request 45 modcall[authorize]: module "chap" returns noop for request 45 modcall[authorize]: module "mschap" returns noop for request 45 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 45 rlm_eap: EAP packet type response id 201 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 45 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 45 modcall: group authorize returns updated for request 45 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 45 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0636], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0097], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 45 modcall: group authenticate returns handled for request 45 Sending Access-Challenge of id 201 to 192.168.1.252:3957 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 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 EAP-Message = 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 EAP-Message = 0xf817d25abe024d35c17ffc70af621f65541b191bfbec9f9aba5bc7d24928526f77f2da6b575a286f0a43b07f5a12e1fddddbca277679567e12b6f02ee8d774b44e51acb80d6a0e3ef8b1ebcb5db4653ccd8db2f4b7e7329a75986fc401dc66d7158c9e2f942108f13d7f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d01010405000381810001317dad45ec190cc10d01236b4191c0a511a18ced13da4ffe7332311b317131cec85972cbaddbc7ff19117f99d1f0a108cc012a18af4e13de1220964e2969cc330b58b40d8e9f6b80b27e39396b5d257fd3925df992dda1da5c5c8a02256b53b3ba EAP-Message = 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 EAP-Message = 0x024445311a301806035504081311426164656e2d5775 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe6ffaeccd1403c6b3a2860c1ff5d4ec4 Finished request 45 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.252:3958, id=202, length=146 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 State = 0xe6ffaeccd1403c6b3a2860c1ff5d4ec4 EAP-Message = 0x02ca00060d00 Message-Authenticator = 0x0cd5405d3fc745dd29b3a13b19997a91 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 46 modcall[authorize]: module "preprocess" returns ok for request 46 modcall[authorize]: module "chap" returns noop for request 46 modcall[authorize]: module "mschap" returns noop for request 46 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 46 rlm_eap: EAP packet type response id 202 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 46 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 46 modcall: group authorize returns updated for request 46 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 46 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 46 modcall: group authenticate returns handled for request 46 Sending Access-Challenge of id 202 to 192.168.1.252:3958 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x040530030101ff300d06092a864886f70d01010405000381810095f919b4d9b4c6e8b2708f69d1c0929662989141f3cc577543430d80f0808d851da80aa9d05eacfbdb920fd8015e3e49b307b6f7511f3d7feb895a93da44d577dd4abc9941b71f4b10c733ed0d88d986d0051ac8b959c9edcf916f0cf2ea3d250def02e6c2af7c3620023e4255f4d59402e657823b984b5aa274b5b431c2410b16030100970d00008f020102008a0088308185310b3009060355040613024445311a301806035504081311426164656e2d5775657274656d6265726731193017060355040713104b65686c2d476f6c647363686575657231183016060355040a130f46 EAP-Message = 0x616d696c69652d4b7261656d6572310b3009060355040b13024954311830160603550403130f63612e616b2d7365727665722e64650e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x759ae134d3df2e4fa36030c95f4d25de Finished request 46 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.252:3959, id=203, length=146 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 State = 0x759ae134d3df2e4fa36030c95f4d25de EAP-Message = 0x02cb00060d00 Message-Authenticator = 0xe4a2325847600d5a4121fe00cbf01adc Processing the authorize section of radiusd.conf modcall: entering group authorize for request 47 modcall[authorize]: module "preprocess" returns ok for request 47 modcall[authorize]: module "chap" returns noop for request 47 modcall[authorize]: module "mschap" returns noop for request 47 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 47 rlm_eap: EAP packet type response id 203 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 47 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 47 modcall: group authorize returns updated for request 47 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 47 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 47 modcall: group authenticate returns handled for request 47 Sending Access-Challenge of id 203 to 192.168.1.252:3959 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 0x01cc000a0d8000000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4a5bc8d1702d1267d77979348d175f19 Finished request 47 Going to the next request Waking up in 6 seconds...