rad_recv: Access-Request packet from host 192.168.1.252:3981, id=211, length=156 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 EAP-Message = 0x02d3002201686f73742f4e6f7465626f6f6b2d414b2e616b2d7365727665722e6465 Message-Authenticator = 0xdc7a41517d6dec674ce6ff8219eef368 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 69 modcall[authorize]: module "preprocess" returns ok for request 69 modcall[authorize]: module "chap" returns noop for request 69 modcall[authorize]: module "mschap" returns noop for request 69 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 69 rlm_eap: EAP packet type response id 211 length 34 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 69 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 69 modcall: group authorize returns updated for request 69 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 69 rlm_eap: EAP Identity rlm_eap: processing type tls rlm_eap_tls: Requiring client certificate rlm_eap_tls: Initiate rlm_eap_tls: Start returned 1 modcall[authenticate]: module "eap" returns handled for request 69 modcall: group authenticate returns handled for request 69 Sending Access-Challenge of id 211 to 192.168.1.252:3981 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 0x01d400060d20 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa1c7c1956b9316d9f037a05c69ad25c8 Finished request 69 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.252:3982, id=212, length=220 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 State = 0xa1c7c1956b9316d9f037a05c69ad25c8 EAP-Message = 0x02d400500d800000004616030100410100003d030143bda6f2fc59b27540aac54a5085da11347df898b75c1fbbbd32fb87d3bd028f00001600040005000a000900640062000300060013001200630100 Message-Authenticator = 0x921d7a28a8db01f4270383a31a31a5e5 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 70 modcall[authorize]: module "preprocess" returns ok for request 70 modcall[authorize]: module "chap" returns noop for request 70 modcall[authorize]: module "mschap" returns noop for request 70 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 70 rlm_eap: EAP packet type response id 212 length 80 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 70 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 70 modcall: group authorize returns updated for request 70 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 70 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Length Included eaptls_verify returned 11 (other): before/accept initialization TLS_accept: before/accept initialization rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0636], Certificate TLS_accept: SSLv3 write certificate A rlm_eap_tls: >>> TLS 1.0 Handshake [length 0097], CertificateRequest TLS_accept: SSLv3 write certificate request A TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 70 modcall: group authenticate returns handled for request 70 Sending Access-Challenge of id 212 to 192.168.1.252:3982 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 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 EAP-Message = 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 EAP-Message = 0xf817d25abe024d35c17ffc70af621f65541b191bfbec9f9aba5bc7d24928526f77f2da6b575a286f0a43b07f5a12e1fddddbca277679567e12b6f02ee8d774b44e51acb80d6a0e3ef8b1ebcb5db4653ccd8db2f4b7e7329a75986fc401dc66d7158c9e2f942108f13d7f0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d01010405000381810001317dad45ec190cc10d01236b4191c0a511a18ced13da4ffe7332311b317131cec85972cbaddbc7ff19117f99d1f0a108cc012a18af4e13de1220964e2969cc330b58b40d8e9f6b80b27e39396b5d257fd3925df992dda1da5c5c8a02256b53b3ba EAP-Message = 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 EAP-Message = 0x024445311a301806035504081311426164656e2d5775 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x19ea1a1f1345766703aa457041daae2b Finished request 70 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.252:3983, id=213, length=146 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 State = 0x19ea1a1f1345766703aa457041daae2b EAP-Message = 0x02d500060d00 Message-Authenticator = 0xee10e8e4485119d55ee728afed960fae Processing the authorize section of radiusd.conf modcall: entering group authorize for request 71 modcall[authorize]: module "preprocess" returns ok for request 71 modcall[authorize]: module "chap" returns noop for request 71 modcall[authorize]: module "mschap" returns noop for request 71 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 71 rlm_eap: EAP packet type response id 213 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 71 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 71 modcall: group authorize returns updated for request 71 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 71 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 71 modcall: group authenticate returns handled for request 71 Sending Access-Challenge of id 213 to 192.168.1.252:3983 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x616d696c69652d4b7261656d6572310b3009060355040b13024954311830160603550403130f63612e616b2d7365727665722e64650e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x91f7e395db011bd94c058f4560a84748 Finished request 71 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.252:3984, id=214, length=146 User-Name = "host/Notebook-AK.ak-server.de" NAS-IP-Address = 192.168.1.252 NAS-Identifier = "acess_point_siemens" NAS-Port = 29 Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 State = 0x91f7e395db011bd94c058f4560a84748 EAP-Message = 0x02d600060d00 Message-Authenticator = 0x758bcc0cd8ca8f6c1e0efaeb72062e45 Processing the authorize section of radiusd.conf modcall: entering group authorize for request 72 modcall[authorize]: module "preprocess" returns ok for request 72 modcall[authorize]: module "chap" returns noop for request 72 modcall[authorize]: module "mschap" returns noop for request 72 rlm_realm: No '@' in User-Name = "host/Notebook-AK.ak-server.de", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 72 rlm_eap: EAP packet type response id 214 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 72 users: Matched entry DEFAULT at line 207 modcall[authorize]: module "files" returns ok for request 72 modcall: group authorize returns updated for request 72 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 72 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake fragment handler eaptls_verify returned 1 eaptls_process returned 13 modcall[authenticate]: module "eap" returns handled for request 72 modcall: group authenticate returns handled for request 72 Sending Access-Challenge of id 214 to 192.168.1.252:3984 Framed-IP-Address = 255.255.255.254 Framed-MTU = 576 Service-Type = Framed-User EAP-Message = 0x01d7000a0d8000000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x60dbd80b9f0df7ce6137506618efadde Finished request 72 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 69 ID 211 with timestamp 43be0f95 Cleaning up request 70 ID 212 with timestamp 43be0f95 Cleaning up request 71 ID 213 with timestamp 43be0f95 Cleaning up request 72 ID 214 with timestamp 43be0f95 Nothing to do. Sleeping until we see a request. 979348d175f19 Finished request 47 Going to the next request Waking up in 6 seconds...