Date: Wed, 21 Jan 2015 21:09:10 +0100 From: =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= <olivier@cochard.me> To: Adrian Chadd <adrian@freebsd.org> Cc: "freebsd-wireless@freebsd.org" <freebsd-wireless@freebsd.org> Subject: Re: Fragmented EAP ACK problem on -current Message-ID: <CA%2Bq%2BTcpdwmRHemEjQxO9FMGa8fkiYQ1_no08ktf_7v8diqwUDA@mail.gmail.com> In-Reply-To: <CA%2Bq%2BTcoBmSnQd1qEq74QZoEGfvQmkKEzyc5Ym12XC9XabqV-Kg@mail.gmail.com> References: <CA%2Bq%2BTcp5Yp0ia0oWdyTxv2ThswU9cWHcyBi1pEMvPXOpEP76dg@mail.gmail.com> <CAJ-Vmo==p-o7DUCsi0Wh9LRizmrHdrvC%2Bx70D1kT%2BYw2v=jR=A@mail.gmail.com> <CA%2Bq%2BTcoBmSnQd1qEq74QZoEGfvQmkKEzyc5Ym12XC9XabqV-Kg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
The problem was identified and have nothing to do with the wireless stack. The author of hostapd found the problem: The RADIUS UDP packet containing the client certificate is a very big packet, and was fragmented between the Authenticator and Authentication server. The first (big) UDP packet never reach to join the Authentication server (OpenVPN tunnel between)... This is why the authentication server never ACK, then Authenticator never transfer the ACK to the client. Sorry for the noise.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2Bq%2BTcpdwmRHemEjQxO9FMGa8fkiYQ1_no08ktf_7v8diqwUDA>