Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Jan 2015 21:09:10 +0100
From:      =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= <olivier@cochard.me>
To:        Adrian Chadd <adrian@freebsd.org>
Cc:        "freebsd-wireless@freebsd.org" <freebsd-wireless@freebsd.org>
Subject:   Re: Fragmented EAP ACK problem on -current
Message-ID:  <CA%2Bq%2BTcpdwmRHemEjQxO9FMGa8fkiYQ1_no08ktf_7v8diqwUDA@mail.gmail.com>
In-Reply-To: <CA%2Bq%2BTcoBmSnQd1qEq74QZoEGfvQmkKEzyc5Ym12XC9XabqV-Kg@mail.gmail.com>
References:  <CA%2Bq%2BTcp5Yp0ia0oWdyTxv2ThswU9cWHcyBi1pEMvPXOpEP76dg@mail.gmail.com> <CAJ-Vmo==p-o7DUCsi0Wh9LRizmrHdrvC%2Bx70D1kT%2BYw2v=jR=A@mail.gmail.com> <CA%2Bq%2BTcoBmSnQd1qEq74QZoEGfvQmkKEzyc5Ym12XC9XabqV-Kg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
The problem was identified and have nothing to do with the wireless stack.
The author of hostapd found the problem: The RADIUS UDP packet containing
the client certificate is a very big packet, and was fragmented between the
Authenticator and Authentication server. The first (big) UDP packet never
reach to join the Authentication server (OpenVPN tunnel between)... This is
why the authentication server never ACK, then Authenticator never transfer
the ACK to the client.

Sorry for the noise.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2Bq%2BTcpdwmRHemEjQxO9FMGa8fkiYQ1_no08ktf_7v8diqwUDA>