I ran the following test on my Radhat (Fodora 6) server to test eap-tls (after I started radiusd): ./eapol_test -c ../network -a 127.0.0.1 -p1812 -s secret -r 1 It failed after some handshake with the server: ....... EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=213) - Flags 0x80 SSL: TLS Message Length: 1227 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: Certificate verification failed, error 18 (self signed certificate) depth 0 for '/C=US/ST=California/L=Oak Park/O=Jins Company/OU=Engineering/CN=jinlu/[EMAIL PROTECTED]' SSL: (where=0x4008 ret=0x230) SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server certificate B OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed ........ The configuration is
network={ ssid="roofnet" key_mgmt=WPA-EAP eap=TLS ca_cert="/etc/pki/CA/cacert.pem" identity="jinlu" client_cert="/etc/pki/tls/misc/cert-clt.pem" private_key="/etc/pki/tls/misc/cert-key.pem" private_key_passwd="......" } where the certificates are created based on a standard procedure. Could someone shed some light into the problem (unknown CA...)? Thanks in advance for your help. For your information, I include the long test output in the following (after removing some lines). ---------------------------------------------------------------------------------------------------------- [EMAIL PROTECTED] wpa_supplicant-0.5.8]# ./eapol_test -c ../network -a127.0.0.1 -p1812 -s secret -r 1 Reading configuration file '../network' Line: 1 - start of a new network block ssid - hexdump_ascii(len=7): 72 6f 6f 66 6e 65 74 roofnet key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 ca_cert - hexdump_ascii(len=22): 2f 65 74 63 2f 70 6b 69 2f 43 41 2f 63 61 63 65 /etc/pki/CA/cace 72 74 2e 70 65 6d rt.pem identity - hexdump_ascii(len=5): 6a 69 6e 6c 75 jinlu client_cert - hexdump_ascii(len=30): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 6d 69 73 /etc/pki/tls/mis 63 2f 63 65 72 74 2d 63 6c 74 2e 70 65 6d c/cert-clt.pem private_key - hexdump_ascii(len=30): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 6d 69 73 /etc/pki/tls/mis 63 2f 63 65 72 74 2d 6b 65 79 2e 70 65 6d c/cert-key.pem private_key_passwd - hexdump_ascii(len=8): --- line omitted --- Priority group 0 id=0 ssid='roofnet' Authentication server 127.0.0.1:1812 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using real identity - hexdump_ascii(len=5): 6a 69 6e 6c 75 jinlu EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=10) TX EAP -> RADIUS - hexdump(len=10): 02 00 00 0a 01 6a 69 6e 6c 75 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len=5): 6a 69 6e 6c 75 Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=0 length=118 Attribute 1 (User-Name) length=7 Value: 'jinlu' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=12 Value: 02 00 00 0a 01 6a 69 6e 6c 75 Attribute 80 (Message-Authenticator) length=18 Value: 4d 62 5a c4 38 ed f1 b8 7a 98 48 67 4b 37 64 57 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=0 length=64 Attribute 79 (EAP-Message) length=8 Value: 01 01 00 06 0d 20 Attribute 80 (Message-Authenticator) length=18 Value: 4b e0 7f d9 8c 4a d5 07 3f de d0 d3 87 9e 4c c3 Attribute 24 (State) length=18 Value: 7a 7d 47 98 47 26 f2 04 bb 85 c6 f5 ce ba 05 11 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=1 len=6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: Initialize selected EAP method: vendor 0 method 13 (TLS) TLS: Trusted root certificate(s) loaded OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib OpenSSL: SSL_use_certificate_file (PEM) --> OK OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094068:asn1 encoding routines:d2i_ASN1_SET:bad tag OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK SSL: Private key loaded successfully CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-TLS: Start SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 101 bytes pending from ssl_out SSL: 101 bytes left to be sent out (of total 101 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=107) TX EAP -> RADIUS - hexdump(len=107): 02 01 00 6b 0d 00 16 03 01 00 60 01 00 00 5c 03 01 46 bb fa f5 f7 67 fd cb 52 99 b3 03 5f 34 51 9e 0f 29 0d 60 ed 34 63 c7 dc a1 5e 2f cb d9 07 f6 00 00 34 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 66 00 05 00 04 00 63 00 62 00 61 00 15 00 12 00 09 00 65 00 64 00 60 00 14 00 11 00 08 00 06 00 03 02 01 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=1 length=233 Attribute 1 (User-Name) length=7 Value: 'jinlu' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=109 Value: 02 01 00 6b 0d 00 16 03 01 00 60 01 00 00 5c 03 01 46 bb fa f5 f7 67 fd cb 52 99 b3 03 5f 34 51 9e 0f 29 0d 60 ed 34 63 c7 dc a1 5e 2f cb d9 07 f6 00 00 34 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 66 00 05 00 04 00 63 00 62 00 61 00 15 00 12 00 09 00 65 00 64 00 60 00 14 00 11 00 08 00 06 00 03 02 01 00 Attribute 24 (State) length=18 Value: 7a 7d 47 98 47 26 f2 04 bb 85 c6 f5 ce ba 05 11 Attribute 80 (Message-Authenticator) length=18 Value: b0 84 c6 41 88 20 b7 26 24 39 a0 b1 e9 85 ff e9 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1100 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=1 length=1100 Attribute 79 (EAP-Message) length=255 Value: 01 02 04 0a 0d c0 00 00 04 cb 16 03 01 00 4a 02 00 00 46 03 01 46 bb fa f5 57 38 38 bf 2a e4 bb 09 14 5e 6a 8a 9f 3b b2 20 3d 76 ad 16 7a 06 63 d9 35 87 c4 73 20 a6 ef c4 e3 0b 74 12 65 ab c5 57 65 12 fe 0a 3d 07 bd 48 42 ea 62 f4 a2 b3 34 31 10 3a 26 9e 64 00 39 01 16 03 01 02 c9 0b 00 02 c5 00 02 c2 00 02 bf 30 82 02 bb 30 82 02 24 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66 6f 72 6e 69 61 31 11 30 0f 06 03 55 04 07 13 08 4f 61 6b 20 50 61 72 6b 31 15 30 13 06 03 55 04 0a 13 0c 4a 69 6e 73 20 43 6f 6d 70 61 6e 79 31 14 30 12 06 03 55 04 0b 13 0b 45 6e 67 69 6e 65 65 72 69 6e 67 31 0e 30 0c 06 03 55 04 03 13 05 6a 69 6e 6c 75 31 Attribute 79 (EAP-Message) length=255 Value: 22 30 20 06 09 2a 86 48 86 f7 0d 01 09 01 16 13 6a 69 6e 6c 75 38 35 39 31 40 79 61 68 6f 6f 2e 63 6f 6d 30 1e 17 0d 30 37 30 37 31 39 31 31 31 38 32 32 5a 17 0d 30 38 30 37 31 38 31 31 31 38 32 32 5a 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66 6f 72 6e 69 61 31 11 30 0f 06 03 55 04 07 13 08 4f 61 6b 20 50 61 72 6b 31 15 30 13 06 03 55 04 0a 13 0c 4a 69 6e 73 20 43 6f 6d 70 61 6e 79 31 14 30 12 06 03 55 04 0b 13 0b 45 6e 67 69 6e 65 65 72 69 6e 67 31 0e 30 0c 06 03 55 04 03 13 05 6a 69 6e 6c 75 31 22 30 20 06 09 2a 86 48 86 f7 0d 01 09 01 16 13 6a 69 6e 6c 75 38 35 39 31 40 79 61 68 6f 6f 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 ac 5d dd 1b Attribute 79 (EAP-Message) length=255 Value: 4a c0 83 9e 76 98 29 d5 c8 5c 9c 31 70 8a 19 ec b3 01 35 45 c8 c5 10 53 58 6a 29 81 b0 3b ab 03 4b 34 71 fa 9d dc 53 59 7f ba c6 43 75 da bc 87 85 3e 6f ac a3 cf 8b 53 cd ea 40 ea 28 ed ea 63 1f f1 bc 69 cb 04 03 b3 02 d6 e4 b9 6d 7d c8 4d ea 18 b6 f2 ca f7 3a fa d5 64 1b 9e ae 42 8f e0 85 1f 9f 5c 41 50 d9 63 d5 e3 5d 7a ba ab 14 52 42 72 7f 47 bf 37 c6 be 40 8e b4 e3 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 88 07 66 f2 ce 74 08 a4 be 06 35 5f e8 74 92 56 fb 54 89 cb fd 7e 3e 13 f9 14 03 2b 85 9d 12 66 26 fb b2 95 37 5d d8 c9 c3 af 12 8a 01 ed d6 f8 cf a8 a4 01 65 a5 82 b7 02 c6 01 23 2e 2f ba 1e 1f a8 6d d2 c0 d7 62 92 a2 ad 88 e9 ea 98 88 14 Attribute 79 (EAP-Message) length=255 Value: d4 40 e7 01 88 ef ae ac 1e 29 1c e3 4d 51 59 1e f8 aa 1d ed 80 09 8b 1c da 97 a4 14 83 e6 03 20 6d cc a8 f8 63 f8 00 71 92 4a c7 de 3b 71 a5 39 16 03 01 01 0d 0c 00 01 09 00 40 f4 55 ff 48 c7 dd e1 e9 a1 9c 2d 4d 0a 1b d4 5c 56 e6 6c 13 3a 11 c0 9e 59 20 42 9b 7d 56 f5 f8 4f f0 68 9d c3 57 4c 0d c0 90 75 2d 86 cc 4a d1 5c 4d 81 ac e2 ba 90 23 86 cc 30 26 aa 17 ca 0b 00 01 02 00 40 7f 8a 85 b5 af 2e 76 e8 56 a0 fd 41 e6 cb 05 2d 17 4e 9a eb 47 08 6d 75 5e ef 29 3d d7 42 18 df 21 5b 9b 56 cf fa 7a c0 8a 88 46 00 fe 27 a3 92 fd 30 4a 6e 82 3e 26 ee 69 5e e5 ce 9f 78 f7 a1 00 80 8c 1a 55 2f d9 b2 0b 6a fb 27 15 f8 a4 af b6 4a c5 1f 24 49 5d 2c 50 60 20 7c 9a 0d 70 61 cf b8 20 b3 c6 7b 78 b9 ba 13 9e 48 8c 67 be 18 9b 31 5e 72 ac a9 1a f0 ac 75 0a 2b d5 Attribute 79 (EAP-Message) length=24 Value: bd 99 51 4b a9 51 ed 4f dd 9d f3 58 bb 68 b0 84 64 09 56 82 18 40 Attribute 80 (Message-Authenticator) length=18 Value: 12 59 88 7a 60 55 f3 ec 87 2d cc 1e b5 30 87 1c Attribute 24 (State) length=18 Value: 02 94 35 6e ba 17 63 c8 36 be fd ca b0 bd 0e b2 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=2 len=1034) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1034) - Flags 0xc0 SSL: TLS Message Length: 1227 SSL: Need 203 bytes more input data SSL: Building ACK EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 02 00 06 0d 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=2 length=132 Attribute 1 (User-Name) length=7 Value: 'jinlu' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 02 02 00 06 0d 00 Attribute 24 (State) length=18 Value: 02 94 35 6e ba 17 63 c8 36 be fd ca b0 bd 0e b2 Attribute 80 (Message-Authenticator) length=18 Value: c7 19 1d 9c 59 b2 71 6f 53 66 56 39 e1 d8 f8 43 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 271 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=2 length=271 Attribute 79 (EAP-Message) length=215 Value: 01 03 00 d5 0d 80 00 00 04 cb 9a e6 89 25 59 d6 a3 5a fc 29 ca b0 33 64 f1 d2 07 5f d1 18 3d 92 eb d3 8b 6e d9 5b 26 fa 18 e5 98 9b e4 96 39 24 31 48 3e 0d f0 b0 c7 9a bc 16 03 01 00 97 0d 00 00 8f 04 03 04 01 02 00 88 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66 6f 72 6e 69 61 31 15 30 13 06 03 55 04 0a 13 0c 4a 69 6e 73 20 43 6f 6d 70 61 6e 79 31 14 30 12 06 03 55 04 0b 13 0b 45 6e 67 69 6e 65 65 72 69 6e 67 31 0e 30 0c 06 03 55 04 03 13 05 6a 69 6e 6c 75 31 22 30 20 06 09 2a 86 48 86 f7 0d 01 09 01 16 13 6a 69 6e 6c 75 38 35 39 31 40 79 61 68 6f 6f 2e 63 6f 6d 0e 00 00 00 Attribute 80 (Message-Authenticator) length=18 Value: 6a b5 d5 15 78 ec 0d a6 92 50 8e 45 38 63 ba 52 Attribute 24 (State) length=18 Value: 5f 54 ce c4 d3 14 cd b3 23 76 96 b7 c4 27 2a 3e STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=3 len=213) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=213) - Flags 0x80 SSL: TLS Message Length: 1227 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: Certificate verification failed, error 18 (self signed certificate) depth 0 for '/C=US/ST=California/L=Oak Park/O=Jins Company/OU=Engineering/CN=jinlu/[EMAIL PROTECTED]' SSL: (where=0x4008 ret=0x230) SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server certificate B OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed SSL: 7 bytes pending from ssl_out SSL: Failed - tls_out available to report error SSL: 7 bytes left to be sent out (of total 7 bytes) EAP-TLS: TLS processing failed EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=13) TX EAP -> RADIUS - hexdump(len=13): 02 03 00 0d 0d 00 15 03 01 00 02 02 30 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=3 length=139 Attribute 1 (User-Name) length=7 Value: 'jinlu' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=15 Value: 02 03 00 0d 0d 00 15 03 01 00 02 02 30 Attribute 24 (State) length=18 Value: 5f 54 ce c4 d3 14 cd b3 23 76 96 b7 c4 27 2a 3e Attribute 80 (Message-Authenticator) length=18 Value: c1 6a 58 d8 74 f7 5f dc 07 9d 85 6f 8d b6 14 5d Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 STA 02:00:00:00:00:01: Resending RADIUS message (id=3) Next RADIUS client retransmit in 6 seconds Received 44 bytes from RADIUS server Received RADIUS message RADIUS message: code=3 (Access-Reject) identifier=3 length=44 Attribute 79 (EAP-Message) length=6 Value: 04 03 00 04 Attribute 80 (Message-Authenticator) length=18 Value: a2 c8 1a 01 9b 4b 9b 3f 98 29 ee c0 74 7b 37 6a STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=4 id=3 len=4) from RADIUS server: EAP Failure EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Failure EAP: EAP entering state FAILURE CTRL-EVENT-EAP-FAILURE EAP authentication failed EAPOL: SUPP_PAE entering state HELD EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state FAIL EAPOL: SUPP_BE entering state IDLE eapol_sm_cb: success=0 EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit ENGINE: engine deinit MPPE keys OK: 0 mismatch: 2 FAILURE -- View this message in context: http://www.nabble.com/eapol_test---failed%2C--please-help-tf4324490.html#a12315550 Sent from the OpenSSL - User mailing list archive at Nabble.com. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]