Fragmented EAP ACK problem on -current
Olivier Cochard-Labbé
olivier at cochard.me
Wed Jan 21 20:09:33 UTC 2015
The problem was identified and have nothing to do with the wireless stack.
The author of hostapd found the problem: The RADIUS UDP packet containing
the client certificate is a very big packet, and was fragmented between the
Authenticator and Authentication server. The first (big) UDP packet never
reach to join the Authentication server (OpenVPN tunnel between)... This is
why the authentication server never ACK, then Authenticator never transfer
the ACK to the client.
Sorry for the noise.
More information about the freebsd-wireless
mailing list