Intel adapters can be a little tricky.
Try switching off the power management settings for the adapters. This can
usually be found in the device driver properties for the card.
Also use the latest Intel driver for the adapter.
Good luck, I hope this helps,
Ken
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, January 03, 2004 7:01 PM
Subject: Can't authenticate EAP-TLS with Intel Adapter
Hello,
I have a Freeradius 0.9.3 installation running on a Redhat 9 machine. It
works
GREAT for my home laptop. Thanks so much for this excellent software.
I'm
running a DLink 900+ AP and my home laptop has a matching DLink 650+
PCMCIA
wireless card. I'm using EAP-TLS on Windows XP and it is working great
for that
machine.
I recently got a new Dell Latitude D600 laptop for work and I cannot seem
to get
this silly machine to correctly connect to the wireless network using
EAP-TLS.
I first tried the same certificate I created (using OpenSSL) and have been
using
on my personal laptop. It gets to Attempting Authentication and just
stays
there. I also tried creating a new certificate for this machine, but got
the
same results. I don't see anything obvious in the log file for
FreeRadius, but
I'm attaching the relevant information in hopes that someone can offer an
idea
of what might be wrong.
The new machine has a built-in Intel(R) PRO/Wireless LAN 2100 3A Mini PCI
Adapter. It is running Windows XP + SP1 and patches. I guess I'm unsure
why a
different wireless card would have trouble, as it seems to talk to the AP
just fine.
Thanks for any help you can give.
Craig
Ready to process requests
rad_recv: Access-Request packet from host 192.168.0.50:1248, id=106,
length=135
User-Name = csetera
NAS-IP-Address = 192.168.0.50
NAS-Port = 0
Called-Station-Id = 00-40-05-CA-6D-42
Calling-Station-Id = 00-04-23-53-0D-63
NAS-Identifier = DWL-900AP+
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x0201000c0163736574657261
Message-Authenticator = 0xe5b9e009b38dac2fb879dd1a06885026
modcall: entering group authorize for request 0
modcall[authorize]: module preprocess returns ok for request 0
rlm_eap: EAP packet type notification id 1 length 12
rlm_eap: EAP Start not found
modcall[authorize]: module eap returns updated for request 0
users: Matched csetera at 91
modcall[authorize]: module files returns ok for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type EAP
auth: type EAP
modcall: entering group authenticate for request 0
rlm_eap: EAP packet type notification id 1 length 12
rlm_eap: EAP Start not found
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module eap returns ok for request 0
modcall: group authenticate returns ok for request 0
Sending Access-Challenge of id 106 to 192.168.0.50:1248
EAP-Message = 0x010200060d20
Message-Authenticator = 0x
State =
0x0f1812cd9e34e3291e6614767b2ef0cf2608f73fa740ded30adc1d88ff5b012f9f5b4915
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.0.50:1248, id=107,
length=135
User-Name = csetera
NAS-IP-Address = 192.168.0.50
NAS-Port = 0
Called-Station-Id = 00-40-05-CA-6D-42
Calling-Station-Id = 00-04-23-53-0D-63
NAS-Identifier = DWL-900AP+
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x0203000c0163736574657261
Message-Authenticator = 0xb189b0090592766341676a4d888e29ea
modcall: entering group authorize for request 1
modcall[authorize]: module preprocess returns ok for request 1
rlm_eap: EAP packet type notification id 3 length 12
rlm_eap: EAP Start not found
modcall[authorize]: module eap returns updated for request 1
users: Matched csetera at 91
modcall[authorize]: module files returns ok for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type EAP
auth: type EAP
modcall: entering group authenticate for request 1
rlm_eap: EAP packet type notification id 3 length 12
rlm_eap: EAP Start not found
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module eap returns ok for request 1
modcall: group authenticate returns ok for request 1
Sending Access-Challenge of id 107 to 192.168.0.50:1248
EAP-Message = 0x010400060d20
Message-Authenticator = 0x
State =
0xc813bc0205103cd2019947a069e31de32908f73fac424fb83bd323f40336a2002c26867d
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 3 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 106 with timestamp 3ff70826
Waking up in 3