Ready to process requests Received Access-Request Id 45 from 192.168.254.99:57264 to 192.168.211.189:1812 length 212 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 98 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x0200000e017269636b6a616d6573 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xd1cd2c250afd85b309b6f040675c2877 (13) # Executing section authorize from file /etc/raddb/sites-enabled/default (13) authorize { (13) filter_username filter_username { (13) if (User-Name =~ /@.*@/ ) (13) if (User-Name =~ /@.*@/ ) -> FALSE (13) if (User-Name =~ /\\.\\./ ) (13) if (User-Name =~ /\\.\\./ ) -> FALSE (13) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (13) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (13) if (User-Name =~ /\\.$/) (13) if (User-Name =~ /\\.$/) -> FALSE (13) if (User-Name =~ /@\\./) (13) if (User-Name =~ /@\\./) -> FALSE (13) } # filter_username filter_username = notfound (13) [preprocess] = ok (13) [chap] = noop (13) [mschap] = noop (13) [digest] = noop (13) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (13) suffix : No such realm "NULL" (13) [suffix] = noop (13) [files] = noop SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (13) eap : EAP packet type response id 0 length 14 (13) eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (13) [eap] = ok (13) } # authorize = ok (13) Found Auth-Type = EAP SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (13) # Executing group from file /etc/raddb/sites-enabled/default (13) authenticate { (13) eap : Peer sent Identity (1) (13) eap : Calling eap_md5 to process EAP data (13) eap_md5 : Issuing MD5 Challenge (13) eap : New EAP session, adding 'State' attribute to reply 0xe5450573e54401cf (13) [eap] = handled (13) } # authenticate = handled Sending Access-Challenge Id 45 from 192.168.211.189:1812 to 192.168.254.99:57264 EAP-Message = 0x010100160410b493ca2dbc531be9588b6550fce88dcd Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe5450573e54401cf78bc7b330539f845 (13) Finished request Waking up in 0.3 seconds. Received Access-Request Id 46 from 192.168.254.99:57264 to 192.168.211.189:1812 length 222 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 98 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x020100060319 State = 0xe5450573e54401cf78bc7b330539f845 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xdf79927db96a6b65775098e4ea7a783d (14) # Executing section authorize from file /etc/raddb/sites-enabled/default (14) authorize { (14) filter_username filter_username { (14) if (User-Name =~ /@.*@/ ) (14) if (User-Name =~ /@.*@/ ) -> FALSE (14) if (User-Name =~ /\\.\\./ ) (14) if (User-Name =~ /\\.\\./ ) -> FALSE (14) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (14) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (14) if (User-Name =~ /\\.$/) (14) if (User-Name =~ /\\.$/) -> FALSE (14) if (User-Name =~ /@\\./) (14) if (User-Name =~ /@\\./) -> FALSE (14) } # filter_username filter_username = notfound (14) [preprocess] = ok (14) [chap] = noop (14) [mschap] = noop (14) [digest] = noop (14) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (14) suffix : No such realm "NULL" (14) [suffix] = noop (14) [files] = noop SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp: Unknown value 'Challenge' for attribute 'Post-Auth-Type' (14) eap : EAP packet type response id 1 length 6 (14) eap : No EAP Start, assuming it's an on-going EAP conversation SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (14) [eap] = updated (14) sql : EXPAND %{User-Name} (14) sql : --> rickjames (14) sql : SQL-User-Name set to 'rickjames' rlm_sql (sql): Reserved connection (4) (14) sql : EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id (14) sql : --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'rickjames' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'rickjames' ORDER BY id' (14) sql : User found in radcheck table (14) sql : Check items matched (14) sql : EXPAND SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id (14) sql : --> SELECT id, username, attribute, value, op FROM radreply WHERE username = 'rickjames' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, username, attribute, value, op FROM radreply WHERE username = 'rickjames' ORDER BY id' (14) sql : EXPAND SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority (14) sql : --> SELECT groupname FROM radusergroup WHERE username = 'rickjames' ORDER BY priority rlm_sql (sql): Executing query: 'SELECT groupname FROM radusergroup WHERE username = 'rickjames' ORDER BY priority' (14) sql : User found in the group table (14) sql : EXPAND SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id (14) sql : --> SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'TestSite-Premium' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = 'TestSite-Premium' ORDER BY id' (14) sql : Group "TestSite-Premium" check items matched (14) sql : EXPAND SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id (14) sql : --> SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'TestSite-Premium' ORDER BY id rlm_sql (sql): Executing query: 'SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = 'TestSite-Premium' ORDER BY id' (14) sql : Group "TestSite-Premium" reply items processed rlm_sql (sql): Released connection (4) rlm_sql (sql): Closing connection (3): Hit idle_timeout, was idle for 178 seconds rlm_sql (sql): You probably need to lower "min" rlm_sql_mysql: Socket destructor called, closing socket rlm_sql (sql): Closing connection (2): Hit idle_timeout, was idle for 178 seconds rlm_sql (sql): You probably need to lower "min" rlm_sql_mysql: Socket destructor called, closing socket rlm_sql (sql): Closing connection (1): Hit idle_timeout, was idle for 178 seconds rlm_sql (sql): You probably need to lower "min" rlm_sql_mysql: Socket destructor called, closing socket (14) [sql] = ok (14) [expiration] = noop (14) [logintime] = noop (14) WARNING: pap : Auth-Type already set. Not setting to PAP (14) [pap] = noop (14) } # authorize = updated (14) Found Auth-Type = EAP (14) # Executing group from file /etc/raddb/sites-enabled/default (14) authenticate { (14) eap : Expiring EAP session with state 0xe5450573e54401cf (14) eap : Finished EAP session with state 0xe5450573e54401cf (14) eap : Previous EAP request found for state 0xe5450573e54401cf, released from the list (14) eap : Peer sent NAK (3) (14) eap : Found mutually acceptable type PEAP (25) (14) eap : Calling eap_peap to process EAP data (14) eap_peap : Initiate (14) eap_peap : Start returned 1 (14) eap : New EAP session, adding 'State' attribute to reply 0xe5450573e4471ccf (14) [eap] = handled (14) } # authenticate = handled Sending Access-Challenge Id 46 from 192.168.211.189:1812 to 192.168.254.99:57264 Ruckus-Role = 'TestSite-Premium' EAP-Message = 0x010200061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe5450573e4471ccf78bc7b330539f845 (14) Finished request Waking up in 0.3 seconds. Received Access-Request Id 47 from 192.168.254.99:57264 to 192.168.211.189:1812 length 487 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 98 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 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 State = 0xe5450573e4471ccf78bc7b330539f845 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xd702524f256e74ef4985d77297e87f47 (15) # Executing section authorize from file /etc/raddb/sites-enabled/default (15) authorize { (15) filter_username filter_username { (15) if (User-Name =~ /@.*@/ ) (15) if (User-Name =~ /@.*@/ ) -> FALSE (15) if (User-Name =~ /\\.\\./ ) (15) if (User-Name =~ /\\.\\./ ) -> FALSE (15) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (15) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (15) if (User-Name =~ /\\.$/) (15) if (User-Name =~ /\\.$/) -> FALSE (15) if (User-Name =~ /@\\./) (15) if (User-Name =~ /@\\./) -> FALSE (15) } # filter_username filter_username = notfound (15) [preprocess] = ok (15) [chap] = noop (15) [mschap] = noop (15) [digest] = noop (15) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (15) suffix : No such realm "NULL" (15) [suffix] = noop (15) [files] = noop SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp: Unknown value 'Challenge' for attribute 'Post-Auth-Type' (15) eap : EAP packet type response id 2 length 269 (15) eap : Continuing tunnel setup SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (15) [eap] = ok (15) } # authorize = ok (15) Found Auth-Type = EAP SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (15) # Executing group from file /etc/raddb/sites-enabled/default (15) authenticate { (15) eap : Expiring EAP session with state 0xe5450573e4471ccf (15) eap : Finished EAP session with state 0xe5450573e4471ccf (15) eap : Previous EAP request found for state 0xe5450573e4471ccf, released from the list (15) eap : Peer sent PEAP (25) (15) eap : EAP PEAP (25) (15) eap : Calling eap_peap to process EAP data (15) eap_peap : processing EAP-TLS TLS Length 259 (15) eap_peap : Length Included (15) eap_peap : eaptls_verify returned 11 (15) eap_peap : (other): before/accept initialization (15) eap_peap : TLS_accept: before/accept initialization (15) eap_peap : <<< TLS 1.0 Handshake [length 00fe], ClientHello (15) eap_peap : TLS_accept: SSLv3 read client hello A (15) eap_peap : >>> TLS 1.0 Handshake [length 005e], ServerHello (15) eap_peap : TLS_accept: SSLv3 write server hello A (15) eap_peap : >>> TLS 1.0 ChangeCipherSpec [length 0001] (15) eap_peap : TLS_accept: SSLv3 write change cipher spec A (15) eap_peap : >>> TLS 1.0 Handshake [length 0010], Finished (15) eap_peap : TLS_accept: SSLv3 write finished A (15) eap_peap : TLS_accept: SSLv3 flush data (15) eap_peap : TLS_accept: Need to read more data: SSLv3 read finished A In SSL Handshake Phase In SSL Accept mode (15) eap_peap : eaptls_process returned 13 (15) eap_peap : FR_TLS_HANDLED (15) eap : New EAP session, adding 'State' attribute to reply 0xe5450573e7461ccf (15) [eap] = handled (15) } # authenticate = handled Sending Access-Challenge Id 47 from 192.168.211.189:1812 to 192.168.254.99:57264 EAP-Message = 0x010300a41900160301005e0200005a0301530adf98538afb15d56417a12d13809a663d089a16932c80ba804598233e4249200997cfc9e31e456f3b47687295c9a0808a51db1f4ff57082b470732e0a50bd92c014000012ff01000100000b000403000102000f0001011403010001011603010030a2203ca4ae79014f540685a1072d7d700c1d62437e0ab683a741f8ec6a2af7e1e64e5dca9f033a5283aed89fb662fcf6 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe5450573e7461ccf78bc7b330539f845 (15) Finished request Waking up in 0.3 seconds. Received Access-Request Id 48 from 192.168.254.99:57264 to 192.168.211.189:1812 length 281 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 98 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x0203004119001403010001011603010030168b90ccb87ba6177e9083c1448ece8598d8ff507c8c1f95409cf6cccb02b329adea7b3024cc602d73f0aace18b977b2 State = 0xe5450573e7461ccf78bc7b330539f845 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0xc0a99a51ca3c275ae6f96c2c49b0470b (16) # Executing section authorize from file /etc/raddb/sites-enabled/default (16) authorize { (16) filter_username filter_username { (16) if (User-Name =~ /@.*@/ ) (16) if (User-Name =~ /@.*@/ ) -> FALSE (16) if (User-Name =~ /\\.\\./ ) (16) if (User-Name =~ /\\.\\./ ) -> FALSE (16) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (16) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (16) if (User-Name =~ /\\.$/) (16) if (User-Name =~ /\\.$/) -> FALSE (16) if (User-Name =~ /@\\./) (16) if (User-Name =~ /@\\./) -> FALSE (16) } # filter_username filter_username = notfound (16) [preprocess] = ok (16) [chap] = noop (16) [mschap] = noop (16) [digest] = noop (16) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (16) suffix : No such realm "NULL" (16) [suffix] = noop (16) [files] = noop SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp: Unknown value 'Challenge' for attribute 'Post-Auth-Type' (16) eap : EAP packet type response id 3 length 65 (16) eap : Continuing tunnel setup SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (16) [eap] = ok (16) } # authorize = ok (16) Found Auth-Type = EAP SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (16) # Executing group from file /etc/raddb/sites-enabled/default (16) authenticate { (16) eap : Expiring EAP session with state 0xe5450573e7461ccf (16) eap : Finished EAP session with state 0xe5450573e7461ccf (16) eap : Previous EAP request found for state 0xe5450573e7461ccf, released from the list (16) eap : Peer sent PEAP (25) (16) eap : EAP PEAP (25) (16) eap : Calling eap_peap to process EAP data (16) eap_peap : processing EAP-TLS (16) eap_peap : eaptls_verify returned 7 (16) eap_peap : Done initial handshake (16) eap_peap : <<< TLS 1.0 ChangeCipherSpec [length 0001] (16) eap_peap : <<< TLS 1.0 Handshake [length 0010], Finished (16) eap_peap : TLS_accept: SSLv3 read finished A (16) eap_peap : (other): SSL negotiation finished successfully SSL Connection Established SSL Application Data (16) eap_peap : eaptls_process returned 3 (16) eap_peap : FR_TLS_SUCCESS (16) eap_peap : Session established. Decoding tunneled attributes (16) eap_peap : Peap state TUNNEL ESTABLISHED (16) eap_peap : Skipping Phase2 because of session resumption (16) eap_peap : SUCCESS (16) eap : New EAP session, adding 'State' attribute to reply 0xe5450573e6411ccf (16) [eap] = handled (16) } # authenticate = handled Sending Access-Challenge Id 48 from 192.168.211.189:1812 to 192.168.254.99:57264 EAP-Message = 0x0104002b190017030100203d181e809532198b5e33e2c3c4227d1e4854a621bde646b4dbd2e8df4d61084b Message-Authenticator = 0x00000000000000000000000000000000 State = 0xe5450573e6411ccf78bc7b330539f845 (16) Finished request Waking up in 0.3 seconds. Received Access-Request Id 49 from 192.168.254.99:57264 to 192.168.211.189:1812 length 296 User-Name = 'rickjames' Calling-Station-Id = 'F0-7B-CB-6D-07-6D' NAS-IP-Address = 10.177.1.230 NAS-Port = 98 Called-Station-Id = '6C-AA-B3-CF-40-A9:test-eap-radius1' Service-Type = Framed-User Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 NAS-Identifier = '6C-AA-B3-CF-40-A9' Connect-Info = 'CONNECT 802.11g/n' EAP-Message = 0x02040050190017030100200c77b7f182ef86a0cababdef1c2e7584fe21c4a53caa6c7fcb538fe2f6451abc170301002041499f7de1183b664457f4dcff16203c6513349cb3d61dbb42c5566598af9cdc State = 0xe5450573e6411ccf78bc7b330539f845 Attr-26.25053.3 = 0x746573742d6561702d72616469757331 Message-Authenticator = 0x4a19069cf833322425a4247dec28f428 (17) # Executing section authorize from file /etc/raddb/sites-enabled/default (17) authorize { (17) filter_username filter_username { (17) if (User-Name =~ /@.*@/ ) (17) if (User-Name =~ /@.*@/ ) -> FALSE (17) if (User-Name =~ /\\.\\./ ) (17) if (User-Name =~ /\\.\\./ ) -> FALSE (17) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (17) if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (17) if (User-Name =~ /\\.$/) (17) if (User-Name =~ /\\.$/) -> FALSE (17) if (User-Name =~ /@\\./) (17) if (User-Name =~ /@\\./) -> FALSE (17) } # filter_username filter_username = notfound (17) [preprocess] = ok (17) [chap] = noop (17) [mschap] = noop (17) [digest] = noop (17) suffix : No '@' in User-Name = "rickjames", looking up realm NULL (17) suffix : No such realm "NULL" (17) [suffix] = noop (17) [files] = noop SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp: Unknown value 'Challenge' for attribute 'Post-Auth-Type' (17) eap : EAP packet type response id 4 length 80 (17) eap : Continuing tunnel setup SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (17) [eap] = ok (17) } # authorize = ok (17) Found Auth-Type = EAP SOFT ASSERT FAILED src/lib/valuepair.c[235]: vp (17) # Executing group from file /etc/raddb/sites-enabled/default (17) authenticate { (17) eap : Expiring EAP session with state 0xe5450573e6411ccf (17) eap : Finished EAP session with state 0xe5450573e6411ccf (17) eap : Previous EAP request found for state 0xe5450573e6411ccf, released from the list (17) eap : Peer sent PEAP (25) (17) eap : EAP PEAP (25) (17) eap : Calling eap_peap to process EAP data (17) eap_peap : processing EAP-TLS (17) eap_peap : eaptls_verify returned 7 (17) eap_peap : Done initial handshake (17) eap_peap : eaptls_process returned 7 (17) eap_peap : FR_TLS_OK (17) eap_peap : Session established. Decoding tunneled attributes (17) eap_peap : Peap state send tlv success (17) eap_peap : Received EAP-TLV response (17) eap_peap : Success (17) eap_peap : Adding cached attributes for session 0997cfc9e31e456f3b47687295c9a0808a51db1f4ff57082b470732e0a50bd92: User-Name = 'rickjames' (17) eap : Freeing handler (17) [eap] = ok (17) } # authenticate = ok (17) # Executing section post-auth from file /etc/raddb/sites-enabled/default (17) post-auth { (17) sql : EXPAND .query (17) sql : --> .query (17) sql : Using query template 'query' rlm_sql (sql): Reserved connection (4) (17) sql : EXPAND %{User-Name} (17) sql : --> rickjames (17) sql : SQL-User-Name set to 'rickjames' (17) sql : EXPAND INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S') (17) sql : --> INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'rickjames', '', 'Access-Accept', '2014-08-13 09:23:45') rlm_sql (sql): Executing query: 'INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( 'rickjames', '', 'Access-Accept', '2014-08-13 09:23:45')' rlm_sql (sql): Released connection (4) (17) [sql] = ok (17) [exec] = noop (17) remove_reply_message_if_eap remove_reply_message_if_eap { (17) if (reply:EAP-Message && reply:Reply-Message) (17) if (reply:EAP-Message && reply:Reply-Message) -> FALSE (17) else else { (17) [noop] = noop (17) } # else else = noop (17) } # remove_reply_message_if_eap remove_reply_message_if_eap = noop (17) } # post-auth = ok Sending Access-Accept Id 49 from 192.168.211.189:1812 to 192.168.254.99:57264 User-Name = 'rickjames' MS-MPPE-Recv-Key = 0x1f93b2c6c7f75ef0bb7636c75ea0f79218155b00c2a318ec929ca25b6f166a1b MS-MPPE-Send-Key = 0x743a404c99f2f9ec7e3558624014bcd92834f3e271acdd504f97360a06f78485 EAP-Message = 0x03040004 Message-Authenticator = 0x00000000000000000000000000000000 (17) Finished request Waking up in 0.3 seconds. Waking up in 4.6 seconds. (13) Cleaning up request packet ID 45 with timestamp +178 (14) Cleaning up request packet ID 46 with timestamp +178 (15) Cleaning up request packet ID 47 with timestamp +178 (16) Cleaning up request packet ID 48 with timestamp +178 (17) Cleaning up request packet ID 49 with timestamp +178 Ready to process requests