FW: wpa_supplicant problem

helas Akropolis hela80 at web.de
Thu Jun 2 07:16:05 EDT 2005


Hi all,

have no one an idee who he can help me ? Thanks again


"helas Akropolis" <hela80 at web.de> schrieb am 01.06.05 23:00:34:
> 
> 
> Hi everyone, i hope you can help me and thank you very much..
> 
> wpa-psk work fine, but when i try to use eap-ttls there ist no connection between the wpa_supplicant(wxp sp2) and the
> hostap. can anyone please tell me what i am doing wrong?
> 
> wpa_supplicant.conf:
> ctrl_interface=/var/run/wpa_supplicant
> eapol_version=1
> fast_reauth=1
> network={
> ssid="WirelessNetwork"
> key_mgmt=WPA-EAP
> eap=TTLS
> identity="wpasup"
> password="xxxxxxxxx"
> ca_cert="X:\Diplom\Implementierung\wpa_supplicant-windows-bin-0.3.8\certs\ca.crt"
> #ca_cert="X:\Diplom\Implementierung\wpa_supplicant-windows-bin-0.3.8\certs\ca.pem"
> #ca_cert="X:\Diplom\Implementierung\wpa_supplicant-windows-bin-0.3.8\certs\ca.der"
> }
> 
> ##############################################################################
> ##############################################################################
> 
> [root at localhost hostapd-0.3.7]# hostapd -dd hostapd.conf
> 
> Configuration file: hostapd.conf
> Opening raw packet socket for ifindex 5
> Using interface wlan0 with hwaddr 00:09:5b:12:0f:a5 and ssid 'WirelessNetwork'
> wlan0: RADIUS Authentication server 192.168.2.33:1812
> WPA: group state machine entering state GTK_INIT
> GMK - hexdump(len=32): 57 29 cc cf 52 66 b1 18 cf 1b ce e4 d4 63 f9 0d e4 9e 76 1a 67 0e cf 0c 0b 63 75 34 25 8a cb 8d
> GTK - hexdump(len=32): 1d 2a d8 28 30 3b f7 e2 0c 10 f8 c0 88 16 6b 6e 91 6d 3e 82 f4 7d 7e 38 a2 91 ff 4a ff 8b 33 03
> WPA: group state machine entering state SETKEYSDONE
> Flushing old station entries
> Deauthenticate all stations
> Received 342 bytes management frame
> extra data in frame (elen=0)
> unknown frame type 3
> Received 342 bytes management frame
> extra data in frame (elen=0)
> unknown frame type 3
> MGMT
> mgmt::auth
> authentication: STA=00:09:5b:98:e2:7e auth_alg=0 auth_transaction=1 status_code=0 wep=0
> New STA
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: authentication OK (open system)
> wlan0: STA 00:09:5b:98:e2:7e WPA: event 0 notification
> authentication reply: STA=00:09:5b:98:e2:7e auth_alg=0 auth_transaction=2 resp=0
> Received 30 bytes management frame
> MGMT (TX callback) ACK
> mgmt::auth cb
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: authenticated
> Received 75 bytes management frame
> MGMT
> mgmt::assoc_req
> association request: STA=00:09:5b:98:e2:7e capab_info=0x01 listen_interval=1
> new AID 1
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: association OK (aid 1)
> Received 36 bytes management frame
> MGMT (TX callback) ACK
> mgmt::assoc_resp cb
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: associated (aid 1, accounting session 429DB6F9-00000000)
> wlan0: STA 00:09:5b:98:e2:7e WPA: event 1 notification
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: start authentication
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state INITIALIZE
> wlan0: STA 00:09:5b:98:e2:7e WPA: start authentication
> WPA: 00:09:5b:98:e2:7e WPA_PTK entering state INITIALIZE
> WPA: 00:09:5b:98:e2:7e WPA_PTK_GROUP entering state IDLE
> WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION
> WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
> Wireless event: cmd=0x8c03 len=20
> Received 37 bytes management frame
> DATA
> IEEE 802.1X: 5 bytes from 00:09:5b:98:e2:7e
> IEEE 802.1X: version=1 type=1 length=0
> ignoring 1 extra octets after IEEE 802.1X packet
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAPOL-Start from STA
> wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
> WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state DISCONNECTED
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: unauthorizing port
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e CTRL_DIR entering state FORCE_BOTH
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
> IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
> IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 0, timeout 30)
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
> IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 0)
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> Received 46 bytes management frame
> DATA (TX callback) ACK
> IEEE 802.1X: 00:09:5b:98:e2:7e TX status - version=2 type=0 length=10 - ack=1
> Received 36 bytes management frame
> DATA
> IEEE 802.1X: 4 bytes from 00:09:5b:98:e2:7e
> IEEE 802.1X: version=1 type=1 length=0
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAPOL-Start from STA
> wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
> WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
> IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
> IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 1, timeout 30)
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
> IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 1)
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> Received 46 bytes management frame
> DATA (TX callback) ACK
> IEEE 802.1X: 00:09:5b:98:e2:7e TX status - version=2 type=0 length=10 - ack=1
> Received 47 bytes management frame
> DATA
> IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
> IEEE 802.1X: version=1 type=0 length=11
> EAP: code=2 identifier=0 length=11 (response)
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP Identifier of the Response-Identity does not match (was 0, expected 1) - ignored
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> Received 47 bytes management frame
> DATA
> IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
> IEEE 802.1X: version=1 type=0 length=11
> EAP: code=2 identifier=1 length=11 (response)
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=1 len=11) from STA: EAP Response-Identity (1)
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: STA identity 'wpasup'
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
> Encapsulating EAP message into a RADIUS packet
> Sending RADIUS message to authentication server
> Next RADIUS client retransmit in 3 seconds
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> Received 64 bytes from RADIUS server
> Received RADIUS message
> Received RADIUS packet matched with a pending request, round trip time 0.00 sec
> RADIUS packet matching with station 00:09:5b:98:e2:7e
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
> wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=2 len=6) from RADIUS server: EAP-Request-TTLS (21)
> IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
> IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 2)
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
> #############################################################################
> #############################################################################
> The RADIUSServer dont tel me any errors:
> 
> rad_recv: Access-Request packet from host 192.168.2.1:32768, id=0, length=161
> User-Name = "wpasup"
> NAS-IP-Address = 192.168.2.1
> NAS-Port = 1
> Called-Station-Id = "00-09-5B-12-0F-A5:WirelessNetwork"
> Calling-Station-Id = "00-09-5B-98-E2-7E"
> Framed-MTU = 1400
> NAS-Port-Type = Wireless-802.11
> Connect-Info = "CONNECT 11Mbps 802.11b"
> EAP-Message = 0x0201000b01777061737570
> Message-Authenticator = 0x2e0250f37e4e8ea80c19b5425fbf8975
> Processing the authorize section of radiusd.conf
> modcall: entering group authorize for request 0
> modcall[authorize]: module "preprocess" returns ok for request 0
> modcall[authorize]: module "chap" returns noop for request 0
> modcall[authorize]: module "mschap" returns noop for request 0
> rlm_realm: No '@' in User-Name = "wpasup", looking up realm NULL
> rlm_realm: No such realm "NULL"
> modcall[authorize]: module "suffix" returns noop for request 0
> rlm_eap: EAP packet type response id 1 length 11
> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
> modcall[authorize]: module "eap" returns updated for request 0
> users: Matched entry wpasup at line 100
> modcall[authorize]: module "files" returns ok for request 0
> modcall: group authorize returns updated for request 0
> rad_check_password: Found Auth-Type EAP
> auth: type "EAP"
> Processing the authenticate section of radiusd.conf
> modcall: entering group authenticate for request 0
> rlm_eap: EAP Identity
> rlm_eap: processing type tls
> rlm_eap_tls: Initiate
> rlm_eap_tls: Start returned 1
> modcall[authenticate]: module "eap" returns handled for request 0
> modcall: group authenticate returns handled for request 0
> Sending Access-Challenge of id 0 to 192.168.2.1:32768
> EAP-Message = 0x010200061520
> Message-Authenticator = 0x00000000000000000000000000000000
> State = 0xb5eeb1affaee2bc8145aa107b23ba0be
> Finished request 0
> Going to the next request
> --- Walking the entire request list ---
> Waking up in 6 seconds...
> rad_recv: Access-Request packet from host 192.168.2.1:32768, id=1, length=174
> User-Name = "wpasup"
> NAS-IP-Address = 192.168.2.1
> NAS-Port = 1
> Called-Station-Id = "00-09-5B-12-0F-A5:WirelessNetwork"
> Calling-Station-Id = "00-09-5B-98-E2-7E"
> Framed-MTU = 1400
> NAS-Port-Type = Wireless-802.11
> Connect-Info = "CONNECT 11Mbps 802.11b"
> EAP-Message = 0x02020006030d
> State = 0xb5eeb1affaee2bc8145aa107b23ba0be
> Message-Authenticator = 0xe5ff72c377ae7a47815759270d0fb8f5
> Processing the authorize section of radiusd.conf
> modcall: entering group authorize for request 1
> modcall[authorize]: module "preprocess" returns ok for request 1
> modcall[authorize]: module "chap" returns noop for request 1
> modcall[authorize]: module "mschap" returns noop for request 1
> rlm_realm: No '@' in User-Name = "wpasup", looking up realm NULL
> rlm_realm: No such realm "NULL"
> modcall[authorize]: module "suffix" returns noop for request 1
> rlm_eap: EAP packet type response id 2 length 6
> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
> modcall[authorize]: module "eap" returns updated for request 1
> users: Matched entry wpasup at line 100
> modcall[authorize]: module "files" returns ok for request 1
> modcall: group authorize returns updated for request 1
> rad_check_password: Found Auth-Type EAP
> auth: type "EAP"
> Processing the authenticate section of radiusd.conf
> modcall: entering group authenticate for request 1
> rlm_eap: Request found, released from the list
> rlm_eap: EAP NAK
> rlm_eap: EAP-NAK asked for EAP-Type/tls
> rlm_eap: processing type tls
> rlm_eap_tls: Requiring client certificate
> rlm_eap_tls: Initiate
> rlm_eap_tls: Start returned 1
> modcall[authenticate]: module "eap" returns handled for request 1
> modcall: group authenticate returns handled for request 1
> Sending Access-Challenge of id 1 to 192.168.2.1:32768
> EAP-Message = 0x010300060d20
> Message-Authenticator = 0x00000000000000000000000000000000
> State = 0xf31846e3989efb50921335bf62f2fe19
> Finished request 1
> Going to the next request
> .
> .
> .
> --- Walking the entire request list ---
> Cleaning up request 6 ID 6 with timestamp 429db79b
> Cleaning up request 7 ID 7 with timestamp 429db79b
> Nothing to do. Sleeping until we see a request.
> 
> ##############################################################################
> ##############################################################################
> 
> The wpa_supplicant say everytime i get connected: SSL: SSL_connect:error in SSLv3 read server hello A
> 
> X:wpa_supplicant-windows-bin-0.3.8>wpa_supplicant.exe -i \Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858} -c wpa_supplicant.conf -dd
> 
> Initializing interface '\Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858}' conf
> 'wpa_supplicant.conf' driver 'default'
> Configuration file 'wpa_supplicant.conf' -> 'X:wpa_supplicant-windows-bin-0.3.8/wpa_supplicant.conf'
> Reading configuration file 'X:wpa_supplicant-windows-bin-0.3.8/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> eapol_version=1
> ap_scan=1
> fast_reauth=1
> Line: 294 - start of a new network block
> ssid - hexdump_ascii(len=15):
> 57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b WirelessNetwork
> key_mgmt: 0x1
> eap methods - hexdump(len=2): 15 00
> anonymous_identity - hexdump_ascii(len=6):
> 77 70 61 73 75 70 wpasup
> password - hexdump_ascii(len=10): [REMOVED]
> ca_cert - hexdump_ascii(len=71):
> 58 3a 5c 44 69 70 6c 6f 6d 5c 49 6d 70 6c 65 6d X:\.....\.......
> 65 6e 74 69 65 72 75 6e 67 5c 77 70 61 5f 73 75 entierung\wpa_su
> 70 70 6c 69 63 61 6e 74 2d 77 69 6e 64 6f 77 73 pplicant-windows
> 2d 62 69 6e 2d 30 2e 33 2e 38 5c 63 65 72 74 73 -bin-0.3.8\certs
> 5c 63 61 2e 63 72 74 \ca.crt
> Priority group 0
> id=0 ssid='WirelessNetwork'
> Initializing interface (2) '\Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858}'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> NDIS: 4 adapter names found
> NDIS: 4 adapter descriptions found
> NDIS: 0 - \Device\NPF_GenericNdisWanAdapter - Generic NdisWan adapter
> NDIS: 1 - \Device\NPF_{54617D0B-61F8-4370-AB78-D0609129F1D5} - WAN (PPP/SLIP) In
> terface
> NDIS: 2 - \Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858} - NETGEAR 108 Mbps
> Wireless PC Card WG511T (Microsoft's Packet Scheduler)
> NDIS: 3 - \Device\NPF_{5C0997E9-AFF5-423C-90A7-E9D32B2E7B1B} - NET IP/1394 Minip
> ort
> NDIS: Adapter description prefix 'NETGEAR 108 Mbps Wireless PC Card WG511T'
> ndis_get_oid: oid=0xd010122 len (512) failed
> NDIS: verifying driver WPA capability
> NDIS: WPA key management supported
> NDIS: WPA-PSK key management supported
> NDIS: CCMP encryption supported
> NDIS: TKIP encryption supported
> NDIS: driver supports WPA
> NDIS: driver capabilities: key_mgmt 0x5 enc 0xc auth 0x3
> Own MAC address: 00:09:5b:98:e2:7e
> wpa_driver_ndis_set_wpa: enabled=1
> ndis_get_oid: oid=0xd010101 len (6) failed
> ndis_get_oid: oid=0xd010101 len (6) failed
> ndis_get_oid: oid=0xd010101 len (6) failed
> ndis_get_oid: oid=0xd010101 len (6) failed
> Setting scan request: 0 sec 100000 usec
> Starting AP scan (broadcast SSID)
> NDIS: turning radio on before the first scan
> EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
> ndis_get_oid: oid=0xd010101 len (6) failed
> EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
> ndis_get_oid: oid=0xd010101 len (6) failed
> EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
> RX ctrl_iface - hexdump_ascii(len=6):
> 41 54 54 41 43 48 ATTACH
> CTRL_IFACE monitor attached 127.0.0.1:2081
> ndis_get_oid: oid=0xd010101 len (6) failed
> Scan timeout - try to get results
> Scan results: 2
> Selecting BSS from priority group 0
> 0: 00:30:f1:bc:03:64 ssid=' ' wpa_ie_len=0 rsn_ie_len=0
> skip - no WPA/RSN IE
> 1: 00:09:5b:12:0f:a5 ssid='WirelessNetwork' wpa_ie_len=28 rsn_ie_len=0
> selected
> Trying to associate with 00:09:5b:12:0f:a5 (SSID='WirelessNetwork' freq=2422 MHz
> )
> CTRL_IFACE monitor send 127.0.0.1:2081
> Cancelling scan request
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1
> WPA: using GTK TKIP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT 802.1X
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
> 50 f2 04 01 00 00 50 f2 01
> No keys have been configured - skip key clearing
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - portControl=Auto
> NDIS: received event data - hexdump(len=45): 00 00 00 00 28 4e 45 54 47 45 41 52
> 20 31 30 38 20 4d 62 70 73 20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 64 2
> 0 57 47 35 31 31 54
> NDIS: event - type 0
> NDIS: event InstanceName - hexdump_ascii(len=40):
> 4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73 NETGEAR 108 Mbps
> 20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 Wireless PC Car
> 64 20 57 47 35 31 31 54 d WG511T
> NDIS: Media Connect Event
> NDIS: association information - hexdump(len=151): 28 00 00 00 03 00 01 00 01 00
> 00 00 00 00 00 00 2f 00 00 00 28 00 00 00 07 00 11 00 00 00 01 c0 06 00 00 00 57
> 00 00 00 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b 01 04 02 04 0b 16 d
> d 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 01 01 04 82
> 84 0b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
> 0 00 00 00 00 00 00 00
> NDIS: ReqFixed=0x3 RespFixed=0x7 off_req=40 off_resp=87 len_req=47 len_resp=6
> NDIS: Request IEs - hexdump(len=47): 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6
> f 72 6b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04
> 01 00 00 50 f2 01
> NDIS: Response IEs - hexdump(len=6): 01 04 82 84 0b 16
> Association info event
> req_ies - hexdump(len=47): 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b 01
> 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 5
> 0 f2 01
> resp_ies - hexdump(len=6): 01 04 82 84 0b 16
> assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50
> f2 04 01 00 00 50 f2 01
> Association event - clear replay counter
> Associated to a new BSS: BSSID=00:09:5b:12:0f:a5
> No keys have been configured - skip key clearing
> Associated with 00:09:5b:12:0f:a5
> CTRL_IFACE monitor send 127.0.0.1:2081
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> TX EAPOL - hexdump(len=18): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 01 00 0
> 0
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RX EAPOL from 00:09:5b:12:0f:a5
> RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
> Setting authentication timeout: 70 sec 0 usec
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_PAE entering state RESTART
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=1 id=0
> EAP: EAP entering state IDENTITY
> EAP: EAP-Request Identity data - hexdump_ascii(len=5):
> 68 65 6c 6c 6f hello
> EAP: using anonymous identity - hexdump_ascii(len=6):
> 77 70 61 73 75 70 wpasup
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> TX EAPOL - hexdump(len=29): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 00 00 0
> b 02 00 00 0b 01 77 70 61 73 75 70
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 14, expecting at least 99
> EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=29 idleWhile=59
> RX EAPOL from 00:09:5b:12:0f:a5
> RX EAPOL - hexdump(len=14): 02 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=1 id=1
> EAP: EAP entering state IDENTITY
> EAP: EAP-Request Identity data - hexdump_ascii(len=5):
> 68 65 6c 6c 6f hello
> EAP: using anonymous identity - hexdump_ascii(len=6):
> 77 70 61 73 75 70 wpasup
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> TX EAPOL - hexdump(len=29): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 00 00 0
> b 02 01 00 0b 01 77 70 61 73 75 70
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 14, expecting at least 99
> RX EAPOL from 00:09:5b:12:0f:a5
> RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 15 20
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=21 id=2
> EAP: EAP entering state GET_METHOD
> EAP: initialize selected EAP method (21, TTLS)
> EAP-TTLS: Phase2 type: EAP
> EAP-TTLS: Phase2 EAP types - hexdump(len=6): 04 1a 06 05 12 11
> TLS: Trusted root certificate(s) loaded
> EAP: EAP entering state METHOD
> EAP-TTLS: Received packet(len=6) - Flags 0x20
> EAP-TTLS: Start
> SSL: (where=0x10 ret=0x1)
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:before/connect initialization
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write client hello A
> SSL: (where=0x1002 ret=0xffffffff)
> SSL: SSL_connect:error in SSLv3 read server hello A
> SSL: SSL_connect - want more data
> SSL: 100 bytes pending from ssl_out
> SSL: 100 bytes left to be sent out (of total 100 bytes)
> EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> TX EAPOL - hexdump(len=124): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 00 00
> 6a 02 02 00 6a 15 00 16 03 01 00 5f 01 00 00 5b 03 01 42 9d b7 1a 5b 92 ad 3b 7b
> 6c 93 95 b9 65 c5 e4 06 af 62 c8 c2 7f 32 6d 24 8f 99 2d 1a 00 59 bf 00 00 34 0
> 0 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 66 00 05 00 04 00 63 00
> 62 00 61 00 15 00 12 00 09 00 65 00 64 00 60 00 14 00 11 00 08 00 06 00 03 01 00
> 
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 10, expecting at least 99
> RX EAPOL from 00:09:5b:12:0f:a5
> RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 0d 20
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=13 id=3
> EAP: EAP entering state DISCARD
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 10, expecting at least 99
> EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=28 idleWhile=59
> EAPOL: Port Timers tick - authWhile=28 heldWhile=0 startWhen=27 idleWhile=58
> EAPOL: Port Timers tick - authWhile=27 heldWhile=0 startWhen=26 idleWhile=57
> EAPOL: Port Timers tick - authWhile=26 heldWhile=0 startWhen=25 idleWhile=56
> EAPOL: Port Timers tick - authWhile=25 heldWhile=0 startWhen=24 idleWhile=55
> 
> ##############################################################################
> ##############################################################################
> 
> Here the Output of the wpa_cli.exe
> 
> Interactive mode
> 
> > status
> <2>Trying to associate with 00:09:5b:12:0f:a5 (SSID='WirelessNetwork' freq=2422
> MHz)
> <2>Associated with 00:09:5b:12:0f:a5
> <2>Disconnect event - remove keys
> <2>Trying to associate with 00:09:5b:12:0f:a5 (SSID='WirelessNetwork' freq=2422
> MHz)
> <2>Associated with 00:09:5b:12:0f:a5
> bssid=00:09:5b:12:0f:a5
> ssid=WirelessNetwork
> pairwise_cipher=CCMP
> group_cipher=TKIP
> key_mgmt=WPA/IEEE 802.1X/EAP
> wpa_state=ASSOCIATED
> Supplicant PAE state=AUTHENTICATING
> suppPortStatus=Unauthorized
> EAP state=IDLE
> selectedMethod=21 (EAP-TTLS)
> EAP TLS cipher=(NONE)
> EAP-TTLS Phase2 method=EAP-?


__________________________________________________________
Mit WEB.DE FreePhone mit hoechster Qualitaet ab 0 Ct./Min.
weltweit telefonieren! http://freephone.web.de/?mc=021201




More information about the HostAP mailing list