Trying again. Bug in the new stable release 0.3.9 ? Thanks for any help

helas Akropolis hela80 at web.de
Tue Jun 21 08:02:42 EDT 2005



Hi all, Jouni
  
  i a have the neu hostap, hostapd and wpa_supplicant 0.3.9 release. Every thing work
  fine even preauthentication :-)) but just for ~ 45 min. After REAUTHENTICATE i 
  have EAP TIMEOUT state and no Connection from wpa_supplicant(wxp sp2) to Access 
  Point or from Access Point to wpa_supplicant.
  
  Can you please tell me why i am getting TIMEOUT while reauthentication ?? The 
  wpa_supplicant can not read the Server Certificate !! But why ?? At the beginn
  of the connection he read the Server Certificate and the supplicant get authentificated..
  
  Hope you can help me and thank you very much
  
  helas
  
  here the output of the wpa_supplicant:
  
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
  NDIS: received event data - hexdump(len=74): 02 00 00 00 20 41 74 68 65 72 6f 73
  12 0f a5 00 00 01 00 00 00
  NDIS: event - type 2
  NDIS: event InstanceName - hexdump_ascii(len=32):
       41 74 68 65 72 6f 73 20 57 69 72 65 6c 65 73 73   Atheros Wireless
       20 4e 65 74 77 6f 72 6b 20 41 64 61 70 74 65 72    Network Adapter
  NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
   2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
  NDIS: Media Specific Indication - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00
   00 00 00 09 5b 2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
  NDIS: PMKID Candidate List Event - Version 1 NumCandidates 2
  NDIS: 0: 00:09:5b:2f:72:78 Flags 0x1
  RSN: PMKID candidate event - bssid=00:09:5b:2f:72:78 index=0 preauth=1
  RSN: added PMKSA cache candidate 00:09:5b:2f:72:78 prio 0
  RSN: processing PMKSA candidate list
  RSN: PMKSA candidate 00:09:5b:2f:72:78 does not need pre-authentication anymore
  NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 2f 72
   
  RSN: no more pending PMKSA candidates
  NDIS: 1: 00:09:5b:12:0f:a5 Flags 0x1
  RSN: PMKID candidate event - bssid=00:09:5b:12:0f:a5 index=1 preauth=1
  RSN: added PMKSA cache candidate 00:09:5b:12:0f:a5 prio 1
  RSN: processing PMKSA candidate list
  RSN: PMKSA candidate 00:09:5b:12:0f:a5 does not need pre-authentication anymore
  NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 12 0f
 
  RSN: no more pending PMKSA candidates
  NDIS: received event data - hexdump(len=105): 02 00 00 00 3f 4e 45 54 47 45 41 5
  0 00 00 09 5b 12 0f a5 00 00 01 00 00 00
  NDIS: event - type 2
  NDIS: event InstanceName - hexdump_ascii(len=63):
       4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73   NETGEAR 108 Mbps
       20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72    Wireless PC Car
       64 20 57 47 35 31 31 54 20 2d 20 50 61 6b 65 74   d WG511T - Paket
       70 6c 61 6e 65 72 2d 4d 69 6e 69 70 6f 72 74      planer-Miniport
  NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
   
  NDIS: ignored event for another adapter
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
  .
  .
  .
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 09
  .
  .
  .
  00 20 95 98 db ca 9c 35 59 9c 77 2f 5f d0 c9 ad 76 19 d5 19 94 62 98 56 c6 ec 63
   37 3a ab 9f 71 54 26
  EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  IEEE 802.1X RX: version=2 type=3 length=127
    EAPOL-Key type=2
  WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00
  .
  .
   c6 ec 63 37 3a ab 9f 71 54 26
  RSN: encrypted key data - hexdump(len=32): 95 98 db ca 9c 35 59 9c 77 2f 5f d0 c
  9 ad 76 19 d5 19 94 62 98 56 c6 ec 63 37 3a ab 9f 71 54 26
  WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED]
  WPA: RX message 1 of Group Key Handshake from 00:09:5b:2f:72:78 (ver=2)
  RSN: received GTK in group key handshake - hexdump(len=18): 02 00 0f 33 50 2a 24
   66 47 b6 2e 5a c3 18 9c 05 25 0a
  WPA: Group Key - hexdump(len=16): [REMOVED]
  WPA: Installing GTK to the driver (keyidx=2 tx=0).
  WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  NDIS: OIS_802_11_ADD_KEY - hexdump(len=48): [REMOVED]
  WPA: Sending EAPOL-Key 2/2
  WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88
  .
  .
  WPA: Group rekeying completed with 00:09:5b:2f:72:78 [GTK=CCMP]
  CTRL_IFACE monitor send 127.0.0.1:1888
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
  .
  .
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
  RSN: Authenticator did not accept PMKID, doing full EAP authentication
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_PAE entering state CONNECTING
  EAPOL: txStart
  RSN: PMKSA caching - do not send EAPOL-Start
  EAP: EAP entering state INITIALIZE
  EAP: maintaining EAP method data for fast reauthentication
  EAP: EAP entering state IDLE
  WPA: EAPOL frame too short, len 14, expecting at least 99
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
  .
  .
  .
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=15 idleWhile=45
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=14): 02 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_PAE entering state RESTART
  EAP: EAP entering state INITIALIZE
  EAP: maintaining EAP method data for fast reauthentication
  EAP: EAP entering state IDLE
  EAPOL: SUPP_PAE entering state AUTHENTICATING
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=1 id=1
  EAP: EAP entering state IDENTITY
  EAP: EAP-Request Identity data - hexdump_ascii(len=5):
       68 65 6c 6c 6f                                    hello
  EAP: using real identity - hexdump_ascii(len=6):
       77 70 61 73 75 70                                 wpasup
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_BE entering state RESPONSE
  EAPOL: txSuppRsp
  TX EAPOL - hexdump(len=29): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
  .
  EAPOL: SUPP_BE entering state RECEIVE
  WPA: EAPOL frame too short, len 14, expecting at least 99
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 15 20
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=21 id=2
  EAP: EAP entering state GET_METHOD
  EAP: using previous method data for fast re-authentication
  EAP: initialize selected EAP method (21, TTLS)
  EAP: EAP entering state METHOD
  EAP-TTLS: Received packet(len=6) - Flags 0x20
  EAP-TTLS: Start
  SSL: (where=0x10 ret=0x1)
  SSL: (where=0x1001 ret=0x1)
  SSL: SSL_connect:before/connect initialization
  SSL: (where=0x1001 ret=0x1)
  SSL: SSL_connect:SSLv3 write client hello A
  SSL: (where=0x1002 ret=0xffffffff)
  SSL: SSL_connect:error in SSLv3 read server hello A
  SSL: SSL_connect - want more data
  SSL: 132 bytes pending from ssl_out
  SSL: 132 bytes left to be sent out (of total 132 bytes)
  EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_BE entering state RESPONSE
  EAPOL: txSuppRsp
  TX EAPOL - hexdump(len=160): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00
  .
  .
  EAPOL: SUPP_BE entering state RECEIVE
  WPA: EAPOL frame too short, len 10, expecting at least 99
  EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=14 idleWhile=59
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 03 04 0a 15 c0 00 00 06 e5 16 03 01
  .
  .
  .
  02 46 48 31 14 30 12 06
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=21 id=3
  EAP: EAP entering state METHOD
  EAP-TTLS: Received packet(len=1034) - Flags 0xc0
  EAP-TTLS: TLS Message Length: 1765
  SSL: Need 741 bytes more input data
  SSL: Building ACK
  EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_BE entering state RESPONSE
  EAPOL: txSuppRsp
  TX EAPOL - hexdump(len=24): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
  6 02 03 00 06 15 00
  EAPOL: SUPP_BE entering state RECEIVE
  IEEE 802.1X RX: version=2 type=0 length=1034
  WPA: EAPOL frame (type 0) discarded, not a Key frame
  WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
  RSN: Do not try to use cached PMKSA
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=755): 02 00 02 ef 01 04 02 ef 15 80 00 00 06 e5 03 55 04
  .
  .
  .
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=21 id=4
  EAP: EAP entering state METHOD
  EAP-TTLS: Received packet(len=751) - Flags 0x80
  EAP-TTLS: TLS Message Length: 1765
  SSL: (where=0x1001 ret=0x1)
  SSL: SSL_connect:SSLv3 read server hello A
  TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/ST=Hessen/L=Wi
  esbaden/O=FH/OU=Entwicklung/CN=CA'
  TLS: Certificate verification failed, error 7 (certificate signature failure) de
  pth 0 for '/C=DE/ST=Hessen/L=Wiesbaden/O=FH/OU=Entwicklung/CN=SubCA'
  SSL: (where=0x4008 ret=0x233)
  SSL: SSL3 alert: write (local SSL3 detected an error):fatal:decrypt error
  SSL: (where=0x1002 ret=0xffffffff)
  SSL: SSL_connect:error in SSLv3 read server certificate B
  SSL: SSL_connect: error:0D0890A1:lib(13):func(137):reason(161)
  EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  IEEE 802.1X RX: version=2 type=0 length=751
  WPA: EAPOL frame (type 0) discarded, not a Key frame
  WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
  RSN: Do not try to use cached PMKSA
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=13 idleWhile=59
  .
  .
  .
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=46
  NDIS: received event data - hexdump(len=74): 02 00 00 00 20 41 74 68 65 72 6f 73
  12 0f a5 00 00 01 00 00 00
  NDIS: event - type 2
  NDIS: event InstanceName - hexdump_ascii(len=32):
       41 74 68 65 72 6f 73 20 57 69 72 65 6c 65 73 73   Atheros Wireless
       20 4e 65 74 77 6f 72 6b 20 41 64 61 70 74 65 72    Network Adapter
  NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
   
  NDIS: Media Specific Indication - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00
   
  NDIS: PMKID Candidate List Event - Version 1 NumCandidates 2
  NDIS: 0: 00:09:5b:2f:72:78 Flags 0x1
  RSN: PMKID candidate event - bssid=00:09:5b:2f:72:78 index=0 preauth=1
  RSN: added PMKSA cache candidate 00:09:5b:2f:72:78 prio 0
  RSN: processing PMKSA candidate list
  RSN: PMKSA candidate 00:09:5b:2f:72:78 does not need pre-authentication anymore
  NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 2f 72
  
  RSN: no more pending PMKSA candidates
  NDIS: 1: 00:09:5b:12:0f:a5 Flags 0x1
  RSN: PMKID candidate event - bssid=00:09:5b:12:0f:a5 index=1 preauth=1
  RSN: added PMKSA cache candidate 00:09:5b:12:0f:a5 prio 1
  RSN: processing PMKSA candidate list
  RSN: PMKSA candidate 00:09:5b:12:0f:a5 does not need pre-authentication anymore
  NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 12 0f
  
  RSN: no more pending PMKSA candidates
  NDIS: received event data - hexdump(len=105): 02 00 00 00 3f 4e 45 54 47 45 41 5
  0 00 00 09 5b 12 0f a5 00 00 01 00 00 00
  NDIS: event - type 2
  NDIS: event InstanceName - hexdump_ascii(len=63):
       4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73   NETGEAR 108 Mbps
       20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72    Wireless PC Car
       64 20 57 47 35 31 31 54 20 2d 20 50 61 6b 65 74   d WG511T - Paket
       70 6c 61 6e 65 72 2d 4d 69 6e 69 70 6f 72 74      planer-Miniport
  NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
   2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
  NDIS: ignored event for another adapter
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=45
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=14): 02 00 00 0a 01 06 00 0a 01 68 65 6c 6c 6f
  EAPOL: Received EAP-Packet frame
  WPA: EAPOL frame too short, len 14, expecting at least 99
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=44
  .
  .
  .
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=30
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=14): 02 00 00 0a 01 07 00 0a 01 68 65 6c 6c 6f
  EAPOL: Received EAP-Packet frame
  WPA: EAPOL frame too short, len 14, expecting at least 99
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=29
  .
  .
  .
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=15
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=14): 02 00 00 0a 01 09 00 0a 01 68 65 6c 6c 6f
  EAPOL: Received EAP-Packet frame
  WPA: EAPOL frame too short, len 14, expecting at least 99
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=14
  .
  .
  .
  EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
  EAP: EAP entering state FAILURE
  EAPOL: SUPP_PAE entering state HELD
  EAPOL: SUPP_BE entering state RECEIVE
  EAPOL: SUPP_BE entering state FAIL
  EAPOL: SUPP_BE entering state IDLE
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=14): 02 00 00 0a 01 0a 00 0a 01 68 65 6c 6c 6f
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_PAE entering state RESTART
  EAP: EAP entering state INITIALIZE
  EAP: deinitialize previously used EAP method (21, TTLS) at INITIALIZE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_PAE entering state AUTHENTICATING
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=1 id=10
  EAP: EAP entering state IDENTITY
  EAP: EAP-Request Identity data - hexdump_ascii(len=5):
       68 65 6c 6c 6f                                    hello
  EAP: using real identity - hexdump_ascii(len=6):
       77 70 61 73 75 70                                 wpasup
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_BE entering state RESPONSE
  EAPOL: txSuppRsp
  TX EAPOL - hexdump(len=29): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
  b 02 0a 00 0b 01 77 70 61 73 75 70
  EAPOL: SUPP_BE entering state RECEIVE
  WPA: EAPOL frame too short, len 14, expecting at least 99
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=10): 02 00 00 06 01 0b 00 06 15 20
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=21 id=11
  EAP: EAP entering state GET_METHOD
  EAP: initialize selected EAP method (21, TTLS)
  EAP-TTLS: Phase2 type: EAP
  EAP-TTLS: Phase2 EAP types - hexdump(len=6): 04 1a 06 05 12 11
  TLS: Trusted root certificate(s) loaded
  TLS - SSL error: error:0B07C065:lib(11):func(124):reason(101)
  TLS: Include TLS Message Length in unfragmented packets
  EAP: EAP entering state METHOD
  EAP-TTLS: Received packet(len=6) - Flags 0x20
  EAP-TTLS: Start
  SSL: (where=0x10 ret=0x1)
  SSL: (where=0x1001 ret=0x1)
  SSL: SSL_connect:before/connect initialization
  SSL: (where=0x1001 ret=0x1)
  SSL: SSL_connect:SSLv3 write client hello A
  SSL: (where=0x1002 ret=0xffffffff)
  SSL: SSL_connect:error in SSLv3 read server hello A
  SSL: SSL_connect - want more data
  SSL: 100 bytes pending from ssl_out
  SSL: 100 bytes left to be sent out (of total 100 bytes)
  EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_BE entering state RESPONSE
  EAPOL: txSuppRsp
  TX EAPOL - hexdump(len=128): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00
  .
  .
  EAPOL: SUPP_BE entering state RECEIVE
  WPA: EAPOL frame too short, len 10, expecting at least 99
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 0c 04 0a 15 c0 00 00 06 e5 16 03 01
  .
  .
  .
  02 46 48 31 14 30 12 06
  EAPOL: Received EAP-Packet frame
  EAPOL: SUPP_BE entering state REQUEST
  EAPOL: getSuppRsp
  EAP: EAP entering state RECEIVED
  EAP: Received EAP-Request method=21 id=12
  EAP: EAP entering state METHOD
  EAP-TTLS: Received packet(len=1034) - Flags 0xc0
  EAP-TTLS: TLS Message Length: 1765
  SSL: Need 741 bytes more input data
  SSL: Building ACK
  EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
  EAP: EAP entering state SEND_RESPONSE
  EAP: EAP entering state IDLE
  EAPOL: SUPP_BE entering state RESPONSE
  EAPOL: txSuppRsp
  TX EAPOL - hexdump(len=24): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
  6 02 0c 00 06 15 00
  EAPOL: SUPP_BE entering state RECEIVE
  IEEE 802.1X RX: version=2 type=0 length=1034
  WPA: EAPOL frame (type 0) discarded, not a Key frame
  WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
  RSN: Do not try to use cached PMKSA
  RX EAPOL from 00:09:5b:2f:72:78
  RX EAPOL - hexdump(len=755): 02 00 02 ef 01 0d 02 ef 15 80 00 00 06 e5 03 55 04
  
  
  
  The hostapd Output:
  
  IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state REAUTHENTICATE
  wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
  WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
  IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
  IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 0, timeout 30)
  IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
  IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 0)
  Received 62 bytes management frame
  DATA (TX callback) ACK
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP timeout
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state TIMEOUT
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
  IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
  IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 1, timeout 30)
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
  IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 1)
  Received 62 bytes management frame
  DATA (TX callback) ACK
  Received 47 bytes management frame
  DATA
  IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
     IEEE 802.1X: version=2 type=0 length=11
     EAP: code=2 identifier=1 length=11 (response)
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=1 len=11) from STA: EAP Response-Identity (1)
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: STA identity 'wpasup'
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
  Encapsulating EAP message into a RADIUS packet
  Sending RADIUS message to authentication server
  Next RADIUS client retransmit in 3 seconds
  Received 64 bytes from RADIUS server
  Received RADIUS message
  Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  RADIUS packet matching with station 00:09:5b:98:e2:7e
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=2 len=6) from RADIUS server: EAP-Request-TTLS (21)
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
  IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 2)
  Received 58 bytes management frame
  DATA (TX callback) ACK
  Received 178 bytes management frame
  DATA
  IEEE 802.1X: 146 bytes from 00:09:5b:98:e2:7e
     IEEE 802.1X: version=2 type=0 length=142
     EAP: code=2 identifier=2 length=142 (response)
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=2 len=142) from STA: EAP Response-TTLS (21)
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
  Encapsulating EAP message into a RADIUS packet
    Copied RADIUS State Attribute
  Sending RADIUS message to authentication server
  Next RADIUS client retransmit in 3 seconds
  Received 1100 bytes from RADIUS server
  Received RADIUS message
  Received RADIUS packet matched with a pending request, round trip time 0.02 sec
  RADIUS packet matching with station 00:09:5b:98:e2:7e
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=3 len=1034) from RADIUS server: EAP-Request-TTLS (21)
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
  IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 3)
  Received 1086 bytes management frame
  DATA (TX callback) ACK
  Received 42 bytes management frame
  DATA
  IEEE 802.1X: 10 bytes from 00:09:5b:98:e2:7e
     IEEE 802.1X: version=2 type=0 length=6
     EAP: code=2 identifier=3 length=6 (response)
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=3 len=6) from STA: EAP Response-TTLS (21)
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
  Encapsulating EAP message into a RADIUS packet
    Copied RADIUS State Attribute
  Sending RADIUS message to authentication server
  Next RADIUS client retransmit in 3 seconds
  Received 813 bytes from RADIUS server
  Received RADIUS message
  Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  RADIUS packet matching with station 00:09:5b:98:e2:7e
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=4 len=751) from RADIUS server: EAP-Request-TTLS (21)
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
  IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 4)
  Received 803 bytes management frame
  DATA (TX callback) ACK
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP timeout
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state TIMEOUT
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
  IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
  wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
  IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
__________________________________________________________
Mit WEB.DE FreePhone mit hoechster Qualitaet ab 0 Ct./Min.
weltweit telefonieren! http://freephone.web.de/?mc=021201




More information about the HostAP mailing list