wpa_supplicant && mandriva 2007

robm rob.merritt at usask.ca
Wed Nov 1 09:53:59 EST 2006


here is a -dd of tthat connection for Jouni


#wpa_supplicant.conf

>  # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
>
> ctrl_interface=/var/run/wpa_supplicant
>
> network={
>         ssid="uni"
>         key_mgmt=IEEE8021X
>         eap=PEAP
>         phase2="auth=MSCHAPV2"
>         identity="username"
>         password="password"
> }




------------------------------------------------------------------------

ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 7 value 0x1 - ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - ioctl[SIOCSIWMLME]: Operation not supported
Initializing interface 'eth2' conf '/etc/wpa_supplicant.conf' driver 
'wext' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=4):
    75 6f 66 73                                       uni          
key_mgmt: 0x8
eap methods - hexdump(len=2): 19 00
phase2 - hexdump_ascii(len=13):
    61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2   
identity - hexdump_ascii(len=6):
    72 77 6d 31 33 32                                 testacct          
password - hexdump_ascii(len=8): [REMOVED]
Priority group 0
  id=0 ssid='uni'
Initializing interface (2) 'eth2'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=12 enc_capa=0x0
 capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: 00:07:0e:b4:25:02
wpa_driver_wext_set_wpa
Driver does not support WPA.
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth2
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:17:0f:e6:6c:b0
State: SCANNING -> ASSOCIATED
Associated to a new BSS: BSSID=00:17:0f:e6:6c:b0
No keys have been configured - skip key clearing
No network configuration found for the current AP
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_disassociate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:17:0f:e6:6c:b0 into blacklist
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Scan timeout - try to get results
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No APs found - clear blacklist and try again
Removed BSSID 00:17:0f:e6:6c:b0 from blacklist (clear)
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 5 sec 0 usec
Wireless event: cmd=0x8b19 len=8
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 5 sec 0 usec
Wireless event: cmd=0x8c00 len=20
Wireless event: cmd=0x8c00 len=20
Wireless event: cmd=0x8c00 len=20
Ignore event for foreign ifindex 2
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8c00 len=20
Scan timeout - try to get results
Received 408 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:17:0f:e6:6c:b0 ssid='uni' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  skip - no WPA/RSN IE
1: 00:12:43:b9:7d:90 ssid='uni' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  skip - no WPA/RSN IE
2: 00:12:43:97:0f:40 ssid='uni' wpa_ie_len=0 rsn_ie_len=0 
caps=0ioctl[SIOCSIWGENIE]: Operation not supported
ioctl[SIOCSIWGENIE]: Operation not supported
x11
  skip - no WPA/RSN IE
  selected non-WPA AP 00:17:0f:e6:6c:b0 ssid='uni'
Trying to associate with 00:17:0f:e6:6c:b0 (SSID='uni' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b19 len=8
Received 408 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:17:0f:e6:6c:b0 ssid='uni' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  skip - no WPA/RSN IE
1: 00:12:43:b9:7d:90 ssid='uni' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  skip - no WPA/RSN IE
2: 00:12:43:97:0f:40 ssid='uni' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  skip - no WPA/RSN IE
  selected non-WPA AP 00:17:0f:e6:6c:b0 ssid='uni'
Trying to associate with 00:17:0f:e6:6c:b0 (SSID='uni' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: ASSOCIATING -> ASSOCIATING
wpa_driver_wext_associate
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=13
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=13
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:17:0f:e6:6c:b0
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:17:0f:e6:6c:b0
No keys have been configured - skip key clearing
Associated with 00:17:0f:e6:6c:b0
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL - hexdump(len=4): 01 01 00 00
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=46): 01 00 00 05 01 01 00 05 01 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=6):
    72 77 6d 31 33 32                                 testacct          
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 72 77 6d 31 33 32
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=46): 01 00 00 05 01 02 00 05 01 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=2
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=6):
    72 77 6d 31 33 32                                 testacct          
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=15): 01 00 00 0b 02 02 00 0b 01 72 77 6d 31 33 32
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=46): 01 00 00 06 01 b8 00 06 19 21 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=184
EAP: EAP entering state GET_METHOD
EAP: initialize selected EAP method (25, PEAP)
EAP-PEAP: Phase2 EAP types - hexdump(len=1): 1a
CTRL-EVENT-EAP-METHOD EAP method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x21
EAP-PEAP: Start (server ver=1, own ver=1)
EAP-PEAP: Using PEAP version 1
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 101 bytes pending from ssl_out
SSL: 101 bytes left to be sent out (of total 101 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=111): 01 00 00 6b 02 b8 00 6b 19 01 16 03 01 00 
60 01 00 00 5c 03 01 45 47 de ab 42 1f bb 1f 41 9c a7 d7 39 3d e7 68 d3 
4e bf 70 d5 52 46 aa 2d 26 75 d6 31 48 e1 38 00 00 34 00 39 00 38 00 35 
00 16 00 13 00 0a 00 33 00 32 00 2f 00 66 00 05 00 04 00 63 00 62 00 61 
00 15 00 12 00 09 00 65 00 64 00 60 00 14 00 11 00 08 00 06 00 03 02 01 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=1016): 01 00 03 f4 01 b9 03 f4 19 c1 00 00 07 34 
16 03 01 00 4a 02 00 00 46 03 01 45 47 de aa c6 86 f2 ec 62 2c a4 0c 13 
2e 71 fa 7f 1a d7 b0 92 94 b5 46 ca 56 b0 5e 9f 01 15 45 20 6d 18 58 16 
99 5f 5b 15 99 d7 17 24 22 9e 60 4e 55 eb 9c 34 c2 42 cf 58 ac 99 7f 7f 
d7 4a 61 55 00 35 00 16 03 01 06 d7 0b 00 06 d3 00 06 d0 00 03 9f 30 82 
03 9b 30 82 03 04 a0 03 02 01 02 02 10 4d 74 dc 09 4e 02 e8 7e 2a 51 35 
98 48 be 8b e2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 ce 31 
0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 
65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 
70 65 20 54 6f 77 6e 31 1d 30 1b 06 03 55 04 0a 13 14 54 68 61 77 74 65 
20 43 6f 6e 73 75 6c 74 69 6e 67 20 63 63 31 28 30 26 06 03 55 04 0b 13 
1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 
44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 54 68 61 77 74 
65 20 50 72 65 6d 69 75 6d 20 53 65 72 76 65 72 20 43 41 31 28 30 26 06 
09 2a 86 48 86 f7 0d 01 09 01 16 19 70 72 65 6d 69 75 6d 2d 73 65 72 76 
65 72 40 74 68 61 77 74 65 2e 63 6f 6d 30 1e 17 0d 30 36 30 31 31 37 30 
38 32 37 34 39 5a 17 0d 30 37 30 31 31 37 30 38 32 37 34 39 5a 30 81 9f 
31 0b 30 09 06 03 55 04 06 13 02 43 41 31 15 30 13 06 03 55 04 08 13 0c 
53 61 73 6b 61 74 63 68 65 77 61 6e 31 12 30 10 06 03 55 04 07 13 09 53 
61 73 6b 61 74 6f 6f 6e 31 23 30 21 06 03 55 04 0a 13 1a 55 6e 69 76 65 
72 73 69 74 79 20 6f 66 20 53 61 73 6b 61 74 63 68 65 77 61 6e 31 28 30 
26 06 03 55 04 0b 13 1f 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 54 65 63 68 
6e 6f 6c 6f 67 79 20 53 65 72 76 69 63 65 73 31 16 30 14 06 03 55 04 03 
13 0d 41 43 53 31 2e 55 53 41 53 4b 2e 43 41 30 81 9f 30 0d 06 09 2a 86 
48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 f9 56 f3 d1 
dc cd b4 45 34 9d ff a8 9c 20 bd 22 b5 79 92 23 94 b4 77 2e 08 a4 0e 6d 
61 55 cc 1b a9 12 ca f3 ba c1 4a 84 3c 6e fe 41 86 38 ff a0 bb f5 2f c6 
f3 06 ce 52 ac 85 8d 8a 88 ff d4 d4 9c f9 35 65 02 a0 61 2d f5 e0 af 90 
67 1c 9f 72 33 67 c8 db de 13 f0 b1 4d 15 d4 5a ea bd bd b1 68 72 a8 42 
73 1c 88 8a 10 d8 a2 50 be 68 4b 77 8b a7 41 ae 7d 3b 39 02 d8 3d ce 8e 
bb 1e fe 51 02 03 01 00 01 a3 81 a6 30 81 a3 30 1d 06 03 55 1d 25 04 16 
30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 40 
06 03 55 1d 1f 04 39 30 37 30 35 a0 33 a0 31 86 2f 68 74 74 70 3a 2f 2f 
63 72 6c 2e 74 68 61 77 74 65 2e 63 6f 6d 2f 54 68 61 77 74 65 50 72 65 
6d 69 75 6d 53 65 72 76 65 72 43 41 2e 63 72 6c 30 32 06 08 2b 06 01 05 
05 07 01 01 04 26 30 24 30 22 06 08 2b 06 01 05 05 07 30 01 86 16 68 74 
74 70 3a 2f 2f 6f 63 73 70 2e 74 68 61 77 74 65 2e 63 6f 6d 30 0c 06 03 
55 1d 13 01 01 ff 04 02 30 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 
00 03 81 81 00 3e 6e 9b 50 8f 14 6c cf 4b c5 50 42 e9 80 84 9e c4 eb e3 
7f 75 e3 73 9c fe e0 ab 43 d9 2b 74 67 3c 48 c0 fa 7d de 5e 6e d8 93 cb 
2c 18 64 ac 00 a3 1a ca cb 16 bf d9 16 97 e6 d6 3b 26 d2 78 17 c9 d9 c1 
fe c1 34 44 11 3e 16 51 12 40 c1 f7 e0 03 97 ed 1e 90 d9 d3 c2 d9 d6 07 
c5 b0 d0 24 ff f1 d7 35 b0 11 1f fc f5 7d c9 05 23 17
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=185
EAP: EAP entering state METHOD
SSL: Received packet(len=1012) - Flags 0xc1
SSL: TLS Message Length: 1844
SSL: Need 842 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 b9 00 06 19 01
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=852): 01 00 03 50 01 ba 03 50 19 01 98 04 96 51 
b4 74 9b b6 da 51 c3 bb bf d3 52 c3 8c 5d aa 00 03 2b 30 82 03 27 30 82 
02 90 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 
00 30 81 ce 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 
04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 
07 13 09 43 61 70 65 20 54 6f 77 6e 31 1d 30 1b 06 03 55 04 0a 13 14 54 
68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 20 63 63 31 28 30 26 06 
03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 
69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 
54 68 61 77 74 65 20 50 72 65 6d 69 75 6d 20 53 65 72 76 65 72 20 43 41 
31 28 30 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 70 72 65 6d 69 75 6d 
2d 73 65 72 76 65 72 40 74 68 61 77 74 65 2e 63 6f 6d 30 1e 17 0d 39 36 
30 38 30 31 30 30 30 30 30 30 5a 17 0d 32 30 31 32 33 31 32 33 35 39 35 
39 5a 30 81 ce 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 
55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 
04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1d 30 1b 06 03 55 04 0a 13 14 
54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 20 63 63 31 28 30 26 
06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 
76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 
18 54 68 61 77 74 65 20 50 72 65 6d 69 75 6d 20 53 65 72 76 65 72 20 43 
41 31 28 30 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 70 72 65 6d 69 75 
6d 2d 73 65 72 76 65 72 40 74 68 61 77 74 65 2e 63 6f 6d 30 81 9f 30 0d 
06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 
d2 36 36 6a 8b d7 c2 5b 9e da 81 41 62 8f 38 ee 49 04 55 d6 d0 ef 1c 1b 
95 16 47 ef 18 48 35 3a 52 f4 2b 6a 06 8f 3b 2f ea 56 e3 af 86 8d 9e 17 
f7 9e b4 65 75 02 4d ef cb 09 a2 21 51 d8 9b d0 67 d0 ba 0d 92 06 14 73 
d4 93 cb 97 2a 00 9c 5c 4e 0c bc fa 15 52 fc f2 44 6e da 11 4a 6e 08 9f 
2f 2d e3 f9 aa 3a 86 73 b6 46 53 58 c8 89 05 bd 83 11 b8 73 3f aa 07 8d 
f4 42 4d e7 40 9d 1c 37 02 03 01 00 01 a3 13 30 11 30 0f 06 03 55 1d 13 
01 01 ff 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 
00 03 81 81 00 26 48 2c 16 c2 58 fa e8 16 74 0c aa aa 5f 54 3f f2 d7 c9 
78 60 5e 5e 6e 37 63 22 77 36 7e b2 17 c4 34 b9 f5 08 85 fc c9 01 38 ff 
4d be f2 16 42 43 e7 bb 5a 46 fb c1 c6 11 1f f1 4a b0 28 46 c9 c3 c4 42 
7d bc fa ab 59 6e d5 b7 51 88 11 e3 a4 85 19 6b 82 4c a4 0c 12 ad e9 a4 
ae 3f f1 c3 49 65 9a 8c c5 c8 3e 25 b7 94 99 bb 92 32 71 07 f0 86 5e ed 
50 27 a6 0d a6 23 f9 bb cb a6 07 14 42 16 03 01 00 04 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=186
EAP: EAP entering state METHOD
SSL: Received packet(len=848) - Flags 0x01
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 198 bytes pending from ssl_out
SSL: 198 bytes left to be sent out (of total 198 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=208): 01 00 00 cc 02 ba 00 cc 19 01 16 03 01 00 
86 10 00 00 82 00 80 ac f4 97 17 27 f7 a4 a7 17 6b ea ea 2d c5 75 04 bc 
23 9b 54 3a 90 b9 9e 8d e2 00 13 db 68 2e 58 25 cf d0 5b 2c 00 78 68 be 
a6 c3 11 20 17 2a ee f4 19 b7 6d a2 76 65 ed b6 d6 cd d5 90 62 94 3f be 
a9 19 fa 57 bb e0 21 55 59 2c c6 e2 16 e0 8f c5 64 0c f2 e3 e2 e4 27 04 
0d 50 64 03 fc 5b 3c c9 b7 41 cf b9 bf 17 39 be 6a 17 92 94 c2 87 5c 3a 
d2 72 3c b1 a9 c2 61 52 14 54 32 d8 27 07 f4 14 03 01 00 01 01 16 03 01 
00 30 a8 5b 88 bf 74 0e 40 c2 33 a6 b2 2c 7a c2 93 cf a4 e1 b8 c8 45 0b 
cc a2 86 37 cb 4f 6a 77 ca 0c 8b ea ca 51 f6 f0 1d af 4c 95 7e 67 4a 17 
bd 4c
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=73): 01 00 00 45 01 bb 00 45 19 81 00 00 00 3b 14 
03 01 00 01 01 16 03 01 00 30 6e 7d 1a 18 e9 40 71 d7 77 43 4f 57 ab 78 
8c 00 46 5a 98 82 9e fb c3 a4 d9 d0 c1 b4 49 b3 7a 7d c2 64 e7 23 ee 8a 
d1 47 7f c4 66 17 2c 2b c3 60
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=187
EAP: EAP entering state METHOD
SSL: Received packet(len=69) - Flags 0x81
SSL: TLS Message Length: 59
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 bb 00 06 19 01
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=47): 01 00 00 2b 01 bc 00 2b 19 01 17 03 01 00 20 
bc 35 36 b6 f4 66 e4 e2 21 a7 c2 8f 9f 1c 91 d8 05 74 88 d6 5c b2 a5 44 
79 a4 ac 98 80 b4 cf b0
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=188
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x01
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 b9 00 05 01
EAP-PEAP: received Phase 2: code=1 identifier=185 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=6):
    72 77 6d 31 33 32                                 testacct          
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=84): 01 00 00 50 02 bc 00 50 19 01 17 03 01 00 20 
6d 7d c4 7e f3 9e 2d 27 56 ad 40 d9 70 76 42 f0 75 11 b3 6b 43 05 a5 af 
ca 6b 93 61 35 39 1e dc 17 03 01 00 20 85 01 5d db 82 a8 6e 0b 36 00 21 
ae c8 ce 77 17 ba 4c 26 2c 44 7a bd 3b a3 90 4c 51 8a 0f ce b7
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:17:0f:e6:6c:b0
RX EAPOL - hexdump(len=47): 01 00 00 2b 01 bd 00 2b 19 01 17 03 01 00 20 
e1 d0 cc ec 54 38 16 02 c6 d9 99 a2 03 d5 8a bd b7 d5 e3 02 70 34 4a 82 
bd ff 70 91 54 8a 24 d0
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=189
EAP: EAP entering state METHOD




More information about the HostAP mailing list