WPA supplicant not working for LEAP

Anjali Shirvoikar anjali_shirvoikar at persistent.co.in
Fri Dec 7 01:58:47 EST 2007


Hi,

The environment is

WIFI Card – VIA Wyse USB Wireless
Driver – vntwusb
AP – DLink DWL2100
Radius server – Free radius server

The AP is configured for TKIP with WPA-EAP. The radius server is set for
LEAP. The association with AP takes place successfully (seen in the AP log),
a packet trace at the radius server shows that the LEAP conversation takes
place(4 packets are exchanged) and ends in a success EAP packet being sent
to the wpa_supplicant. The wpa_supplicant then seems to be sending a 8 octet
challenge to the AP which is not forwarded by the AP to the RS (not seen in
the packet trace) Could anybody tell me how to fix this issue? Is LEAP to be
used only with Cisco AP?

The wpa_supplicant conf file has the following contents:
================
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
network={
            ssid="WyseWL1"
            scan_ssid=1
            proto=WPA
            key_mgmt=WPA-EAP
            identity="john"
            password="hello"
            eap=LEAP
}



The log file of the wpa_supplicant is as follows
==========================================================
Initializing interface 'wlan0' conf '/tmp/wpa.conf' driver 'vntwusb'
ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/tmp/wpa.conf' -> '/tmp/wpa.conf'
Reading configuration file '/tmp/wpa.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0' (DEPRECATED)
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 6 - start of a new network block
ssid - hexdump_ascii(len=7):
     57 79 73 65 57 4c 31                              WyseWL1         
scan_ssid=1 (0x1)
proto: 0x1
key_mgmt: 0x1
identity - hexdump_ascii(len=4):
     6a 6f 68 6e                                       john            
password - hexdump_ascii(len=5): [REMOVED]
eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00
00
Priority group 0
   id=0 ssid='WyseWL1'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_viawget_init: 
Own MAC address: 00:20:b3:10:33:b2
wpa_driver_viawget_set_wpa: 1 
wpa_driver_viawget_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr= - hexdump(len=6): ff ff ff ff ff ff
key= - hexdump(len=0): [NULL]
wpa_driver_viawget_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
addr= - hexdump(len=6): ff ff ff ff ff ff
key= - hexdump(len=0): [NULL]
wpa_driver_viawget_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
addr= - hexdump(len=6): ff ff ff ff ff ff
key= - hexdump(len=0): [NULL]
wpa_driver_viawget_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
addr= - hexdump(len=6): ff ff ff ff ff ff
key= - hexdump(len=0): [NULL]
wpa_driver_viawget_set_countermeasures - not yet implemented
wpa_driver_viawget_set_drop_unencrypted: 1 
Setting scan request: 0 sec 100000 usec
ctrl_interface_group=0
mike:first time transfer SM-->wlan0
mike:total reserve config is 1
Transfer:device name=wlan0
Transfer:key_mgmt=1
Transfer:proto=1
Transfer:eap=17
Transfer:authen status=FALSE
mike:wpa announce ok
Added interface wlan0
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=7):
     57 79 73 65 57 4c 31                              WyseWL1         
Trying to get current scan results first without requesting a new scan to
speed up initial association
wpa_driver_viawget_get_scan_results: 
VIAWGET: buf - hexdump(len=6): 00 13 46 e5 b4 9c
VIAWGET: AP WPA IEs - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 01
VIAWGET: AP RSN IEs - hexdump(len=0):
VIAWGET: buf - hexdump(len=6): 00 1c 0e 42 4d f0
VIAWGET: AP WPA IEs - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02 28 00
VIAWGET: AP RSN IEs - hexdump(len=0):
Received 2 AP of scan results 
Scan results: 2
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:46:e5:b4:9c ssid='WyseWL1' wpa_ie_len=24 rsn_ie_len=0 caps=0x0
   selected based on WPA IE
   selected WPA AP 00:13:46:e5:b4:9c ssid='WyseWL1'
Try to find non-WPA AP
Trying to associate with 00:13:46:e5:b4:9c (SSID='WyseWL1' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 01
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_viawget_set_drop_unencrypted: 1 
State: SCANNING -> ASSOCIATING
wpa_driver_viawget_associate:  pairwise_suite = 2, group_suite = 2,
key_mgmt_suite = 0 auth_alg = 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
wpa_driver_viawget_event_receive: 
RECEIVE EVENT - hexdump(len=80): 01 2d 00 1e 00 00 07 57 79 73 65 57 4c 31
01 08 82 84 8b 96 0c 18 30 48 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f2 01 00 00 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24
60 6c dd 0c 00 03 7f 02 01 01 00 00 02 a3 40 00
VIAWGET: ASSOC MESSAGE (left: 75)
VIAWGET: copying %d bytes into req_ies - hexdump(len=75): 00 07 57 79 73 65
57 4c 31 01 08 82 84 8b 96 0c 18 30 48 dd 18 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 73 75 70 70 6c 69 63 11 00 00 00
60 ca 14 08 50 13 13 42 10 00 00 00 38 00 00 00 04 00 00
Association info event
req_ies - hexdump(len=45): 00 07 57 79 73 65 57 4c 31 01 08 82 84 8b 96 0c
18 30 48 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50
f2 01 00 00
resp_ies - hexdump(len=30): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c
dd 0c 00 03 7f 02 01 01 00 00 02 a3 40 00
WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_viawget_get_bssid: 
Associated to a new BSS: BSSID=00:13:46:e5:b4:9c
No keys have been configured - skip key clearing
Associated with 00:13:46:e5:b4:9c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=4):
     6a 6f 68 6e                                       john            
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=13): 01 00 00 09 02 00 00 09 01 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state RETRANSMIT
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=13): 01 00 00 09 02 00 00 09 01 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=25): 01 00 00 15 01 01 00 15 11 01 00 08 70 29 48 b3
78 d6 8e f0 6a 6f 68 6e 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=17 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP)
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Request
EAP-LEAP: Challenge from AP - hexdump(len=8): 70 29 48 b3 78 d6 8e f0
EAP-LEAP: Generating Challenge Response
EAP-LEAP: Response - hexdump(len=24): ca ca 14 8b 67 03 9d c5 5d 5c 6a de 2f
0c 61 db 4d 7e 1b 68 ef 94 7a dc
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=40): 01 00 00 24 02 01 00 24 11 01 00 18 ca ca 14 8b
67 03 9d c5 5d 5c 6a de 2f 0c 61 db 4d 7e 1b 68 ef 94 7a dc 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 03 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Success
EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 6f 48 5d ec 41 a2 11 27
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 01 00 00 14 01 02 00 14 11 01 00 08 6f 48 5d ec
41 a2 11 27 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 03 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (17, LEAP) at INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP-Success Id mismatch - reqId=2 lastId=-1
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 04 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP-Success Id mismatch - reqId=2 lastId=-1
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=9): 01 00 00 05 01 03 00 05 01
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=4):
     6a 6f 68 6e                                       john            
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=13): 01 00 00 09 02 03 00 09 01 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=25): 01 00 00 15 01 04 00 15 11 01 00 08 e6 cc 3d 7c
6d 34 a6 45 6a 6f 68 6e 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=17 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP)
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Request
EAP-LEAP: Challenge from AP - hexdump(len=8): e6 cc 3d 7c 6d 34 a6 45
EAP-LEAP: Generating Challenge Response
EAP-LEAP: Response - hexdump(len=24): ec 8f 2d da bf 44 11 02 bd 3a 21 46 62
05 c9 e4 94 78 8e cc 48 55 8c 05
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=40): 01 00 00 24 02 04 00 24 11 01 00 18 ec 8f 2d da
bf 44 11 02 bd 3a 21 46 62 05 c9 e4 94 78 8e cc 48 55 8c 05 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 03 05 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Success
EAP-LEAP: Challenge to AP/AS - hexdump(len=8): d9 bc df 60 6e d0 b1 20
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 01 00 00 14 01 05 00 14 11 01 00 08 d9 bc df 60
6e d0 b1 20 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
Authentication with 00:13:46:e5:b4:9c timed out.
Added BSSID 00:13:46:e5:b4:9c into blacklist
wpa_driver_viawget_disassociate: 
addr= - hexdump(len=6): 00 13 46 e5 b4 9c
No keys have been configured - skip key clearing
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
wpa_driver_viawget_scan: 
wpa_driver_viawget_scan_timeout: 
wpa_driver_viawget_get_scan_results: 
VIAWGET: buf - hexdump(len=6): 00 13 46 e5 b4 9c
VIAWGET: AP WPA IEs - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 01
VIAWGET: AP RSN IEs - hexdump(len=0):
VIAWGET: buf - hexdump(len=6): 00 1c 0e 42 4d f0
VIAWGET: AP WPA IEs - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02 28 00
VIAWGET: AP RSN IEs - hexdump(len=0):
Received 2 AP of scan results 
Scan results: 2
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:46:e5:b4:9c ssid='WyseWL1' wpa_ie_len=24 rsn_ie_len=0 caps=0x0
   selected based on WPA IE
   selected WPA AP 00:13:46:e5:b4:9c ssid='WyseWL1'
Try to find non-WPA AP
Trying to associate with 00:13:46:e5:b4:9c (SSID='WyseWL1' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 01
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_viawget_set_drop_unencrypted: 1 
State: SCANNING -> ASSOCIATING
wpa_driver_viawget_associate:  pairwise_suite = 2, group_suite = 2,
key_mgmt_suite = 0 auth_alg = 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
wpa_driver_viawget_event_receive: 
RECEIVE EVENT - hexdump(len=80): 01 2d 00 1e 00 00 07 57 79 73 65 57 4c 31
01 08 82 84 8b 96 0c 18 30 48 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f2 01 00 00 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24
60 6c dd 0c 00 03 7f 02 01 01 00 00 02 a3 40 00
VIAWGET: ASSOC MESSAGE (left: 75)
VIAWGET: copying %d bytes into req_ies - hexdump(len=75): 00 07 57 79 73 65
57 4c 31 01 08 82 84 8b 96 0c 18 30 48 dd 18 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 00 00 00 07 e0 3c ca 29 00 00 00
01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c dd 0c 00
Association info event
req_ies - hexdump(len=45): 00 07 57 79 73 65 57 4c 31 01 08 82 84 8b 96 0c
18 30 48 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50
f2 01 00 00
resp_ies - hexdump(len=30): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c
dd 0c 00 03 7f 02 01 01 00 00 02 a3 40 00
WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_viawget_get_bssid: 
Associated to a new BSS: BSSID=00:13:46:e5:b4:9c
No keys have been configured - skip key clearing
Associated with 00:13:46:e5:b4:9c
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (17, LEAP) at INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=4):
     6a 6f 68 6e                                       john            
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=13): 01 00 00 09 02 00 00 09 01 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state RETRANSMIT
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=13): 01 00 00 09 02 00 00 09 01 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=25): 01 00 00 15 01 01 00 15 11 01 00 08 99 68 69 af
3d 81 10 e4 6a 6f 68 6e 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=17 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP)
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Request
EAP-LEAP: Challenge from AP - hexdump(len=8): 99 68 69 af 3d 81 10 e4
EAP-LEAP: Generating Challenge Response
EAP-LEAP: Response - hexdump(len=24): 4a 13 c9 ea 23 40 7d b1 c2 b2 b6 07 11
07 b6 fc dd 1d 90 d4 e6 bd ab bb
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=40): 01 00 00 24 02 01 00 24 11 01 00 18 4a 13 c9 ea
23 40 7d b1 c2 b2 b6 07 11 07 b6 fc dd 1d 90 d4 e6 bd ab bb 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 03 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Success
EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 82 6e 32 76 67 4a 82 c4
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 01 00 00 14 01 02 00 14 11 01 00 08 82 6e 32 76
67 4a 82 c4 6a 6f 68 6e
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: SUPP_BE entering state TIMEOUT
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:13:46:e5:b4:9c
RX EAPOL - hexdump(len=8): 01 00 00 04 03 02 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (17, LEAP) at INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP-Success Id mismatch - reqId=2 lastId=-1
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_viawget_deauthenticate - not yet implemented
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_viawget_set_wpa: 0 
wpa_driver_viawget_set_drop_unencrypted: 0 
wpa_driver_viawget_set_countermeasures - not yet implemented
No keys have been configured - skip key clearing
Removed BSSID 00:13:46:e5:b4:9c from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout

Regards,
Anjali




More information about the HostAP mailing list