Hostapd and wpa_supplicant configuration -Failure - Invalid MAC_P - supplicant used different EAP type 47

jackbaker jackbaker at voila.fr
Mon Nov 17 10:57:46 EST 2008












> Hostapd is on 0.5.x

Which exact version of hostapd are you using?

hostapd-0.5.10


Which version of wpa_supplicant are you using?

wpa_supplicant-0.5.10

-------------------------------------------------------------------------------------------------------------------------------------

I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"
---------------------------------------------------
I ran a quick test with the current 0.5.x development branch versions of
hostapd and wpa_supplicant and the configuration files you used for
setting the EAP-PSK parameters worked fine.. Invalid MAC_P sounds like a
mismatch in the shared key used for EAP-PSK.
--------------------------------------------------

I am trying to display the shared keys used by the AP (Hostapd) and the Station (wpa_supplicant).

I an using in the function eap_psk_key_setup (eap_psk_common.c for both hostapd and wpa_supplicant,  the code printf("psk : %s : %d\n", key, sizeof (key))

On the side Hostapd,  the key is displayed but there is not in hexa and the length is "4"

On the side wpa_supplicant, the key is not displayed. 
















On Wed, Oct 22, 2008 at 04:09:06PM +0200, jackbaker wrote:

> Hostapd is on 0.5.x

Which exact version of hostapd are you using?
Which version of wpa_supplicant are you using?

> I want to use hostapd and wpa_supplicant to sercure the access to a
> Network. I want to use WPA-EAP with EAP-PSK. I have installed hostapd in
> the Access Point and wa_supplicant in the client laptop. 
> 
> I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"

I ran a quick test with the current 0.5.x development branch versions of
hostapd and wpa_supplicant and the configuration files you used for
setting the EAP-PSK parameters worked fine.. Invalid MAC_P sounds like a
mismatch in the shared key used for EAP-PSK.

-- 
Jouni Malinen                                            PGP id EFC895FA










> Message du 22/10/08 à 16h09
> De : "jackbaker" <jackbaker at voila.fr>
> A : hostap at lists.shmoo.com
> Copie à : jackbaker at voila.fr
> Objet : Hostapd and wpa_supplicant configuration  -Failure -   Invalid MAC_P - supplicant used different EAP type 47
> 
> Hello,
> 
> Please, could you help me. 
> 
> Hostapd is on 0.5.x
> 
> I want to use hostapd and wpa_supplicant to sercure the access to a
> Network. I want to use WPA-EAP with EAP-PSK. I have installed hostapd in
> the Access Point and wa_supplicant in the client laptop. 
> 
> I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"
> 
> 
> I want to know il my configuration is valid or not.
> If it is valid, what is the problem? Is there a solution.
> 
> Thanks.
> 
> Jack
> 
> 
> 
> 
> 
> I used these
> configurations :
> 
> * The file .config of the hostapd :
> _________________________________________
> CONFIG_DRIVER_MADWIFI=y
> CFLAG += -I/usr/......#path to madwifi src
> CONFIG_EAP=y
> CONFIG_EAP_PSK=y
> CONFIG_RADIUS_SERVER=y
> _________________________________________
> 
> * The file hostapd.conf :
> _________________________________________
> 
> interface=ath1
> driver=madwifi
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=0
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=0
> ssid=test
> ath_algs=1
> ignore_broadcast_ssid=0
> 
> ieee8021x=1
> eapol_key_index_workaround=0
> eap_server=1
> 
> wpa_pairwise=TKIP
> own_ip_addr=10.0.0.20
> pa=1
> wpa_key_management=WPA-EAP
> 
> 
> 
> 
> 
> _________________________________________
> 
> * The file hostapd.eap_user.conf :
> _________________________________________
> 
> 
> "psk user"  PSK   "unknown"
> "eap_psk_user"    PSK   0123456789abcdef0123456789abcdef
> "eap_psk_user at example.com"   PSK   0123456789abcdef0123456789abcdef
> 
> 
> 
> 
> _________________________________________
> 
> * The file madwifi.conf :
> _________________________________________
> 
> 
> 
> interface=ath1
> 
> 
> bridge=br0
> 
> 
> driver=madwifi
> 
> 
> logger_syslog=-1
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=0
> 
> dump_file=/tmp/hostapd.dump
> 
> 
> ssid=wpa-test
> 
> 
> eap_server=0
> own_ip_addr=127.0.0.1
> 
> 
> 
> 
> _________________________________________
> 
> * The file .config of the wpa_supplicant :
> _________________________________________
> CONFIG_DRIVER_MADWIFI=y
> CFLAG += -I/usr/......#path to madwifi src
> CONFIG_IEEE8021X_EAPOL=y
> CONFIG_EAP_PSK=y
> CONFIG_CTRL_IFACE=y
> CONFIG_BACKEND=file
> CONFIG_PEERKEY=y
> _________________________________________
> 
> * The file wpa_supplicant.conf of the :
> _________________________________________
> 
> ctrl_interface=/var/run/wpa_supplicant
> eapol_version=1
> ap_scan=1
> fast_reauth=1
> 
> network={
>       ssid="test"
>       key_mgmt=WPA-EAP
>       eap=PSK
>       identity="eap_psk_user"
>       eappsk=0123456789abcdef0123456789abcdef
>       nai="eap_psk_user at example.com"
> }
> 
> 
> _________________________________________
> 
> When running hostapd, this message is shown (access point) :
> 
> _________________________________________
> ...
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> ...
> could not connect to kernel driver.
> ....
> l2_packet_receive - recvfrom: Network is down
> _________________________________________
> 
> And when running the wpa_supplicant, the hostapd show : 
> _________________________________________
> 
> IEEE 802.1X: 4 bytes from 00:20:a6:61:07:50
> 
>    IEEE 802.1X: version=1 type=1 length=0
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAPOL-Start from STA
> 
> ath1: STA 00:20:a6:61:07:50 WPA: event 5 notification
> 
> WPA: 00:20:a6:61:07:50 WPA_PTK entering state AUTHENTICATION2
> 
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state ABORTING
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state INITIALIZE
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: aborting authentication
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state RESTART
> 
> IEEE 802.1X: Integrated EAP server in use - do not generate EAP-Request/Identity
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> EAP: EAP entering state INITIALIZE
> 
> EAP: EAP entering state SELECT_ACTION
> 
> EAP: getDecision: no identity known yet -> CONTINUE
> 
> EAP: EAP entering state PROPOSE_METHOD
> 
> EAP: getNextMethod: vendor 0 type 1
> 
> EAP: EAP entering state METHOD_REQUEST
> 
> EAP: building EAP-Request: Identifier 236
> 
> EAP: EAP entering state SEND_REQUEST
> 
> EAP: eapReqData -> EAPOL - hexdump(len=5): 01 ec 00 05 01
> 
> EAP: EAP entering state IDLE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state CONNECTING
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state AUTHENTICATING
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST
> 
> IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 236)
> 
> TX EAPOL - hexdump(len=23): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 05 01 ec 00 05 01
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 21 bytes from 00:20:a6:61:07:50
> 
>    IEEE 802.1X: version=1 type=0 length=17
> 
>    EAP: code=2 identifier=236 length=17 (response)
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=236 len=17) from STA: EAP Response-Identity (1)
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: STA identity 'eap_psk_user'
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE
> 
> EAP: EAP-Response received - hexdump(len=17): 02 ec 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> EAP: EAP entering state RECEIVED
> 
> EAP: parseEapResp: rxResp=1 respId=236 respMethod=1 respVendor=0 respVendorMethod=0
> 
> EAP: EAP entering state INTEGRITY_CHECK
> 
> EAP: EAP entering state METHOD_RESPONSE
> 
> EAP-Identity: Peer identity - hexdump_ascii(len=12):
> 
>      65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user
> 
> EAP: EAP entering state SELECT_ACTION
> 
> EAP: getDecision: another method available -> CONTINUE
> 
> EAP: EAP entering state PROPOSE_METHOD
> 
> EAP: getNextMethod: vendor 0 type 47
> 
> EAP: EAP entering state METHOD_REQUEST
> 
> EAP: building EAP-Request: Identifier 237
> 
> EAP-PSK: PSK-1 (sending)
> 
> EAP-PSK: RAND_S (server rand) - hexdump(len=16): 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7
> 
> EAP: EAP entering state SEND_REQUEST
> 
> EAP: eapReqData -> EAPOL - hexdump(len=29): 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64
> 
> EAP: EAP entering state IDLE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST
> 
> IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)
> 
> TX EAPOL - hexdump(len=47): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 1d 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 82 bytes from 00:20:a6:61:07:50
> 
>    IEEE 802.1X: version=1 type=0 length=78
> 
>    EAP: code=2 identifier=237 length=78 (response)
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=237 len=78) from STA: EAP Response-PSK (47)
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE
> 
> EAP: EAP-Response received - hexdump(len=78): 02 ed 00 4e 2f 40 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> EAP: EAP entering state RECEIVED
> 
> EAP: parseEapResp: rxResp=1 respId=237 respMethod=47 respVendor=0 respVendorMethod=0
> 
> EAP: EAP entering state INTEGRITY_CHECK
> 
> EAP-PSK: received frame: T=1
> 
> EAP: EAP entering state METHOD_RESPONSE
> 
> EAP-PSK: Received PSK-2
> 
> EAP-PSK: ID_P - hexdump_ascii(len=24):
> 
>      65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61   eap_psk_user at exa
> 
>      6d 70 6c 65 2e 63 6f 6d                           mple.com
> 
> psk : �d��g��] : 17
> 
> EAP-PSK: AK - hexdump(len=16): [REMOVED]
> 
> EAP-PSK: KDK - hexdump(len=16): [REMOVED]
> 
> EAP-PSK: RAND_P (client rand) - hexdump(len=16): 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8
> 
> EAP-PSK: MAC_P - hexdump(len=16): 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66
> 
> EAP-PSK: Invalid MAC_P
> 
> EAP-PSK: Expected MAC_P - hexdump(len=16): fb 91 91 fb 90 4b f1 23 aa 16 86 2a e8 a5 48 15
> 
> EAP: EAP entering state SELECT_ACTION
> 
> EAP: getDecision: method failed -> FAILURE
> 
> EAP: EAP entering state FAILURE
> 
> EAP: Building EAP-Failure (id=237)
> 
> EAP: eapReqData -> EAPOL - hexdump(len=4): 04 ed 00 04
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state FAIL
> 
> IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)
> 
> TX EAPOL - hexdump(len=22): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 04 04 ed 00 04
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state HELD
> 
> madwifi_set_sta_authorized: addr=00:20:a6:61:07:50 authorized=0
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: unauthorizing port
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: authentication failed - EAP type: 0 (Unknown)
> 
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: Supplicant used different EAP type: 47 (PSK)
> 
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
> 
> Signal 2 received - terminating
> 
> ath1: STA 00:20:a6:61:07:50 MLME: MLME-DEAUTHENTICATE.indication(00:20:a6:61:07:50, 1)
> 
> ath1: STA 00:20:a6:61:07:50 MLME: MLME-DELETEKEYS.request(00:20:a6:61:07:50)
> 
> madwifi_del_key: addr=00:20:a6:61:07:50 key_idx=0
> 
> Removing station 00:20:a6:61:07:50
> 
> EAP: State machine removed
> 
> Flushing old station entries
> 
> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
> 
> Deauthenticate all stations
> 
> madwifi_set_privacy: enabled=0
> 
> madwifi_set_ieee8021x: enabled=0
> 
> madwifi_set_iface_flags: dev_up=0
> 
> _________________________________________
> 
> 
> 
>  the supplicant show :
> 
> _________________________________________
> 
> 
> 
> Selecting BSS from priority group 0
> Try to find WPA-enabled AP
> 
> 0: 00:20:a6:61:1c:da ssid='test' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
> 
>    selected based on WPA IE
> 
>    selected WPA AP 00:20:a6:61:1c:da ssid='test'
> 
> Try to find non-WPA AP
> 
> Trying to associate with 00:20:a6:61:1c:da (SSID='test' freq=2417 MHz)
> 
> Cancelling scan request
> 
> WPA: clearing own WPA/RSN IE
> 
> Automatic auth_alg selection: 0x1
> 
> WPA: using IEEE 802.11i/D3.0
> 
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1
> 
> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
> 
> WPA: clearing AP RSN IE
> 
> WPA: using GTK TKIP
> 
> WPA: using PTK TKIP
> 
> WPA: using KEY_MGMT 802.1X
> 
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
> 
> No keys have been configured - skip key clearing
> 
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> 
> State: SCANNING -> ASSOCIATING
> 
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> 
> WEXT: Operstate: linkmode=-1, operstate=5
> 
> wpa_driver_madwifi_associate
> 
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> 
> wpa_driver_madwifi_associate: SETMLME[ASSOC] failed
> 
> Association request to the driver failed
> 
> Setting authentication timeout: 5 sec 0 usec
> 
> EAPOL: External notification - portControl=Auto
> 
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> 
> Wireless event: cmd=0x8b1a len=12
> 
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> 
> Wireless event: cmd=0x8b15 len=20
> 
> Wireless event: new AP: 00:20:a6:61:1c:da
> 
> State: ASSOCIATING -> ASSOCIATED
> 
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> 
> WEXT: Operstate: linkmode=-1, operstate=5
> 
> Associated to a new BSS: BSSID=00:20:a6:61:1c:da
> 
> No keys have been configured - skip key clearing
> 
> Associated with 00:20:a6:61:1c:da
> 
> WPA: Association event - clear replay counter
> 
> EAPOL: External notification - portEnabled=0
> 
> EAPOL: External notification - portValid=0
> 
> EAPOL: External notification - portEnabled=1
> 
> EAPOL: SUPP_PAE entering state CONNECTING
> 
> EAPOL: SUPP_BE entering state IDLE
> 
> EAP: EAP entering state INITIALIZE
> 
> EAP: EAP entering state IDLE
> 
> Setting authentication timeout: 10 sec 0 usec
> 
> Cancelling scan request
> 
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> 
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added
> 
> RX EAPOL from 00:20:a6:61:1c:da
> 
> RX EAPOL - hexdump(len=9): 01 00 00 05 01 67 00 05 01
> 
> Setting authentication timeout: 70 sec 0 usec
> 
> EAPOL: Received EAP-Packet frame
> 
> EAPOL: SUPP_PAE entering state RESTART
> 
> EAP: EAP entering state INITIALIZE
> 
> EAP: EAP entering state IDLE
> 
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> 
> EAPOL: SUPP_BE entering state REQUEST
> 
> EAPOL: getSuppRsp
> 
> EAP: EAP entering state RECEIVED
> 
> EAP: Received EAP-Request id=103 method=1 vendor=0 vendorMethod=0
> 
> EAP: EAP entering state IDENTITY
> 
> CTRL-EVENT-EAP-STARTED EAP authentication started
> 
> EAP: EAP-Request Identity data - hexdump_ascii(len=0):
> 
> EAP: using real identity - hexdump_ascii(len=12):
> 
>      65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user
> 
> EAP: EAP entering state SEND_RESPONSE
> 
> EAP: EAP entering state IDLE
> 
> EAPOL: SUPP_BE entering state RESPONSE
> 
> EAPOL: txSuppRsp
> 
> TX EAPOL: dst=00:20:a6:61:1c:da
> 
> TX EAPOL - hexdump(len=21): 01 00 00 11 02 67 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72
> 
> EAPOL: SUPP_BE entering state RECEIVE
> 
> RX EAPOL from 00:20:a6:61:1c:da
> 
> RX EAPOL - hexdump(len=33): 01 00 00 1d 01 68 00 1d 2f 00 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 68 6f 73 74 61 70 64
> 
> EAPOL: Received EAP-Packet frame
> 
> EAPOL: SUPP_BE entering state REQUEST
> 
> EAPOL: getSuppRsp
> 
> EAP: EAP entering state RECEIVED
> 
> EAP: Received EAP-Request id=104 method=47 vendor=0 vendorMethod=0
> 
> EAP: EAP entering state GET_METHOD
> 
> EAP: Initialize selected EAP method: vendor 0 method 47 (PSK)
> 
> EAP-PSK: AK - hexdump(len=16): [REMOVED]
> 
> EAP-PSK: KDK - hexdump(len=16): [REMOVED]
> 
> CTRL-EVENT-EAP-METHOD EAP vendor 0 method 47 (PSK) selected
> 
> EAP: EAP entering state METHOD
> 
> EAP-PSK: in INIT state
> 
> EAP-PSK: Flags=0x0
> 
> EAP-PSK: RAND_S - hexdump(len=16): a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4
> 
> EAP-PSK: ID_S - hexdump_ascii(len=7):
> 
>      68 6f 73 74 61 70 64                              hostapd
> 
> EAP-PSK: RAND_P - hexdump(len=16): 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac
> 
> EAP-PSK: MAC_P - hexdump(len=16): 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25
> 
> EAP-PSK: ID_P - hexdump_ascii(len=24):
> 
>      65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61   eap_psk_user at exa
> 
>      6d 70 6c 65 2e 63 6f 6d                           mple.com
> 
> EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
> 
> EAP: EAP entering state SEND_RESPONSE
> 
> EAP: EAP entering state IDLE
> 
> EAPOL: SUPP_BE entering state RESPONSE
> 
> EAPOL: txSuppRsp
> 
> TX EAPOL: dst=00:20:a6:61:1c:da
> 
> TX EAPOL - hexdump(len=82): 01 00 00 4e 02 68 00 4e 2f 40 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
> 
> EAPOL: SUPP_BE entering state RECEIVE
> 
> RX EAPOL from 00:20:a6:61:1c:da
> 
> RX EAPOL - hexdump(len=8): 01 00 00 04 04 68 00 04
> 
> EAPOL: Received EAP-Packet frame
> 
> EAPOL: SUPP_BE entering state REQUEST
> 
> EAPOL: getSuppRsp
> 
> EAP: EAP entering state RECEIVED
> 
> EAP: Received EAP-Failure
> 
> EAP: EAP entering state FAILURE
> 
> CTRL-EVENT-EAP-FAILURE EAP authentication failed
> 
> EAPOL: SUPP_PAE entering state HELD
> 
> EAPOL: SUPP_BE entering state RECEIVE
> 
> EAPOL: SUPP_BE entering state FAIL
> 
> EAPOL: SUPP_BE entering state IDLE
> 
> EAPOL: startWhen --> 0
> 
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> 
> Wireless event: cmd=0x8b15 len=20
> 
> Wireless event: new AP: 00:00:00:00:00:00
> 
> Setting scan request: 0 sec 100000 usec
> 
> Added BSSID 00:20:a6:61:1c:da into blacklist
> 
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
> 
> wpa_driver_madwifi_del_key: keyidx=0
> 
> wpa_driver_madwifi_del_key: keyidx=1
> 
> wpa_driver_madwifi_del_key: keyidx=2
> 
> wpa_driver_madwifi_del_key: keyidx=3
> 
> wpa_driver_madwifi_del_key: keyidx=0
> 
> State: ASSOCIATED -> DISCONNECTED
> 
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> 
> WEXT: Operstate: linkmode=-1, operstate=5
> 
> EAPOL: External notification - portEnabled=0
> 
> EAPOL: SUPP_PAE entering state DISCONNECTED
> 
> EAPOL: SUPP_BE entering state INITIALIZE
> 
> EAP: EAP entering state DISABLED
> 
> EAPOL: External notification - portValid=0
> 
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> 
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added
> 
> State: DISCONNECTED -> SCANNING
> 
> Starting AP scan (broadcast SSID)
> 
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> 
> Wireless event: cmd=0x8b1a len=8
> 
> CTRL-EVENT-TERMINATING - signal 2 received
> 
> Removing interface ath1
> 
> State: SCANNING -> DISCONNECTED
> 
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> 
> WEXT: Operstate: linkmode=-1, operstate=5
> 
> No keys have been configured - skip key clearing
> 
> EAPOL: External notification - portEnabled=0
> 
> EAPOL: External notification - portValid=0
> 
> wpa_driver_madwifi_set_drop_unencrypted: enabled=0
> 
> wpa_driver_madwifi_set_countermeasures: enabled=0
> 
> No keys have been configured - skip key clearing
> 
> EAP: deinitialize previously used EAP method (47, PSK) at EAP deinit
> 
> Removed BSSID 00:20:a6:61:1c:da from blacklist (clear)
> 
> 
> _________________________________________
> 
> 
> 
> Thanks Again
> 
> 
> 
> 
> 
> ____________________________________________________
> 
> Voila vous offre 1 Go d’espace pour stocker et partager photos, vidéos, mp3 et autres documents ! http://www.voila.fr/Macle/
> 

____________________________________________________

1 Go d’espace pour stocker et partager photos, vidéos, mp3 et autres documents sur Ma Clé Voila ! http://macle.voila.fr




More information about the HostAP mailing list