terminated at sending EAPOL-key 2/4 on PEAP.
YenJung Chang
yenjung
Wed Nov 3 21:48:05 PST 2004
Hi, list
I can't connect to my RADIUS server with EAP-PEAP, my setting,
environment and debug message are showed below..
However, the WPA-PSK is workable...
<environment>
=============================
RADIUS server: windows 2000 server
AP: Cisco 1200 a+b
STATION:
- Kernel: 2.4.25
- Wireless card: Atheros ar5212
- Driver: Madwifi
- wpa_supplicant version: 0.2.5
=============================
<setting>
==============================
# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
# (e.g., Radiator)
network={
ssid="1200b"
key_mgmt=WPA-EAP
eap=PEAP
identity="spencer"
password="Ss=1234"
ca_cert="/etc/ssl/certs/netgearca.pem"
phase1="peaplabel=1"
phase2="auth=MSCHAPV2"
priority=2
}
command:
wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0
==========================================
<debug message>
===========================================
l2_packet_receive - recv: Network is down
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
Priority group 2
id=0 ssid='1200b'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_madwifi_set_wpa: enabled=1
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_set_countermeasures: enabled=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 2716 bytes of scan results (13 BSSes)
Scan results: 13
Selecting BSS from priority group 2
0: 00:09:5b:f7:14:8c ssid='*spencer*' wpa_ie_len=24 rsn_ie_len=0
skip - SSID mismatch
1: 00:0f:b5:10:a5:38 ssid='davidv3' wpa_ie_len=26 rsn_ie_len=0
skip - SSID mismatch
2: 00:0c:85:71:6e:a8 ssid='1200b' wpa_ie_len=24 rsn_ie_len=0
selected
Trying to associate with 00:0c:85:71:6e:a8 (SSID='1200b' freq=2437 MHz)
Cancelling scan request
WPA: using IEEE 802.11i/D3.0
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 01
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=18
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:85:71:6e:a8
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0c:85:71:6e:a8
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0c:85:71:6e:a8
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=7):
73 70 65 6e 63 65 72 spencer
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 46, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=2
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=7):
73 70 65 6e 63 65 72 spencer
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 46, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=3
EAP: EAP entering state GET_METHOD
EAP-PEAP: Force new label for key derivation
EAP-PEAP: Phase2 type: MSCHAPV2
SSL: Trusted root certificate(s) loaded
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 100 bytes left to be sent out (of total 100 bytes)
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 46, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=4
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=1396) - Flags 0xc0
EAP-PEAP: TLS Message Length: 4723
SSL: Need 3337 bytes more input data
SSL: Building ACK
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=1 type=0 length=1396
WPA: EAPOL frame (type 0) discarded, not a Key frame
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=5
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=1396) - Flags 0x40
SSL: Need 1947 bytes more input data
SSL: Building ACK
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=1 type=0 length=1396
WPA: EAPOL frame (type 0) discarded, not a Key frame
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=6
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=1396) - Flags 0x40
SSL: Need 557 bytes more input data
SSL: Building ACK
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=1 type=0 length=1396
WPA: EAPOL frame (type 0) discarded, not a Key frame
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=7
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=563) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
SSL: eap_tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1
buf='/DC=com/DC=GUI/CN=Netgear CA'
SSL: eap_tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0
buf='/CN=dni-9j5p6pp7hnj.GUI.com'
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate request A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 194 bytes left to be sent out (of total 194 bytes)
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=1 type=0 length=563
WPA: EAPOL frame (type 0) discarded, not a Key frame
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=8
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=53) - Flags 0x80
EAP-PEAP: TLS Message Length: 43
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client PEAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): f8 50 44 cc e4 a5 95 7e 34 15
09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af ae
9f fc e0 35 29 c5 e5 ee b2 46 45 38 f1 e8 94 45 90 5b aa 6f 8f fb 1d
b3 5f 6a a8 1d 3e 63 4a
SSL: Building ACK
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 57, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=9
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=28) - Flags 0x00
EAP-PEAP: received 22 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=7):
73 70 65 6e 63 65 72 spencer
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=12): 02 09 00 0c 01 73
70 65 6e 63 65 72
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 46, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=10
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=64) - Flags 0x00
EAP-PEAP: received 58 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=37): 1a 01 0a 00 24 10
32 1d da 61 e2 2b a7 4e 2c f4 8a 98 03 d8 d2 9e 44 4e 49 2d 39 4a 35
50 36 50 50 37 48 4e 4a
EAP-PEAP: received Phase 2: code=1 identifier=10 length=41
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Phase 2 EAP packet
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=15):
44 4e 49 2d 39 4a 35 50 36 50 50 37 48 4e 4a DNI-9J5P6PP7HNJ
EAP-MSCHAPV2: Generating Challenge Response
EAP-MSCHAPV2: auth_challenge - hexdump(len=16): 32 1d da 61 e2 2b a7
4e 2c f4 8a 98 03 d8 d2 9e
EAP-MSCHAPV2: peer_challenge - hexdump(len=16): f1 c8 54 a8 1a f7 9b
7a c1 8c 31 7a e0 c4 62 5d
EAP-MSCHAPV2: username - hexdump_ascii(len=7):
73 70 65 6e 63 65 72 spencer
EAP-MSCHAPV2: password - hexdump_ascii(len=7):
53 73 3d 31 32 33 34 Ss=1234
EAP-MSCHAPV2: response - hexdump(len=24): a0 7d d4 88 1e 96 a6 b1 4c
70 35 bf 66 94 c9 1e 5c 58 f6 45 e8 38 af d1
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=66): 02 0a 00 42 1a 02
0a 00 3d 31 f1 c8 54 a8 1a f7 9b 7a c1 8c 31 7a e0 c4 62 5d 00 00 00
00 00 00 00 00 a0 7d d4 88 1e 96 a6 b1 4c 70 35 bf 66 94 c9 1e 5c 58
f6 45 e8 38 af d1 00 73 70 65 6e 63 65 72
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 68, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=11
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=74) - Flags 0x00
EAP-PEAP: received 68 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53
3d 43 37 45 38 35 42 38 46 38 30 36 34 31 46 36 36 45 32 46 36 34 37
37 45 41 36 32 33 41 46 38 30 37 30 46 46 44 38 41 39
EAP-PEAP: received Phase 2: code=1 identifier=11 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Phase 2 EAP packet
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): 02 0b 00 06 1a 03
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 78, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=25 id=12
EAP: EAP entering state METHOD
EAP-PEAP: Received packet(len=38) - Flags 0x00
EAP-PEAP: received 32 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80
03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-PEAP: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-PEAP: Result TLV - hexdump(len=2): 00 01
EAP-PEAP: TLV Result - Success - EAP-PEAP/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): 02 0c 00 0b 21 80
03 00 02 00 01
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 46, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Workaround for unexpected identifier field in EAP Success:
reqId=13 lastId=12 (these are supposed to be same)
EAP: EAP entering state SUCCESS
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
WPA: EAPOL frame too short, len 46, expecting at least 99
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX message 1 of 4-Way Handshake from 00:0c:85:71:6e:a8 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: Renewed SNonce - hexdump(len=32): b7 a5 c6 89 79 94 04 e0 88 f7
48 48 ae a6 84 f7 48 e7 6b e2 0c e8 19 87 01 5f 20 dc 0b e7 d8 10
WPA: PMK from EAPOL state machines - hexdump(len=32): f8 50 44 cc e4
a5 95 7e 34 15 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1
ce 48 4a af
WPA: PMK - hexdump(len=32): f8 50 44 cc e4 a5 95 7e 34 15 09 03 06 97
ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af
WPA: PTK - hexdump(len=64): ca cd 66 64 b3 fc 22 c2 d1 1e 38 5d 11 0b
90 47 a9 a7 75 b2 98 b4 c8 7b e4 b3 09 fd f8 b3 10 b8 c0 ec 68 34 6b
c0 a2 d9 4e 3e f2 f5 39 ef ee 82 62 27 51 be 9a 09 6a 68 b1 63 a1 c3
5d 96 ea f6
WPA: EAPOL-Key MIC - hexdump(len=16): 05 d0 a1 6c 24 5a 40 a2 15 b2 b4
24 97 ea 41 31
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX message 1 of 4-Way Handshake from 00:0c:85:71:6e:a8 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: PMK from EAPOL state machines - hexdump(len=32): f8 50 44 cc e4
a5 95 7e 34 15 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1
ce 48 4a af
WPA: PMK - hexdump(len=32): f8 50 44 cc e4 a5 95 7e 34 15 09 03 06 97
ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af
WPA: PTK - hexdump(len=64): 04 b6 7f 59 b9 33 17 78 b9 10 86 35 18 8c
ab 32 37 e7 48 17 20 80 22 f8 32 a0 7a cc 7a 87 2f ca b8 0b 2a 24 a1
e6 6e 73 9b 49 45 1b d0 68 31 93 9f 63 d6 73 db fb 04 12 eb c8 ff 77
03 40 7d 62
WPA: EAPOL-Key MIC - hexdump(len=16): 91 1c 3f e5 fb 00 ed ce fe b4 8e
f5 f6 ec e3 fb
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:0c:85:71:6e:a8
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
WPA: RX message 1 of 4-Way Handshake from 00:0c:85:71:6e:a8 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: PMK from EAPOL state machines - hexdump(len=32): f8 50 44 cc e4
a5 95 7e 34 15 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1
ce 48 4a af
WPA: PMK - hexdump(len=32): f8 50 44 cc e4 a5 95 7e 34 15 09 03 06 97
ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af
WPA: PTK - hexdump(len=64): de 9b 98 fd 5b 32 ff 12 4d 8d 4a 94 89 7f
d8 a0 6f b4 f6 45 55 0a 94 95 83 39 52 44 62 16 b4 b6 ce 4d c7 40 ad
c2 a3 40 5f a5 11 45 4e a0 8c 99 d5 ed e1 b3 b5 45 e2 27 61 73 14 12
7d 89 3e 83
WPA: EAPOL-Key MIC - hexdump(len=16): b6 3a 56 f5 cb 31 9b 66 c6 43 d4
ae 25 64 1b 12
WPA: Sending EAPOL-Key 2/4
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
==================================================
Please tell me what mistake I made.
If there is more information I should provide, please tell me.
Any advice is appreciated.
Thanks,
yj.
More information about the Hostap
mailing list