wpa_supplicant problem
helas Akropolis
hela80
Wed Jun 1 14:00:34 PDT 2005
Hi everyone, i hope you can help me and thank you very much..
wpa-psk work fine, but when i try to use eap-ttls there ist no connection between the wpa_supplicant(wxp sp2) and the
hostap. can anyone please tell me what i am doing wrong?
wpa_supplicant.conf:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
fast_reauth=1
network={
ssid="WirelessNetwork"
key_mgmt=WPA-EAP
eap=TTLS
identity="wpasup"
password="xxxxxxxxx"
ca_cert="X:\Diplom\Implementierung\wpa_supplicant-windows-bin-0.3.8\certs\ca.crt"
#ca_cert="X:\Diplom\Implementierung\wpa_supplicant-windows-bin-0.3.8\certs\ca.pem"
#ca_cert="X:\Diplom\Implementierung\wpa_supplicant-windows-bin-0.3.8\certs\ca.der"
}
##############################################################################
##############################################################################
[root at localhost hostapd-0.3.7]# hostapd -dd hostapd.conf
Configuration file: hostapd.conf
Opening raw packet socket for ifindex 5
Using interface wlan0 with hwaddr 00:09:5b:12:0f:a5 and ssid 'WirelessNetwork'
wlan0: RADIUS Authentication server 192.168.2.33:1812
WPA: group state machine entering state GTK_INIT
GMK - hexdump(len=32): 57 29 cc cf 52 66 b1 18 cf 1b ce e4 d4 63 f9 0d e4 9e 76 1a 67 0e cf 0c 0b 63 75 34 25 8a cb 8d
GTK - hexdump(len=32): 1d 2a d8 28 30 3b f7 e2 0c 10 f8 c0 88 16 6b 6e 91 6d 3e 82 f4 7d 7e 38 a2 91 ff 4a ff 8b 33 03
WPA: group state machine entering state SETKEYSDONE
Flushing old station entries
Deauthenticate all stations
Received 342 bytes management frame
extra data in frame (elen=0)
unknown frame type 3
Received 342 bytes management frame
extra data in frame (elen=0)
unknown frame type 3
MGMT
mgmt::auth
authentication: STA=00:09:5b:98:e2:7e auth_alg=0 auth_transaction=1 status_code=0 wep=0
New STA
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: authentication OK (open system)
wlan0: STA 00:09:5b:98:e2:7e WPA: event 0 notification
authentication reply: STA=00:09:5b:98:e2:7e auth_alg=0 auth_transaction=2 resp=0
Received 30 bytes management frame
MGMT (TX callback) ACK
mgmt::auth cb
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: authenticated
Received 75 bytes management frame
MGMT
mgmt::assoc_req
association request: STA=00:09:5b:98:e2:7e capab_info=0x01 listen_interval=1
new AID 1
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: association OK (aid 1)
Received 36 bytes management frame
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.11: associated (aid 1, accounting session 429DB6F9-00000000)
wlan0: STA 00:09:5b:98:e2:7e WPA: event 1 notification
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: start authentication
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state INITIALIZE
wlan0: STA 00:09:5b:98:e2:7e WPA: start authentication
WPA: 00:09:5b:98:e2:7e WPA_PTK entering state INITIALIZE
WPA: 00:09:5b:98:e2:7e WPA_PTK_GROUP entering state IDLE
WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION
WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
Wireless event: cmd=0x8c03 len=20
Received 37 bytes management frame
DATA
IEEE 802.1X: 5 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=1 type=1 length=0
ignoring 1 extra octets after IEEE 802.1X packet
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAPOL-Start from STA
wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state DISCONNECTED
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: unauthorizing port
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e CTRL_DIR entering state FORCE_BOTH
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 0, timeout 30)
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 0)
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
Received 46 bytes management frame
DATA (TX callback) ACK
IEEE 802.1X: 00:09:5b:98:e2:7e TX status - version=2 type=0 length=10 - ack=1
Received 36 bytes management frame
DATA
IEEE 802.1X: 4 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=1 type=1 length=0
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAPOL-Start from STA
wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 1, timeout 30)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 1)
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
Received 46 bytes management frame
DATA (TX callback) ACK
IEEE 802.1X: 00:09:5b:98:e2:7e TX status - version=2 type=0 length=10 - ack=1
Received 47 bytes management frame
DATA
IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=1 type=0 length=11
EAP: code=2 identifier=0 length=11 (response)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP Identifier of the Response-Identity does not match (was 0, expected 1) - ignored
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
Received 47 bytes management frame
DATA
IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=1 type=0 length=11
EAP: code=2 identifier=1 length=11 (response)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=1 len=11) from STA: EAP Response-Identity (1)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: STA identity 'wpasup'
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
Encapsulating EAP message into a RADIUS packet
Sending RADIUS message to authentication server
Next RADIUS client retransmit in 3 seconds
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
Received 64 bytes from RADIUS server
Received RADIUS message
Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 00:09:5b:98:e2:7e
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=2 len=6) from RADIUS server: EAP-Request-TTLS (21)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 2)
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
#############################################################################
#############################################################################
The RADIUSServer dont tel me any errors:
rad_recv: Access-Request packet from host 192.168.2.1:32768, id=0, length=161
User-Name = "wpasup"
NAS-IP-Address = 192.168.2.1
NAS-Port = 1
Called-Station-Id = "00-09-5B-12-0F-A5:WirelessNetwork"
Calling-Station-Id = "00-09-5B-98-E2-7E"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0201000b01777061737570
Message-Authenticator = 0x2e0250f37e4e8ea80c19b5425fbf8975
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "wpasup", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 1 length 11
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
users: Matched entry wpasup at line 100
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 0 to 192.168.2.1:32768
EAP-Message = 0x010200061520
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb5eeb1affaee2bc8145aa107b23ba0be
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.2.1:32768, id=1, length=174
User-Name = "wpasup"
NAS-IP-Address = 192.168.2.1
NAS-Port = 1
Called-Station-Id = "00-09-5B-12-0F-A5:WirelessNetwork"
Calling-Station-Id = "00-09-5B-98-E2-7E"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x02020006030d
State = 0xb5eeb1affaee2bc8145aa107b23ba0be
Message-Authenticator = 0xe5ff72c377ae7a47815759270d0fb8f5
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "wpasup", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 2 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
users: Matched entry wpasup at line 100
modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP NAK
rlm_eap: EAP-NAK asked for EAP-Type/tls
rlm_eap: processing type tls
rlm_eap_tls: Requiring client certificate
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 1 to 192.168.2.1:32768
EAP-Message = 0x010300060d20
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xf31846e3989efb50921335bf62f2fe19
Finished request 1
Going to the next request
.
.
.
--- Walking the entire request list ---
Cleaning up request 6 ID 6 with timestamp 429db79b
Cleaning up request 7 ID 7 with timestamp 429db79b
Nothing to do. Sleeping until we see a request.
##############################################################################
##############################################################################
The wpa_supplicant say everytime i get connected: SSL: SSL_connect:error in SSLv3 read server hello A
X:wpa_supplicant-windows-bin-0.3.8>wpa_supplicant.exe -i \Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858} -c wpa_supplicant.conf -dd
Initializing interface '\Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858}' conf
'wpa_supplicant.conf' driver 'default'
Configuration file 'wpa_supplicant.conf' -> 'X:wpa_supplicant-windows-bin-0.3.8/wpa_supplicant.conf'
Reading configuration file 'X:wpa_supplicant-windows-bin-0.3.8/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 294 - start of a new network block
ssid - hexdump_ascii(len=15):
57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b WirelessNetwork
key_mgmt: 0x1
eap methods - hexdump(len=2): 15 00
anonymous_identity - hexdump_ascii(len=6):
77 70 61 73 75 70 wpasup
password - hexdump_ascii(len=10): [REMOVED]
ca_cert - hexdump_ascii(len=71):
58 3a 5c 44 69 70 6c 6f 6d 5c 49 6d 70 6c 65 6d X:\.....\.......
65 6e 74 69 65 72 75 6e 67 5c 77 70 61 5f 73 75 entierung\wpa_su
70 70 6c 69 63 61 6e 74 2d 77 69 6e 64 6f 77 73 pplicant-windows
2d 62 69 6e 2d 30 2e 33 2e 38 5c 63 65 72 74 73 -bin-0.3.8\certs
5c 63 61 2e 63 72 74 \ca.crt
Priority group 0
id=0 ssid='WirelessNetwork'
Initializing interface (2) '\Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858}'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
NDIS: 4 adapter names found
NDIS: 4 adapter descriptions found
NDIS: 0 - \Device\NPF_GenericNdisWanAdapter - Generic NdisWan adapter
NDIS: 1 - \Device\NPF_{54617D0B-61F8-4370-AB78-D0609129F1D5} - WAN (PPP/SLIP) In
terface
NDIS: 2 - \Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858} - NETGEAR 108 Mbps
Wireless PC Card WG511T (Microsoft's Packet Scheduler)
NDIS: 3 - \Device\NPF_{5C0997E9-AFF5-423C-90A7-E9D32B2E7B1B} - NET IP/1394 Minip
ort
NDIS: Adapter description prefix 'NETGEAR 108 Mbps Wireless PC Card WG511T'
ndis_get_oid: oid=0xd010122 len (512) failed
NDIS: verifying driver WPA capability
NDIS: WPA key management supported
NDIS: WPA-PSK key management supported
NDIS: CCMP encryption supported
NDIS: TKIP encryption supported
NDIS: driver supports WPA
NDIS: driver capabilities: key_mgmt 0x5 enc 0xc auth 0x3
Own MAC address: 00:09:5b:98:e2:7e
wpa_driver_ndis_set_wpa: enabled=1
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
NDIS: turning radio on before the first scan
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
ndis_get_oid: oid=0xd010101 len (6) failed
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
ndis_get_oid: oid=0xd010101 len (6) failed
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
RX ctrl_iface - hexdump_ascii(len=6):
41 54 54 41 43 48 ATTACH
CTRL_IFACE monitor attached 127.0.0.1:2081
ndis_get_oid: oid=0xd010101 len (6) failed
Scan timeout - try to get results
Scan results: 2
Selecting BSS from priority group 0
0: 00:30:f1:bc:03:64 ssid=' ' wpa_ie_len=0 rsn_ie_len=0
skip - no WPA/RSN IE
1: 00:09:5b:12:0f:a5 ssid='WirelessNetwork' wpa_ie_len=28 rsn_ie_len=0
selected
Trying to associate with 00:09:5b:12:0f:a5 (SSID='WirelessNetwork' freq=2422 MHz
)
CTRL_IFACE monitor send 127.0.0.1:2081
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
NDIS: received event data - hexdump(len=45): 00 00 00 00 28 4e 45 54 47 45 41 52
20 31 30 38 20 4d 62 70 73 20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 64 2
0 57 47 35 31 31 54
NDIS: event - type 0
NDIS: event InstanceName - hexdump_ascii(len=40):
4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73 NETGEAR 108 Mbps
20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 Wireless PC Car
64 20 57 47 35 31 31 54 d WG511T
NDIS: Media Connect Event
NDIS: association information - hexdump(len=151): 28 00 00 00 03 00 01 00 01 00
00 00 00 00 00 00 2f 00 00 00 28 00 00 00 07 00 11 00 00 00 01 c0 06 00 00 00 57
00 00 00 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b 01 04 02 04 0b 16 d
d 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 01 01 04 82
84 0b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00
NDIS: ReqFixed=0x3 RespFixed=0x7 off_req=40 off_resp=87 len_req=47 len_resp=6
NDIS: Request IEs - hexdump(len=47): 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6
f 72 6b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04
01 00 00 50 f2 01
NDIS: Response IEs - hexdump(len=6): 01 04 82 84 0b 16
Association info event
req_ies - hexdump(len=47): 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b 01
04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 5
0 f2 01
resp_ies - hexdump(len=6): 01 04 82 84 0b 16
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50
f2 04 01 00 00 50 f2 01
Association event - clear replay counter
Associated to a new BSS: BSSID=00:09:5b:12:0f:a5
No keys have been configured - skip key clearing
Associated with 00:09:5b:12:0f:a5
CTRL_IFACE monitor send 127.0.0.1:2081
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL - hexdump(len=18): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 01 00 0
0
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=0
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=5):
68 65 6c 6c 6f hello
EAP: using anonymous identity - hexdump_ascii(len=6):
77 70 61 73 75 70 wpasup
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=29): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 00 00 0
b 02 00 00 0b 01 77 70 61 73 75 70
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 14, expecting at least 99
EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=29 idleWhile=59
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=5):
68 65 6c 6c 6f hello
EAP: using anonymous identity - hexdump_ascii(len=6):
77 70 61 73 75 70 wpasup
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=29): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 00 00 0
b 02 01 00 0b 01 77 70 61 73 75 70
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 14, expecting at least 99
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 15 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=2
EAP: EAP entering state GET_METHOD
EAP: initialize selected EAP method (21, TTLS)
EAP-TTLS: Phase2 type: EAP
EAP-TTLS: Phase2 EAP types - hexdump(len=6): 04 1a 06 05 12 11
TLS: Trusted root certificate(s) loaded
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=6) - Flags 0x20
EAP-TTLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 100 bytes pending from ssl_out
SSL: 100 bytes left to be sent out (of total 100 bytes)
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=124): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 01 00 00
6a 02 02 00 6a 15 00 16 03 01 00 5f 01 00 00 5b 03 01 42 9d b7 1a 5b 92 ad 3b 7b
6c 93 95 b9 65 c5 e4 06 af 62 c8 c2 7f 32 6d 24 8f 99 2d 1a 00 59 bf 00 00 34 0
0 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 66 00 05 00 04 00 63 00
62 00 61 00 15 00 12 00 09 00 65 00 64 00 60 00 14 00 11 00 08 00 06 00 03 01 00
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 10, expecting at least 99
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 0d 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=3
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 10, expecting at least 99
EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=28 idleWhile=59
EAPOL: Port Timers tick - authWhile=28 heldWhile=0 startWhen=27 idleWhile=58
EAPOL: Port Timers tick - authWhile=27 heldWhile=0 startWhen=26 idleWhile=57
EAPOL: Port Timers tick - authWhile=26 heldWhile=0 startWhen=25 idleWhile=56
EAPOL: Port Timers tick - authWhile=25 heldWhile=0 startWhen=24 idleWhile=55
##############################################################################
##############################################################################
Here the Output of the wpa_cli.exe
Interactive mode
> status
<2>Trying to associate with 00:09:5b:12:0f:a5 (SSID='WirelessNetwork' freq=2422
MHz)
<2>Associated with 00:09:5b:12:0f:a5
<2>Disconnect event - remove keys
<2>Trying to associate with 00:09:5b:12:0f:a5 (SSID='WirelessNetwork' freq=2422
MHz)
<2>Associated with 00:09:5b:12:0f:a5
bssid=00:09:5b:12:0f:a5
ssid=WirelessNetwork
pairwise_cipher=CCMP
group_cipher=TKIP
key_mgmt=WPA/IEEE 802.1X/EAP
wpa_state=ASSOCIATED
Supplicant PAE state=AUTHENTICATING
suppPortStatus=Unauthorized
EAP state=IDLE
selectedMethod=21 (EAP-TTLS)
EAP TLS cipher=(NONE)
EAP-TTLS Phase2 method=EAP-?
______________________________________________________________
Verschicken Sie romantische, coole und witzige Bilder per SMS!
Jetzt bei WEB.DE FreeMail: http://f.web.de/?mc=021193
More information about the Hostap
mailing list