No stable connection with the neu stable release 0.3.9
helas Akropolis
hela80
Tue Jun 14 13:57:48 PDT 2005
Hi all, Jouni
a have the neu hostap, hostapd and wpa_supplicant 0.3.9 release. Every thing work
fine even preauthentication :-)) but just for ~ 45 min. After REAUTHENTICATE i
have EAP TIMEOUT state and no Connection from wpa_supplicant(wxp sp2) to Access
Point or from Access Point to wpa_supplicant.
Can you please tell me why i am getting TIMEOUT while reauthentication ?? The
wpa_supplicant can not read the Server Certificate !! But why ?? At the beginn
of the connection he read the Server Certificate and the supplicant get authentificated..
Hope you can help me and thank you very much
helas
here the output of the wpa_supplicant:
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
NDIS: received event data - hexdump(len=74): 02 00 00 00 20 41 74 68 65 72 6f 73
12 0f a5 00 00 01 00 00 00
NDIS: event - type 2
NDIS: event InstanceName - hexdump_ascii(len=32):
41 74 68 65 72 6f 73 20 57 69 72 65 6c 65 73 73 Atheros Wireless
20 4e 65 74 77 6f 72 6b 20 41 64 61 70 74 65 72 Network Adapter
NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
NDIS: Media Specific Indication - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00
00 00 00 09 5b 2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
NDIS: PMKID Candidate List Event - Version 1 NumCandidates 2
NDIS: 0: 00:09:5b:2f:72:78 Flags 0x1
RSN: PMKID candidate event - bssid=00:09:5b:2f:72:78 index=0 preauth=1
RSN: added PMKSA cache candidate 00:09:5b:2f:72:78 prio 0
RSN: processing PMKSA candidate list
RSN: PMKSA candidate 00:09:5b:2f:72:78 does not need pre-authentication anymore
NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 2f 72
RSN: no more pending PMKSA candidates
NDIS: 1: 00:09:5b:12:0f:a5 Flags 0x1
RSN: PMKID candidate event - bssid=00:09:5b:12:0f:a5 index=1 preauth=1
RSN: added PMKSA cache candidate 00:09:5b:12:0f:a5 prio 1
RSN: processing PMKSA candidate list
RSN: PMKSA candidate 00:09:5b:12:0f:a5 does not need pre-authentication anymore
NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 12 0f
RSN: no more pending PMKSA candidates
NDIS: received event data - hexdump(len=105): 02 00 00 00 3f 4e 45 54 47 45 41 5
0 00 00 09 5b 12 0f a5 00 00 01 00 00 00
NDIS: event - type 2
NDIS: event InstanceName - hexdump_ascii(len=63):
4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73 NETGEAR 108 Mbps
20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 Wireless PC Car
64 20 57 47 35 31 31 54 20 2d 20 50 61 6b 65 74 d WG511T - Paket
70 6c 61 6e 65 72 2d 4d 69 6e 69 70 6f 72 74 planer-Miniport
NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
NDIS: ignored event for another adapter
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 09
.
.
.
00 20 95 98 db ca 9c 35 59 9c 77 2f 5f d0 c9 ad 76 19 d5 19 94 62 98 56 c6 ec 63
37 3a ab 9f 71 54 26
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=127
EAPOL-Key type=2
WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00
.
.
c6 ec 63 37 3a ab 9f 71 54 26
RSN: encrypted key data - hexdump(len=32): 95 98 db ca 9c 35 59 9c 77 2f 5f d0 c
9 ad 76 19 d5 19 94 62 98 56 c6 ec 63 37 3a ab 9f 71 54 26
WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED]
WPA: RX message 1 of Group Key Handshake from 00:09:5b:2f:72:78 (ver=2)
RSN: received GTK in group key handshake - hexdump(len=18): 02 00 0f 33 50 2a 24
66 47 b6 2e 5a c3 18 9c 05 25 0a
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
NDIS: OIS_802_11_ADD_KEY - hexdump(len=48): [REMOVED]
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88
.
.
WPA: Group rekeying completed with 00:09:5b:2f:72:78 [GTK=CCMP]
CTRL_IFACE monitor send 127.0.0.1:1888
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
.
.
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
RSN: Authenticator did not accept PMKID, doing full EAP authentication
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
RSN: PMKSA caching - do not send EAPOL-Start
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
WPA: EAPOL frame too short, len 14, expecting at least 99
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=15 idleWhile=45
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=5):
68 65 6c 6c 6f hello
EAP: using real identity - hexdump_ascii(len=6):
77 70 61 73 75 70 wpasup
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=29): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
.
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 14, expecting at least 99
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 15 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=2
EAP: EAP entering state GET_METHOD
EAP: using previous method data for fast re-authentication
EAP: initialize selected EAP method (21, TTLS)
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=6) - Flags 0x20
EAP-TTLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 132 bytes pending from ssl_out
SSL: 132 bytes left to be sent out (of total 132 bytes)
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=160): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00
.
.
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 10, expecting at least 99
EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=14 idleWhile=59
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 03 04 0a 15 c0 00 00 06 e5 16 03 01
.
.
.
02 46 48 31 14 30 12 06
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=3
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=1034) - Flags 0xc0
EAP-TTLS: TLS Message Length: 1765
SSL: Need 741 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
6 02 03 00 06 15 00
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=2 type=0 length=1034
WPA: EAPOL frame (type 0) discarded, not a Key frame
WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
RSN: Do not try to use cached PMKSA
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=755): 02 00 02 ef 01 04 02 ef 15 80 00 00 06 e5 03 55 04
.
.
.
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=4
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=751) - Flags 0x80
EAP-TTLS: TLS Message Length: 1765
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/ST=Hessen/L=Wi
esbaden/O=FH/OU=Entwicklung/CN=CA'
TLS: Certificate verification failed, error 7 (certificate signature failure) de
pth 0 for '/C=DE/ST=Hessen/L=Wiesbaden/O=FH/OU=Entwicklung/CN=SubCA'
SSL: (where=0x4008 ret=0x233)
SSL: SSL3 alert: write (local SSL3 detected an error):fatal:decrypt error
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server certificate B
SSL: SSL_connect: error:0D0890A1:lib(13):func(137):reason(161)
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
IEEE 802.1X RX: version=2 type=0 length=751
WPA: EAPOL frame (type 0) discarded, not a Key frame
WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
RSN: Do not try to use cached PMKSA
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=13 idleWhile=59
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=46
NDIS: received event data - hexdump(len=74): 02 00 00 00 20 41 74 68 65 72 6f 73
12 0f a5 00 00 01 00 00 00
NDIS: event - type 2
NDIS: event InstanceName - hexdump_ascii(len=32):
41 74 68 65 72 6f 73 20 57 69 72 65 6c 65 73 73 Atheros Wireless
20 4e 65 74 77 6f 72 6b 20 41 64 61 70 74 65 72 Network Adapter
NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
NDIS: Media Specific Indication - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00
NDIS: PMKID Candidate List Event - Version 1 NumCandidates 2
NDIS: 0: 00:09:5b:2f:72:78 Flags 0x1
RSN: PMKID candidate event - bssid=00:09:5b:2f:72:78 index=0 preauth=1
RSN: added PMKSA cache candidate 00:09:5b:2f:72:78 prio 0
RSN: processing PMKSA candidate list
RSN: PMKSA candidate 00:09:5b:2f:72:78 does not need pre-authentication anymore
NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 2f 72
RSN: no more pending PMKSA candidates
NDIS: 1: 00:09:5b:12:0f:a5 Flags 0x1
RSN: PMKID candidate event - bssid=00:09:5b:12:0f:a5 index=1 preauth=1
RSN: added PMKSA cache candidate 00:09:5b:12:0f:a5 prio 1
RSN: processing PMKSA candidate list
RSN: PMKSA candidate 00:09:5b:12:0f:a5 does not need pre-authentication anymore
NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 12 0f
RSN: no more pending PMKSA candidates
NDIS: received event data - hexdump(len=105): 02 00 00 00 3f 4e 45 54 47 45 41 5
0 00 00 09 5b 12 0f a5 00 00 01 00 00 00
NDIS: event - type 2
NDIS: event InstanceName - hexdump_ascii(len=63):
4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73 NETGEAR 108 Mbps
20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 Wireless PC Car
64 20 57 47 35 31 31 54 20 2d 20 50 61 6b 65 74 d WG511T - Paket
70 6c 61 6e 65 72 2d 4d 69 6e 69 70 6f 72 74 planer-Miniport
NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
NDIS: ignored event for another adapter
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=45
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 06 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
WPA: EAPOL frame too short, len 14, expecting at least 99
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=44
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=30
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 07 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
WPA: EAPOL frame too short, len 14, expecting at least 99
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=29
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=15
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 09 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
WPA: EAPOL frame too short, len 14, expecting at least 99
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=14
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAP: EAP entering state FAILURE
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 0a 00 0a 01 68 65 6c 6c 6f
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (21, TTLS) at INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=10
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=5):
68 65 6c 6c 6f hello
EAP: using real identity - hexdump_ascii(len=6):
77 70 61 73 75 70 wpasup
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=29): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
b 02 0a 00 0b 01 77 70 61 73 75 70
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 14, expecting at least 99
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=10): 02 00 00 06 01 0b 00 06 15 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=11
EAP: EAP entering state GET_METHOD
EAP: initialize selected EAP method (21, TTLS)
EAP-TTLS: Phase2 type: EAP
EAP-TTLS: Phase2 EAP types - hexdump(len=6): 04 1a 06 05 12 11
TLS: Trusted root certificate(s) loaded
TLS - SSL error: error:0B07C065:lib(11):func(124):reason(101)
TLS: Include TLS Message Length in unfragmented packets
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=6) - Flags 0x20
EAP-TTLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 100 bytes pending from ssl_out
SSL: 100 bytes left to be sent out (of total 100 bytes)
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=128): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00
.
.
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 10, expecting at least 99
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 0c 04 0a 15 c0 00 00 06 e5 16 03 01
.
.
.
02 46 48 31 14 30 12 06
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=12
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=1034) - Flags 0xc0
EAP-TTLS: TLS Message Length: 1765
SSL: Need 741 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
6 02 0c 00 06 15 00
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=2 type=0 length=1034
WPA: EAPOL frame (type 0) discarded, not a Key frame
WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
RSN: Do not try to use cached PMKSA
RX EAPOL from 00:09:5b:2f:72:78
RX EAPOL - hexdump(len=755): 02 00 02 ef 01 0d 02 ef 15 80 00 00 06 e5 03 55 04
The hostapd Output:
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state REAUTHENTICATE
wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 0, timeout 30)
IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 0)
Received 62 bytes management frame
DATA (TX callback) ACK
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP timeout
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state TIMEOUT
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 1, timeout 30)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 1)
Received 62 bytes management frame
DATA (TX callback) ACK
Received 47 bytes management frame
DATA
IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=2 type=0 length=11
EAP: code=2 identifier=1 length=11 (response)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=1 len=11) from STA: EAP Response-Identity (1)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: STA identity 'wpasup'
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
Encapsulating EAP message into a RADIUS packet
Sending RADIUS message to authentication server
Next RADIUS client retransmit in 3 seconds
Received 64 bytes from RADIUS server
Received RADIUS message
Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 00:09:5b:98:e2:7e
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=2 len=6) from RADIUS server: EAP-Request-TTLS (21)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 2)
Received 58 bytes management frame
DATA (TX callback) ACK
Received 178 bytes management frame
DATA
IEEE 802.1X: 146 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=2 type=0 length=142
EAP: code=2 identifier=2 length=142 (response)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=2 len=142) from STA: EAP Response-TTLS (21)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
Encapsulating EAP message into a RADIUS packet
Copied RADIUS State Attribute
Sending RADIUS message to authentication server
Next RADIUS client retransmit in 3 seconds
Received 1100 bytes from RADIUS server
Received RADIUS message
Received RADIUS packet matched with a pending request, round trip time 0.02 sec
RADIUS packet matching with station 00:09:5b:98:e2:7e
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=3 len=1034) from RADIUS server: EAP-Request-TTLS (21)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 3)
Received 1086 bytes management frame
DATA (TX callback) ACK
Received 42 bytes management frame
DATA
IEEE 802.1X: 10 bytes from 00:09:5b:98:e2:7e
IEEE 802.1X: version=2 type=0 length=6
EAP: code=2 identifier=3 length=6 (response)
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=3 len=6) from STA: EAP Response-TTLS (21)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
Encapsulating EAP message into a RADIUS packet
Copied RADIUS State Attribute
Sending RADIUS message to authentication server
Next RADIUS client retransmit in 3 seconds
Received 813 bytes from RADIUS server
Received RADIUS message
Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 00:09:5b:98:e2:7e
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=4 len=751) from RADIUS server: EAP-Request-TTLS (21)
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 4)
Received 803 bytes management frame
DATA (TX callback) ACK
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP timeout
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state TIMEOUT
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
_________________________________________________________________________
Mit der Gruppen-SMS von WEB.DE FreeMail k?nnen Sie eine SMS an alle
Freunde gleichzeitig schicken: http://freemail.web.de/features/?mc=021179
More information about the Hostap
mailing list