Bug in the new stable release 0.3.9 ?

helas Akropolis hela80
Sat Jun 18 05:47:26 PDT 2005


Hi all, Jouni
 
 i a have the neu hostap, hostapd and wpa_supplicant 0.3.9 release. Every thing work
 fine even preauthentication :-)) but just for ~ 45 min. After REAUTHENTICATE i 
 have EAP TIMEOUT state and no Connection from wpa_supplicant(wxp sp2) to Access 
 Point or from Access Point to wpa_supplicant.
 
 Can you please tell me why i am getting TIMEOUT while reauthentication ?? The 
 wpa_supplicant can not read the Server Certificate !! But why ?? At the beginn
 of the connection he read the Server Certificate and the supplicant get authentificated..
 
 Hope you can help me and thank you very much
 
 helas
 
 here the output of the wpa_supplicant:
 
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
 NDIS: received event data - hexdump(len=74): 02 00 00 00 20 41 74 68 65 72 6f 73
 12 0f a5 00 00 01 00 00 00
 NDIS: event - type 2
 NDIS: event InstanceName - hexdump_ascii(len=32):
      41 74 68 65 72 6f 73 20 57 69 72 65 6c 65 73 73   Atheros Wireless
      20 4e 65 74 77 6f 72 6b 20 41 64 61 70 74 65 72    Network Adapter
 NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
  2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
 NDIS: Media Specific Indication - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00
  00 00 00 09 5b 2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
 NDIS: PMKID Candidate List Event - Version 1 NumCandidates 2
 NDIS: 0: 00:09:5b:2f:72:78 Flags 0x1
 RSN: PMKID candidate event - bssid=00:09:5b:2f:72:78 index=0 preauth=1
 RSN: added PMKSA cache candidate 00:09:5b:2f:72:78 prio 0
 RSN: processing PMKSA candidate list
 RSN: PMKSA candidate 00:09:5b:2f:72:78 does not need pre-authentication anymore
 NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 2f 72
  
 RSN: no more pending PMKSA candidates
 NDIS: 1: 00:09:5b:12:0f:a5 Flags 0x1
 RSN: PMKID candidate event - bssid=00:09:5b:12:0f:a5 index=1 preauth=1
 RSN: added PMKSA cache candidate 00:09:5b:12:0f:a5 prio 1
 RSN: processing PMKSA candidate list
 RSN: PMKSA candidate 00:09:5b:12:0f:a5 does not need pre-authentication anymore
 NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 12 0f

 RSN: no more pending PMKSA candidates
 NDIS: received event data - hexdump(len=105): 02 00 00 00 3f 4e 45 54 47 45 41 5
 0 00 00 09 5b 12 0f a5 00 00 01 00 00 00
 NDIS: event - type 2
 NDIS: event InstanceName - hexdump_ascii(len=63):
      4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73   NETGEAR 108 Mbps
      20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72    Wireless PC Car
      64 20 57 47 35 31 31 54 20 2d 20 50 61 6b 65 74   d WG511T - Paket
      70 6c 61 6e 65 72 2d 4d 69 6e 69 70 6f 72 74      planer-Miniport
 NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
  
 NDIS: ignored event for another adapter
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
 .
 .
 .
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 09
 .
 .
 .
 00 20 95 98 db ca 9c 35 59 9c 77 2f 5f d0 c9 ad 76 19 d5 19 94 62 98 56 c6 ec 63
  37 3a ab 9f 71 54 26
 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
 IEEE 802.1X RX: version=2 type=3 length=127
   EAPOL-Key type=2
 WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00
 .
 .
  c6 ec 63 37 3a ab 9f 71 54 26
 RSN: encrypted key data - hexdump(len=32): 95 98 db ca 9c 35 59 9c 77 2f 5f d0 c
 9 ad 76 19 d5 19 94 62 98 56 c6 ec 63 37 3a ab 9f 71 54 26
 WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED]
 WPA: RX message 1 of Group Key Handshake from 00:09:5b:2f:72:78 (ver=2)
 RSN: received GTK in group key handshake - hexdump(len=18): 02 00 0f 33 50 2a 24
  66 47 b6 2e 5a c3 18 9c 05 25 0a
 WPA: Group Key - hexdump(len=16): [REMOVED]
 WPA: Installing GTK to the driver (keyidx=2 tx=0).
 WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
 NDIS: OIS_802_11_ADD_KEY - hexdump(len=48): [REMOVED]
 WPA: Sending EAPOL-Key 2/2
 WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88
 .
 .
 WPA: Group rekeying completed with 00:09:5b:2f:72:78 [GTK=CCMP]
 CTRL_IFACE monitor send 127.0.0.1:1888
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
 .
 .
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
 RSN: Authenticator did not accept PMKID, doing full EAP authentication
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_PAE entering state CONNECTING
 EAPOL: txStart
 RSN: PMKSA caching - do not send EAPOL-Start
 EAP: EAP entering state INITIALIZE
 EAP: maintaining EAP method data for fast reauthentication
 EAP: EAP entering state IDLE
 WPA: EAPOL frame too short, len 14, expecting at least 99
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
 .
 .
 .
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=15 idleWhile=45
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=14): 02 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_PAE entering state RESTART
 EAP: EAP entering state INITIALIZE
 EAP: maintaining EAP method data for fast reauthentication
 EAP: EAP entering state IDLE
 EAPOL: SUPP_PAE entering state AUTHENTICATING
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=1 id=1
 EAP: EAP entering state IDENTITY
 EAP: EAP-Request Identity data - hexdump_ascii(len=5):
      68 65 6c 6c 6f                                    hello
 EAP: using real identity - hexdump_ascii(len=6):
      77 70 61 73 75 70                                 wpasup
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_BE entering state RESPONSE
 EAPOL: txSuppRsp
 TX EAPOL - hexdump(len=29): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
 .
 EAPOL: SUPP_BE entering state RECEIVE
 WPA: EAPOL frame too short, len 14, expecting at least 99
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 15 20
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=21 id=2
 EAP: EAP entering state GET_METHOD
 EAP: using previous method data for fast re-authentication
 EAP: initialize selected EAP method (21, TTLS)
 EAP: EAP entering state METHOD
 EAP-TTLS: Received packet(len=6) - Flags 0x20
 EAP-TTLS: Start
 SSL: (where=0x10 ret=0x1)
 SSL: (where=0x1001 ret=0x1)
 SSL: SSL_connect:before/connect initialization
 SSL: (where=0x1001 ret=0x1)
 SSL: SSL_connect:SSLv3 write client hello A
 SSL: (where=0x1002 ret=0xffffffff)
 SSL: SSL_connect:error in SSLv3 read server hello A
 SSL: SSL_connect - want more data
 SSL: 132 bytes pending from ssl_out
 SSL: 132 bytes left to be sent out (of total 132 bytes)
 EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_BE entering state RESPONSE
 EAPOL: txSuppRsp
 TX EAPOL - hexdump(len=160): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00
 .
 .
 EAPOL: SUPP_BE entering state RECEIVE
 WPA: EAPOL frame too short, len 10, expecting at least 99
 EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=14 idleWhile=59
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 03 04 0a 15 c0 00 00 06 e5 16 03 01
 .
 .
 .
 02 46 48 31 14 30 12 06
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=21 id=3
 EAP: EAP entering state METHOD
 EAP-TTLS: Received packet(len=1034) - Flags 0xc0
 EAP-TTLS: TLS Message Length: 1765
 SSL: Need 741 bytes more input data
 SSL: Building ACK
 EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_BE entering state RESPONSE
 EAPOL: txSuppRsp
 TX EAPOL - hexdump(len=24): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
 6 02 03 00 06 15 00
 EAPOL: SUPP_BE entering state RECEIVE
 IEEE 802.1X RX: version=2 type=0 length=1034
 WPA: EAPOL frame (type 0) discarded, not a Key frame
 WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
 RSN: Do not try to use cached PMKSA
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=755): 02 00 02 ef 01 04 02 ef 15 80 00 00 06 e5 03 55 04
 .
 .
 .
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=21 id=4
 EAP: EAP entering state METHOD
 EAP-TTLS: Received packet(len=751) - Flags 0x80
 EAP-TTLS: TLS Message Length: 1765
 SSL: (where=0x1001 ret=0x1)
 SSL: SSL_connect:SSLv3 read server hello A
 TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/ST=Hessen/L=Wi
 esbaden/O=FH/OU=Entwicklung/CN=CA'
 TLS: Certificate verification failed, error 7 (certificate signature failure) de
 pth 0 for '/C=DE/ST=Hessen/L=Wiesbaden/O=FH/OU=Entwicklung/CN=SubCA'
 SSL: (where=0x4008 ret=0x233)
 SSL: SSL3 alert: write (local SSL3 detected an error):fatal:decrypt error
 SSL: (where=0x1002 ret=0xffffffff)
 SSL: SSL_connect:error in SSLv3 read server certificate B
 SSL: SSL_connect: error:0D0890A1:lib(13):func(137):reason(161)
 EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 IEEE 802.1X RX: version=2 type=0 length=751
 WPA: EAPOL frame (type 0) discarded, not a Key frame
 WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
 RSN: Do not try to use cached PMKSA
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=13 idleWhile=59
 .
 .
 .
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=46
 NDIS: received event data - hexdump(len=74): 02 00 00 00 20 41 74 68 65 72 6f 73
 12 0f a5 00 00 01 00 00 00
 NDIS: event - type 2
 NDIS: event InstanceName - hexdump_ascii(len=32):
      41 74 68 65 72 6f 73 20 57 69 72 65 6c 65 73 73   Atheros Wireless
      20 4e 65 74 77 6f 72 6b 20 41 64 61 70 74 65 72    Network Adapter
 NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
  
 NDIS: Media Specific Indication - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00
  
 NDIS: PMKID Candidate List Event - Version 1 NumCandidates 2
 NDIS: 0: 00:09:5b:2f:72:78 Flags 0x1
 RSN: PMKID candidate event - bssid=00:09:5b:2f:72:78 index=0 preauth=1
 RSN: added PMKSA cache candidate 00:09:5b:2f:72:78 prio 0
 RSN: processing PMKSA candidate list
 RSN: PMKSA candidate 00:09:5b:2f:72:78 does not need pre-authentication anymore
 NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 2f 72
 
 RSN: no more pending PMKSA candidates
 NDIS: 1: 00:09:5b:12:0f:a5 Flags 0x1
 RSN: PMKID candidate event - bssid=00:09:5b:12:0f:a5 index=1 preauth=1
 RSN: added PMKSA cache candidate 00:09:5b:12:0f:a5 prio 1
 RSN: processing PMKSA candidate list
 RSN: PMKSA candidate 00:09:5b:12:0f:a5 does not need pre-authentication anymore
 NDIS: OID_802_11_PMKID - hexdump(len=52): 34 00 00 00 02 00 00 00 00 09 5b 12 0f
 
 RSN: no more pending PMKSA candidates
 NDIS: received event data - hexdump(len=105): 02 00 00 00 3f 4e 45 54 47 45 41 5
 0 00 00 09 5b 12 0f a5 00 00 01 00 00 00
 NDIS: event - type 2
 NDIS: event InstanceName - hexdump_ascii(len=63):
      4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73   NETGEAR 108 Mbps
      20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72    Wireless PC Car
      64 20 57 47 35 31 31 54 20 2d 20 50 61 6b 65 74   d WG511T - Paket
      70 6c 61 6e 65 72 2d 4d 69 6e 69 70 6f 72 74      planer-Miniport
 NDIS: event data - hexdump(len=36): 02 00 00 00 01 00 00 00 02 00 00 00 00 09 5b
  2f 72 78 00 00 01 00 00 00 00 09 5b 12 0f a5 00 00 01 00 00 00
 NDIS: ignored event for another adapter
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=45
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=14): 02 00 00 0a 01 06 00 0a 01 68 65 6c 6c 6f
 EAPOL: Received EAP-Packet frame
 WPA: EAPOL frame too short, len 14, expecting at least 99
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=44
 .
 .
 .
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=30
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=14): 02 00 00 0a 01 07 00 0a 01 68 65 6c 6c 6f
 EAPOL: Received EAP-Packet frame
 WPA: EAPOL frame too short, len 14, expecting at least 99
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=29
 .
 .
 .
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=15
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=14): 02 00 00 0a 01 09 00 0a 01 68 65 6c 6c 6f
 EAPOL: Received EAP-Packet frame
 WPA: EAPOL frame too short, len 14, expecting at least 99
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=14
 .
 .
 .
 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
 EAP: EAP entering state FAILURE
 EAPOL: SUPP_PAE entering state HELD
 EAPOL: SUPP_BE entering state RECEIVE
 EAPOL: SUPP_BE entering state FAIL
 EAPOL: SUPP_BE entering state IDLE
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=14): 02 00 00 0a 01 0a 00 0a 01 68 65 6c 6c 6f
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_PAE entering state RESTART
 EAP: EAP entering state INITIALIZE
 EAP: deinitialize previously used EAP method (21, TTLS) at INITIALIZE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_PAE entering state AUTHENTICATING
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=1 id=10
 EAP: EAP entering state IDENTITY
 EAP: EAP-Request Identity data - hexdump_ascii(len=5):
      68 65 6c 6c 6f                                    hello
 EAP: using real identity - hexdump_ascii(len=6):
      77 70 61 73 75 70                                 wpasup
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_BE entering state RESPONSE
 EAPOL: txSuppRsp
 TX EAPOL - hexdump(len=29): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
 b 02 0a 00 0b 01 77 70 61 73 75 70
 EAPOL: SUPP_BE entering state RECEIVE
 WPA: EAPOL frame too short, len 14, expecting at least 99
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=10): 02 00 00 06 01 0b 00 06 15 20
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=21 id=11
 EAP: EAP entering state GET_METHOD
 EAP: initialize selected EAP method (21, TTLS)
 EAP-TTLS: Phase2 type: EAP
 EAP-TTLS: Phase2 EAP types - hexdump(len=6): 04 1a 06 05 12 11
 TLS: Trusted root certificate(s) loaded
 TLS - SSL error: error:0B07C065:lib(11):func(124):reason(101)
 TLS: Include TLS Message Length in unfragmented packets
 EAP: EAP entering state METHOD
 EAP-TTLS: Received packet(len=6) - Flags 0x20
 EAP-TTLS: Start
 SSL: (where=0x10 ret=0x1)
 SSL: (where=0x1001 ret=0x1)
 SSL: SSL_connect:before/connect initialization
 SSL: (where=0x1001 ret=0x1)
 SSL: SSL_connect:SSLv3 write client hello A
 SSL: (where=0x1002 ret=0xffffffff)
 SSL: SSL_connect:error in SSLv3 read server hello A
 SSL: SSL_connect - want more data
 SSL: 100 bytes pending from ssl_out
 SSL: 100 bytes left to be sent out (of total 100 bytes)
 EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_BE entering state RESPONSE
 EAPOL: txSuppRsp
 TX EAPOL - hexdump(len=128): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00
 .
 .
 EAPOL: SUPP_BE entering state RECEIVE
 WPA: EAPOL frame too short, len 10, expecting at least 99
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 0c 04 0a 15 c0 00 00 06 e5 16 03 01
 .
 .
 .
 02 46 48 31 14 30 12 06
 EAPOL: Received EAP-Packet frame
 EAPOL: SUPP_BE entering state REQUEST
 EAPOL: getSuppRsp
 EAP: EAP entering state RECEIVED
 EAP: Received EAP-Request method=21 id=12
 EAP: EAP entering state METHOD
 EAP-TTLS: Received packet(len=1034) - Flags 0xc0
 EAP-TTLS: TLS Message Length: 1765
 SSL: Need 741 bytes more input data
 SSL: Building ACK
 EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
 EAP: EAP entering state SEND_RESPONSE
 EAP: EAP entering state IDLE
 EAPOL: SUPP_BE entering state RESPONSE
 EAPOL: txSuppRsp
 TX EAPOL - hexdump(len=24): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 8e 02 00 00 0
 6 02 0c 00 06 15 00
 EAPOL: SUPP_BE entering state RECEIVE
 IEEE 802.1X RX: version=2 type=0 length=1034
 WPA: EAPOL frame (type 0) discarded, not a Key frame
 WPA: Cancelling PMKSA caching attempt - attempt full EAP authentication
 RSN: Do not try to use cached PMKSA
 RX EAPOL from 00:09:5b:2f:72:78
 RX EAPOL - hexdump(len=755): 02 00 02 ef 01 0d 02 ef 15 80 00 00 06 e5 03 55 04
 
 
 
 The hostapd Output:
 
 IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state REAUTHENTICATE
 wlan0: STA 00:09:5b:98:e2:7e WPA: event 5 notification
 WPA: 00:09:5b:98:e2:7e WPA_PTK entering state AUTHENTICATION2
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
 IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
 IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 0, timeout 30)
 IEEE 802.1X: 00:09:5b:98:e2:7e REAUTH_TIMER entering state INITIALIZE
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
 IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 0)
 Received 62 bytes management frame
 DATA (TX callback) ACK
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP timeout
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state TIMEOUT
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
 IEEE 802.1X: station 00:09:5b:98:e2:7e - new auth session, clearing State
 IEEE 802.1X: Generated EAP Request-Identity for 00:09:5b:98:e2:7e (identifier 1, timeout 30)
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state IDLE
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state CONNECTING
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state AUTHENTICATING
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
 IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 1)
 Received 62 bytes management frame
 DATA (TX callback) ACK
 Received 47 bytes management frame
 DATA
 IEEE 802.1X: 15 bytes from 00:09:5b:98:e2:7e
    IEEE 802.1X: version=2 type=0 length=11
    EAP: code=2 identifier=1 length=11 (response)
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=1 len=11) from STA: EAP Response-Identity (1)
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: STA identity 'wpasup'
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
 Encapsulating EAP message into a RADIUS packet
 Sending RADIUS message to authentication server
 Next RADIUS client retransmit in 3 seconds
 Received 64 bytes from RADIUS server
 Received RADIUS message
 Received RADIUS packet matched with a pending request, round trip time 0.00 sec
 RADIUS packet matching with station 00:09:5b:98:e2:7e
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=2 len=6) from RADIUS server: EAP-Request-TTLS (21)
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
 IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 2)
 Received 58 bytes management frame
 DATA (TX callback) ACK
 Received 178 bytes management frame
 DATA
 IEEE 802.1X: 146 bytes from 00:09:5b:98:e2:7e
    IEEE 802.1X: version=2 type=0 length=142
    EAP: code=2 identifier=2 length=142 (response)
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=2 len=142) from STA: EAP Response-TTLS (21)
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
 Encapsulating EAP message into a RADIUS packet
   Copied RADIUS State Attribute
 Sending RADIUS message to authentication server
 Next RADIUS client retransmit in 3 seconds
 Received 1100 bytes from RADIUS server
 Received RADIUS message
 Received RADIUS packet matched with a pending request, round trip time 0.02 sec
 RADIUS packet matching with station 00:09:5b:98:e2:7e
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=3 len=1034) from RADIUS server: EAP-Request-TTLS (21)
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
 IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 3)
 Received 1086 bytes management frame
 DATA (TX callback) ACK
 Received 42 bytes management frame
 DATA
 IEEE 802.1X: 10 bytes from 00:09:5b:98:e2:7e
    IEEE 802.1X: version=2 type=0 length=6
    EAP: code=2 identifier=3 length=6 (response)
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: received EAP packet (code=2 id=3 len=6) from STA: EAP Response-TTLS (21)
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state RESPONSE
 Encapsulating EAP message into a RADIUS packet
   Copied RADIUS State Attribute
 Sending RADIUS message to authentication server
 Next RADIUS client retransmit in 3 seconds
 Received 813 bytes from RADIUS server
 Received RADIUS message
 Received RADIUS packet matched with a pending request, round trip time 0.00 sec
 RADIUS packet matching with station 00:09:5b:98:e2:7e
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: using EAP timeout of 30 seconds
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: decapsulated EAP packet (code=1 id=4 len=751) from RADIUS server: EAP-Request-TTLS (21)
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state REQUEST
 IEEE 802.1X: Sending EAP Packet to 00:09:5b:98:e2:7e (identifier 4)
 Received 803 bytes management frame
 DATA (TX callback) ACK
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: EAP timeout
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state TIMEOUT
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state ABORTING
 IEEE 802.1X: 00:09:5b:98:e2:7e BE_AUTH entering state INITIALIZE
 wlan0: STA 00:09:5b:98:e2:7e IEEE 802.1X: aborting authentication
 IEEE 802.1X: 00:09:5b:98:e2:7e AUTH_PAE entering state RESTART
_________________________________________________________________________
Mit der Gruppen-SMS von WEB.DE FreeMail k?nnen Sie eine SMS an alle 
Freunde gleichzeitig schicken: http://freemail.web.de/features/?mc=021179







More information about the Hostap mailing list