wpa_supplicant - Navisradius5 failure parsing ClientHello
caz riley
macmoon
Sun Mar 9 20:03:48 PDT 2008
Hi,
tcpdump attached...
thanks
Jouni Malinen <j at w1.fi> wrote:
On Thu, Mar 06, 2008 at 04:36:24PM +1300, caz riley wrote:
> I'm using wpa_suuplicant to test eap-ttls and cannot get the TLS session to setup. I've used other supplicants against the navisradius without problems.
>
> Here is the radius log...
>
> 9 Not a V2Hello: Two-byte length marker not set
This looks odd.. I'm not sure what the RADIUS server is trying to do
here, but if "V2Hello" is referring to SSL v2, this is certainly not
supposed to be used..
> 9 server/15 >>> Transmitting AlertMessage: Fatal: decode_error (50)
I haven't seen this in my tests with NavisRadius. Though, I think I've
only tested with older versions of the server. Would you be able to
capture the packets sent between wpa_supplicant and the RADIUS server? I
would be interested in seeing a capture log showing this message with
the ClientHello that is triggering the fatal error. I would be fine with
this captured as an EAPOL frame from the client or as the encapsulated
RADIUS packet between the authentication server and authenticator.
--
Jouni Malinen PGP id EFC895FA
_______________________________________________
HostAP mailing list
HostAP at lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20080310/6090400b/attachment.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: vasnoop.zip
Type: application/x-zip-compressed
Size: 666 bytes
Desc: 2843336327-vasnoop.zip
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20080310/6090400b/attachment.bin
More information about the Hostap
mailing list