HostAP Digest, Vol 66, Issue 2
James Woo
jaws
Wed Oct 1 16:39:14 PDT 2008
hostap-request at lists.shmoo.com wrote:
> ----------------------------------------------------------------------
>
> Message: 2
> Date: Wed, 1 Oct 2008 10:05:06 +0300
> From: Jouni Malinen <j at w1.fi>
> Subject: Re: Does wpa supplicant version 0.6.4 support Windows Server
> 2008NAP IEEE802.1X Enforcement ?
> To: hostap at lists.shmoo.com
> Message-ID: <20081001070506.GN4853 at jm.kir.nu>
> Content-Type: text/plain; charset=utf-8
>
> EAP-PEAP: SoH TLV - hexdump(len=418):
> SoH Header packet:
> Outer Type: 00 07 (7)
> Length: 01 9e
> IANA SMI Code: 00 00 01 37
> Inner Type: 00 02 (version 2 - Value: SoH Mode Sub-Header | SSoH |
> SoHReportEntry(0+))
> Inner Length: 01 96
> Value:
> SoH Mode Sub-Header:
> Outer Type: 00 07 (7)
> Length: 00 1e
> IANA SMI Code: 00 00 01 37
> Value:
> Correlation ID: 6f a0 2d f4 d8 51 4e 00 bb 76 28 c4 8a e5 1d f1 01 c8 8d 8e f9 1f a1 32 (== MS-CorrelationId)
> Intent Flag: 01 (SoH request message)
> Content-Type Flag: 00
>
I got thru if I use Jouni's SoH data.
But it still failed authentication with the following error messages:
"EAP-TLV: Unsupported TLV Type 7" and
"EAP-PEAP: Invalid Compound_MAC in cryptobinding TLV"
James
Initializing interface 'eth0' conf '161.conf' driver 'wired'
ctrl_interface 'N/A' bridge 'N/A'
Configuration file '161.conf' ->
'/root/Download/wpa_supplicant-0.6.4/wpa_supplicant/161.conf'
Reading configuration file
'/root/Download/wpa_supplicant-0.6.4/wpa_supplicant/161.conf'
ctrl_interface='/var/run/wpa_supplicant'
Priority group 0
id=0 ssid='example 802.1x network'
Initializing interface (2) 'eth0'
wpa_driver_wired_init: Added multicast membership with packet socket
Own MAC address: 00:15:58:28:5a:1d
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists, but does not allow connections - assuming it was
leftover from forced program termination
Successfully replaced leftover ctrl_iface socket
'/var/run/wpa_supplicant/eth0'
Added interface eth0
Using wired driver - overriding ap_scan configuration
EAPOL: External notification - portControl=Auto
Already associated with a configured network - generating associated event
Association info event
State: DISCONNECTED -> ASSOCIATED
Associated to a new BSS: BSSID=01:80:c2:00:00:03
No keys have been configured - skip key clearing
Select network based on association information
Network configuration found for the current AP
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
EAPOL: External notification - portControl=Auto
Associated with 01:80:c2:00:00:03
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=01:80:c2:00:00:03
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=5):
55 73 65 72 31 User1
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: SoH enabled
TLS: Phase2 EAP types - hexdump(len=8):
00 00 00 00 1a 00 00 00 ........
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 97 bytes pending from ssl_out
SSL: 97 bytes left to be sent out (of total 97 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1496) - Flags 0xc0
SSL: TLS Message Length: 2323
SSL: Need 837 bytes more input data
SSL: Building ACK (type=25 id=2 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64):
[REMOVED]
SSL: Building ACK (type=25 id=4 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x00
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1):
01 .
EAP-PEAP: received Phase 2: code=1 identifier=5 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=5):
55 73 65 72 31 User1
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10):
[REMOVED]
SSL: 74 bytes left to be sent out (of total 74 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=59) - Flags 0x00
EAP-PEAP: received 53 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=20):
fe 00 01 37 00 00 00 21 00 07 00 08 00 00 01 37 ...7...!.......7
00 02 00 00 ....
EAP-PEAP: received Phase 2: code=1 identifier=7 length=24
EAP-PEAP: Phase 2 Request: type=254
EAP-PEAP: SoH EAP Extensions
TNC: SoH Request - hexdump(len=12):
00 07 00 08 00 00 01 37 00 02 00 00 .......7....
TNC: SoH Request TLV received
TNC: SoH Correlation ID - hexdump(len=24):
a9 75 4d f9 00 25 c6 fd e2 64 30 32 06 a8 66 64 .uM..%...d02..fd
28 4f 95 47 22 ae c5 67 (O.G"..g
TNC: SoH Response - hexdump(len=430):
00 07 01 aa 00 00 01 37 00 01 01 a2 00 07 01 9e .......7........
00 00 01 37 00 02 01 96 00 07 00 1e 00 00 01 37 ...7...........7
6f a0 2d f4 d8 51 4e 00 bb 76 28 c4 8a e5 1d f1 o.-..QN..v(.....
01 c8 8d 8e f9 1f a1 32 01 00 00 02 00 04 00 01 .......2........
37 00 00 07 00 4f 00 00 01 37 03 11 01 00 00 00 7....O...7......
05 00 00 00 01 00 00 0a 28 00 03 00 00 00 00 05 ........(.......
00 06 4a 6f 75 6e 69 00 06 6f a0 2d f4 d8 51 4e ..Jouni..o.-..QN
00 bb 76 28 c4 8a e5 1d f1 01 c8 8d 8e f9 1f a1 ..v(............
32 02 00 09 ff ff ff ff ff ff ff ff 00 01 00 08 2...............
de ca fb ad 01 00 02 00 04 00 01 37 80 00 07 00 ...........7....
08 00 01 37 80 02 00 00 00 00 07 00 08 00 01 37 ...7...........7
80 00 00 01 05 00 08 00 01 00 00 0a 00 40 4e 00 ............. at N.
6f 00 72 00 74 00 6f 00 6e 00 20 00 49 00 6e 00 o.r.t.o.n. .I.n.
74 00 65 00 72 00 6e 00 65 00 74 00 20 00 57 00 t.e.r.n.e.t. .W.
6f 00 72 00 6d 00 20 00 50 00 72 00 6f 00 74 00 o.r.m. .P.r.o.t.
65 00 63 00 74 00 69 00 6f 00 6e 00 00 00 00 0b e.c.t.i.o.n.....
00 04 00 00 00 01 00 0a 00 24 4d 00 49 00 43 00 .........$M.I.C.
52 00 4f 00 53 00 4f 00 46 00 54 00 20 00 50 00 R.O.S.O.F.T. .P.
52 00 4f 00 44 00 55 00 43 00 54 00 00 00 00 0b R.O.D.U.C.T.....
00 04 00 00 00 04 00 08 00 01 01 00 0a 00 2c 4e ..............,N
00 6f 00 72 00 74 00 6f 00 6e 00 20 00 41 00 6e .o.r.t.o.n. .A.n
00 74 00 69 00 56 00 69 00 72 00 75 00 73 00 20 .t.i.V.i.r.u.s.
00 32 00 30 00 30 00 35 00 00 00 00 0b 00 04 00 .2.0.0.5........
00 00 01 00 08 00 01 03 00 0b 00 04 00 00 00 03 ................
00 08 00 01 04 00 0b 00 04 00 ff 00 05 00 07 00 ................
08 00 01 37 80 b3 f1 00 00 00 07 00 05 00 01 37 ...7...........7
80 00 00 07 00 08 00 01 37 80 00 40 00 00 ........7.. at ..
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=442):
[REMOVED]
SSL: 506 bytes left to be sent out (of total 506 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=75) - Flags 0x00
EAP-PEAP: received 69 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=29):
1a 01 08 00 1c 10 91 7b 71 aa cf 31 8e ab 58 53 .......{q..1..XS
65 7a a7 ed 54 3b 57 49 4e 30 38 45 4e ez..T;WIN08EN
EAP-PEAP: received Phase 2: code=1 identifier=8 length=33
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 8 mschapv2_id 8
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=7):
57 49 4e 30 38 45 4e WIN08EN
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=5):
55 73 65 72 31 User1
MSCHAPV2: Username - hexdump_ascii(len=5):
55 73 65 72 31 User1
MSCHAPV2: auth_challenge - hexdump(len=16):
91 7b 71 aa cf 31 8e ab 58 53 65 7a a7 ed 54 3b .{q..1..XSez..T;
MSCHAPV2: peer_challenge - hexdump(len=16):
ff 63 ef cc 6c 94 e7 f1 4d e4 86 9a 5d 7d a7 5c .c..l...M...]}.\
MSCHAPV2: username - hexdump_ascii(len=5):
55 73 65 72 31 User1
MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED]
MSCHAPV2: NT Response - hexdump(len=24):
05 67 22 47 d9 20 1e 07 e6 92 ef 78 16 73 43 57 .g"G. .....x.sCW
1a 65 cf 8e b6 aa 9b ca .e......
MSCHAPV2: Auth Response - hexdump(len=20):
52 8d 4a 00 ae 2f 39 1d 45 4a 96 f9 71 e6 4f 44 R.J../9.EJ..q.OD
e3 9e 8b e6 ....
MSCHAPV2: Master Key - hexdump(len=16):
[REMOVED]
EAP-MSCHAPV2: TX identifier 8 mschapv2_id 8 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64):
[REMOVED]
SSL: 138 bytes left to be sent out (of total 138 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=91) - Flags 0x00
EAP-PEAP: received 85 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47):
1a 03 08 00 2e 53 3d 35 32 38 44 34 41 30 30 41 .....S=528D4A00A
45 32 46 33 39 31 44 34 35 34 41 39 36 46 39 37 E2F391D454A96F97
31 45 36 34 46 34 34 45 33 39 45 38 42 45 36 1E64F44E39E8BE6
EAP-PEAP: received Phase 2: code=1 identifier=9 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-MSCHAPV2: RX identifier 9 mschapv2_id 8
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6):
[REMOVED]
SSL: 74 bytes left to be sent out (of total 74 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=331) - Flags 0x00
EAP-PEAP: received 325 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=284):
01 0a 01 1c 21 80 03 00 02 00 01 00 07 00 d1 00 ....!...........
00 01 37 00 03 00 c9 00 07 00 c5 00 00 01 37 00 ..7...........7.
02 00 bd 00 07 00 1e 00 00 01 37 6f a0 2d f4 d8 ..........7o.-..
51 4e 00 bb 76 28 c4 8a e5 1d f1 01 c8 8d 8e f9 QN..v(..........
1f a1 32 00 00 00 02 00 04 00 01 37 00 00 07 00 ..2........7....
4b 00 00 01 37 03 01 05 00 14 57 49 4e 30 38 45 K...7.....WIN08E
4e 2e 61 6e 73 30 38 65 6e 2e 63 6f 6d 00 06 6f N.ans08en.com..o
a0 2d f4 d8 51 4e 00 bb 76 28 c4 8a e5 1d f1 01 .-..QN..v(......
c8 8d 8e f9 1f a1 32 02 00 01 ff ff ff ff ff ff ......2.........
ff ff 00 01 00 07 00 04 00 01 37 80 00 02 00 04 ..........7.....
00 01 37 80 00 08 00 01 00 00 04 00 04 00 00 00 ..7.............
00 00 08 00 01 01 00 04 00 08 00 00 00 00 00 00 ................
00 00 00 08 00 01 03 00 04 00 04 00 00 00 00 00 ................
08 00 01 04 00 04 00 08 00 00 00 00 00 00 00 00 ................
00 0c 00 38 00 00 00 00 84 03 36 b6 c1 08 d9 58 ...8......6....X
42 70 82 c4 d7 4d 10 b4 df 70 27 a5 5c 85 8a 9c Bp...M...p'.\...
47 09 f5 a2 f9 cb 9d a0 00 2a 69 3c 37 d4 cf bc G........*i<7...
57 7d 78 db 1c 22 83 e3 03 86 14 54 W}x..".....T
EAP-PEAP: received Phase 2: code=1 identifier=10 length=284
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=279):
80 03 00 02 00 01 00 07 00 d1 00 00 01 37 00 03 .............7..
00 c9 00 07 00 c5 00 00 01 37 00 02 00 bd 00 07 .........7......
00 1e 00 00 01 37 6f a0 2d f4 d8 51 4e 00 bb 76 .....7o.-..QN..v
28 c4 8a e5 1d f1 01 c8 8d 8e f9 1f a1 32 00 00 (............2..
00 02 00 04 00 01 37 00 00 07 00 4b 00 00 01 37 ......7....K...7
03 01 05 00 14 57 49 4e 30 38 45 4e 2e 61 6e 73 .....WIN08EN.ans
30 38 65 6e 2e 63 6f 6d 00 06 6f a0 2d f4 d8 51 08en.com..o.-..Q
4e 00 bb 76 28 c4 8a e5 1d f1 01 c8 8d 8e f9 1f N..v(...........
a1 32 02 00 01 ff ff ff ff ff ff ff ff 00 01 00 .2..............
07 00 04 00 01 37 80 00 02 00 04 00 01 37 80 00 .....7.......7..
08 00 01 00 00 04 00 04 00 00 00 00 00 08 00 01 ................
01 00 04 00 08 00 00 00 00 00 00 00 00 00 08 00 ................
01 03 00 04 00 04 00 00 00 00 00 08 00 01 04 00 ................
04 00 08 00 00 00 00 00 00 00 00 00 0c 00 38 00 ..............8.
00 00 00 84 03 36 b6 c1 08 d9 58 42 70 82 c4 d7 .....6....XBp...
4d 10 b4 df 70 27 a5 5c 85 8a 9c 47 09 f5 a2 f9 M...p'.\...G....
cb 9d a0 00 2a 69 3c 37 d4 cf bc 57 7d 78 db 1c ....*i<7...W}x..
22 83 e3 03 86 14 54 ".....T
EAP-TLV: Unsupported TLV Type 7
EAP-PEAP: Cryptobinding TLV - hexdump(len=56):
00 00 00 00 84 03 36 b6 c1 08 d9 58 42 70 82 c4 ......6....XBp..
d7 4d 10 b4 df 70 27 a5 5c 85 8a 9c 47 09 f5 a2 .M...p'.\...G...
f9 cb 9d a0 00 2a 69 3c 37 d4 cf bc 57 7d 78 db .....*i<7...W}x.
1c 22 83 e3 03 86 14 54 .".....T
EAP-PEAP: TK - hexdump(len=60):
[REMOVED]
EAP-MSCHAPV2: Derived key - hexdump(len=32):
[REMOVED]
EAP-PEAP: ISK - hexdump(len=32):
[REMOVED]
EAP-PEAP: TempKey - hexdump(len=40):
[REMOVED]
EAP-PEAP: IMCK (IPMKj) - hexdump(len=60):
[REMOVED]
EAP-PEAP: IPMK (S-IPMKj) - hexdump(len=40):
[REMOVED]
EAP-PEAP: CMK (CMKj) - hexdump(len=20):
[REMOVED]
EAP-PEAP: Invalid Compound_MAC in cryptobinding TLV
EAP-TLV: Result TLV - hexdump(len=2):
00 01 ..
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-TLV: Earlier failure - force failed Phase 2
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=71):
[REMOVED]
SSL: 138 bytes left to be sent out (of total 138 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP-PEAP: CSK - hexdump(len=128):
[REMOVED]
EAP-PEAP: Derived key - hexdump(len=64):
39 87 2f d8 c4 e6 82 43 8a ea a7 34 5f 50 cc 23 9./....C...4_P.#
fe 50 b4 fa dc 04 0b d0 b5 b8 cb 40 55 c8 3e 64 .P......... at U.>d
b1 2f dc 79 25 85 18 ce dd 9f d9 05 d9 71 a2 dd ./.y%........q..
2b e9 24 25 17 f4 a3 05 81 9a d6 7e 06 43 30 0a +.$%.......~.C0.
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=01:80:c2:00:00:03
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:0d:28:a3:6c:d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed unsuccessfully
EAPOL: authWhile --> 0
EAPOL: startWhen --> 0
More information about the Hostap
mailing list