Can't authenticate in EAP-PEAP mode to a server freeradius
IMS
ims77.dev
Tue Jan 25 07:50:18 PST 2011
Hi,
I'm trying to use wpa_supplicant to authenticate an embedding system
using the protocol 802.1X to a server freeradius.
1- I think my configuration (freeradius and access point) is ok
because I can authenticate from a windows XP using the same
informations (certificate and login/password in PEAP mode)
2- My embedding system contains 2 interfaces, 1 for ethernet and 1 for the wifi.
I can authenticate my system in EAP-PEAP mode using the driver wired
(for the ethernet) with a command like : wpa_supplicant -ieth0 -Dwired
-c/etc/wpasupplicant/wired.conf -B -d
I can't authenticate using the wifi !!! It's been more than 1 week I'm
working on it and can't find what is the problem !
It's seem I'm authenticate (I can see an accept-challenge in the log
on the freeadius server) but the system retry again and again to
authenticate
I need some help, thanks by advance.
Sebastien
I will try to give the maximum of informations here :
-----------------------------------------------------------------------
The access point is a TRENDnet TEW-410APB. I've also tryed with a
Netgear but the xp could not authenticate so I've changed.
-----------------------------------------------------------------------
My configuration used with wpa_supplicant :
ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
fast_reauth=1
network={
ssid="TREND2-LABO"
key_mgmt=WPA-EAP
eap=PEAP
identity="ClientRadius"
password="castel3"
ca_cert="/etc/certs/castel_CA-cacert.pem"
phase1="peaplabel=0"
phase2="auth=MSCHAPV2"
}
Can someone tell me if this file is ok ? I've tryed with ap_scan=2 but
no more results.
-----------------------------------------------------------------------
I run the command wpa_supplicant -Dwext -ieth1
-c/etc/wpasupplicant/wifi.conf -dddt to test my config
I've also read and tryed some little things with wpa_cli.
What else ?
-----------------------------------------------------------------------
I have a maximum of informations from wpa_supplicant but what is the problem ?
007139: Configuration file '/etc/wpasupplicant/wifi.conf' ->
'/etc/wpasupplicant/wifi.conf'
007317: Reading configuration file '/etc/wpasupplicant/wifi.conf'
007974: ctrl_interface='/var/run/wpa_supplicant'
008248: ap_scan=1
008534: fast_reauth=1
008622: Line: 11 - start of a new network block
008887: ssid - TREND2-LABO
009273: scan_ssid=1 (0x1)
009431: key_mgmt: 0x1
009589: eap methods -
010037: identity - ClientRadius
010316: password - [REMOVED]
010418: ca_cert - /etc/certs/castel_CA-cacert.pem
010855: phase1 - peaplabel=0
011272: phase2 - auth=MSCHAPV2
011824: Priority group 0
011934: id=0 ssid='TREND2-LABO'
127942: SIOCGIWRANGE: WE(compiled)=22 WE(source)=15 enc_capa=0xf
128068: capabilities: key_mgmt 0xf enc 0xf flags 0x0
128943: netlink: Operstate: linkmode=1, operstate=5
156865: Own MAC address: 00:24:23:15:dc:aa
157280: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
157543: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
157707: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
157851: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
157993: wpa_driver_wext_set_countermeasures
158101: RSN: flushing PMKID list in the driver
158321: Setting scan request: 0 sec 100000 usec
293463: EAPOL: SUPP_PAE entering state DISCONNECTED
293793: EAPOL: Supplicant port status: Unauthorized
293950: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
294030: EAPOL: SUPP_BE entering state INITIALIZE
294104: EAP: EAP entering state DISABLED
294171: EAPOL: Supplicant port status: Unauthorized
294247: EAPOL: Supplicant port status: Unauthorized
294802: Added interface eth1
295336: State: DISCONNECTED -> SCANNING
295445: Scan SSID - TREND2-LABO
295683: Starting AP scan for specific SSID(s)
295847: Scan requested (ret=0) - scan timeout 5 seconds
296140: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
296296: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
326935: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
327234: Wireless event: cmd=0x8b06 len=8
327337: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
327424: Wireless event: cmd=0x8b1a len=40
296821: EAPOL: disable timer tick
297106: EAPOL: Supplicant port status: Unauthorized
007541: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
007845: Wireless event: cmd=0x8b19 len=8
008156: Received 0 bytes of scan results (0 BSSes)
008313: BSS: Start scan result update 1
008402: New scan results available
008550: Selecting BSS from priority group 0
008625: Try to find WPA-enabled AP
008685: Try to find non-WPA AP
008746: No suitable network found
008836: Setting scan request: 5 sec 0 usec
016819: Starting AP scan for wildcard SSID
017198: Scan requested (ret=0) - scan timeout 30 seconds
557800: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
558101: Wireless event: cmd=0x8b19 len=8
558472: Received 1007 bytes of scan results (5 BSSes)
558594: BSS: Start scan result update 2
558692: BSS: Add new id 0 BSSID 00:0e:8e:7a:67:ec SSID 'TREND2-LABO'
558859: BSS: Add new id 1 BSSID 00:0d:88:93:85:2e SSID 'DLINK-LABO'
...
559611: New scan results available
559701: Selecting BSS from priority group 0
559769: Try to find WPA-enabled AP
559833: 0: 00:0e:8e:7a:67:ec ssid='TREND2-LABO'
wpa_ie_len=22 rsn_ie_len=0 caps=0x11
559985: selected based on WPA IE
560067: selected WPA AP 00:0e:8e:7a:67:ec ssid='TREND2-LABO'
560268: Trying to associate with 00:0e:8e:7a:67:ec
(SSID='TREND2-LABO' freq=2462 MHz)
560377: Cancelling scan request
560452: WPA: clearing own WPA/RSN IE
560519: Automatic auth_alg selection: 0x1
560657: WPA: using IEEE 802.11i/D3.0
560899: WPA: Selected cipher suites: group 8 pairwise 8
key_mgmt 1 proto 1
560992: WPA: set AP WPA IE -
561222: WPA: clearing AP RSN IE
561303: WPA: using GTK TKIP
561384: WPA: using PTK TKIP
561465: WPA: using KEY_MGMT 802.1X
561538: WPA: Set own WPA IE default -
561765: No keys have been configured - skip key clearing
561830: State: SCANNING -> ASSOCIATING
561896: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
561971: netlink: Operstate: linkmode=-1, operstate=5
562255: wpa_driver_wext_associate
562341: wpa_driver_wext_set_drop_unencrypted
562735: wpa_driver_wext_set_psk
563008: Association request to the driver failed
563130: Setting authentication timeout: 5 sec 0 usec
563228: EAPOL: External notification - EAP success=0
563305: EAPOL: Supplicant port status: Unauthorized
563382: EAPOL: External notification - EAP fail=0
563450: EAPOL: Supplicant port status: Unauthorized
563726: EAPOL: External notification - portControl=Auto
563807: EAPOL: Supplicant port status: Unauthorized
563922: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
564113: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
564286: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
368197: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
368506: Wireless event: cmd=0x8b15 len=20
368594: Wireless event: new AP: 00:0e:8e:7a:67:ec
368683: State: ASSOCIATING -> ASSOCIATED
368756: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
368834: netlink: Operstate: linkmode=-1, operstate=5
381618: Associated to a new BSS: BSSID=00:0e:8e:7a:67:ec
381737: No keys have been configured - skip key clearing
381852: Associated with 00:0e:8e:7a:67:ec
381925: WPA: Association event - clear replay counter
381992: WPA: Clear old PTK
382049: EAPOL: External notification - portEnabled=0
382118: EAPOL: Supplicant port status: Unauthorized
382194: EAPOL: External notification - portValid=0
382432: EAPOL: Supplicant port status: Unauthorized
382511: EAPOL: External notification - portEnabled=1
382582: EAPOL: SUPP_PAE entering state CONNECTING
382645: EAPOL: enable timer tick
382721: EAPOL: SUPP_BE entering state IDLE
382789: EAP: EAP entering state INITIALIZE
382859: EAP: EAP entering state IDLE
382963: Setting authentication timeout: 10 sec 0 usec
383074: Cancelling scan request
383186: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
383287: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
396807: EAPOL: startWhen --> 0
397108: EAPOL: SUPP_PAE entering state CONNECTING
...
407982: Setting authentication timeout: 70 sec 0 usec
408265: EAPOL: Received EAP-Packet frame
408349: EAPOL: SUPP_PAE entering state RESTART
408422: EAP: EAP entering state INITIALIZE
408498: EAP: EAP entering state IDLE
408570: EAPOL: SUPP_PAE entering state AUTHENTICATING
408640: EAPOL: SUPP_BE entering state REQUEST
408703: EAPOL: getSuppRsp
408763: EAP: EAP entering state RECEIVED
409298: EAP: Received EAP-Request id=0 method=1 vendor=0
vendorMethod=0
409579: EAP: EAP entering state IDENTITY
409690: CTRL-EVENT-EAP-STARTED EAP authentication started
409771: EAP: EAP-Request Identity data -
409848: EAP: using real identity - ClientRadius
410109: EAP: EAP entering state SEND_RESPONSE
410194: EAP: EAP entering state IDLE
410270: EAPOL: SUPP_BE entering state RESPONSE
410338: EAPOL: txSuppRsp
410407: TX EAPOL: dst=00:0e:8e:7a:67:ec
410486: TX EAPOL -
01 43 6c 69 65 6e 74 52 61 64 69 75 73
410976: EAPOL: SUPP_BE entering state RECEIVE
427825: RX EAPOL from 00:0e:8e:7a:67:ec
427953: RX EAPOL -
428139: EAPOL: Received EAP-Packet frame
428217: EAPOL: SUPP_BE entering state REQUEST
428285: EAPOL: getSuppRsp
428347: EAP: EAP entering state RECEIVED
428481: EAP: Received EAP-Request id=1 method=25 vendor=0
vendorMethod=0
428579: EAP: EAP entering state GET_METHOD
428690: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
428770: EAP: Initialize selected EAP method: vendor 0
method 25 (PEAP)
429102: TLS: Phase2 EAP types -
429371: TLS: using phase1 config options
436456: TLS: Trusted root certificate(s) loaded
437709: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
437808: EAP: EAP entering state METHOD
437951: SSL: Received packet(len=6) - Flags 0x20
438042: EAP-PEAP: Start (server ver=0, own ver=1)
438116: EAP-PEAP: Using PEAP version 0
439821: SSL: SSL_connect:before/connect initialization
443959: SSL: SSL_connect:SSLv3 write client hello A
444396: SSL: SSL_connect:error in SSLv3 read server hello A
444563: SSL: SSL_connect - want more data
444667: SSL: 88 bytes pending from ssl_out
444800: SSL: 88 bytes left to be sent out (of total 88 bytes)
444919: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
445015: EAP: EAP entering state SEND_RESPONSE
445104: EAP: EAP entering state IDLE
445184: EAPOL: SUPP_BE entering state RESPONSE
445253: EAPOL: txSuppRsp
445323: TX EAPOL: dst=00:0e:8e:7a:67:ec
450441: EAPOL: SUPP_BE entering state RECEIVE
518184: RX EAPOL from 00:0e:8e:7a:67:ec
861150: EAPOL: Received EAP-Packet frame
861260: EAPOL: SUPP_BE entering state REQUEST
861332: EAPOL: getSuppRsp
861395: EAP: EAP entering state RECEIVED
861640: EAP: Received EAP-Request id=2 method=25 vendor=0
vendorMethod=0
861751: EAP: EAP entering state METHOD
861850: SSL: Received packet(len=1024) - Flags 0xc0
861931: SSL: TLS Message Length: 4077
862082: SSL: Need 3063 bytes more input data
862345: SSL: Building ACK (type=25 id=2 ver=0)
862430: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
862520: EAP: EAP entering state SEND_RESPONSE
862610: EAP: EAP entering state IDLE
862687: EAPOL: SUPP_BE entering state RESPONSE
...
224980: EAPOL: Received EAP-Packet frame
225090: EAPOL: SUPP_BE entering state REQUEST
225164: EAPOL: getSuppRsp
225228: EAP: EAP entering state RECEIVED
225390: EAP: Received EAP-Request id=3 method=25 vendor=0
vendorMethod=0
225491: EAP: EAP entering state METHOD
225586: SSL: Received packet(len=1020) - Flags 0x40
225700: SSL: Need 2049 bytes more input data
225786: SSL: Building ACK (type=25 id=3 ver=0)
225865: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
226118: EAP: EAP entering state SEND_RESPONSE
226208: EAP: EAP entering state IDLE
226288: EAPOL: SUPP_BE entering state RESPONSE
226357: EAPOL: txSuppRsp
226426: TX EAPOL: dst=00:0e:8e:7a:67:ec
227063: TX EAPOL -
227530: EAPOL: SUPP_BE entering state RECEIVE
238189: RX EAPOL from 00:0e:8e:7a:67:ec
581825: EAPOL: Received EAP-Packet frame
581932: EAPOL: SUPP_BE entering state REQUEST
582004: EAPOL: getSuppRsp
582066: EAP: EAP entering state RECEIVED
582226: EAP: Received EAP-Request id=4 method=25 vendor=0
vendorMethod=0
582330: EAP: EAP entering state METHOD
582426: SSL: Received packet(len=1020) - Flags 0x40
582539: SSL: Need 1035 bytes more input data
582630: SSL: Building ACK (type=25 id=4 ver=0)
582710: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
582958: EAP: EAP entering state SEND_RESPONSE
583127: EAP: EAP entering state IDLE
583219: EAPOL: SUPP_BE entering state RESPONSE
583290: EAPOL: txSuppRsp
583358: TX EAPOL: dst=00:0e:8e:7a:67:ec
583436: TX EAPOL -
583713: EAPOL: SUPP_BE entering state RECEIVE
...
941570: EAPOL: SUPP_BE entering state REQUEST
941643: EAPOL: getSuppRsp
941708: EAP: EAP entering state RECEIVED
941871: EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
941973: EAP: EAP entering state METHOD
942071: SSL: Received packet(len=1020) - Flags 0x40
942185: SSL: Need 21 bytes more input data
942271: SSL: Building ACK (type=25 id=5 ver=0)
942347: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
942593: EAP: EAP entering state SEND_RESPONSE
942687: EAP: EAP entering state IDLE
942768: EAPOL: SUPP_BE entering state RESPONSE
...
958143: EAPOL: SUPP_BE entering state REQUEST
958209: EAPOL: getSuppRsp
958271: EAP: EAP entering state RECEIVED
958402: EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
958499: EAP: EAP entering state METHOD
958676: SSL: Received packet(len=27) - Flags 0x00
959739: SSL: (where=0x1001 ret=0x1)
959859: SSL: SSL_connect:SSLv3 read server hello A
188757: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok)
ca_cert_verify=1 depth=1
buf='/C=FR/ST=France/L=Saumur/O=Castel/OU=Labo/CN=castel_CA/emailAddress=s'
188964: CTRL-EVENT-EAP-PEER-CERT depth=1
subject='/C=FR/ST=France/L=Saumur/O=Castel/OU=Labo/CN=castel_CA/emailAddress=sm at c.fr'
314023: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok)
ca_cert_verify=1 depth=0
buf='/C=FR/ST=France/L=Saumur/O=Castel/OU=Labo/CN=ServeurRadius/emailAddre'
314409: CTRL-EVENT-EAP-PEER-CERT depth=0
subject='/C=FR/ST=France/L=Saumur/O=Castel/OU=Labo/CN=ServeurRadius/emailAddress=s.m at c.fr'
314859: SSL: SSL_connect:SSLv3 read server certificate A
387611: SSL: SSL_connect:SSLv3 read server key exchange A
387841: SSL: SSL_connect:SSLv3 read server done A
656441: SSL: SSL_connect:SSLv3 write client key exchange A
784651: SSL: SSL_connect:SSLv3 write change cipher spec A
785806: SSL: SSL_connect:SSLv3 write finished A
786195: SSL: SSL_connect:SSLv3 flush data
786284: SSL: (where=0x1002 ret=0xffffffff)
786357: SSL: SSL_connect:error in SSLv3 read finished A
786460: SSL: SSL_connect - want more data
816882: SSL: 198 bytes pending from ssl_out
817004: SSL: 198 bytes left to be sent out (of total 198 bytes)
817118: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
817212: EAP: EAP entering state SEND_RESPONSE
817308: EAP: EAP entering state IDLE
817485: EAPOL: SUPP_BE entering state RESPONSE
817557: EAPOL: txSuppRsp
817630: TX EAPOL: dst=00:0e:8e:7a:67:ec
820501: EAPOL: SUPP_BE entering state RECEIVE
847619: RX EAPOL from 00:0e:8e:7a:67:ec
848646: EAPOL: Received EAP-Packet frame
848726: EAPOL: SUPP_BE entering state REQUEST
848794: EAPOL: getSuppRsp
848857: EAP: EAP entering state RECEIVED
848994: EAP: Received EAP-Request id=7 method=25 vendor=0
vendorMethod=0
849094: EAP: EAP entering state METHOD
849189: SSL: Received packet(len=65) - Flags 0x00
850673: SSL: (where=0x1001 ret=0x1)
850796: SSL: SSL_connect:SSLv3 read finished A
851338: SSL: (where=0x20 ret=0x1)
851436: SSL: (where=0x1002 ret=0x1)
851510: SSL: 0 bytes pending from ssl_out
851816: SSL: No Application Data included
851928: SSL: No data to be sent out
852006: EAP-PEAP: TLS done, proceed to Phase 2
852075: EAP-PEAP: using label 'client EAP encryption' in
key derivation
854445: EAP-PEAP: Derived key - [REMOVED]
854582: SSL: Building ACK (type=25 id=7 ver=0)
854666: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
854755: EAP: EAP entering state SEND_RESPONSE
854846: EAP: EAP entering state IDLE
854926: EAPOL: SUPP_BE entering state RESPONSE
854994: EAPOL: txSuppRsp
855062: TX EAPOL: dst=00:0e:8e:7a:67:ec
855140: TX EAPOL -
855601: EAPOL: SUPP_BE entering state RECEIVE
867489: RX EAPOL from 00:0e:8e:7a:67:ec
868254: EAPOL: Received EAP-Packet frame
868337: EAPOL: SUPP_BE entering state REQUEST
868406: EAPOL: getSuppRsp
868470: EAP: EAP entering state RECEIVED
868602: EAP: Received EAP-Request id=8 method=25 vendor=0
vendorMethod=0
868702: EAP: EAP entering state METHOD
868798: SSL: Received packet(len=43) - Flags 0x00
868886: EAP-PEAP: received 37 bytes encrypted data for Phase 2
869582: EAP-PEAP: Decrypted Phase 2 EAP -
869757: EAP-PEAP: received Phase 2: code=1 identifier=8 length=5
869845: EAP-PEAP: Phase 2 Request: type=1
869917: EAP: using real identity - ClientRadius
870186: EAP-PEAP: Encrypting Phase 2 data - [REMOVED]
871006: SSL: 90 bytes left to be sent out (of total 90 bytes)
871159: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
871258: EAP: EAP entering state SEND_RESPONSE
871350: EAP: EAP entering state IDLE
871430: EAPOL: SUPP_BE entering state RESPONSE
871499: EAPOL: txSuppRsp
871566: TX EAPOL: dst=00:0e:8e:7a:67:ec
205088: EAPOL: SUPP_BE entering state RECEIVE
217431: RX EAPOL from 00:0e:8e:7a:67:ec
218437: EAPOL: Received EAP-Packet frame
218520: EAPOL: SUPP_BE entering state REQUEST
218588: EAPOL: getSuppRsp
218650: EAP: EAP entering state RECEIVED
218787: EAP: Received EAP-Request id=9 method=25 vendor=0
vendorMethod=0
218891: EAP: EAP entering state METHOD
218987: SSL: Received packet(len=75) - Flags 0x00
219076: EAP-PEAP: received 69 bytes encrypted data for Phase 2
219681: EAP-PEAP: Decrypted Phase 2 EAP -
220088: EAP-PEAP: received Phase 2: code=1 identifier=9 length=38
220178: EAP-PEAP: Phase 2 Request: type=26
220251: EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
220345: EAP-MSCHAPV2: RX identifier 9 mschapv2_id 9
220431: EAP-MSCHAPV2: Received challenge
220659: EAP-MSCHAPV2: Authentication Servername - ClientRadius
220893: EAP-MSCHAPV2: Generating Challenge Response
230883: MSCHAPV2: Identity - ClientRadius
231168: MSCHAPV2: Username - ClientRadius
231390: MSCHAPV2: auth_challenge -
231807: MSCHAPV2: peer_challenge -
231992: MSCHAPV2: username - ClientRadius
232214: MSCHAPV2: password - [REMOVED]
233214: MSCHAPV2: NT Response -
233494: MSCHAPV2: Auth Response -
233835: MSCHAPV2: Master Key - [REMOVED]
233941: EAP-MSCHAPV2: TX identifier 9 mschapv2_id 9 (response)
234029: EAP-PEAP: Encrypting Phase 2 data -[REMOVED]
234859: SSL: 138 bytes left to be sent out (of total 138 bytes)
235010: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
235113: EAP: EAP entering state SEND_RESPONSE
235209: EAP: EAP entering state IDLE
235289: EAPOL: SUPP_BE entering state RESPONSE
235359: EAPOL: txSuppRsp
235429: TX EAPOL: dst=00:0e:8e:7a:67:ec
238861: EAPOL: SUPP_BE entering state RECEIVE
247652: RX EAPOL from 00:0e:8e:7a:67:ec
581785: EAPOL: Received EAP-Packet frame
581893: EAPOL: SUPP_BE entering state REQUEST
581965: EAPOL: getSuppRsp
582030: EAP: EAP entering state RECEIVED
582163: EAP: Received EAP-Request id=10 method=25 vendor=0
vendorMethod=0
582267: EAP: EAP entering state METHOD
582363: SSL: Received packet(len=91) - Flags 0x00
582451: EAP-PEAP: received 85 bytes encrypted data for Phase 2
583150: EAP-PEAP: Decrypted Phase 2 EAP -
583661: EAP-PEAP: received Phase 2: code=1 identifier=10 length=51
583753: EAP-PEAP: Phase 2 Request: type=26
583834: EAP-MSCHAPV2: RX identifier 10 mschapv2_id 9
583902: EAP-MSCHAPV2: Received success
583970: EAP-MSCHAPV2: Success message -
584041: EAP-MSCHAPV2: Authentication succeeded
584120: EAP-PEAP: Encrypting Phase 2 data -[REMOVED]
584899: SSL: 74 bytes left to be sent out (of total 74 bytes)
585050: EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
585160: EAP: EAP entering state SEND_RESPONSE
585256: EAP: EAP entering state IDLE
585338: EAPOL: SUPP_BE entering state RESPONSE
585407: EAPOL: txSuppRsp
585479: TX EAPOL: dst=00:0e:8e:7a:67:ec
585559: TX EAPOL -
587830: EAPOL: SUPP_BE entering state RECEIVE
597573: RX EAPOL from 00:0e:8e:7a:67:ec
597704: RX EAPOL -
598343: EAPOL: Received EAP-Packet frame
598430: EAPOL: SUPP_BE entering state REQUEST
598498: EAPOL: getSuppRsp
598562: EAP: EAP entering state RECEIVED
598697: EAP: Received EAP-Request id=11 method=25 vendor=0
vendorMethod=0
598801: EAP: EAP entering state METHOD
598896: SSL: Received packet(len=43) - Flags 0x00
598982: EAP-PEAP: received 37 bytes encrypted data for Phase 2
599398: EAP-PEAP: Decrypted Phase 2 EAP -
599776: EAP-PEAP: received Phase 2: code=1 identifier=11 length=11
599866: EAP-PEAP: Phase 2 Request: type=33
599939: EAP-TLV: Received TLVs -
600067: EAP-TLV: Result TLV - 00 01
600155: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
600244: EAP-PEAP: Encrypting Phase 2 data -[REMOVED]
600853: SSL: 74 bytes left to be sent out (of total 74 bytes)
601164: EAP: method process -> ignore=FALSE
methodState=DONE decision=UNCOND_SUCC
601285: EAP: EAP entering state SEND_RESPONSE
601378: EAP: EAP entering state IDLE
601458: EAPOL: SUPP_BE entering state RESPONSE
601529: EAPOL: txSuppRsp
601599: TX EAPOL: dst=00:0e:8e:7a:67:ec
602700: EAPOL: SUPP_BE entering state RECEIVE
935994: RX EAPOL from 00:0e:8e:7a:67:ec
936114: RX EAPOL -
936279: EAPOL: Received EAP-Packet frame
936354: EAPOL: SUPP_BE entering state REQUEST
936422: EAPOL: getSuppRsp
936739: EAP: EAP entering state RECEIVED
936909: EAP: Received EAP-Success
937148: EAP: EAP entering state SUCCESS
937261: CTRL-EVENT-EAP-SUCCESS EAP authentication completed
successfully
937356: EAPOL: SUPP_BE entering state RECEIVE
937434: EAPOL: SUPP_BE entering state SUCCESS
937508: EAPOL: SUPP_BE entering state IDLE
937690: RX EAPOL from 00:0e:8e:7a:67:ec
938913: EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
939058: IEEE 802.1X RX: version=1 type=3 length=95
939189: EAPOL-Key type=254
939257: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
940713: WPA: RX EAPOL-Key -
941877: State: ASSOCIATED -> 4WAY_HANDSHAKE
941971: WPA: RX message 1 of 4-Way Handshake from
00:0e:8e:7a:67:ec (ver=1)
942070: EAPOL: Successfully fetched key (len=32)
942139: WPA: PMK from EAPOL state machines -[REMOVED]
998767: WPA: Renewed SNonce -
999906: WPA: PTK derivation - A1=00:24:23:15:dc:aa
A2=00:0e:8e:7a:67:ec
000050: WPA: PMK - [REMOVED]
000137: WPA: PTK - [REMOVED]
010093: EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
010191: IEEE 802.1X RX: version=1 type=3 length=119
010270: EAPOL-Key type=254
010333: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise
Install Ack MIC)
010421: key_length=32 key_data_length=24
345974: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
346072: WPA: RX message 3 of 4-Way Handshake from
00:0e:8e:7a:67:ec (ver=1)
346168: WPA: IE KeyData -
346445: WPA: WPA IE in EAPOL-Key -
347318: WPA: Sending EAPOL-Key 4/4
348772: WPA: Installing PTK to the driver.
348864: WPA: RSC -
348999: wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1
seq_len=6 key_len=32
349187: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
377225: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
377526: Wireless event: cmd=0x8b15 len=20
377613: Wireless event: new AP: 00:00:00:00:00:00
377700: Disassociation notification
377808: Setting scan request: 0 sec 100000 usec
377909: Added BSSID 00:0e:8e:7a:67:ec into blacklist
378038: CTRL-EVENT-DISCONNECTED bssid=00:0e:8e:7a:67:ec reason=0
378114: Disconnect event - remove keys
378182: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
430354: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
430732: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
430892: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
431033: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
431177: State: GROUP_HANDSHAKE -> DISCONNECTED
431263: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
431342: netlink: Operstate: linkmode=-1, operstate=5
431468: EAPOL: External notification - portEnabled=0
431556: EAPOL: SUPP_PAE entering state DISCONNECTED
431624: EAPOL: Supplicant port status: Unauthorized
431694: EAPOL: SUPP_BE entering state INITIALIZE
431774: EAP: EAP entering state DISABLED
431843: EAPOL: Supplicant port status: Unauthorized
432077: EAPOL: External notification - portValid=0
432152: EAPOL: Supplicant port status: Unauthorized
432266: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
432363: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
486843: State: DISCONNECTED -> SCANNING
Stop using CTRL^C else will be still running.
More information about the Hostap
mailing list