PEAPv1 testing

Sergio NNX sfhacker
Mon Feb 10 04:06:28 PST 2014


Hi all,

I'm trying to test several EAP methods, including PEAPv0 & PEAPv1. PEAPv0 works fine, but PEAPv1.
All other methods (e.g. EAP-TTLS, EAP-AKA, etc) work Ok.
I've done some Google search but I couldn't find any pointers.

I'm using eapol_test (v2.1) to test EAP methods.

This is my .conf file:

network={
        ssid="test"
        key_mgmt=WPA-EAP
        eap=PEAP
        identity="user"
        password="password"
        anonymous_identity="not anonymous"
        ca_cert="ca.pem"
        phase1="peaplabel=1"
        phase2="auth=MD5"
}

And this is eapol_test output:

...
...
...
RADIUS packet matching with station
MS-MPPE-Send-Key (sign) - hexdump(len=32): 0b 56 d2 59 a3 7d 06 86 21 25 3c b0 7
d e3 52 50 3e 67 a5 f9 d4 e4 16 6c e0 cd e2 91 8d 11 17 84
MS-MPPE-Recv-Key (crypt) - hexdump(len=32): 3b 5a 51 96 0a 77 9b 32 1c 50 6c 4b
a8 95 fa 1e bc a8 ba 7a c6 f8 76 cc 3b 09 f4 35 64 8b 26 b1
decapsulated EAP packet (code=3 id=7 len=4) from RADIUS server: EAP Success
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required
WPA: EAPOL processing complete
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
eapol_sm_cb: result=1
EAPOL: Successfully fetched key (len=32)
PMK from EAPOL - hexdump(len=32): b1 61 62 66 33 67 f8 2f 1e d8 6a e8 1e 39 d8 d
5 34 d8 98 35 36 a8 08 14 9a f1 58 9d 6e 6d 5e ef
WARNING: PMK mismatch
PMK from AS - hexdump(len=32): 3b 5a 51 96 0a 77 9b 32 1c 50 6c 4b a8 95 fa 1e b
c a8 ba 7a c6 f8 76 cc 3b 09 f4 35 64 8b 26 b1
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 0  mismatch: 1
FAILURE

This is part of hostapd output:

...
...
...
RADIUS SRV: Request for session 0x0
RADIUS SRV: Received EAP data - hexdump(len=6): 02 07 00 06 19 01
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=7 respMethod=25 respVendor=0 respVendorMethod
=0
EAP: EAP entering state INTEGRITY_CHECK
EAP: EAP entering state METHOD_RESPONSE
SSL: Received packet(len=6) - Flags 0x01
SSL: Received packet: Flags 0x1 Message Length 0
EAP-PEAP: SUCCESS_REQ -> SUCCESS
OpenSSL: Using internal PRF
EAP-PEAP: Derived key - hexdump(len=64): 3b 5a 51 96 0a 77 9b 32 1c 50 6c 4b a8
95 fa 1e bc a8 ba 7a c6 f8 76 cc 3b 09 f4 35 64 8b 26 b1 0b 56 d2 59 a3 7d 06 86
 21 25 3c b0 7d e3 52 50 3e 67 a5 f9 d4 e4 16 6c e0 cd e2 91 8d 11 17 84
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: method succeeded -> SUCCESS
EAP: EAP entering state SUCCESS
EAP: Building EAP-Success (id=7)
eth0: CTRL-EVENT-EAP-SUCCESS 00:00:00:00:00:00
RADIUS SRV: EAP data from the state machine - hexdump(len=4): 03 07 00 04
RADIUS SRV: Reply to 127.0.0.1:53035
RADIUS message: code=2 (Access-Accept) identifier=7 length=160
   Attribute 79 (EAP-Message) length=6
      Value: 03 07 00 04
   Attribute 26 (Vendor-Specific) length=58
      Value: 00 00 01 37 10 34 c9 03 67 98 8d d4 08 2e 3a 8c 82 00 d2 e6 20 e2 9
7 a0 fd e6 f8 dd e6 b4 76 1b 77 61 51 f3 c2 52 88 80 68 54 f4 ce 0c 18 c6 31 0e
f4 10 02 96 eb ee ba
   Attribute 26 (Vendor-Specific) length=58
      Value: 00 00 01 37 11 34 c9 02 79 4f 83 ba 16 8a ac 6b 17 17 c4 46 f5 e2 e
8 98 12 9a 2f ba 41 fd 5c 15 3a fd 1c 30 41 fa 13 b6 6f bc 78 c4 1f 1e 76 21 19
77 19 ff 17 a6 70 b1
   Attribute 80 (Message-Authenticator) length=18
      Value: c7 17 84 d4 57 54 c7 5f 35 15 a3 ef 2b 7f f3 d5
      

Any pointers/examples/etc will be greatly appreciated.

Thanks in advance.

Sergio.
 		 	   		  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.shmoo.com/pipermail/hostap/attachments/20140210/681dd989/attachment.htm>



More information about the Hostap mailing list