Issue with Enterprise authentication due to ap_sta_delayed_1x_auth_fail_cb

kiran k ikirank at gmail.com
Sun Apr 20 23:27:28 PDT 2025


Hi,
I am running into an issue with Enterprise authentication with a STA
using hostapd. There is a 20 to 40 second delay because the timer
ap_sta_delayed_1x_auth_fail_cb is being called in the middle of EAP
exchange. I am attaching a log with a sequence of steps.
The sequence of steps are as follows:
1) The STA does an association and the 4 way handshake is successfully
completed. Now the station goes out of AP coverage.
2) STA again associates back to AP and AP sends an EAP Request Id with
ID 116 in line  160 in the attached log.
3) The  sends a EAP logoff instead of responding with an EAP response
in line 172. Not sure if this is expected.
4) Hostapd starts a timer ap_sta_delayed_1x_auth_fail_cb for 10ms on
receiving EAP-Logoff in line 179
5)  AP sends a new EAP Request ID message with ID 209 line 190
6)  Then STA sends EAP Response ID message with ID 116 (previous EAP
exchange before logoff) in line number 202
7)  AP discards this EAP Response with ID 116.
8)  STA responds with EAP Response ID 209 in line 209
9)  AP sends a RADIUS access request to the RADIUS server in line 233
10) AP receives Access Challenge from RADIUS server 269
11) Now in middle of this   ap_sta_delayed_1x_auth_fail_cb timer is
triggered at line 286 causing Disconnection of STA
12) Then association is retriggered after deauth.
13) This is causing a delay of 20 to 40 seconds to authenticate.

The timer ap_sta_delayed_1x_auth_fail_cb should be cancelled for the
EAP exchange to go through. This is causing a 20 to 40 second delay in
association.  If a new association happens we clear all the disconnect
timers.
Where do we cancel the timer if no new association happens as
explained above. Can you please provide some insights as to where to
call the cancellation of ap_sta_delayed_1x_auth_fail_cb timer.

Thanks & Regards,
Kiran
949428EAP_64B_WLINTERNAL_WL26D1_WLMLO_OT
-------------- next part --------------
1710231329.857390: nl80211: Event message available
1710231329.857432: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wl1
1710231329.857441: nl80211: Delete station 3a:fa:fa:3e:d7:6b
1710231329.857454: wl1: Event DISASSOC (1) received
1710231329.857468: 1710231329.857469: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.11: disassociated
1710231329.857514: wl1: AP-STA-DISCONNECTED 3a:fa:fa:3e:d7:6b
1710231329.857522: nl80211: Set STA flags - ifname=wl1 addr=3a:fa:fa:3e:d7:6b total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
1710231329.857620: 1710231329.857622: wl1: STA 3a:fa:fa:3e:d7:6b WPA: event 2 notification
1710231329.857649: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1310e50 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
1710231329.857662: nl80211: DEL_KEY
1710231329.857669:    addr=3a:fa:fa:3e:d7:6b
1710231329.857676:    pairwise key
1710231329.857841: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state DISCONNECTED
1710231329.857853: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state INITIALIZE
1710231329.857875: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1310e50 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
1710231329.857886: nl80211: DEL_KEY
1710231329.857893:    addr=3a:fa:fa:3e:d7:6b
1710231329.857899:    pairwise key
1710231329.858013: nl80211: Set STA flags - ifname=wl1 addr=3a:fa:fa:3e:d7:6b total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
1710231329.858048: hostapd_ht_operation_update current operation mode=0x0
1710231329.858055: hostapd_ht_operation_update new operation mode=0x0 changes=0
1710231329.858061: ap_free_sta: cancel ap_handle_timer for 3a:fa:fa:3e:d7:6b
1710231329.858072: EAP: Server state machine removed
1710231340.277590: nl80211: Event message available
1710231340.277664: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wl1
1710231340.277674: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wl1(d8:21:da:37:52:bb) A1=d8:21:da:37:52:bb A2=a0:2d:13:52:47:e8
1710231340.277687: nl80211: MLME event frame - hexdump(len=68): d0 00 00 00 d8 21 da 37 52 bb a0 2d 13 52 47 e8 d8 21 da 37 52 bb 00 00 04 09 50 6f 9a 1a 01 0d 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231340.277725: nl80211: Frame event
1710231340.277732: nl80211: RX frame da=d8:21:da:37:52:bb sa=a0:2d:13:52:47:e8 bssid=d8:21:da:37:52:bb freq=5220 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=68
1710231340.277751: wl1: Event RX_MGMT (18) received
1710231340.277761: mgmt::action
1710231340.277765: RX_ACTION category 4 action 9 sa a0:2d:13:52:47:e8 da d8:21:da:37:52:bb len 68 freq 5220
1710231340.277776: DPP: Received DPP Public Action frame crypto suite 1 type 13 from a0:2d:13:52:47:e8 freq=5220
1710231340.277784: DPP: Received message attributes - hexdump(len=36): 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231340.277805: DPP: Attribute ID 1002 len 32
1710231340.277816: wl1: DPP-RX src=a0:2d:13:52:47:e8 freq=5220 type=13
1710231340.277823: DPP: Presence Announcement from a0:2d:13:52:47:e8
1710231340.277830: DPP: Responder Bootstrapping Key Hash - hexdump(len=32): c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231340.277868: wl1: DPP-CHIRP-RX id=-1 src=a0:2d:13:52:47:e8 freq=5220 hash=c8cd82148a034bab2ccc8f04215bc25ff82dcb0cd41ad954c14091df66bb2216
1710231340.277874: DPP: No matching bootstrapping information found
1710231344.108115: nl80211: Event message available
1710231344.108183: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wl1
1710231344.108194: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wl1(d8:21:da:37:52:bb) A1=d8:21:da:37:52:bb A2=a0:2d:13:52:47:e8
1710231344.108207: nl80211: MLME event frame - hexdump(len=68): d0 00 00 00 d8 21 da 37 52 bb a0 2d 13 52 47 e8 d8 21 da 37 52 bb 00 00 04 09 50 6f 9a 1a 01 0d 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231344.108245: nl80211: Frame event
1710231344.108252: nl80211: RX frame da=d8:21:da:37:52:bb sa=a0:2d:13:52:47:e8 bssid=d8:21:da:37:52:bb freq=5180 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=68
1710231344.108271: wl1: Event RX_MGMT (18) received
1710231344.108281: mgmt::action
1710231344.108285: RX_ACTION category 4 action 9 sa a0:2d:13:52:47:e8 da d8:21:da:37:52:bb len 68 freq 5180
1710231344.108296: DPP: Received DPP Public Action frame crypto suite 1 type 13 from a0:2d:13:52:47:e8 freq=5180
1710231344.108304: DPP: Received message attributes - hexdump(len=36): 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231344.108325: DPP: Attribute ID 1002 len 32
1710231344.108336: wl1: DPP-RX src=a0:2d:13:52:47:e8 freq=5180 type=13
1710231344.108342: DPP: Presence Announcement from a0:2d:13:52:47:e8
1710231344.108349: DPP: Responder Bootstrapping Key Hash - hexdump(len=32): c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231344.108387: wl1: DPP-CHIRP-RX id=-1 src=a0:2d:13:52:47:e8 freq=5180 hash=c8cd82148a034bab2ccc8f04215bc25ff82dcb0cd41ad954c14091df66bb2216
1710231344.108394: DPP: No matching bootstrapping information found


=== mark: phone disconnect ====

1710231353.975439: nl80211: Event message available
1710231353.975485: nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 19 wdev 0x0)


1710231360.398229: nl80211: Event message available
1710231360.398296: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wl1
1710231360.398306: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wl1(d8:21:da:37:52:bb) A1=d8:21:da:37:52:bb A2=a0:2d:13:52:47:e8
1710231360.398320: nl80211: MLME event frame - hexdump(len=68): d0 00 00 00 d8 21 da 37 52 bb a0 2d 13 52 47 e8 d8 21 da 37 52 bb 00 00 04 09 50 6f 9a 1a 01 0d 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231360.398357: nl80211: Frame event
1710231360.398363: nl80211: RX frame da=d8:21:da:37:52:bb sa=a0:2d:13:52:47:e8 bssid=d8:21:da:37:52:bb freq=5220 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=68
1710231360.398382: wl1: Event RX_MGMT (18) received
1710231360.398392: mgmt::action
1710231360.398396: RX_ACTION category 4 action 9 sa a0:2d:13:52:47:e8 da d8:21:da:37:52:bb len 68 freq 5220
1710231360.398407: DPP: Received DPP Public Action frame crypto suite 1 type 13 from a0:2d:13:52:47:e8 freq=5220
1710231360.398415: DPP: Received message attributes - hexdump(len=36): 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231360.398437: DPP: Attribute ID 1002 len 32
1710231360.398447: wl1: DPP-RX src=a0:2d:13:52:47:e8 freq=5220 type=13
1710231360.398454: DPP: Presence Announcement from a0:2d:13:52:47:e8
1710231360.398461: DPP: Responder Bootstrapping Key Hash - hexdump(len=32): c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231360.398499: wl1: DPP-CHIRP-RX id=-1 src=a0:2d:13:52:47:e8 freq=5220 hash=c8cd82148a034bab2ccc8f04215bc25ff82dcb0cd41ad954c14091df66bb2216
1710231360.398506: DPP: No matching bootstrapping information found
1710231364.180706: nl80211: Event message available
1710231364.180773: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wl1
1710231364.180784: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wl1(d8:21:da:37:52:bb) A1=d8:21:da:37:52:bb A2=a0:2d:13:52:47:e8
1710231364.180797: nl80211: MLME event frame - hexdump(len=68): d0 00 00 00 d8 21 da 37 52 bb a0 2d 13 52 47 e8 d8 21 da 37 52 bb 00 00 04 09 50 6f 9a 1a 01 0d 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231364.180834: nl80211: Frame event
1710231364.180841: nl80211: RX frame da=d8:21:da:37:52:bb sa=a0:2d:13:52:47:e8 bssid=d8:21:da:37:52:bb freq=5180 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=68
1710231364.180860: wl1: Event RX_MGMT (18) received
1710231364.180869: mgmt::action
1710231364.180874: RX_ACTION category 4 action 9 sa a0:2d:13:52:47:e8 da d8:21:da:37:52:bb len 68 freq 5180
1710231364.180885: DPP: Received DPP Public Action frame crypto suite 1 type 13 from a0:2d:13:52:47:e8 freq=5180
1710231364.180893: DPP: Received message attributes - hexdump(len=36): 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231364.180914: DPP: Attribute ID 1002 len 32
1710231364.180925: wl1: DPP-RX src=a0:2d:13:52:47:e8 freq=5180 type=13
1710231364.180931: DPP: Presence Announcement from a0:2d:13:52:47:e8
1710231364.180938: DPP: Responder Bootstrapping Key Hash - hexdump(len=32): c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231364.180976: wl1: DPP-CHIRP-RX id=-1 src=a0:2d:13:52:47:e8 freq=5180 hash=c8cd82148a034bab2ccc8f04215bc25ff82dcb0cd41ad954c14091df66bb2216
1710231364.180983: DPP: No matching bootstrapping information found
1710231369.602147: nl80211: Event message available
1710231369.602212: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wl1
1710231369.602223: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wl1(d8:21:da:37:52:bb) A1=d8:21:da:37:52:bb A2=a0:2d:13:52:47:e8
1710231369.602235: nl80211: MLME event frame - hexdump(len=68): d0 00 00 00 d8 21 da 37 52 bb a0 2d 13 52 47 e8 d8 21 da 37 52 bb 00 00 04 09 50 6f 9a 1a 01 0d 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231369.602272: nl80211: Frame event
1710231369.602279: nl80211: RX frame da=d8:21:da:37:52:bb sa=a0:2d:13:52:47:e8 bssid=d8:21:da:37:52:bb freq=5200 ssi_signal=0 fc=0xd0 seq_ctrl=0x0 stype=13 (WLAN_FC_STYPE_ACTION) len=68
1710231369.602297: wl1: Event RX_MGMT (18) received
1710231369.602307: mgmt::action
1710231369.602311: RX_ACTION category 4 action 9 sa a0:2d:13:52:47:e8 da d8:21:da:37:52:bb len 68 freq 5200
1710231369.602322: DPP: Received DPP Public Action frame crypto suite 1 type 13 from a0:2d:13:52:47:e8 freq=5200
1710231369.602331: DPP: Received message attributes - hexdump(len=36): 02 10 20 00 c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231369.602352: DPP: Attribute ID 1002 len 32
1710231369.602362: wl1: DPP-RX src=a0:2d:13:52:47:e8 freq=5200 type=13
1710231369.602369: DPP: Presence Announcement from a0:2d:13:52:47:e8
1710231369.602375: DPP: Responder Bootstrapping Key Hash - hexdump(len=32): c8 cd 82 14 8a 03 4b ab 2c cc 8f 04 21 5b c2 5f f8 2d cb 0c d4 1a d9 54 c1 40 91 df 66 bb 22 16
1710231369.602414: wl1: DPP-CHIRP-RX id=-1 src=a0:2d:13:52:47:e8 freq=5200 hash=c8cd82148a034bab2ccc8f04215bc25ff82dcb0cd41ad954c14091df66bb2216
1710231369.602420: DPP: No matching bootstrapping information found
1710231371.070906: nl80211: Event message available
1710231371.070975: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wl1
1710231371.070985: nl80211: New station 3a:fa:fa:3e:d7:6b
1710231371.070994: nl80211: Assoc Req IEs - hexdump(len=210): 00 12 41 31 2d 42 4d 32 5f 63 61 72 6c 5f 72 61 64 69 75 73 01 08 8c 12 98 24 b0 48 60 6c 21 02 f9 15 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 8c 00 46 05 71 08 01 00 00 2d 1a 6f 00 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 0b 00 00 08 00 00 00 00 40 00 00 20 6b 07 0f ff ff ff ff ff ff bf 0c 32 70 81 0f fa ff 00 00 fa ff 00 00 ff 1c 23 01 08 08 00 00 80 44 30 02 00 1d 00 9f 08 00 0c 00 fa ff fa ff 39 1c c7 71 1c 07 dd 0b 00 17 f2 0a 00 01 04 00 00 00 00 dd 05 00 90 4c 04 07 dd 0a 00 10 18 02 00 00 10 00 00 02 dd 07 00 50 f2 02 00 01 00
1710231371.071101: wl1: Event ASSOC (0) received
1710231371.071119: 1710231371.071120: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.11: associated
1710231371.071165: STA included RSN IE in (Re)AssocReq
1710231371.071173:   New STA
1710231371.071237: ap_sta_add: register ap_handle_timer timeout for 3a:fa:fa:3e:d7:6b (300 seconds - ap_max_inactivity)
1710231371.071266: nl80211: Set STA flags - ifname=wl1 addr=3a:fa:fa:3e:d7:6b total_flags=0x68 flags_or=0x8 flags_and=0xfffffff9 authorized=0
1710231371.071489: 1710231371.071491: wl1: STA 3a:fa:fa:3e:d7:6b WPA: event 1 notification
1710231371.071523: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1317220 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
1710231371.071564: nl80211: DEL_KEY
1710231371.071574:    addr=3a:fa:fa:3e:d7:6b
1710231371.071582:    pairwise key
1710231371.071773: 1710231371.071775: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: start authentication
1710231371.071789: EAP: Server state machine created
1710231371.071800: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state IDLE
1710231371.071809: IEEE 802.1X: 3a:fa:fa:3e:d7:6b CTRL_DIR entering state FORCE_BOTH
1710231371.071876: 1710231371.071878: wl1: STA 3a:fa:fa:3e:d7:6b WPA: start authentication
1710231371.071886: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state INITIALIZE
1710231371.071912: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1317220 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
1710231371.071924: nl80211: DEL_KEY
1710231371.071934:    addr=3a:fa:fa:3e:d7:6b
1710231371.071941:    pairwise key
1710231371.072101: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK_GROUP entering state IDLE
1710231371.072112: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state AUTHENTICATION
1710231371.072122: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state AUTHENTICATION2
1710231371.072131: Get randomness: len=32 entropy=16
1710231371.072216: WPA: Assign ANonce - hexdump(len=32): d3 f6 30 9d 1b 88 f9 57 6c 36 44 cb 6f 5c 19 6b 6d 45 9e a5 e2 25 c0 e3 01 92 a1 73 15 96 81 35
1710231371.072240: wl1: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 3a:fa:fa:3e:d7:6b (300 seconds - ap_max_inactivity)
1710231371.072276: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state DISCONNECTED
1710231371.072287: nl80211: Set STA flags - ifname=wl1 addr=3a:fa:fa:3e:d7:6b total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
1710231371.072528: 1710231371.072530: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: unauthorizing port
1710231371.072546: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state RESTART
1710231371.072555: EAP: EAP entering state INITIALIZE
1710231371.072566: wl1: CTRL-EVENT-EAP-STARTED 3a:fa:fa:3e:d7:6b
1710231371.072573: EAP: EAP entering state SELECT_ACTION
1710231371.072583: EAP: getDecision: no identity known yet -> CONTINUE
1710231371.072590: EAP: EAP entering state PROPOSE_METHOD
1710231371.072596: EAP: getNextMethod: vendor 0 type 1
1710231371.072606: wl1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
1710231371.072614: EAP: EAP entering state METHOD_REQUEST
1710231371.072621: EAP: building EAP-Request: Identifier 116
1710231371.072630: EAP: EAP entering state SEND_REQUEST
1710231371.072638: EAP: EAP entering state IDLE
1710231371.072644: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1710231371.072651: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state CONNECTING
1710231371.072659: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state AUTHENTICATING
1710231371.072668: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state REQUEST
1710231371.072681: 1710231371.072682: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: Sending EAP Packet (identifier 116)
1710231371.098731: wl1: Event EAPOL_RX (23) received
1710231371.098760: IEEE 802.1X: 22 bytes from 3a:fa:fa:3e:d7:6b
1710231371.098769:    IEEE 802.1X: version=1 type=2 length=0
1710231371.098776:    ignoring 18 extra octets after IEEE 802.1X packet
1710231371.098790: 1710231371.098791: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: received EAPOL-Logoff from STA
1710231371.098812: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state ABORTING
1710231371.098822: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state INITIALIZE
1710231371.098835: 1710231371.098836: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: aborting authentication
1710231371.098846: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state DISCONNECTED
1710231371.098857: nl80211: Set STA flags - ifname=wl1 addr=3a:fa:fa:3e:d7:6b total_flags=0x68 flags_or=0x0 flags_and=0xfffffffe authorized=0
1710231371.099781: 1710231371.099784: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: unauthorizing port
1710231371.099802: wl1: IEEE 802.1X: Force disconnection of 3a:fa:fa:3e:d7:6b after EAP-Failure in 10 ms
1710231371.099813: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state IDLE
1710231371.099823: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state RESTART
1710231371.099834: EAP: EAP entering state INITIALIZE
1710231371.099845: wl1: CTRL-EVENT-EAP-STARTED 3a:fa:fa:3e:d7:6b
1710231371.099853: EAP: EAP entering state SELECT_ACTION
1710231371.099860: EAP: getDecision: no identity known yet -> CONTINUE
1710231371.099867: EAP: EAP entering state PROPOSE_METHOD
1710231371.099873: EAP: getNextMethod: vendor 0 type 1
1710231371.099883: wl1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
1710231371.099890: EAP: EAP entering state METHOD_REQUEST
1710231371.099898: EAP: building EAP-Request: Identifier 209
1710231371.099906: EAP: EAP entering state SEND_REQUEST
1710231371.099913: EAP: EAP entering state IDLE
1710231371.099920: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1710231371.099927: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state CONNECTING
1710231371.099936: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state AUTHENTICATING
1710231371.099944: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state REQUEST
1710231371.099957: 1710231371.099958: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: Sending EAP Packet (identifier 209)
1710231371.100025: wl1: Event EAPOL_RX (23) received
1710231371.100033: IEEE 802.1X: 28 bytes from 3a:fa:fa:3e:d7:6b
1710231371.100040:    IEEE 802.1X: version=1 type=0 length=10
1710231371.100047:    ignoring 14 extra octets after IEEE 802.1X packet
1710231371.100054: EAP: code=2 (response) identifier=116 length=10
1710231371.100068: 1710231371.100069: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: received EAP packet (code=2 id=116 len=10) from STA: EAP Response-Identity (1)
1710231371.100101: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state RESPONSE
1710231371.100110: EAP: EAP entering state RECEIVED
1710231371.100116: EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=116 respMethod=1 respVendor=0 respVendorMethod=0
1710231371.100124: EAP: RECEIVED->DISCARD: rxResp=1 respId=116 currentId=209 respMethod=1 currentMethod=1
1710231371.100132: EAP: EAP entering state DISCARD
1710231371.100138: EAP: EAP entering state IDLE
1710231371.100142: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1710231371.100148: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state IGNORE
1710231371.104080: wl1: Event EAPOL_RX (23) received
1710231371.104104: IEEE 802.1X: 28 bytes from 3a:fa:fa:3e:d7:6b
1710231371.104113:    IEEE 802.1X: version=1 type=0 length=10
1710231371.104120:    ignoring 14 extra octets after IEEE 802.1X packet
1710231371.104128: EAP: code=2 (response) identifier=209 length=10
1710231371.104144: 1710231371.104146: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: received EAP packet (code=2 id=209 len=10) from STA: EAP Response-Identity (1)
1710231371.104168: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state RESPONSE
1710231371.104181: EAP: EAP entering state RECEIVED
1710231371.104188: EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=209 respMethod=1 respVendor=0 respVendorMethod=0
1710231371.104196: EAP: EAP entering state INTEGRITY_CHECK
1710231371.104203: EAP: EAP entering state METHOD_RESPONSE
1710231371.104211: EAP-Identity: Peer identity - hexdump_ascii(len=5):
     73 74 65 76 65                                    steve           
1710231371.104232: EAP: EAP entering state SELECT_ACTION
1710231371.104238: EAP: getDecision: -> PASSTHROUGH
1710231371.104245: EAP: EAP entering state INITIALIZE_PASSTHROUGH
1710231371.104251: EAP: EAP entering state AAA_REQUEST
1710231371.104258: EAP: EAP entering state AAA_IDLE
1710231371.104271: 1710231371.104272: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: STA identity 'steve'
1710231371.104279: Encapsulating EAP message into a RADIUS packet
1710231371.104406: 1710231371.104408: wl1: RADIUS Sending RADIUS message to authentication server
1710231371.104416: RADIUS message: code=1 (Access-Request) identifier=7 length=222
1710231371.104425:    Attribute 1 (User-Name) length=7
1710231371.104432:       Value: 'steve'
1710231371.104438:    Attribute 4 (NAS-IP-Address) length=6
1710231371.104446:       Value: 127.0.0.1
1710231371.104451:    Attribute 30 (Called-Station-Id) length=38
1710231371.104458:       Value: 'D8-21-DA-37-52-BB:A1-BM2_carl_radius'
1710231371.104465:    Attribute 61 (NAS-Port-Type) length=6
1710231371.104471:       Value: 19
1710231371.104476:    Attribute 6 (Service-Type) length=6
1710231371.104482:       Value: 2
1710231371.104488:    Attribute 31 (Calling-Station-Id) length=19
1710231371.104494:       Value: '3A-FA-FA-3E-D7-6B'
1710231371.104500:    Attribute 77 (Connect-Info) length=24
1710231371.104506:       Value: 'CONNECT 24Mbps 802.11a'
1710231371.104512:    Attribute 44 (Acct-Session-Id) length=18
1710231371.104518:       Value: '63253FFA0DC89B79'
1710231371.104524:    Attribute 50 (Acct-Multi-Session-Id) length=18
1710231371.104530:       Value: '8E0B33663AB3BCE2'
1710231371.104549:    Attribute 186 (WLAN-Pairwise-Cipher) length=6
1710231371.104558:       Value: 000fac04
1710231371.104563:    Attribute 187 (WLAN-Group-Cipher) length=6
1710231371.104571:       Value: 000fac04
1710231371.104577:    Attribute 188 (WLAN-AKM-Suite) length=6
1710231371.104584:       Value: 000fac01
1710231371.104590:    Attribute 189 (WLAN-Group-Mgmt-Pairwise-Cipher) length=6
1710231371.104598:       Value: 000fac06
1710231371.104604:    Attribute 12 (Framed-MTU) length=6
1710231371.104609:       Value: 1400
1710231371.104613:    Attribute 79 (EAP-Message) length=12
1710231371.104624:       Value: 02d1000a017374657665
1710231371.104629:    Attribute 80 (Message-Authenticator) length=18
1710231371.104641:       Value: ed35f0c579139d6a8e4f0e6669f044bf
1710231371.104691: 1710231371.104692: wl1: RADIUS Next RADIUS client retransmit in 2 seconds
1710231371.105685: 1710231371.105687: wl1: RADIUS Received 64 bytes from RADIUS server
1710231371.105704: 1710231371.105705: wl1: RADIUS Received RADIUS message
1710231371.105711: RADIUS message: code=11 (Access-Challenge) identifier=7 length=64
1710231371.105718:    Attribute 79 (EAP-Message) length=8
1710231371.105726:       Value: 01d200061520
1710231371.105731:    Attribute 80 (Message-Authenticator) length=18
1710231371.105742:       Value: fbb0cb50cae0d0ce2cf78ab8f02ad0bf
1710231371.105747:    Attribute 24 (State) length=18
1710231371.105757:       Value: eb05ace4ebd7b9f1e1c34836b1b1f654
1710231371.105768: 1710231371.105770: wl1: STA 3a:fa:fa:3e:d7:6b RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
1710231371.105796: RADIUS packet matching with station 3a:fa:fa:3e:d7:6b
1710231371.105814: 1710231371.105815: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: decapsulated EAP packet (code=1 id=210 len=6) from RADIUS server: EAP-Request-unknown (21)
1710231371.105833: EAP: EAP entering state AAA_RESPONSE
1710231371.105840: EAP: getId: id=210
1710231371.105845: EAP: EAP entering state SEND_REQUEST2
1710231371.105850: EAP: EAP entering state IDLE2
1710231371.105855: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1710231371.105862: IEEE 802.1X: 3a:fa:fa:3e:d7:6b BE_AUTH entering state REQUEST
1710231371.105875: 1710231371.105876: wl1: STA 3a:fa:fa:3e:d7:6b IEEE 802.1X: Sending EAP Packet (identifier 210)
1710231371.109904: wl1: IEEE 802.1X: Scheduled disconnection of 3a:fa:fa:3e:d7:6b after EAP-Failure
1710231371.109923: wl1: ap_sta_disconnect STA 3a:fa:fa:3e:d7:6b reason=23
1710231371.110621: nl80211: sta_remove -> DEL_STATION wl1 3a:fa:fa:3e:d7:6b --> 0 (Success)
1710231371.110638: nl80211: Set STA flags - ifname=wl1 addr=3a:fa:fa:3e:d7:6b total_flags=0x8 flags_or=0x8 flags_and=0xfffffff9 authorized=0
1710231371.110720: 1710231371.110721: wl1: STA 3a:fa:fa:3e:d7:6b WPA: event 3 notification
1710231371.110765: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1317220 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
1710231371.110778: nl80211: DEL_KEY
1710231371.110786:    addr=3a:fa:fa:3e:d7:6b
1710231371.110793:    pairwise key
1710231371.120208: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state DISCONNECTED
1710231371.120250: WPA: 3a:fa:fa:3e:d7:6b WPA_PTK entering state INITIALIZE
1710231371.120314: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1317220 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
1710231371.120338: nl80211: DEL_KEY
1710231371.120363:    addr=3a:fa:fa:3e:d7:6b
1710231371.120383:    pairwise key
1710231371.120626: wl1: ap_sta_disconnect: reschedule ap_handle_timer timeout for 3a:fa:fa:3e:d7:6b (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
1710231371.120672: IEEE 802.1X: 3a:fa:fa:3e:d7:6b AUTH_PAE entering state INITIALIZE
1710231371.120695: EAP: EAP entering state DISABLED
1710231371.120728: wl1: Deauthentication callback for STA 3a:fa:fa:3e:d7:6b
1710231371.120746: wl1: Removing STA 3a:fa:fa:3e:d7:6b from kernel driver
1710231371.121020: nl80211: sta_remove -> DEL_STATION wl1 3a:fa:fa:3e:d7:6b --> 0 (Success)
1710231371.121052: 1710231371.121054: wl1: STA 3a:fa:fa:3e:d7:6b MLME: MLME-DEAUTHENTICATE.indication(3a:fa:fa:3e:d7:6b, 23)
1710231371.121077: 1710231371.121078: wl1: STA 3a:fa:fa:3e:d7:6b MLME: MLME-DELETEKEYS.request(3a:fa:fa:3e:d7:6b)
1710231371.121111: wpa_driver_nl80211_set_key: ifindex=18 (wl1) alg=0 addr=0x1317220 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20



More information about the Hostap mailing list