help needed in pre-authentication with wpa_supplicant. Thanks

helas Akropolis hela80
Sun Jun 5 16:00:29 PDT 2005


Hi all,

i have 2 hostap with hostapd 0.3.7, FreeRADIUS Server and a wpa_supplicant 0.3.8 who run on wxp sp2. The wpa_supplicant get via EAP-TTLS authenticated. I have a problem when i force pre-authentication !! 

Both APs have the same essid=WirelessNetwork. On both hostapd.conf i have 

iapp_interface=eth0
rsn_preauth=1 
rsn_preauth_interface=etho
 
The wpa_supplicant get just to one AP connected

Interactive mode

> status
bssid=00:09:5b:12:0f:a5
ssid=WirelessNetwork
pairwise_cipher=CCMP
group_cipher=TKIP
key_mgmt=WPA/IEEE 802.1X/EAP
wpa_state=COMPLETED
Supplicant PAE state=AUTHENTICATED
suppPortStatus=Authorized
EAP state=SUCCESS
selectedMethod=21 (EAP-TTLS)
EAP TLS cipher=AES256-SHA
EAP-TTLS Phase2 method=EAP-MD5

Then i force the wpa_cli with 
> preauthenticate 00:09:5b:2f:72:78
OK

The wpa_supplicant begin with the EAPOL Start and get timeouted. The Hostapd and RADIUSServer dont log anything 

I tested with Ethereal and see that the 00:09:5b:12:0f:a5 send a EAPOL start, but he become no responce.

Can you please help me ? Thank you

X:\wpa_supplicant-windows-bin-0.3.8>wpa_supplicant.exe -i
 \Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858} -c wpa_supplicant.conf -dd
Initializing interface '\Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858}' conf
 'wpa_supplicant.conf' driver 'default'
Configuration file 'wpa_supplicant.conf' -> 'X:\wpa_supplicant-windows-bin-0.3.8/wpa_supplicant.conf'
Reading configuration file 'X:\wpa_supplicant-windows-bin-0.3.8/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=2
ap_scan=1
fast_reauth=1
Line: 323 - start of a new network block
ssid - hexdump_ascii(len=15):
     57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b      WirelessNetwork
proto: 0x1
key_mgmt: 0x1
auth_alg: 0x1
pairwise: 0x18
group: 0x18
eap methods - hexdump(len=2): 15 00
identity - hexdump_ascii(len=6):
     77 70 61 73 75 70                                 wpasup
password - hexdump_ascii(len=10): [REMOVED]
ca_cert - hexdump_ascii(len=71):
     58 3a 5c 44 69 70 6c 6f 6d 5c 49 6d 70 6c 65 6d   X:\xxxxxx\xxxxxx
     65 6e 74 69 65 72 75 6e 67 5c 77 70 61 5f 73 75   entierung\wpa_su
     70 70 6c 69 63 61 6e 74 2d 77 69 6e 64 6f 77 73   pplicant-windows
     2d 62 69 6e 2d 30 2e 33 2e 38 5c 63 65 72 74 73   -bin-0.3.8\certs
     5c 63 61 2e 63 72 74                              \ca.crt
phase1 - hexdump_ascii(len=20):
     69 6e 63 6c 75 64 65 5f 74 6c 73 5f 6c 65 6e 67   include_tls_leng
     74 68 3d 31                                       th=1
Priority group 0
   id=0 ssid='WirelessNetwork'
Initializing interface (2) '\Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858}'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
NDIS: 4 adapter names found
NDIS: 4 adapter descriptions found
NDIS: 0 - \Device\NPF_GenericNdisWanAdapter - Generic NdisWan adapter
NDIS: 1 - \Device\NPF_{54617D0B-61F8-4370-AB78-D0609129F1D5} - WAN (PPP/SLIP) In
terface
NDIS: 2 - \Device\NPF_{F554BABA-A284-4E8B-9179-88362F3C7858} - NETGEAR 108 Mbps
Wireless PC Card WG511T (Microsoft's Packet Scheduler)
NDIS: 3 - \Device\NPF_{5C0997E9-AFF5-423C-90A7-E9D32B2E7B1B} - NET IP/1394 Minip
ort
NDIS: Adapter description prefix 'NETGEAR 108 Mbps Wireless PC Card WG511T'
ndis_get_oid: oid=0xd010122 len (512) failed
NDIS: verifying driver WPA capability
NDIS: WPA key management supported
NDIS: WPA-PSK key management supported
NDIS: CCMP encryption supported
NDIS: TKIP encryption supported
NDIS: driver supports WPA
NDIS: driver capabilities: key_mgmt 0x5 enc 0xc auth 0x3
Own MAC address: 00:09:5b:98:e2:7e
wpa_driver_ndis_set_wpa: enabled=1
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
NDIS: turning radio on before the first scan
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
ndis_get_oid: oid=0xd010101 len (6) failed
RX ctrl_iface - hexdump_ascii(len=6):
     41 54 54 41 43 48                                 ATTACH
CTRL_IFACE monitor attached 127.0.0.1:1859
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
ndis_get_oid: oid=0xd010101 len (6) failed
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
ndis_get_oid: oid=0xd010101 len (6) failed
Scan timeout - try to get results
Scan results: 3
Selecting BSS from priority group 0
0: 00:30:f1:bc:03:64 ssid=' ' wpa_ie_len=0 rsn_ie_len=0
   skip - no WPA/RSN IE
1: 00:09:5b:2f:72:78 ssid='WirelessNetwork' wpa_ie_len=28 rsn_ie_len=0
   selected
Trying to associate with 00:09:5b:2f:72:78 (SSID='WirelessNetwork' freq=2422 MHz
)
CTRL_IFACE monitor send 127.0.0.1:1859
Cancelling scan request
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - portControl=Auto
NDIS: received event data - hexdump(len=45): 00 00 00 00 28 4e 45 54 47 45 41 52
 20 31 30 38 20 4d 62 70 73 20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72 64 2
0 57 47 35 31 31 54
NDIS: event - type 0
NDIS: event InstanceName - hexdump_ascii(len=40):
     4e 45 54 47 45 41 52 20 31 30 38 20 4d 62 70 73   NETGEAR 108 Mbps
     20 57 69 72 65 6c 65 73 73 20 50 43 20 43 61 72    Wireless PC Car
     64 20 57 47 35 31 31 54                           d WG511T
NDIS: Media Connect Event
NDIS: association information - hexdump(len=151): 28 00 00 00 03 00 01 00 01 00
.........0 00 00 00 00 00 00 00
NDIS: ReqFixed=0x3 RespFixed=0x7 off_req=40 off_resp=87 len_req=47 len_resp=6
NDIS: Request IEs - hexdump(len=47): 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6
f 72 6b 01 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04
01 00 00 50 f2 01
NDIS: Response IEs - hexdump(len=6): 01 04 82 84 0b 16
Association info event
req_ies - hexdump(len=47): 00 0f 57 69 72 65 6c 65 73 73 4e 65 74 77 6f 72 6b 01
 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 5
0 f2 01
resp_ies - hexdump(len=6): 01 04 82 84 0b 16
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50
f2 04 01 00 00 50 f2 01
Association event - clear replay counter
Associated to a new BSS: BSSID=00:09:5b:12:0f:a5
No keys have been configured - skip key clearing
Associated with 00:09:5b:12:0f:a5
CTRL_IFACE monitor send 127.0.0.1:1859
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL - hexdump(len=18): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 01 00 0
0
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=0
EAP: EAP entering state IDENTITY
EAP: EAP-Request Identity data - hexdump_ascii(len=5):
     68 65 6c 6c 6f                                    hello
EAP: using real identity - hexdump_ascii(len=6):
     77 70 61 73 75 70                                 wpasup
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=29): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 00 00 0
b 02 00 00 0b 01 77 70 61 73 75 70
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 14, expecting at least 99
EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=29 idleWhile=59
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=10): 02 00 00 06 01 01 00 06 15 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=1
EAP: EAP entering state GET_METHOD
EAP: initialize selected EAP method (21, TTLS)
EAP-TTLS: Phase2 type: EAP
EAP-TTLS: Phase2 EAP types - hexdump(len=6): 04 1a 06 05 12 11
TLS: Trusted root certificate(s) loaded
TLS: Include TLS Message Length in unfragmented packets
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=6) - Flags 0x20
EAP-TTLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 100 bytes pending from ssl_out
SSL: 100 bytes left to be sent out (of total 100 bytes)
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=128): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 00 00
 00 03 01 00
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 10, expecting at least 99
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=1038): 02 00 04 0a 01 02 04 0a 15 c0 00 00 06 e5 16 03 01
 00 4a 02 00 00 46 03 01 42 a3 7d 93 fb 67 9e 29 21 e0 c2 7c d4 12 0a f6 ae d8 f
......... 04 06 13 02 44 45 31 0f 30 0d 06 03 55 04 08 13 06 48 65 73 73 65 6e 31 12 30 1
0 06 03 55 04 07 13 09 57 69 65 73 62 61 64 65 6e 31 0b 30 09 06 03 55 04 0a 13
02 46 48 31 14 30 12 06
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=2
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=1034) - Flags 0xc0
EAP-TTLS: TLS Message Length: 1765
SSL: Need 741 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=24): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 00 00 0
6 02 02 00 06 15 00
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=2 type=0 length=1034
WPA: EAPOL frame (type 0) discarded, not a Key frame
EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=28 idleWhile=59
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=755): 02 00 02 ef 01 03 02 ef 15 80 00 00 06 e5 03 55 04
d2 4e 4d 2a 9b 59 27 71 5a 16 03 01 00 04 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=3
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=751) - Flags 0x80
EAP-TTLS: TLS Message Length: 1765
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/ST=Hessen/L=Wi
esbaden/O=FH/OU=Entwicklung/CN=CA'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0 buf='/C=DE/ST=Hessen/L=Wi
esbaden/O=FH/OU=Entwicklung/CN=SubCA'
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 326 bytes pending from ssl_out
SSL: 326 bytes left to be sent out (of total 326 bytes)
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=354): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 00 01
........6 ff b5 04 0b 3c 8f 6e d0 6d d2 60 71 4f 70 5e f4 cf b1 cd 99 c6 97 a3 8b 29 58
a3 1a 06 ab 17 ee 59 00 78 71 02 31 0b 83 a7 31 b9
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=2 type=0 length=751
WPA: EAPOL frame (type 0) discarded, not a Key frame
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=73): 02 00 00 45 01 04 00 45 15 80 00 00 00 3b 14 03 01 0
 db e9
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=4
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=69) - Flags 0x80
EAP-TTLS: TLS Message Length: 59
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
SSL: No data to be sent out
EAP-TTLS: TLS done, proceed to Phase 2
EAP-TTLS: Derived key - hexdump(len=64): [REMOVED]
EAP-TTLS: received 0 bytes encrypted data for Phase 2
EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity
EAP-TTLS: Phase 2 EAP Request: type=1
EAP: using real identity - hexdump_ascii(len=6):
     77 70 61 73 75 70                                 wpasup
EAP-TTLS: AVP encapsulate EAP Response - hexdump(len=11): 02 04 00 0b 01 77 70 6
1 73 75 70
EAP-TTLS: Encrypting Phase 2 data - hexdump(len=20): [REMOVED]
EAP: method process -> ignore=FALSE methodState=CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=114): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 00 00
8d 53 f4 01 45 9b b2 93 fe 2c 02 25 8e 85 3e bc e8
EAPOL: SUPP_BE entering state RECEIVE
WPA: EAPOL frame too short, len 73, expecting at least 99
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=120): 02 00 00 74 01 05 00 74 15 80 00 00 00 6a 17 03 01
0d fe e0 4c e3 46 14 27 d7 6a 3a fd 78 85 6a ae 88 02 95 04 d1 a8 a1
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=21 id=5
EAP: EAP entering state METHOD
EAP-TTLS: Received packet(len=116) - Flags 0x80
EAP-TTLS: TLS Message Length: 106
EAP-TTLS: received 106 bytes encrypted data for Phase 2
EAP-TTLS: Decrypted Phase 2 AVPs - hexdump(len=32): 00 00 00 4f 40 00 00 1e 01 0
5 00 16 04 10 f0 21 67 73 01 ce 21 fd 5a 78 00 93 7b 74 a3 6b 00 00
EAP-TTLS: AVP: code=79 flags=0x40 length=30
EAP-TTLS: AVP data - hexdump(len=22): 01 05 00 16 04 10 f0 21 67 73 01 ce 21 fd
5a 78 00 93 7b 74 a3 6b
EAP-TTLS: AVP - EAP Message
EAP-TTLS: Phase 2 EAP - hexdump(len=22): 01 05 00 16 04 10 f0 21 67 73 01 ce 21
fd 5a 78 00 93 7b 74 a3 6b
EAP-TTLS: received Phase 2: code=1 identifier=5 length=22
EAP-TTLS: Phase 2 EAP Request: type=4
EAP-TTLS: Selected Phase 2 EAP method 4
EAP-MD5: Challenge - hexdump(len=16): f0 21 67 73 01 ce 21 fd 5a 78 00 93 7b 74
a3 6b
EAP-MD5: generating Challenge Response
EAP-MD5: Response - hexdump(len=16): 5d a2 87 5b ca 29 13 ff ab 78 07 24 67 3e 9
5 1e
EAP-TTLS: AVP encapsulate EAP Response - hexdump(len=22): 02 05 00 16 04 10 5d a
2 87 5b ca 29 13 ff ab 78 07 24 67 3e 95 1e
EAP-TTLS: Encrypting Phase 2 data - hexdump(len=32): [REMOVED]
EAP-TTLS: Authentication completed successfully
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=130): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88 8e 02 00 00
 2d ee bd a8 21 2a
EAPOL: SUPP_BE entering state RECEIVE
IEEE 802.1X RX: version=2 type=0 length=116
WPA: EAPOL frame (type 0) discarded, not a Key frame
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=8): 02 00 00 04 03 05 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: AS used the same Id again, but EAP packets were not identical
EAP: workaround - assume this is not a duplicate packet
EAP: EAP entering state SUCCESS
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
WPA: EAPOL frame too short, len 8, expecting at least 99
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=99): 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 2
0 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 0
0 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:09:5b:12:0f:a5 (ver=2)
WPA: Renewed SNonce - hexdump(len=32): b3 12 4d c8 43 bb 8b a6 1f 03 5a 7d 09 38
 25 1f 5d d4 cb fc 96 f5 45 3b 13 0d 89 0a 1c db ae 32
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): cd a9 61 20 9c bd 24 d6 01 88 76 b1 c9 76
63 bf
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88
1 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 01
EAPOL: Port Timers tick - authWhile=29 heldWhile=0 startWhen=27 idleWhile=59
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=127): 02 03 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 02
 50 f2 01
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=123
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=127): 02 03 00 7b fe 01 ca 00 10 00 00 00 00 00
 01 00 00 50 f2 01
WPA: RX message 3 of 4-Way Handshake from 00:09:5b:12:0f:a5 (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00
50 f2 04 00 50 f2 02 01 00 00 50 f2 01
WPA: No WPA/RSN IE for this AP known. Trying to get from scan results
WPA: Found the current AP from updated scan results
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
NDIS: OIS_802_11_ADD_KEY - hexdump(len=48): [REMOVED]
RX EAPOL from 00:09:5b:12:0f:a5
RX EAPOL - hexdump(len=139): 02 03 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 03
 dd 08 f9 5b 13 9a 3e f2 bc e9 5e 7e c8 07 1b
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=135
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=139): 02 03 00 87 fe 03 92 00 20 00 00 00 00 00
 6b 59 fc dd 08 f9 5b 13 9a 3e f2 bc e9 5e 7e c8 07 1b
WPA: RX message 1 of Group Key Handshake from 00:09:5b:12:0f:a5 (ver=2)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 01 00 00 00 00 00
NDIS: OIS_802_11_ADD_KEY - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 09 5b 12 0f a5 00 09 5b 98 e2 7e 88
 00 00 26 da d3 c4 3c c3 f8 ea de 3d c8 58 dd d3 1b 58 00 00
WPA: Key negotiation completed with 00:09:5b:12:0f:a5 [PTK=CCMP GTK=TKIP]
CTRL_IFACE monitor send 127.0.0.1:1859
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Port Timers tick - authWhile=28 heldWhile=0 startWhen=26 idleWhile=58
.
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=4
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=3
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=2
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=1
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
RX ctrl_iface - hexdump_ascii(len=25):
     50 52 45 41 55 54 48 20 30 30 3a 30 39 3a 35 62   PREAUTH 00:09:5b
     3a 32 66 3a 37 32 3a 37 38                        :2f:72:78
CTRL_IFACE PREAUTH 00:09:5b:2f:72:78
RSN: starting pre-authentication with 00:09:5b:2f:72:78
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=1
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL (preauth) - hexdump(len=18): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 c7
02 01 00 00
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=1 idleWhile=31
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=30
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL (preauth) - hexdump(len=18): 00 09 5b 2f 72 78 00 09 5b 98 e2 7e 88 c7
02 01 00 00
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=29
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=28
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=27
RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=26
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
.
.
.
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=1 idleWhile=1
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
RSN: pre-authentication with 00:09:5b:2f:72:78 timed out
CTRL_IFACE monitor send 127.0.0.1:1859
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
__________________________________________________________
Mit WEB.DE FreePhone mit hoechster Qualitaet ab 0 Ct./Min.
weltweit telefonieren! http://freephone.web.de/?mc=021201





More information about the Hostap mailing list