Problems with ipw2200, wpa_supplicant and eap-tls

Michael Kaufmann michael
Mon Jan 2 09:12:32 PST 2006


Hi,

I want to connect to a wireless lan secured by eap-tls. The
administrator told me to use to following setup:
* IEEE 802.1X authentification using a certificate he sent me.
* authentification: open
* encryption: WEP with dynamically generated keys OR WPA/WPA2/CCKM with
eap type: eap-tls

I wrote these settings into /etc/wpa_supplicant.conf:

update_config=1
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
opensc_engine_path=/usr/lib/opensc/engine_opensc.so
pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
network={
        ssid="infeap"
        key_mgmt=IEEE8021X
        pairwise=TKIP
        auth_alg=OPEN
        group=WEP104
#        proto=WPA
        eap=TLS
        identity="kaufmaml"
        ca_cert="/etc/wpa-supplicant/informatik.cert"
        client_cert="/etc/wpa-supplicant/kaufmaml.cert"
        private_key="/etc/wpa-supplicant/kaufmaml.key"
        private_key_passwd="my_password"
        eapol_flags=3
}

I also tryed to comment out some values (in the network block) and let
wpa_supplicant guess what's correct, but without success.

Error symptoms I get:
* After the authentification succeded wpa_supplicant adds the current
bssid to the blacklist and disconnects.
* ioctl[SIOCGIFADDR]: Cannot assign requested address

This is the part of the log I think the bug is in:

State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:12:43:48:26:00 completed (auth)
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=13):
     4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53            LIST_NETWORKS
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:12:43:48:26:00 into blacklist
State: COMPLETED -> DISCONNECTED

I use
* Gentoo Linux
* Kernel 2.6.15_rc7, 2.6.12.5
* wpa_supplicant 0.4.7, 0.5.0
* ipw2200 1.0.8 and the one in the kernel with 2.6.15_rc7
* ieee80211 1.1.6
* wireless-tools 28_pre13

Can anyone explain to me what these errors mean?

bye, Michael


And here's the complete log:

komet etc # wpa_supplicant -ieth0 -Dwext -c/etc/wpa_supplicant.conf -d
Initializing interface 'eth0' conf '/etc/wpa_supplicant.conf' driver
'wext' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
update_config=1
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
opensc_engine_path='/usr/lib/opensc/engine_opensc.so'
pkcs11_engine_path='/usr/lib/opensc/engine_pkcs11.so'
pkcs11_module_path='/usr/lib/pkcs11/opensc-pkcs11.so'
Priority group 0
   id=0 ssid='infeap'
Initializing interface (2) 'eth0'
ENGINE: Loading dynamic engine
ENGINE: Loading OpenSC Engine from /usr/lib/opensc/engine_opensc.so
ENGINE: 'SO_PATH' '/usr/lib/opensc/engine_opensc.so'
ENGINE: 'ID' 'opensc'
ENGINE: 'LIST_ADD' '1'
ENGINE: 'LOAD' '(null)'
ENGINE: Loading pkcs11 Engine from /usr/lib/opensc/engine_pkcs11.so
ENGINE: 'SO_PATH' '/usr/lib/opensc/engine_pkcs11.so'
ENGINE: 'ID' 'pkcs11'
ENGINE: 'LIST_ADD' '1'
ENGINE: 'LOAD' '(null)'
ENGINE: 'MODULE_PATH' '/usr/lib/pkcs11/opensc-pkcs11.so'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=19 WE(source)=16 enc_capa=0x0
  capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: 00:12:f0:c3:22:5d
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
Added interface eth0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
CTRL_IFACE monitor attached - hexdump(len=25): 2f 74 6d 70 2f 77 70 61
5f 63 74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=13):
     4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53            LIST_NETWORKS
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
Scan timeout - try to get results
Received 2344 bytes of scan results (11 BSSes)
Scan results: 11
Selecting BSS from priority group 0
0: 00:12:43:48:26:00 ssid='infeap' wpa_ie_len=30 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:12:43:48:26:00 (SSID='infeap' freq=0 MHz)
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 1
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2
05 01 00 00 50 f2 02 02 00 00 40 96 00 00 50 f2 01 28 00
WPA: clearing AP RSN IE
WPA: using GTK WEP104
WPA: using PTK TKIP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=15
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:43:48:26:00
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:12:43:48:26:00
No keys have been configured - skip key clearing
Associated with 00:12:43:48:26:00
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:12:43:48:26:00
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
EAP: EAP-Request Identity data - hexdump_ascii(len=40):
     00 6e 65 74 77 6f 72 6b 69 64 3d 69 6e 66 65 61   _networkid=infea
     70 2c 6e 61 73 69 64 3d 41 50 30 2d 57 44 53 2c   p,nasid=AP0-WDS,
     70 6f 72 74 69 64 3d 30                           portid=0
EAP: using real identity - hexdump_ascii(len=8):
     6b 61 75 66 6d 61 6d 6c                           kaufmaml
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=13):
     4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53            LIST_NETWORKS
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
EAPOL: startWhen --> 0
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:43:48:26:00
State: ASSOCIATED -> ASSOCIATED
Associated with 00:12:43:48:26:00
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0' added
RX EAPOL from 00:12:43:48:26:00
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
EAP: EAP-Request Identity data - hexdump_ascii(len=40):
     00 6e 65 74 77 6f 72 6b 69 64 3d 69 6e 66 65 61   _networkid=infea
     70 2c 6e 61 73 69 64 3d 41 50 30 2d 57 44 53 2c   p,nasid=AP0-WDS,
     70 6f 72 74 69 64 3d 30                           portid=0
EAP: using real identity - hexdump_ascii(len=8):
     6b 61 75 66 6d 61 6d 6c                           kaufmaml
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=17 id=28
EAP: EAP entering state GET_METHOD
EAP: Building EAP-Nak (requested type 17 not allowed)
EAP: allowed methods - hexdump(len=1): 0d
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=29
EAP: EAP entering state GET_METHOD
EAP: initialize selected EAP method (13, TLS)
TLS: Trusted root certificate(s) loaded
OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER)
failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
OpenSSL: pending error: error:0D07803A:asn1 encoding
routines:ASN1_ITEM_EX_D2I:nested asn1 error
OpenSSL: pending error: error:140C800D:SSL
routines:SSL_use_certificate_file:ASN1 lib
OpenSSL: SSL_use_certificate_file (PEM) --> OK
OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER)
failed error:140CB07C:SSL routines:SSL_use_PrivateKey_file:bad ssl filetype
OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK
SSL: Private key loaded successfully
CTRL-EVENT-EAP-METHOD EAP method 13 (TLS) selected
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-TLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 102 bytes pending from ssl_out
SSL: 102 bytes left to be sent out (of total 102 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=30
EAP: EAP entering state METHOD
SSL: Received packet(len=1012) - Flags 0xc0
SSL: TLS Message Length: 2543
SSL: Need 1541 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=31
EAP: EAP entering state METHOD
SSL: Received packet(len=1008) - Flags 0x40
SSL: Need 539 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=32
EAP: EAP entering state METHOD
SSL: Received packet(len=545) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1
buf='/C=DE/ST=Baden-Wuerttemberg/L=Stuttgart/O=Universitaet
Stuttgart/OU=Informatik/CN=Informatik Certificate
Authority/emailAddress=ca at informatik.uni-stuttgart.de'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0
buf='/C=DE/ST=Baden-Wuerttemberg/L=Stuttgart/O=Universitaet
Stuttgart/OU=Informatik/CN=acs1.mgmt.informatik.uni-stuttgart.de'
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate request A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write certificate verify A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 3069 bytes pending from ssl_out
SSL: 3069 bytes left to be sent out (of total 3069 bytes)
SSL: sending 1398 bytes, more fragments will follow
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=33
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x00
SSL: 1671 bytes left to be sent out (of total 3069 bytes)
SSL: sending 1398 bytes, more fragments will follow
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=34
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x00
SSL: 273 bytes left to be sent out (of total 3069 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=13 id=35
EAP: EAP entering state METHOD
SSL: Received packet(len=69) - Flags 0x80
SSL: TLS Message Length: 59
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
SSL: No data to be sent out
EAP-TLS: Done
EAP-TLS: Derived key - hexdump(len=64): [REMOVED]
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:12:43:48:26:00 (ver=1)
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50
f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01
WPA: Renewed SNonce - hexdump(len=32): 37 ea 02 ba 2f 52 57 1f ac ad 5d
e9 0e 36 65 6a 0a 23 87 25 26 c1 88 72 04 c9 6b 37 ff 3d 71 c9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:12:43:48:26:00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=125
  EAPOL-Key type=254
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:12:43:48:26:00 (ver=1)
WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 05
01 00 00 50 f2 02 02 00 00 40 96 00 00 50 f2 01 28 00
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:12:43:48:26:00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=108
  EAPOL-Key type=254
WPA: RX message 1 of Group Key or STAKey Handshake from
00:12:43:48:26:00 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=13): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=0):
wpa_driver_wext_set_key: alg=1 key_idx=1 set_tx=0 seq_len=0 key_len=13
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:12:43:48:26:00 [PTK=TKIP GTK=WEP-104]
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:12:43:48:26:00 completed (auth)
CTRL_IFACE monitor send - hexdump(len=25): 2f 74 6d 70 2f 77 70 61 5f 63
74 72 6c 5f 31 39 34 33 38 2d 35 37 00 00 00
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING
RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
ioctl[SIOCGIFADDR]: Cannot assign requested address
RX ctrl_iface - hexdump_ascii(len=13):
     4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53            LIST_NETWORKS
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:12:43:48:26:00 into blacklist
State: COMPLETED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
.........and so on.........





More information about the Hostap mailing list