Problem authenticating with 802.1X.

Ben Greear greearb
Tue Jul 23 09:52:44 PDT 2013


This is probably some issue with my config file, but I am at a loss as to
what needs changing.

On windows, the configuration is configured as:

WPA2
AES
EAP-PEAP

Inner:  PEAP EAP-MS-CHAP-V2


My config file (minus the passwords) is:

ctrl_interface=/var/run/wpa_supplicant
fast_reauth=1
can_scan_one=1
min_scan_gap=5
bss_max_count=2000
network={
     ssid="Flexcon"
     disable_ht=0
     disable_ht40=0
     disable_sgi=0
     ht_mcs=""
     disable_max_amsdu=-1
     ampdu_factor=-1
     ampdu_density=-1
     proto=RSN WPA
     key_mgmt=IEEE8021X WPA-EAP WPA-PSK NONE
     #psk="xxx"
     psk=xxx
     eap=PEAP
     pairwise=CCMP TKIP
     group=CCMP TKIP
     identity="msplt"
     password="xxx"
     phase1="peaplabel=0"
     phase2="auth=MSCHAPV2"

}

Supplicant logs:

More complete logs:

http://www.candelatech.com/~greearb/misc/hostapd_log.txt


Smaller logs that will fit on the mailing list limit:


2013-07-23 12:22:16.687  1374596531.256691: sta11: CTRL-EVENT-EAP-STARTED EAP authentication started
2013-07-23 12:22:16.687  1374596531.256928: EAP: Status notification: started (param=)
2013-07-23 12:22:16.687  1374596531.257159: EAP: EAP-Request Identity data - hexdump_ascii(len=46):
2013-07-23 12:22:16.687       00 6e 65 74 77 6f 72 6b 69 64 3d 46 6c 65 78 63   _networkid=Flexc
2013-07-23 12:22:16.687       6f 6e 2c 6e 61 73 69 64 3d 47 51 4d 54 52 4c 57   on,nasid=GQMTRLW
2013-07-23 12:22:16.687       4c 43 30 31 2c 70 6f 72 74 69 64 3d 31 33         LC01,portid=13
2013-07-23 12:22:16.687  1374596531.258391: EAP: using real identity - hexdump_ascii(len=5):
2013-07-23 12:22:16.687       6d 73 70 6c 74                                    msplt
2013-07-23 12:22:16.687  1374596531.258919: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.259144: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.259433: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.259679: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.259900: TX EAPOL: dst=00:3a:9a:a9:67:9d
2013-07-23 12:22:16.687  1374596531.260124: TX EAPOL - hexdump(len=14): 01 00 00 0a 02 01 00 0a 01 6d 73 70 6c 74
2013-07-23 12:22:16.687  1374596531.260502: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.260834: nl80211: Event message available
2013-07-23 12:22:16.687  1374596531.261106: nl80211: Ignore connect event (cmd=46) when using userspace SME
2013-07-23 12:22:16.687  1374596531.269947: sta11: RX EAPOL from 00:3a:9a:a9:67:9d
2013-07-23 12:22:16.687  1374596531.270045: RX EAPOL - hexdump(len=10): 02 00 00 06 01 42 00 06 19 21
2013-07-23 12:22:16.687  1374596531.270098: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.270129: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.270157: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.270206: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.270322: EAP: Received EAP-Request id=66 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.270379: EAP: EAP entering state GET_METHOD
2013-07-23 12:22:16.687  1374596531.270421: sta11: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
2013-07-23 12:22:16.687  1374596531.270463: EAP: Status notification: accept proposed method (param=PEAP)
2013-07-23 12:22:16.687  1374596531.270520: EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
2013-07-23 12:22:16.687  1374596531.270578: TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
2013-07-23 12:22:16.687  1374596531.270634: TLS: using phase1 config options
2013-07-23 12:22:16.687  1374596531.270718: sta11: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
2013-07-23 12:22:16.687  1374596531.270767: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.270799: SSL: Received packet(len=6) - Flags 0x21
2013-07-23 12:22:16.687  1374596531.270844: EAP-PEAP: Start (server ver=1, own ver=1)
2013-07-23 12:22:16.687  1374596531.270874: EAP-PEAP: Using PEAP version 1
2013-07-23 12:22:16.687  1374596531.271564: SSL: 117 bytes left to be sent out (of total 117 bytes)
2013-07-23 12:22:16.687  1374596531.271641: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.271676: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.271709: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.271739: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.271782: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.271815: TX EAPOL: dst=00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.272117: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.279889: sta11: RX EAPOL from 00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.280767: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.280801: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.280831: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.280873: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.280980: EAP: Received EAP-Request id=67 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.281031: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.281063: SSL: Received packet(len=685) - Flags 0x01
2013-07-23 12:22:16.687  1374596531.281124: tls_pull_func - 674 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.281170: tls_pull_func - 593 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.281377: tls_pull_func - 588 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.281451: tls_pull_func - 9 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.282400: tls_pull_func - 4 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.282487: tls_pull_func - pull_buf consumed
2013-07-23 12:22:16.687  1374596531.303907: SSL: 230 bytes left to be sent out (of total 230 bytes)
2013-07-23 12:22:16.687  1374596531.304022: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.304062: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.304096: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.304127: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.304169: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.304202: TX EAPOL: dst=00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.304642: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.319855: sta11: RX EAPOL from 00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.320078: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.320123: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.320153: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.320194: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.320394: EAP: Received EAP-Request id=68 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.320456: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.320490: SSL: Received packet(len=65) - Flags 0x01
2013-07-23 12:22:16.687  1374596531.320600: tls_pull_func - 54 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.320649: tls_pull_func - 53 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.320702: tls_pull_func - 48 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.320737: tls_pull_func - pull_buf consumed
2013-07-23 12:22:16.687  1374596531.321346: TLS: Handshake completed successfully
2013-07-23 12:22:16.687  1374596531.321461: SSL: No data to be sent out
2013-07-23 12:22:16.687  1374596531.321509: EAP-PEAP: TLS done, proceed to Phase 2
2013-07-23 12:22:16.687  1374596531.321539: EAP-PEAP: using label 'client EAP encryption' in key derivation
2013-07-23 12:22:16.687  1374596531.323031: EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
2013-07-23 12:22:16.687  1374596531.323115: EAP-PEAP: Failed to derive Session-Id
2013-07-23 12:22:16.687  1374596531.323155: SSL: Building ACK (type=25 id=68 ver=1)
2013-07-23 12:22:16.687  1374596531.323188: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.323234: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.323268: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.332472: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.332515: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.332550: TX EAPOL: dst=00:3a:9a:a9:67:9d
2013-07-23 12:22:16.687  1374596531.332598: TX EAPOL - hexdump(len=10): 01 00 00 06 02 44 00 06 19 01
2013-07-23 12:22:16.687  1374596531.332752: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.339856: sta11: RX EAPOL from 00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.340048: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.340083: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.340158: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.340193: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.340309: EAP: Received EAP-Request id=69 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.340389: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.340423: SSL: Received packet(len=43) - Flags 0x01
2013-07-23 12:22:16.687  1374596531.340467: EAP-PEAP: received 37 bytes encrypted data for Phase 2
2013-07-23 12:22:16.687  1374596531.340514: tls_pull_func - 32 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.340551: tls_pull_func - pull_buf consumed
2013-07-23 12:22:16.687  1374596531.340708: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 45 00 05 01
2013-07-23 12:22:16.687  1374596531.340769: EAP-PEAP: received Phase 2: code=1 identifier=69 length=5
2013-07-23 12:22:16.687  1374596531.340802: EAP-PEAP: Phase 2 Request: type=1
2013-07-23 12:22:16.687  1374596531.340843: EAP: using real identity - hexdump_ascii(len=5):
2013-07-23 12:22:16.687       6d 73 70 6c 74                                    msplt
2013-07-23 12:22:16.687  1374596531.340925: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED]
2013-07-23 12:22:16.687  1374596531.341091: SSL: 149 bytes left to be sent out (of total 149 bytes)
2013-07-23 12:22:16.687  1374596531.341151: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.341201: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.341235: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.341267: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.341393: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.341429: TX EAPOL: dst=00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.341749: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.348681: sta11: RX EAPOL from 00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.348874: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.348903: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.348932: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.348963: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.349107: EAP: Received EAP-Request id=70 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.349184: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.349216: SSL: Received packet(len=75) - Flags 0x01
2013-07-23 12:22:16.687  1374596531.349247: EAP-PEAP: received 69 bytes encrypted data for Phase 2
2013-07-23 12:22:16.687  1374596531.349355: tls_pull_func - 64 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.349399: tls_pull_func - pull_buf consumed

2013-07-23 12:22:16.687  1374596531.349599: EAP-PEAP: received Phase 2: code=1 identifier=70 length=37
2013-07-23 12:22:16.687  1374596531.349628: EAP-PEAP: Phase 2 Request: type=26
2013-07-23 12:22:16.687  1374596531.349656: EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
2013-07-23 12:22:16.687  1374596531.349688: EAP-MSCHAPV2: RX identifier 70 mschapv2_id 70
2013-07-23 12:22:16.687  1374596531.349723: EAP-MSCHAPV2: Received challenge
2013-07-23 12:22:16.687  1374596531.349751: EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=11):
2013-07-23 12:22:16.687       47 51 4d 54 52 4c 50 53 4e 30 31                  GQMTRLPSN01
2013-07-23 12:22:16.687  1374596531.349814: EAP-MSCHAPV2: Generating Challenge Response
2013-07-23 12:22:16.687  1374596531.349843: Get randomness: len=16 entropy=21
2013-07-23 12:22:16.687  1374596531.352212: MSCHAPV2: Identity - hexdump_ascii(len=5):
2013-07-23 12:22:16.687       6d 73 70 6c 74                                    msplt
2013-07-23 12:22:16.687  1374596531.352365: MSCHAPV2: Username - hexdump_ascii(len=5):
2013-07-23 12:22:16.687       6d 73 70 6c 74                                    msplt
2013-07-23 12:22:16.687  1374596531.352424: MSCHAPV2: auth_challenge - hexdump(len=16): 94 8e 3b da fd 17 72 30 6c ef bc cd ba f9 f9 6c
2013-07-23 12:22:16.687  1374596531.352467: MSCHAPV2: peer_challenge - hexdump(len=16): 37 91 38 02 fe f6 ea 09 8a dc e1 7a b9 ec 75 e7
2013-07-23 12:22:16.687  1374596531.352510: MSCHAPV2: username - hexdump_ascii(len=5):
2013-07-23 12:22:16.687       6d 73 70 6c 74                                    msplt
2013-07-23 12:22:16.687  1374596531.352567: MSCHAPV2: password - hexdump_ascii(len=9): [REMOVED]
2013-07-23 12:22:16.687  1374596531.353000: MSCHAPV2: NT Response - hexdump(len=24): ab af 61 90 04 fe fd d2 b1 05 60 4a 5f fe 85 44 6c 38 d8 f4 13 ec 56 4c
2013-07-23 12:22:16.687  1374596531.353053: MSCHAPV2: Auth Response - hexdump(len=20): 6f ed 50 fb d5 42 7c 8f f5 50 9c 93 18 e7 c1 ec 15 3c 7b 13
2013-07-23 12:22:16.687  1374596531.353192: MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
2013-07-23 12:22:16.687  1374596531.353232: EAP-MSCHAPV2: TX identifier 70 mschapv2_id 70 (response)
2013-07-23 12:22:16.687  1374596531.353267: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED]
2013-07-23 12:22:16.687  1374596531.353612: SSL: 261 bytes left to be sent out (of total 261 bytes)
2013-07-23 12:22:16.687  1374596531.353729: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.353818: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.353905: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.353990: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.354072: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.354158: TX EAPOL: dst=00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.354920: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.369529: sta11: RX EAPOL from 00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.370173: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.370441: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.370655: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.370855: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.371106: EAP: Received EAP-Request id=71 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.371434: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.371660: SSL: Received packet(len=59) - Flags 0x01
2013-07-23 12:22:16.687  1374596531.371864: EAP-PEAP: received 53 bytes encrypted data for Phase 2
2013-07-23 12:22:16.687  1374596531.372120: tls_pull_func - 48 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.372450: tls_pull_func - pull_buf consumed
2013-07-23 12:22:16.687  1374596531.372817: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=22): 01 47 00 16 1a 04 46 00 11 45 3d 36 34 37 20 52 3d 30 20 56 3d 33
2013-07-23 12:22:16.687  1374596531.373074: EAP-PEAP: received Phase 2: code=1 identifier=71 length=22
2013-07-23 12:22:16.687  1374596531.373369: EAP-PEAP: Phase 2 Request: type=26
2013-07-23 12:22:16.687  1374596531.373624: EAP-MSCHAPV2: RX identifier 71 mschapv2_id 70
2013-07-23 12:22:16.687  1374596531.373833: EAP-MSCHAPV2: Received failure
2013-07-23 12:22:16.687  1374596531.374033: EAP-MSCHAPV2: Failure data - hexdump_ascii(len=13):
2013-07-23 12:22:16.687       45 3d 36 34 37 20 52 3d 30 20 56 3d 33            E=647 R=0 V=3
2013-07-23 12:22:16.687  1374596531.374511: EAP-MSCHAPV2: error 647
2013-07-23 12:22:16.687  1374596531.374721: EAP-MSCHAPV2: retry is not allowed
2013-07-23 12:22:16.687  1374596531.374924: EAP-MSCHAPV2: required challenge field was not present in failure message
2013-07-23 12:22:16.687  1374596531.375124: EAP-MSCHAPV2: password changing protocol version 3
2013-07-23 12:22:16.687  1374596531.375400: sta11: EAP-MSCHAPV2: failure message: '' (retry not allowed, error 647)
2013-07-23 12:22:16.687  1374596531.375635: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
2013-07-23 12:22:16.687  1374596531.375961: SSL: 37 bytes left to be sent out (of total 37 bytes)
2013-07-23 12:22:16.687  1374596531.376200: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.376476: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.376691: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.376900: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.377102: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.377355: TX EAPOL: dst=00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.377901: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.384725: sta11: RX EAPOL from 00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.385428: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.385655: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.385862: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.386066: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.386418: EAP: Received EAP-Request id=72 method=25 vendor=0 vendorMethod=0
2013-07-23 12:22:16.687  1374596531.386678: EAP: EAP entering state METHOD
2013-07-23 12:22:16.687  1374596531.386886: SSL: Received packet(len=43) - Flags 0x01
2013-07-23 12:22:16.687  1374596531.387094: EAP-PEAP: received 37 bytes encrypted data for Phase 2
2013-07-23 12:22:16.687  1374596531.387351: tls_pull_func - 32 bytes remaining in pull_buf
2013-07-23 12:22:16.687  1374596531.387594: tls_pull_func - pull_buf consumed
2013-07-23 12:22:16.687  1374596531.387904: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=4): 04 47 00 04
2013-07-23 12:22:16.687  1374596531.388146: EAP-PEAP: received Phase 2: code=4 identifier=71 length=4
2013-07-23 12:22:16.687  1374596531.388446: EAP-PEAP: Phase 2 Failure
2013-07-23 12:22:16.687  1374596531.388728: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=4): [REMOVED]
2013-07-23 12:22:16.687  1374596531.389105: SSL: 181 bytes left to be sent out (of total 181 bytes)
2013-07-23 12:22:16.687  1374596531.389444: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
2013-07-23 12:22:16.687  1374596531.389688: EAP: EAP entering state SEND_RESPONSE
2013-07-23 12:22:16.687  1374596531.389896: EAP: EAP entering state IDLE
2013-07-23 12:22:16.687  1374596531.390101: EAPOL: SUPP_BE entering state RESPONSE
2013-07-23 12:22:16.687  1374596531.390350: EAPOL: txSuppRsp
2013-07-23 12:22:16.687  1374596531.390574: TX EAPOL: dst=00:3a:9a:a9:67:9d

2013-07-23 12:22:16.687  1374596531.391355: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.687  1374596531.399539: sta11: RX EAPOL from 00:3a:9a:a9:67:9d
2013-07-23 12:22:16.687  1374596531.399626: RX EAPOL - hexdump(len=8): 02 00 00 04 04 48 00 04
2013-07-23 12:22:16.687  1374596531.399675: EAPOL: Received EAP-Packet frame
2013-07-23 12:22:16.687  1374596531.399704: EAPOL: SUPP_BE entering state REQUEST
2013-07-23 12:22:16.687  1374596531.399732: EAPOL: getSuppRsp
2013-07-23 12:22:16.687  1374596531.399763: EAP: EAP entering state RECEIVED
2013-07-23 12:22:16.687  1374596531.399844: EAP: Received EAP-Failure
2013-07-23 12:22:16.687  1374596531.399872: EAP: Status notification: completion (param=failure)
2013-07-23 12:22:16.687  1374596531.399910: EAP: EAP entering state FAILURE
2013-07-23 12:22:16.687  1374596531.399942: sta11: CTRL-EVENT-EAP-FAILURE EAP authentication failed
2013-07-23 12:22:16.687  1374596531.399972: EAPOL: SUPP_PAE entering state HELD
2013-07-23 12:22:16.687  1374596531.400000: EAPOL: Supplicant port status: Unauthorized
2013-07-23 12:22:16.702  1374596531.405223: EAPOL: SUPP_BE entering state RECEIVE
2013-07-23 12:22:16.702  1374596531.405594: EAPOL: SUPP_BE entering state FAIL
2013-07-23 12:22:16.702  1374596531.405659: EAPOL: SUPP_BE entering state IDLE
2013-07-23 12:22:16.702  1374596531.405691: EAPOL authentication completed unsuccessfully
2013-07-23 12:22:16.702  1374596531.405760: sta11: Setting authentication timeout: 2 sec 0 usec

I'd be greatful for any suggestions to try.

Thanks,
Ben

-- 
Ben Greear <greearb at candelatech.com>
Candela Technologies Inc  http://www.candelatech.com




More information about the Hostap mailing list