View previous topic :: View next topic |
Author |
Message |
warer n00b
Joined: 26 Oct 2002 Posts: 38
|
Posted: Mon Sep 03, 2007 12:10 pm Post subject: wpa_supplicant WPA-Enterprise authentication ipw3945 [solved |
|
|
I am trying to connect to a wireless network wich use WPA2. I got a ipw3945 card.
Please help me out. I have been at this for days now.
Code: |
Cell 08 - Address: 00:13:7F:43:B3:10
ESSID:"ssid"
Protocol:IEEE 802.11bg
Mode:Master
Channel:7
Frequency:2.442 GHz (Channel 7)
Encryption key:on
Bit Rates:11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Quality=40/100 Signal level=-45 dBm Noise level=-85 dBm
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : 802.1x
Extra: Last beacon: 1528ms ago
|
wpa_supplicant.conf
Code: |
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
eapol_version=1
ap_scan=2
fast_reauth=1
network={
ssid="someid"
scan_ssid="1"
#mode=0
#bssid=00:05:4E:50:0B:C3
bssid=00:13:7f:43:b3:10
proto=WPA RSN
key_mgmt=WPA-EAP
phase1="peaplabel=1"
phase2="auth=MSCHAPV2"
priority=10
pairwise=CCMP
group=CCMP
identity="username"
password="password"
}
|
conf.d/net
Code: | modules_eth1=( "wpa_supplicant" )
config_eth0=("dhcp")
config_eth1=("dhcp")
iwconfig_eth1="mode managed"
#wpa_supplicant_eth1="-ddw -Dwext -c /etc/wpa_supplicant/wpa_supplicant.conf"
|
commented out wpa, when i run it manually to see output
log from wpa_supplicant
[code]
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel' (DEPRECATED)
eapol_version=1
ap_scan=2
fast_reauth=1
Line: 28 - start of a new network block
ssid - hexdump_ascii(len=4):
41 62 65 6f Abeo
scan_ssid=0 (0x0)
BSSID - hexdump(len=6): 00 13 7f 43 b3 10
proto: 0x3
key_mgmt: 0x1
phase1 - hexdump_ascii(len=11):
70 65 61 70 6c 61 62 65 6c 3d 31 peaplabel=1
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
priority=10 (0xa)
pairwise: 0x10
group: 0x10
identity - hexdump_ascii(len=13):
69 64 61 72 62 40 61 62 65 6f 2e 6e 6f username
password - hexdump_ascii(len=: [REMOVED]
Priority group 10
id=0 ssid='Abeo'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1b:77:03:d9:1f
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
ctrl_interface_group=10 (from group name 'wheel')
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'Abeo'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=20
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=53): 01 00 00 31 01 01 00 31 01 00 6e 65 74 77 6f 72 6b 69 64 3d 41 62 65 6f 2c 6e 61 73 69 64 3d 41 62 65 6f 2d 54 52 44 2d 41 50 30 32 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:13:7f:43:b3:10
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:7f:43:b3:10
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
EAPOL: External notification - portControl=Auto
Associated with 00:13:7f:43:b3:10
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL - hexdump(len=4): 01 01 00 00
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=53): 01 00 00 31 01 02 00 31 01 00 6e 65 74 77 6f 72 6b 69 64 3d 41 62 65 6f 2c 6e 61 73 69 64 3d 41 62 65 6f 2d 54 52 44 2d 41 50 30 32 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=44):
00 6e 65 74 77 6f 72 6b 69 64 3d 41 62 65 6f 2c _networkid=Abeo,
6e 61 73 69 64 3d 41 62 65 6f 2d 54 52 44 2d 41 nasid=Abeo-TRD-A
50 30 32 2c 70 6f 72 74 69 64 3d 30 P02,portid=0
EAP: using real identity - hexdump_ascii(len=13):
69 64 61 72 62 40 61 62 65 6f 2e 6e 6f username
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=22): 01 00 00 12 02 02 00 12 01 69 64 61 72 62 40 61 62 65 6f 2e 6e 6f
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=46): 01 00 00 06 01 03 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
EAP-PEAP: Force new label for key derivation
EAP-PEAP: Phase2 EAP types - hexdump(len=: 00 00 00 00 1a 00 00 00
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 89 bytes pending from ssl_out
SSL: 89 bytes left to be sent out (of total 89 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=99): 01 00 00 5f 02 03 00 5f 19 00 16 03 01 00 54 01 00 00 50 03 01 46 db f5 5f 96 4f 12 96 35 ec 92 a5 89 3c 1a c1 23 5d bd 92 e1 78 7d 74 d2 59 52 dd e3 fd bc 03 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=1400): 01 00 05 74 01 04 05 74 19 c0 00 00 10 33 16 03 01 10 2e 02 00 00 46 03 01 46 db f5 5e 0e 27 89 10 e1 5b ae f2 67 8c 5f 46 8a ae 90 b4 b2 3e 5d 7c cd 4e d3 9f 73 b9 98 b3 20 17 14 00 00 7d f2 c1 d9 4c b7 eb 01 bd 18 bd 6f 9e 02 8c 00 c7 7c 6f b3 a5 9e 3b a3 79 83 cb cc 00 04 00 0b 00 03 3d 00 03 3a 00 03 37 30 82 03 33 30 82 02 9c a0 03 02 01 02 02 10 71 37 e8 04 f4 bb 12 81 4c e8 5b f1 44 e8 ce 78 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 87 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 22 30 20 06 03 55 04 08 13 19 46 4f 52 20 54 45 53 54 49 4e 47 20 50 55 52 50 4f 53 45 53 20 4f 4e 4c 59 31 1d 30 1b 06 03 55 04 0a 13 14 54 68 61 77 74 65 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 31 17 30 15 06 03 55 04 0b 13 0e 54 45 53 54 20 54 45 53 54 20 54 45 53 54 31 1c 30 1a 06 03 55 04 03 13 13 54 68 61 77 74 65 20 54 65 73 74 20 43 41 20 52 6f 6f 74 30 1e 17 0d 30 36 30 39 31 34 30 36 35 32 33 39 5a 17 0d 30 36 31 30 30 35 30 36 35 32 33 39 5a 30 7f 31 0b 30 09 06 03 55 04 06 13 02 4e 4f 31 23 30 21 06 03 55 04 08 0c 1a 00 53 00 f8 00 72 00 2d 00 54 00 72 00 f8 00 6e 00 64 00 65 00 6c 00 61 00 67 31 12 30 10 06 03 55 04 07 13 09 54 72 6f 6e 64 68 65 69 6d 31 10 30 0e 06 03 55 04 0a 13 07 41 62 65 6f 20 41 53 31 0e 30 0c 06 03 55 04 0b 13 05 44 72 69 66 74 31 15 30 13 06 03 55 04 03 13 0c 61 70 70 31 2e 61 62 65 6f 2e 6e 6f 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 d6 4b e2 77 fa e2 a0 2f b7 b3 7b e4 95 09 7f f8 d7 28 f3 1b 8f d2 66 61 35 7e eb a9 6b 02 f4 88 7c 2f 7c 89 03 dc fd 66 e1 7e 17 a7 1c b5 01 54 98 29 4f 5a 82 f8 5f 2d 7c e9 38 01 ce 86 61 45 2e fb 5a 9c b3 bd a0 1b c9 ea f5 99 66 12 57 33 04 a8 38 42 d6 ed e2 b0 64 d9 80 07 b6 e0 5a 37 91 ae 22 d0 27 1b 8f 52 49 38 11 66 78 fa 54 33 17 2b b1 d5 9d 71 c4 08 53 48 34 4a bd 19 b0 95 02 03 01 00 01 a3 81 a6 30 81 a3 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 40 06 03 55 1d 1f 04 39 30 37 30 35 a0 33 a0 31 86 2f 68 74 74 70 3a 2f 2f 63 72 6c 2e 74 68 61 77 74 65 2e 63 6f 6d 2f 54 68 61 77 74 65 50 72 65 6d 69 75 6d 53 65 72 76 65 72 43 41 2e 63 72 6c 30 32 06 08 2b 06 01 05 05 07 01 01 04 26 30 24 30 22 06 08 2b 06 01 05 05 07 30 01 86 16 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 74 68 61 77 74 65 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 82 1b ee 82 75 0c 0c 85 11 90 db eb 50 bd cb 54 2b 45 d2 a8 e1 d1 21 d7 12 f2 f6 ec ff e1 55 d2 1c ab 36 26 fb 12 e2 dd bb 7a f7 48 6a cb a2 1a 1c 3e 7c 99 9f 57 e9 c9 b3 b8 d4 5b 38 65 4e 1e ae 6b e0 01 ef 3e 00 56 f5 d4 68 6f 53 ac d5 5e 55 4f b0 ed 8f 8d d3 4d 54 62 5c 50 04 af 56 db a6 b6 c5 69 91 54 3f 23 ab 56 7b 81 ae ba 2e a3 d1 d1 58 0f 56 23 02 b1 84 76 ed 2b c3 57 3e 61 0d 00 0c 9b 02 01 02 0c 96 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 34 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 d4 30 81 d1 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1396) - Flags 0xc0
SSL: TLS Message Length: 4147
SSL: Need 2761 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=1400): 01 00 05 74 01 05 05 74 19 40 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 24 30 22 06 03 55 04 03 13 1b 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 46 72 65 65 6d 61 69 6c 20 43 41 31 2b 30 29 06 09 2a 86 48 86 f7 0d 01 09 01 16 1c 70 65 72 73 6f 6e 61 6c 2d 66 72 65 65 6d 61 69 6c 40 74 68 61 77 74 65 2e 63 6f 6d 00 d2 30 81 cf 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 23 30 21 06 03 55 04 03 13 1a 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 50 72 65 6d 69 75 6d 20 43 41 31 2a 30 28 06 09 2a 86 48 86 f7 0d 01 09 01 16 1b 70 65 72 73 6f 6e 61 6c 2d 70 72 65 6d 69 75 6d 40 74 68 61 77 74 65 2e 63 6f 6d 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 2d 30 2b 06 03 55 04 0a 13 24 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 31 45 30 43 06 03 55 04 03 13 3c 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 ce 30 81 cb 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 42 61 73 69 63 20 43 41 31 28 30 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 70 65 72 73 6f 6e 61 6c 2d 62 61 73 69 63 40 74 68 61 77 74 65 2e 63 6f 6d 00 61 30 5f 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 37 30 35 06 03 55 04 0b 13 2e 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 61 30 5f 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 37 30 35 06 03 55 04 0b 13 2e 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 61 30 5f 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 37 30 35 06 03 55 04 0b 13 2e 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 32 30 30 06 03 55 04 03 13 29 4e 65 74 4c 6f 63 6b 20 55 7a 6c 65 74 69 20 28 43 6c 61 73 73 20 42 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 00 47 30 45 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 18 30 16 06 03 55 04 0a 13 0f 47 54 45 20 43 6f 72 70
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1396) - Flags 0x40
SSL: Need 1371 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=1381): 01 00 05 61 01 06 05 61 19 00 6f 72 61 74 69 6f 6e 31 1c 30 1a 06 03 55 04 03 13 13 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 52 6f 6f 74 00 77 30 75 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 18 30 16 06 03 55 04 0a 13 0f 47 54 45 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 27 30 25 06 03 55 04 0b 13 1e 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 53 6f 6c 75 74 69 6f 6e 73 2c 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 13 1a 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 00 c6 30 81 c3 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 14 30 12 06 03 55 04 0a 13 0b 45 6e 74 72 75 73 74 2e 6e 65 74 31 3b 30 39 06 03 55 04 0b 13 32 77 77 77 2e 65 6e 74 72 75 73 74 2e 6e 65 74 2f 43 50 53 20 69 6e 63 6f 72 70 2e 20 62 79 20 72 65 66 2e 20 28 6c 69 6d 69 74 73 20 6c 69 61 62 2e 29 31 25 30 23 06 03 55 04 0b 13 1c 28 63 29 20 31 39 39 39 20 45 6e 74 72 75 73 74 2e 6e 65 74 20 4c 69 6d 69 74 65 64 31 3a 30 38 06 03 55 04 03 13 31 45 6e 74 72 75 73 74 2e 6e 65 74 20 53 65 63 75 72 65 20 53 65 72 76 65 72 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 b2 30 81 af 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 10 30 0e 06 03 55 04 08 13 07 48 75 6e 67 61 72 79 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 36 30 34 06 03 55 04 03 13 2d 4e 65 74 4c 6f 63 6b 20 4b 6f 7a 6a 65 67 79 7a 6f 69 20 28 43 6c 61 73 73 20 41 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 70 30 6e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 18 30 16 06 03 55 04 0a 13 0f 47 54 45 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 27 30 25 06 03 55 04 0b 13 1e 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 53 6f 6c 75 74 69 6f 6e 73 2c 20 49 6e 63 2e 31 1c 30 1a 06 03 55 04 03 13 13 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 52 6f 6f 74 00 9e 30 81 9b 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 34 30 32 06 03 55 04 03 13 2b 4e 65 74 4c 6f 63 6b 20 45 78 70 72 65 73 73 7a 20 28 43 6c 61 73 73 20 43 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 00 3c 30 3a 31 1d 30 1b 06 03 55 04 0a 13 14 53 79 6d 61 6e 74 65 63 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 19 30 17 06 03 55 04 03 13 10 53 79 6d 61 6e 74 65 63 20 52 6f 6f 74 20 43 41 00 72 30 70 31 2b 30 29 06 03 55 04 0b 13 22 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 31 39 39 37 20 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 2e 31 1e 30 1c 06 03 55 04 0b 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 4d 69 63 72 6f 73 6f 66 74 20 52 6f 6f 74 20 41 75 74 68 6f 72 69 74 79 00 4e 30 4c 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1d 30 1b 06 03 55 04 0a 13 14 53 79 6d 61 6e 74 65 63 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 1e 30 1c 06 03 55 04 03 13 15 53 79 6d 61 6e 74 65 63 20 52 6f 6f 74 20 32 30 30 35 20 43 41 00 61 30 5f 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 63 6f 6d 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 09 6d 69 63 72 6f 73 6f 66 74 31 2d 30 2b 06 03 55 04 03 13 24 4d 69 63 72 6f 73 6f 66 74 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1377) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate request A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 194 bytes pending from ssl_out
SSL: 194 bytes left to be sent out (of total 194 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=204): 01 00 00 c8 02 06 00 c8 19 00 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 00 86 10 00 00 82 00 80 23 80 af 3e 77 12 24 5e c4 06 2a 69 ca 35 dd eb d7 c4 21 92 89 a5 ed d2 37 73 79 cc 23 19 db aa 0a 56 e4 c6 65 0e 90 68 98 b9 99 e2 72 23 dd e5 90 87 2b 1a 68 21 e3 33 1d 99 bd cc d5 36 45 04 e0 c5 be 89 c5 ce c1 5a 52 87 7d 74 33 bb 31 5c 99 e4 a7 57 95 f9 0e fc 9e cb 50 d7 46 5f 3b ca f7 36 78 ec 4d 68 23 d6 d9 9a 10 e8 66 93 f1 68 6e 3f bd 55 1f a2 4c 76 05 d8 47 59 a7 6f 92 27 14 03 01 00 01 01 16 03 01 00 20 95 94 cb c4 cc e7 15 00 bb f7 da 61 2b 2c 86 76 23 e1 26 2b c6 ce ce ee 2e 35 ee 25 33 01 39 ad
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=57): 01 00 00 35 01 07 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 32 f2 64 30 90 ff 41 54 f0 67 26 0f 67 77 ac 6f 85 e5 0e d5 24 89 9e 3d 30 8d a3 1a 42 e2 00 b0
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x80
SSL: TLS Message Length: 43
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client PEAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=46): 01 00 00 1c 01 08 00 1c 19 00 17 03 01 00 11 86 78 dd b4 fa 59 96 1b db ff 4f 19 c7 7f 4e ab 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=2 - Flags 0x00
EAP-PEAP: received 22 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=8 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=13):
69 64 61 72 62 40 61 62 65 6f 2e 6e 6f username
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=1: [REMOVED]
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=45): 01 00 00 29 02 08 00 29 19 00 17 03 01 00 1e 5a 7a 9c ba 99 1f b4 81 75 de 86 14 e3 db 77 e9 6f 74 ce 29 b9 d5 7d 2e 6c d9 8c 03 f5 c3
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=57): 01 00 00 35 01 09 00 35 19 00 17 03 01 00 2a aa fd f1 31 f3 e1 35 1c 51 13 29 00 e0 28 2f ae 02 c7 ad 8d 26 b9 d2 14 f2 d5 3e a1 41 5e 15 1c e4 7b a0 83 71 c1 bc de 57 db
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x00
EAP-PEAP: received 47 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=26): 1a 01 09 00 19 10 00 3f 18 1a 69 06 3c 82 e3 66 17 00 ff 3f 6d d6 41 50 50 31
EAP-PEAP: received Phase 2: code=1 identifier=9 length=30
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 9 mschapv2_id 9
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=4):
41 50 50 31 APP1
EAP-MSCHAPV2: Generating Challenge Response
EAP-MSCHAPV2: auth_challenge - hexdump(len=16): 00 3f 18 1a 69 06 3c 82 e3 66 17 00 ff 3f 6d d6
EAP-MSCHAPV2: peer_challenge - hexdump(len=16): 49 1b 93 12 48 56 de 1d ff fe 9d f5 76 86 e0 07
EAP-MSCHAPV2: username - hexdump_ascii(len=13):
69 64 61 72 62 40 61 62 65 6f 2e 6e 6f username
EAP-MSCHAPV2: password - hexdump_ascii(len=: [REMOVED]
EAP-MSCHAPV2: response - hexdump(len=24): 40 1f c6 22 a5 6c aa 77 62 02 f1 4d 90 d3 ad 81 59 78 ab a6 46 e1 a4 1e
EAP-MSCHAPV2: TX identifier 9 mschapv2_id 9 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=72): [REMOVED]
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=99): 01 00 00 5f 02 09 00 5f 19 00 17 03 01 00 54 38 67 5c ae c5 d3 e3 fd 50 8e bd 3c 08 40 c8 f9 51 7f 65 4d 31 a8 28 12 e1 4e 73 67 ac fa e1 65 de a5 b4 92 ba a6 94 5a 00 b9 99 3f 87 6a 16 12 e6 ca c1 c1 44 f0 72 60 7c f4 2a 47 c6 b6 c9 d3 18 c2 af 2f 35 bd 21 fa 53 50 6a 90 d9 dd 83 76 02 09 fc 41
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=7: 01 00 00 4a 01 0a 00 4a 19 00 17 03 01 00 3f 7a 1d 65 d8 7e be 8b 90 7e cb 35 74 13 48 d1 c3 3b f6 64 96 12 81 c9 98 d5 d6 42 37 69 8d 15 00 a1 d2 76 34 59 25 54 bb d2 8a a5 ea 23 35 21 e9 c0 e7 3b c1 c0 a6 02 95 41 9c d1 55 44 a6 45
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=74) - Flags 0x00
EAP-PEAP: received 68 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 09 00 2e 53 3d 35 37 38 36 42 32 36 33 43 36 44 36 32 38 35 35 42 45 31 43 41 45 44 39 32 36 36 33 30 44 43 39 30 39 31 34 30 45 37 46
EAP-PEAP: received Phase 2: code=1 identifier=10 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-MSCHAPV2: RX identifier 10 mschapv2_id 9
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 0a 00 1d 19 00 17 03 01 00 12 d0 a2 e4 7c 2b 3b 4f 26 a3 b1 e3 ce 4f d0 b0 08 a3 66
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=46): 01 00 00 26 01 0b 00 26 19 00 17 03 01 00 1b bd 5e 3d f3 4d d6 b4 f1 d0 75 82 39 55 fe be e4 2a 05 15 19 cc e9 f0 ac ec f4 b4 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=3 - Flags 0x00
EAP-PEAP: received 32 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0b 00 0b 21 80 03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=11 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-TLV: Result TLV - hexdump(len=2): 00 01
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=42): 01 00 00 26 02 0b 00 26 19 00 17 03 01 00 1b 1b 10 a3 89 7c cd 09 04 c5 6c b3 1d ec 6e 87 68 e2 4c 43 9d a4 12 8d 8c 38 4c cf
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=46): 01 00 00 04 03 0c 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Workaround for unexpected identifier field in EAP Success: reqId=12 lastId=11 (these are supposed to be same)
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=22
replay_counter - hexdump(len=: 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:7f:43:b3:10 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
RSN: PMKID from Authenticator - hexdump(len=16): 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
RSN: no matching PMKID found
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
RSN: added PMKSA cache entry for 00:13:7f:43:b3:10
RSN: no PMKSA entry found - trigger full EAP authentication
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=22
replay_counter - hexdump(len=: 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:7f:43:b3:10 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
RSN: PMKID from Authenticator - hexdump(len=16): 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
RSN: no matching PMKID found
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
WPA: reusing previous PMKSA entry
RSN: no PMKSA entry found - trigger full EAP authentication
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=22
replay_counter - hexdump(len=: 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 1e ad c6 de 36 40 5c da f5 1f ca e6 da f3 7f 51 3b d8 8f 76 75 5c 73 b2 0d ab b1 25 ba 18 04 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:7f:43:b3:10 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
RSN: PMKID from Authenticator - hexdump(len=16): 46 74 e9 b6 89 c7 45 78 72 5b 05 8e f1 50 e9 fa
RSN: no matching PMKID found
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
WPA: reusing previous PMKSA entry
RSN: no PMKSA entry found - trigger full EAP authentication
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:7f:43:b3:10 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'Abeo'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=20
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=53): 01 00 00 31 01 01 00 31 01 00 6e 65 74 77 6f 72 6b 69 64 3d 41 62 65 6f 2c 6e 61 73 69 64 3d 41 62 65 6f 2d 54 52 44 2d 41 50 30 32 2c 70 6f 72 74 69 64 3d 30
EAPOL: Received EAP-Packet frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:13:7f:43:b3:10
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:7f:43:b3:10
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
EAPOL: External notification - portControl=Auto
Associated with 00:13:7f:43:b3:10
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL - hexdump(len=4): 01 01 00 00
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=53): 01 00 00 31 01 02 00 31 01 00 6e 65 74 77 6f 72 6b 69 64 3d 41 62 65 6f 2c 6e 61 73 69 64 3d 41 62 65 6f 2d 54 52 44 2d 41 50 30 32 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=44):
00 6e 65 74 77 6f 72 6b 69 64 3d 41 62 65 6f 2c _networkid=Abeo,
6e 61 73 69 64 3d 41 62 65 6f 2d 54 52 44 2d 41 nasid=Abeo-TRD-A
50 30 32 2c 70 6f 72 74 69 64 3d 30 P02,portid=0
EAP: using real identity - hexdump_ascii(len=13):
69 64 61 72 62 40 61 62 65 6f 2e 6e 6f username
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=22): 01 00 00 12 02 02 00 12 01 69 64 61 72 62 40 61 62 65 6f 2e 6e 6f
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=46): 01 00 00 06 01 03 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Using previous method data for fast re-authentication
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=0)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 121 bytes pending from ssl_out
SSL: 121 bytes left to be sent out (of total 121 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=131): 01 00 00 7f 02 03 00 7f 19 00 16 03 01 00 74 01 00 00 70 03 01 46 db f5 64 67 a5 6d 5c 29 e6 23 74 3c 2c 68 f2 f7 41 6d 13 69 36 c9 d5 35 5e 6f 87 f2 8e db b0 20 17 14 00 00 7d f2 c1 d9 4c b7 eb 01 bd 18 bd 6f 9e 02 8c 00 c7 7c 6f b3 a5 9e 3b a3 79 83 cb cc 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=1400): 01 00 05 74 01 04 05 74 19 c0 00 00 10 33 16 03 01 10 2e 02 00 00 46 03 01 46 db f5 63 60 45 bc 41 99 d2 40 fb d4 f2 69 22 ce 69 c1 f6 b7 9a 86 fe 6c c1 68 c8 b7 e4 af f1 20 fb 1b 00 00 b9 8b bf 80 19 21 10 74 b7 e3 e6 75 1b 93 65 44 e0 9f a7 3e ac 8a 3b 26 1c c5 7b 14 00 04 00 0b 00 03 3d 00 03 3a 00 03 37 30 82 03 33 30 82 02 9c a0 03 02 01 02 02 10 71 37 e8 04 f4 bb 12 81 4c e8 5b f1 44 e8 ce 78 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 87 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 22 30 20 06 03 55 04 08 13 19 46 4f 52 20 54 45 53 54 49 4e 47 20 50 55 52 50 4f 53 45 53 20 4f 4e 4c 59 31 1d 30 1b 06 03 55 04 0a 13 14 54 68 61 77 74 65 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 31 17 30 15 06 03 55 04 0b 13 0e 54 45 53 54 20 54 45 53 54 20 54 45 53 54 31 1c 30 1a 06 03 55 04 03 13 13 54 68 61 77 74 65 20 54 65 73 74 20 43 41 20 52 6f 6f 74 30 1e 17 0d 30 36 30 39 31 34 30 36 35 32 33 39 5a 17 0d 30 36 31 30 30 35 30 36 35 32 33 39 5a 30 7f 31 0b 30 09 06 03 55 04 06 13 02 4e 4f 31 23 30 21 06 03 55 04 08 0c 1a 00 53 00 f8 00 72 00 2d 00 54 00 72 00 f8 00 6e 00 64 00 65 00 6c 00 61 00 67 31 12 30 10 06 03 55 04 07 13 09 54 72 6f 6e 64 68 65 69 6d 31 10 30 0e 06 03 55 04 0a 13 07 41 62 65 6f 20 41 53 31 0e 30 0c 06 03 55 04 0b 13 05 44 72 69 66 74 31 15 30 13 06 03 55 04 03 13 0c 61 70 70 31 2e 61 62 65 6f 2e 6e 6f 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 d6 4b e2 77 fa e2 a0 2f b7 b3 7b e4 95 09 7f f8 d7 28 f3 1b 8f d2 66 61 35 7e eb a9 6b 02 f4 88 7c 2f 7c 89 03 dc fd 66 e1 7e 17 a7 1c b5 01 54 98 29 4f 5a 82 f8 5f 2d 7c e9 38 01 ce 86 61 45 2e fb 5a 9c b3 bd a0 1b c9 ea f5 99 66 12 57 33 04 a8 38 42 d6 ed e2 b0 64 d9 80 07 b6 e0 5a 37 91 ae 22 d0 27 1b 8f 52 49 38 11 66 78 fa 54 33 17 2b b1 d5 9d 71 c4 08 53 48 34 4a bd 19 b0 95 02 03 01 00 01 a3 81 a6 30 81 a3 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 40 06 03 55 1d 1f 04 39 30 37 30 35 a0 33 a0 31 86 2f 68 74 74 70 3a 2f 2f 63 72 6c 2e 74 68 61 77 74 65 2e 63 6f 6d 2f 54 68 61 77 74 65 50 72 65 6d 69 75 6d 53 65 72 76 65 72 43 41 2e 63 72 6c 30 32 06 08 2b 06 01 05 05 07 01 01 04 26 30 24 30 22 06 08 2b 06 01 05 05 07 30 01 86 16 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 74 68 61 77 74 65 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 82 1b ee 82 75 0c 0c 85 11 90 db eb 50 bd cb 54 2b 45 d2 a8 e1 d1 21 d7 12 f2 f6 ec ff e1 55 d2 1c ab 36 26 fb 12 e2 dd bb 7a f7 48 6a cb a2 1a 1c 3e 7c 99 9f 57 e9 c9 b3 b8 d4 5b 38 65 4e 1e ae 6b e0 01 ef 3e 00 56 f5 d4 68 6f 53 ac d5 5e 55 4f b0 ed 8f 8d d3 4d 54 62 5c 50 04 af 56 db a6 b6 c5 69 91 54 3f 23 ab 56 7b 81 ae ba 2e a3 d1 d1 58 0f 56 23 02 b1 84 76 ed 2b c3 57 3e 61 0d 00 0c 9b 02 01 02 0c 96 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 34 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 d4 30 81 d1 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1396) - Flags 0xc0
SSL: TLS Message Length: 4147
SSL: Need 2761 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=1400): 01 00 05 74 01 05 05 74 19 40 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 24 30 22 06 03 55 04 03 13 1b 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 46 72 65 65 6d 61 69 6c 20 43 41 31 2b 30 29 06 09 2a 86 48 86 f7 0d 01 09 01 16 1c 70 65 72 73 6f 6e 61 6c 2d 66 72 65 65 6d 61 69 6c 40 74 68 61 77 74 65 2e 63 6f 6d 00 d2 30 81 cf 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 23 30 21 06 03 55 04 03 13 1a 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 50 72 65 6d 69 75 6d 20 43 41 31 2a 30 28 06 09 2a 86 48 86 f7 0d 01 09 01 16 1b 70 65 72 73 6f 6e 61 6c 2d 70 72 65 6d 69 75 6d 40 74 68 61 77 74 65 2e 63 6f 6d 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 2d 30 2b 06 03 55 04 0a 13 24 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 31 45 30 43 06 03 55 04 03 13 3c 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 ce 30 81 cb 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 42 61 73 69 63 20 43 41 31 28 30 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 70 65 72 73 6f 6e 61 6c 2d 62 61 73 69 63 40 74 68 61 77 74 65 2e 63 6f 6d 00 61 30 5f 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 37 30 35 06 03 55 04 0b 13 2e 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 61 30 5f 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 37 30 35 06 03 55 04 0b 13 2e 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 61 30 5f 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 37 30 35 06 03 55 04 0b 13 2e 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 32 30 30 06 03 55 04 03 13 29 4e 65 74 4c 6f 63 6b 20 55 7a 6c 65 74 69 20 28 43 6c 61 73 73 20 42 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 00 47 30 45 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 18 30 16 06 03 55 04 0a 13 0f 47 54 45 20 43 6f 72 70
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1396) - Flags 0x40
SSL: Need 1371 bytes more input data
SSL: Building ACK
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:7f:43:b3:10
RX EAPOL - hexdump(len=1381): 01 00 05 61 01 06 05 61 19 00 6f 72 61 74 69 6f 6e 31 1c 30 1a 06 03 55 04 03 13 13 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 52 6f 6f 74 00 77 30 75 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 18 30 16 06 03 55 04 0a 13 0f 47 54 45 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 27 30 25 06 03 55 04 0b 13 1e 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 53 6f 6c 75 74 69 6f 6e 73 2c 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 13 1a 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 00 c6 30 81 c3 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 14 30 12 06 03 55 04 0a 13 0b 45 6e 74 72 75 73 74 2e 6e 65 74 31 3b 30 39 06 03 55 04 0b 13 32 77 77 77 2e 65 6e 74 72 75 73 74 2e 6e 65 74 2f 43 50 53 20 69 6e 63 6f 72 70 2e 20 62 79 20 72 65 66 2e 20 28 6c 69 6d 69 74 73 20 6c 69 61 62 2e 29 31 25 30 23 06 03 55 04 0b 13 1c 28 63 29 20 31 39 39 39 20 45 6e 74 72 75 73 74 2e 6e 65 74 20 4c 69 6d 69 74 65 64 31 3a 30 38 06 03 55 04 03 13 31 45 6e 74 72 75 73 74 2e 6e 65 74 20 53 65 63 75 72 65 20 53 65 72 76 65 72 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 b2 30 81 af 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 10 30 0e 06 03 55 04 08 13 07 48 75 6e 67 61 72 79 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 36 30 34 06 03 55 04 03 13 2d 4e 65 74 4c 6f 63 6b 20 4b 6f 7a 6a 65 67 79 7a 6f 69 20 28 43 6c 61 73 73 20 41 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 70 30 6e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 18 30 16 06 03 55 04 0a 13 0f 47 54 45 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 27 30 25 06 03 55 04 0b 13 1e 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 53 6f 6c 75 74 69 6f 6e 73 2c 20 49 6e 63 2e 31 1c 30 1a 06 03 55 04 03 13 13 47 54 45 20 43 79 62 65 72 54 72 75 73 74 20 52 6f 6f 74 00 9e 30 81 9b 31 0b 30 09 06 03 55 04 06 13 02 4
Last edited by warer on Tue Sep 04, 2007 7:03 am; edited 1 time in total |
|
Back to top |
|
|
mamac l33t
Joined: 29 Feb 2004 Posts: 890
|
Posted: Mon Sep 03, 2007 2:34 pm Post subject: |
|
|
Hi,
If you want to compare with my configuration...
wpa_supplicat.conf:
Code: |
network={
key_mgmt=NONE
priority=-9999999
}
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
update_config=0
fast_reauth=1
eapol_version=1
ap_scan=1
network={
ssid="jmb"
psk="******"
pairwise=TKIP
group=TKIP
priority=5
}
|
conf.d/net:
Code: |
dns_domain_lo="btworld.net"
dhcpcd_eth0="-N"
config_eth0=( "dhcp" )
modules=( "wpa_supplicant" )
wpa_supplicant_eth1="-Dwext"
dhcpcd_eth1="-N"
config_eth1=( "dhcp" )
|
Is it the first wpa network you try to connect to? What hardware do you have? _________________ Powered by Gentoo Linux since 2003 |
|
Back to top |
|
|
warer n00b
Joined: 26 Oct 2002 Posts: 38
|
Posted: Mon Sep 03, 2007 3:49 pm Post subject: |
|
|
Yes this is my first wpa network i am trying to connect to. I have the intel ipw3945 card. The card works flawlessly on normal networks and wep encryption, probably on some wpa networks too. Its just this network that is difficult. |
|
Back to top |
|
|
mamac l33t
Joined: 29 Feb 2004 Posts: 890
|
Posted: Mon Sep 03, 2007 5:19 pm Post subject: |
|
|
What driver do you use ? _________________ Powered by Gentoo Linux since 2003 |
|
Back to top |
|
|
warer n00b
Joined: 26 Oct 2002 Posts: 38
|
Posted: Tue Sep 04, 2007 7:02 am Post subject: |
|
|
I use the ipw3945 driver and wext on wpa supplicant. But now it works
i had to remove these two lines from my config.
Code: |
phase1="peaplabel=1"
phase2="auth=MSCHAPV2"
|
|
|
Back to top |
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|