Re: Can I configure a specified PEAP wireless in network-manager
- From: Frank <eular frank gmail com>
- To: Dan Williams <dcbw redhat com>
- Cc: networkmanager-list gnome org
- Subject: Re: Can I configure a specified PEAP wireless in network-manager
- Date: Thu, 20 Sep 2012 16:40:26 +0800
On 09/19/2012 12:12 AM, Dan Williams wrote:
then we need some
supplicant debug logging instead, which is roughly:
1) mv /usr/sbin/wpa_supplicant /
2) killall -TERM wpa_supplicant
3) /wpa_supplicant -dddtu
4) retry the connection and let it fail
5) grab the supplicant debug output (careful, may be sensitive info)
But before you do that, NM logs the configuration its sending to the
supplicant to syslog, so try to match that up with what you have from
the plain wpa_supplicant config and see what the differences are. You
will see NM send "TKIP CCMP" instead of just "CCMP", but that is not
going to be the problem.
I fetched a log and read it roughly, finding some differences. I
attached the part which I think is the most crucial. It seems that
"flush_object_timeout_handler" had been sent by the key should have been
attached, therefore no key was configured and the connection lost.
Does your network have *both* WPA-only and WPA2-only acess points with
the same SSID?
There are many wireless access points with the same SSID, but they're
all WPA2.
Dan
Best wishes. Thanks!
EAP: EAP-Request Identity data - hexdump_ascii(len=53):
00 6e 65 74 77 6f 72 6b 69 64 3d 66 64 75 77 69 _networkid=fduwi
72 65 6c 65 73 73 2e 31 78 2c 6e 61 73 69 64 3d reless.1x,nasid=
31 30 2e 32 32 30 2e 31 2e 33 33 2c 70 6f 72 74 10.220.1.33,port
69 64 3d 32 39 id=29
EAP: using real identity - hexdump_ascii(len=11):
31 32 33 30 30 31 38 30 30 30 39 12300180009
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=20): 01 00 00 10 02 01 00 10 01 31 32 33 30 30 31 38 30 30 30 39
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
eth1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 06 00 00 00
TLS: using phase1 config options
eth1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 225 bytes pending from ssl_out
SSL: 225 bytes left to be sent out (of total 225 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=239): 01 00 00 eb 02 02 00 eb 19 80 00 00 00 e1 16 03 01 00 dc 01 00 00 d8 03 01 50 5a ce 82 19 2f 83 29 87 7f d8 37 ae f4 a2 62 32 13 22 23 56 6a a8 49 50 48 55 3d 8e 47 b2 e8 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=1028): 02 00 04 00 01 03 04 00 19 c0 00 00 09 8d 16 03 01 00 35 02 00 00 31 03 01 50 5a ce d1 a7 54 d5 7c 35 9d 04 df 7b 61 ae bc 75 70 1f 02 de 9e ba 92 67 ee 85 4e 05 7e e8 42 00 00 39 00 00 09 ff 01 00 01 00 00 23 00 00 16 03 01 07 b3 0b 00 07 af 00 07 ac 00 03 13 30 82 03 0f 30 82 01 f7 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 8b 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 08 13 08 53 68 61 6e 67 68 61 69 31 11 30 0f 06 03 55 04 07 13 08 53 68 61 6e 67 68 61 69 31 19 30 17 06 03 55 04 0a 13 10 46 75 64 61 6e 20 55 6e 69 76 65 72 73 69 74 79 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 6e 69 63 40 66 75 64 61 6e 2e 65 64 75 2e 63 6e 31 1a 30 18 06 03 55 04 03 13 11 46 75 64 61 6e 20 57 69 72 65 6c 65 73 73 20 43 41 30 1e 17 0d 31 32 30 33 30 32 30 30 32 38 31 30 5a 17 0d 31 34 30 33 30 32 30 30 32 38 31 30 5a 30 75 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 08 13 08 53 68 61 6e 67 68 61 69 31 19 30 17 06 03 55 04 0a 13 10 46 75 64 61 6e 20 55 6e 69 76 65 72 73 69 74 79 31 17 30 15 06 03 55 04 03 13 0e 66 64 75 77 69 72 65 6c 65 73 73 2e 31 78 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 6e 69 63 40 66 75 64 61 6e 2e 65 64 75 2e 63 6e 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e9 0d c7 47 2f 6f bd a5 f2 d0 d0 eb d0 36 48 16 63 d5 63 12 61 85 82 af fe 30 09 af bb d1 c9 36 87 3f 83 d8 49 f7 e7 fb 5b 83 c2 69 67 00 a6 64 14 2c 3f 62 80 d4 f4 51 81 c4 a8 47 76 75 d3 ce c1 42 c2 28 e4 53 72 b8 51 fe 49 a9 b4 52 2c d4 c5 71 94 74 6c cc 94 b9 06 7e 0e 6d 81 a0 c5 4a c0 e9 ae 4e fa 2d 03 97 7e 19 7a 49 34 d2 11 71 85 04 ea e4 fb 00 0b a7 cb a8 05 db 00 e3 5a ed 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 82 01 01 00 27 59 82 f0 0c 87 5e f7 44 a3 b9 ad 40 80 2d 97 a1 40 80 4c 4d 85 2b 14 1f 77 76 9f da 5a 28 51 90 30 1f 28 cf a9 8c c1 07 b5 97 9c d2 25 c5 0e 0c dc 9d 40 5b 8f 96 b8 01 33 0c 66 25 58 4b 37 b3 14 53 ae 23 aa 7d e8 ff fb 67 a4 ba 43 bb d8 8f 15 fa 12 02 dc fa e0 c0 b8 03 a4 1c de 8b 8a 2f cf f5 0a 9a 0c 0c f0 66 ae 23 77 2f f4 76 34 0a 03 27 fc 21 e8 7b a1 b4 ae 5a 36 23 83 d9 3f a6 9a 23 6e 27 38 39 d9 f1 91 23 6d 92 33 14 50 09 4d f1 4a bd 69 5d 8d a5 ca 13 ec cc 2e 41 9b d8 45 4b 59 5d 5a 35 2d ff 9e 1d 46 4b 96 93 46 5d ab 3d e2 41 3e 76 60 84 87 79 09 30 88 8f 49 26 b4 d0 f5 be a4 32 5d 4e b1 f0 7a 84 40 bd 16 f7 eb 11 12 90 b4 1f 1d 82 79 c1 00 61 ab e5 a9 4f 07 cd 64 db 35 d2 30 32 62 06 bb 6b 5d 8e ed 02 ac 47 ed a8 f1 38 fe 10 70 46 4c 26 f9 84 8f 00 04 93 30 82 04 8f 30 82 03 77 a0 03 02 01 02 02 09 00 88 7d 96 29 fb 05 d6 b4 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 8b 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 08 13 08 53 68 61 6e 67 68 61 69 31 11 30 0f 06 03 55 04 07 13 08 53 68 61 6e 67 68 61 69 31 19 30 17 06 03 55 04 0a 13 10 46 75 64 61 6e 20 55 6e 69 76 65 72 73 69 74 79 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 6e 69 63 40 66 75 64 61 6e 2e 65 64 75 2e
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1024) - Flags 0xc0
SSL: TLS Message Length: 2445
SSL: Need 1431 bytes more input data
SSL: Building ACK (type=25 id=3 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 04 03 fc 19 40 63 6e 31 1a 30 18 06 03 55 04 03 13 11 46 75 64 61 6e 20 57 69 72 65 6c 65 73 73 20 43 41 30 1e 17 0d 31 32 30 33 30 32 30 30 32 38 31 30 5a 17 0d 31 34 30 33 30 32 30 30 32 38 31 30 5a 30 81 8b 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 08 13 08 53 68 61 6e 67 68 61 69 31 11 30 0f 06 03 55 04 07 13 08 53 68 61 6e 67 68 61 69 31 19 30 17 06 03 55 04 0a 13 10 46 75 64 61 6e 20 55 6e 69 76 65 72 73 69 74 79 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 6e 69 63 40 66 75 64 61 6e 2e 65 64 75 2e 63 6e 31 1a 30 18 06 03 55 04 03 13 11 46 75 64 61 6e 20 57 69 72 65 6c 65 73 73 20 43 41 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d6 60 c3 0e c0 06 d2 35 bd cf 96 ba 10 ea 39 01 2a 47 8f 67 d8 21 ca 32 0b 14 fb b2 85 2c 51 5c 35 c5 78 42 34 4d 1d 57 83 04 dc f7 13 2e 3b fc ec 1b 7e f4 80 2f 9a c0 ce 3c ac 10 f6 5a 55 63 96 82 9e 08 23 7f 93 df 97 ec 26 fe 13 19 f3 3b b3 b7 c6 63 4f 2b a6 9b 21 19 c9 5a 80 cb 4d fa a8 56 30 43 98 ef d4 9c 14 dc 89 23 0b 84 ae 17 9f 5b 7b 35 eb 3f 10 ea a9 62 62 d4 b0 4d f9 a8 d9 35 d7 45 f8 f1 bd 3a 9b 10 a8 82 e5 53 a8 0e d7 ed 20 f1 a5 f7 ca 94 03 c7 bb ec d5 4b 47 a9 1b 59 78 af 5f 8a 01 bb 4a b1 05 46 b1 ff 22 af 1c 63 70 0d 9c 58 b0 f0 02 b4 d7 f1 fb d3 ec 97 f4 87 5b 6e 07 31 4b 89 95 1f 79 8c ba 50 c6 37 b6 37 e5 6f 6a 83 5d 0c 05 17 1c 96 9c 26 30 44 bf c8 1f a5 8e a3 44 0d 72 e4 36 7b 4f f9 d3 d1 73 51 a5 fb 7b 92 c9 5d eb 45 87 72 f2 6b 54 27 02 03 01 00 01 a3 81 f3 30 81 f0 30 1d 06 03 55 1d 0e 04 16 04 14 cf 8a 22 a1 40 a0 93 ca 32 d2 fc 49 21 83 45 af 8e 9e 6f 50 30 81 c0 06 03 55 1d 23 04 81 b8 30 81 b5 80 14 cf 8a 22 a1 40 a0 93 ca 32 d2 fc 49 21 83 45 af 8e 9e 6f 50 a1 81 91 a4 81 8e 30 81 8b 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 08 13 08 53 68 61 6e 67 68 61 69 31 11 30 0f 06 03 55 04 07 13 08 53 68 61 6e 67 68 61 69 31 19 30 17 06 03 55 04 0a 13 10 46 75 64 61 6e 20 55 6e 69 76 65 72 73 69 74 79 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 6e 69 63 40 66 75 64 61 6e 2e 65 64 75 2e 63 6e 31 1a 30 18 06 03 55 04 03 13 11 46 75 64 61 6e 20 57 69 72 65 6c 65 73 73 20 43 41 82 09 00 88 7d 96 29 fb 05 d6 b4 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 9a c8 f3 31 05 27 39 b1 a7 c7 ce 78 56 7d e6 f3 ae 4c 85 14 7f 7a 53 04 e9 68 f6 1d bc 17 36 5d 90 aa 0c 40 56 51 0c f2 1b 51 ae c2 c9 a3 9c 54 46 62 58 ae fa 46 fe 18 bc d4 b7 a4 55 c4 58 89 d1 aa 3a 0f ae 16 20 03 03 72 0d c0 5b 56 b0 fe 32 27 aa 16 b9 9f 4f 3e 17 35 a8 a5 bb bb c9 af 39 99 f6 46 27 37 5b bc 70 2b a8 76 c3 37 2a e8 20 95 a1 36 f8 bb cc 50 79 68 26 b0 7a cc 27 14 05 b9 d6 4a da 52 81 33 64 4b 71 fc 2b 95 91 26 9b 5e 4c a6 c7 6f 2d 5d 80 e7 83 7a 81 d6 6c 64 8c 15 dc ab be 94 b7 da 5e ae cf cf 06 8c cf 61 f7 e4 53 12 58 59 ef 99 d3 67 ca 30 db 62 40 89 fa 4a b4 86 90 95 e6 87 d2 d5 3f 58 b4 bb a2 3e 25 5b e8 e8 6b a5 b3 68 e3 bd 1f 38 0b e8 94 38 af 1f f8 bd 59 8e 70 62 96 5d c2 c1 f4 71 82 71 8d 8b 56 3a e5 f7 c5 4c ae 71
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1020) - Flags 0x40
SSL: Need 417 bytes more input data
SSL: Building ACK (type=25 id=4 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=427): 02 00 01 a7 01 05 01 a7 19 00 fa 51 7e 86 75 3e 16 03 01 01 8d 0c 00 01 89 00 80 ef 08 1a 43 79 9e d3 83 e5 bb 08 9a 0b 4f fa 76 ea e5 88 f1 d9 6d 61 7f 4d 58 c6 63 15 eb fc b6 2a b8 1e f3 5f 4e 6a 44 19 72 c9 60 c2 df 8b aa 88 8d 26 65 6a a3 e0 f2 ed e6 ec ad a5 9a 3b f6 f6 d3 51 10 2a d1 62 56 fb 18 f7 d7 f7 3d eb c4 1e 97 fc 83 9d 80 bb 40 c9 9e 5a bd e7 ab 5d 6f 81 b4 67 35 e1 6e 06 dc eb d5 81 bc a5 c7 2a 9f d0 11 6a b2 e0 b6 e4 a7 66 17 25 10 fe 37 6c 8b 00 01 02 00 80 9e 92 90 de 7e af bf b2 5a 5a a6 bb 93 3b b3 32 2c 5f c1 6c b8 83 88 14 ad c4 f3 99 a1 ec fb 57 f7 82 2c 48 01 56 46 08 0a 06 9d e4 bc 23 58 51 c9 58 c3 24 e0 17 ad de 60 50 f1 3f 13 00 28 1e f2 ee c6 2f 3e 21 66 13 76 f7 79 95 00 7f a4 14 15 22 27 78 2a 7d a7 73 ba 04 e6 3c 34 c6 6b 4f 8a 97 89 ae f8 99 47 3c 90 e3 e2 4f 95 e2 0e 68 2d ef fa a1 97 e4 b9 8a 89 fb b7 e1 8b e4 53 88 00 80 ce df 93 3c 1e f8 67 5e 33 02 ae c8 9f c9 8b ff f3 f4 2a af 95 b5 b7 83 90 05 5c b0 0e b4 35 f9 16 5e 5e 9b 39 13 76 2d a5 f7 38 18 cd dd 49 a4 37 88 c8 8b 0c 68 1c 86 a0 18 4a c8 68 19 a8 43 87 14 cb e6 c5 0e 51 f2 49 f1 d0 d8 8b d2 0c b7 0d d4 b6 91 0d 72 5e 77 77 b9 51 19 ce 1a 64 63 6c 22 fe 4f 26 8e b8 e3 06 00 5f 08 71 30 e6 45 7e 57 f7 81 8f 60 ea 2d 78 fb 11 7f ce a0 e5 f6 16 03 01 00 04 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=423) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=CN/ST=Shanghai/L=Shanghai/O=Fudan University/emailAddress=nic fudan edu cn/CN=Fudan Wireless CA'
eth1: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=CN/ST=Shanghai/L=Shanghai/O=Fudan University/emailAddress=nic fudan edu cn/CN=Fudan Wireless CA'
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=CN/ST=Shanghai/L=Shanghai/O=Fudan University/emailAddress=nic fudan edu cn/CN=Fudan Wireless CA'
eth1: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=CN/ST=Shanghai/L=Shanghai/O=Fudan University/emailAddress=nic fudan edu cn/CN=Fudan Wireless CA'
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='/C=CN/ST=Shanghai/O=Fudan University/CN=fduwireless.1x/emailAddress=nic fudan edu cn'
eth1: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=CN/ST=Shanghai/O=Fudan University/CN=fduwireless.1x/emailAddress=nic fudan edu cn'
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server session ticket A
SSL: SSL_connect - want more data
SSL: 198 bytes pending from ssl_out
SSL: 198 bytes left to be sent out (of total 198 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=212): 01 00 00 d0 02 05 00 d0 19 80 00 00 00 c6 16 03 01 00 86 10 00 00 82 00 80 01 5a 89 96 5b b9 1b 75 98 fd 96 e7 f5 64 ff 46 dc 1e f9 9d 36 4b 67 f1 41 ed 9a 08 5b 2c 5f 54 38 e9 11 45 d5 17 36 86 b9 e3 9e 45 cf 3f c8 ec 8d bd da ad 12 5f 15 69 84 71 ec 73 31 11 fb ad 48 ef 72 3d 9c 29 e8 f6 e1 54 67 6c d0 d7 cb 37 3a 9c 19 78 5a e5 9e e6 cf 5f e1 c5 ff 44 59 21 23 43 11 85 06 06 62 0d c8 3a 10 ed 6a c4 98 1a 70 14 15 39 e6 b3 73 90 21 f3 ec a3 e0 60 54 71 14 03 01 00 01 01 16 03 01 00 30 bd 54 15 a9 32 87 b6 6b b3 1e 0f ad 0a bf 3a 63 89 12 b5 57 3a 2b c9 eb 85 7e 93 23 90 7a 2b 4d d6 f5 6a da e6 25 1e ce 50 13 d0 6a 83 e2 f7 d9
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=244): 02 00 00 f0 01 06 00 f0 19 00 16 03 01 00 aa 04 00 00 a6 00 00 00 00 00 a0 5f 41 6d e6 35 09 e9 d7 ee 90 ba 28 11 dc d1 69 32 95 ce 07 8e a7 ae 77 b9 19 75 1f 57 bc 68 71 8d 3a 9b 53 08 f7 2f 31 df 64 a3 f6 d2 fa 17 05 18 a7 03 6a ae 98 03 d7 aa 76 31 8f 6e 30 a7 8a 0b f5 3c 55 a7 58 91 2d c4 6c 20 2c 5c 75 92 fd c0 a4 3f 3f 3d 51 84 82 fc b8 43 46 92 00 43 a1 9c 66 ae 4e 1e 8a e4 e3 c3 0b ae 4f 19 3a 79 c2 5e f2 dc 32 44 51 44 6e a0 cd 14 f0 76 32 b6 56 bc ab 37 d0 9c d5 04 8e b6 03 a0 0a 1b 81 e5 1d 9c cb 2a 9e 18 b4 60 57 2f 2c ff 14 65 44 c7 ec 14 03 01 00 01 01 16 03 01 00 30 b5 7f 6d a8 e8 47 0c 6a 90 76 9b d1 00 5e 11 9e 60 2b 54 eb 25 2c 89 cc 1f a3 ac 94 07 6d 76 06 62 3d 5a 93 8f fc e7 6a c3 d2 c7 e3 de 96 d6 db
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=240) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server session ticket A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
SSL: No Application Data included
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
SSL: Building ACK (type=25 id=6 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=47): 02 00 00 2b 01 07 00 2b 19 00 17 03 01 00 20 1d bd 67 52 35 95 53 31 9d 79 48 16 5f 0a ce c7 91 34 bd 27 ff ef b2 7b bd fc 60 d3 29 3b d3 8e
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x00
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 07 00 05 01
EAP-PEAP: received Phase 2: code=1 identifier=7 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=11):
31 32 33 30 30 31 38 30 30 30 39 12300180009
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=16): [REMOVED]
SSL: 90 bytes left to be sent out (of total 90 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=100): 01 00 00 60 02 07 00 60 19 00 17 03 01 00 20 cd 02 0b f2 6a a9 b5 11 8f 76 85 75 7e 36 c4 fa 8a 70 69 6d 76 bd 28 65 e3 ff df a1 bc be b8 38 17 03 01 00 30 f9 9f 51 40 6d 6c 36 da 3f f2 1a 3d 90 90 fb cd e2 a9 81 21 1a da 49 a4 7d 4f 32 f5 36 ad 09 8c e9 b1 34 1f 7e e0 31 72 65 5a 7d 5e 15 87 6f 9d
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=47): 02 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 33 2e 9c a0 32 80 ef 52 90 14 74 76 91 be 93 36 3c f7 aa 50 3e 80 b0 ab 7f fd 51 49 eb 18 f3 75
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x00
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 06 50 61 73 73 77 6f 72 64 3a 20
EAP-PEAP: received Phase 2: code=1 identifier=8 length=15
EAP-PEAP: Phase 2 Request: type=6
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 6
EAP-GTC: Request message - hexdump_ascii(len=10):
50 61 73 73 77 6f 72 64 3a 20 Password:
EAP-GTC: Response - hexdump_ascii(len=14): [REMOVED]
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=19): [REMOVED]
SSL: 90 bytes left to be sent out (of total 90 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=100): 01 00 00 60 02 08 00 60 19 00 17 03 01 00 20 3b 14 f3 00 af 30 fd 6c cd aa 3f 66 1f c7 ea 93 53 5a 7f 5c 95 ec 18 a9 33 68 b0 ad 18 43 c5 78 17 03 01 00 30 5b eb ba 9a c5 79 23 d9 86 f7 7c 0c 0e 38 3b 8b 94 6d 6b ee 5c e4 c2 ed e4 53 8a 33 4a c7 8f a0 87 03 59 a3 48 05 a1 06 87 9b e3 f2 91 88 12 6f
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=47): 02 00 00 2b 01 09 00 2b 19 00 17 03 01 00 20 75 d7 5e 8b 7a 6b f0 bd 08 59 14 2d 63 1f 2a a1 39 03 ef f0 0a 20 14 fc b7 85 34 f3 56 60 ea 6d
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x00
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 09 00 0b 21 80 03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=9 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-TLV: Result TLV - hexdump(len=2): 00 01
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
SSL: 74 bytes left to be sent out (of total 74 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=3c:ce:73:94:8a:73
TX EAPOL - hexdump(len=84): 01 00 00 50 02 09 00 50 19 00 17 03 01 00 20 6f 83 9b 27 00 e7 12 80 54 56 0b c0 6e 75 53 78 6b bf 15 81 71 6e bb a8 2c 23 66 b9 42 c2 59 86 17 03 01 00 20 04 d3 14 84 e0 af ca 3b 41 aa 3b 98 da 26 f0 84 bd 50 7d b7 17 06 1e a6 f4 18 00 a9 f8 ce eb dc
EAPOL: SUPP_BE entering state RECEIVE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=8): 02 00 00 04 03 09 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state SUCCESS
eth1: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 5b 97 d7 b2 94 e6 77 58 55 56 52 91 6f 47 54 bc
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
eth1: IEEE 802.1X RX: version=2 type=3 length=117
eth1: EAPOL-Key type=2
eth1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
eth1: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 5b 97 d7 b2 94 e6 77 58 55 56 52 91 6f 47 54 bc
eth1: State: ASSOCIATED -> 4WAY_HANDSHAKE
eth1: WPA: RX message 1 of 4-Way Handshake from 3c:ce:73:94:8a:73 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 5b 97 d7 b2 94 e6 77 58 55 56 52 91 6f 47 54 bc
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 5b 97 d7 b2 94 e6 77 58 55 56 52 91 6f 47 54 bc
RSN: PMKID from Authenticator - hexdump(len=16): 5b 97 d7 b2 94 e6 77 58 55 56 52 91 6f 47 54 bc
eth1: RSN: no matching PMKID found
EAPOL: Successfully fetched key (len=32)
EAPOL: Successfully fetched key (len=64)
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
RSN: added PMKSA cache entry for 3c:ce:73:94:8a:73
eth1: RSN: the new PMK matches with the PMKID
Get randomness: len=32 entropy=11
random from os_get_random - hexdump(len=32): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
mixed random - hexdump(len=32): [REMOVED]
WPA: Renewed SNonce - hexdump(len=32): e2 f2 7d 87 07 f2 c8 45 2f b5 c7 5d 2e 8e 05 aa 4b 99 e7 19 70 6a 7d 4c b5 5c 5f d4 3e df 93 b0
WPA: PTK derivation - A1=00:13:ce:f6:7a:dd A2=3c:ce:73:94:8a:73
WPA: Nonce1 - hexdump(len=32): e2 f2 7d 87 07 f2 c8 45 2f b5 c7 5d 2e 8e 05 aa 4b 99 e7 19 70 6a 7d 4c b5 5c 5f d4 3e df 93 b0
WPA: Nonce2 - hexdump(len=32): 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
eth1: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): e7 a5 3f 76 80 d8 6f 76 f9 13 63 60 6b 4f 5f 03
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 e2 f2 7d 87 07 f2 c8 45 2f b5 c7 5d 2e 8e 05 aa 4b 99 e7 19 70 6a 7d 4c b5 5c 5f d4 3e df 93 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 a5 3f 76 80 d8 6f 76 f9 13 63 60 6b 4f 5f 03 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
eth1: RX EAPOL from 3c:ce:73:94:8a:73
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cc 33 c8 9a 6a 03 13 19 98 ad 5b 63 df 55 75 97 00 38 e2 45 7d 3e fd b9 7c 0b 4e e2 52 94 e9 ca ee 09 58 b4 13 c6 2c b6 8d 1e a5 30 65 cc 55 69 4a 46 03 8a f2 3f 48 12 21 cf e6 3f ca 48 31 4d 45 4d 2d e7 c8 4e dd 1e c6 94
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
eth1: IEEE 802.1X RX: version=2 type=3 length=151
eth1: EAPOL-Key type=2
eth1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
eth1: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): cc 33 c8 9a 6a 03 13 19 98 ad 5b 63 df 55 75 97
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 67 2a c7 a5 4d 13 5a 1c d2 49 2f 23 df 67 92 4c 90 ff e0 8e f4 86 0f 2c ee f8 ed b9 65 2f a2 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cc 33 c8 9a 6a 03 13 19 98 ad 5b 63 df 55 75 97 00 38 e2 45 7d 3e fd b9 7c 0b 4e e2 52 94 e9 ca ee 09 58 b4 13 c6 2c b6 8d 1e a5 30 65 cc 55 69 4a 46 03 8a f2 3f 48 12 21 cf e6 3f ca 48 31 4d 45 4d 2d e7 c8 4e dd 1e c6 94
RSN: encrypted key data - hexdump(len=56): e2 45 7d 3e fd b9 7c 0b 4e e2 52 94 e9 ca ee 09 58 b4 13 c6 2c b6 8d 1e a5 30 65 cc 55 69 4a 46 03 8a f2 3f 48 12 21 cf e6 3f ca 48 31 4d 45 4d 2d e7 c8 4e dd 1e c6 94
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
eth1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
eth1: WPA: RX message 3 of 4-Way Handshake from 3c:ce:73:94:8a:73 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 16 00 0f ac 01 01 00 84 c8 fe 0c a0 95 89 fa 92 53 79 c4 77 91 6a bc dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
eth1: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 63 fd 52 69 62 04 73 45 66 9a aa ce f0 61 37 8f
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 63 fd 52 69 62 04 73 45 66 9a aa ce f0 61 37 8f 00 00
eth1: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL authentication completed successfully
eth1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
eth1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
eth1: WPA: Key negotiation completed with 3c:ce:73:94:8a:73 [PTK=CCMP GTK=CCMP]
eth1: Cancelling authentication timeout
eth1: State: GROUP_HANDSHAKE -> COMPLETED
eth1: CTRL-EVENT-CONNECTED - Connection to 3c:ce:73:94:8a:73 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
1348128112.545458: EAP: EAP-Request Identity data - hexdump_ascii(len=53):
00 6e 65 74 77 6f 72 6b 69 64 3d 66 64 75 77 69 _networkid=fduwi
72 65 6c 65 73 73 2e 31 78 2c 6e 61 73 69 64 3d reless.1x,nasid=
31 30 2e 32 32 30 2e 31 2e 33 33 2c 70 6f 72 74 10.220.1.33,port
69 64 3d 32 39 id=29
1348128112.545481: EAP: using real identity - hexdump_ascii(len=11):
31 32 33 30 30 31 38 30 30 30 39 12300180009
1348128112.545492: EAP: EAP entering state SEND_RESPONSE
1348128112.545495: EAP: EAP entering state IDLE
1348128112.545497: EAPOL: SUPP_BE entering state RESPONSE
1348128112.545499: EAPOL: txSuppRsp
1348128112.545503: TX EAPOL: dst=3c:ce:73:94:8a:73
1348128112.545506: TX EAPOL - hexdump(len=20): 01 00 00 10 02 01 00 10 01 31 32 33 30 30 31 38 30 30 30 39
1348128112.545526: EAPOL: SUPP_BE entering state RECEIVE
1348128112.546616: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1
1348128112.811479: nl80211: Ignore event for foreign ifindex 2
1348128112.811498: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1348128112.811507: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1348128112.811543: WEXT: if_removed already cleared - ignore event
1348128112.823443: EAPOL: startWhen --> 0
1348128137.864389: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1)
1348128137.864408: wpa_driver_wext_deauthenticate
1348128137.864455: eth1: No keys have been configured - skip key clearing
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]