Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Initializing interface 'eth0.2' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant.conf'
- ap_scan=0
- Line: 2 - start of a new network block
- key_mgmt: 0x8
- eap methods - hexdump(len=16): 00 00 00 00 00 00 00 15 00 00 00 00 00 00 00 00
- identity - hexdump_ascii(len=6):
- 64 6f 67 35 30 30 dog500
- password - hexdump_ascii(len=8): [REMOVED]
- phase2 - hexdump_ascii(len=8):
- 61 75 74 68 3d 50 41 50 auth=PAP
- Priority group 0
- id=0 ssid=''
- wpa_driver_wired_init: Added multicast membership with packet socket
- Own MAC address: 00:23:cd:16:b4:f4
- RSN: flushing PMKID list in the driver
- Setting scan request: 0 sec 100000 usec
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- Added interface eth0.2
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- Already associated with a configured network - generating associated event
- Association info event
- State: DISCONNECTED -> ASSOCIATED
- Associated to a new BSS: BSSID=01:80:c2:00:00:03
- No keys have been configured - skip key clearing
- Select network based on association information
- Network configuration found for the current AP
- WPA: clearing AP WPA IE
- WPA: clearing AP RSN IE
- WPA: clearing own WPA/RSN IE
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- Associated with 01:80:c2:00:00:03
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- Cancelling scan request
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=4): 01 01 00 00
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=46): 01 00 00 0f 01 0d 00 0f 01 55 73 65 72 20 6e 61 6d 65 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=13 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=10):
- 55 73 65 72 20 6e 61 6d 65 3a User name:
- EAP: using real identity - hexdump_ascii(len=6):
- 64 6f 67 35 30 30 dog500
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 0d 00 0b 01 64 6f 67 35 30 30
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=46): 01 00 00 06 01 0e 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 25
- EAP: vendor 0 method 25 not allowed
- CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 -> NAK
- EAP: Building EAP-Nak (requested type 25 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 15
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 0e 00 06 03 15
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=46): 01 00 00 06 01 0f 00 06 15 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=15 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
- EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS)
- EAP-TTLS: Phase2 type: PAP
- CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TTLS: Start (server ver=0, own ver=0)
- TLS: using phase1 config options
- EAP-TTLS: Start
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 95 bytes pending from ssl_out
- SSL: 95 bytes left to be sent out (of total 95 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=105): 01 00 00 65 02 0f 00 65 15 00 16 03 01 00 5a 01 00 00 56 03 01 4c 19 34 b0 4c b0 5b f8 36 f2 82 29 90 a6 d9 6e 6c c2 43 9b 22 6f b2 e0 d1 32 11 53 97 55 77 e6 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 02 01 00 00 04 00 23 00 00
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=1028): 01 00 04 00 01 10 04 00 15 c0 00 00 05 21 16 03 01 00 30 02 00 00 2c 03 01 4c 19 34 b2 9c 05 2f 94 1b 02 36 68 63 31 61 a0 57 4f 23 7c c5 36 02 66 a1 ff 23 56 63 21 c1 82 00 00 39 01 00 04 00 23 00 00 16 03 01 03 4c 0b 00 03 48 00 03 45 00 03 42 30 82 03 3e 30 82 02 a7 a0 03 02 01 02 02 03 0c 6b 64 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 4e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 0a 13 07 45 71 75 69 66 61 78 31 2d 30 2b 06 03 55 04 0b 13 24 45 71 75 69 66 61 78 20 53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 30 39 30 38 31 33 31 37 32 39 32 36 5a 17 0d 31 35 30 38 31 34 31 31 30 30 35 39 5a 30 81 c8 31 0b 30 09 06 03 55 04 06 13 02 47 42 31 1b 30 19 06 03 55 04 0a 13 12 6e 61 73 61 61 61 31 2e 79 6f 72 6b 2e 61 63 2e 75 6b 31 13 30 11 06 03 55 04 0b 13 0a 47 54 38 36 33 32 36 36 35 36 31 31 30 2f 06 03 55 04 0b 13 28 53 65 65 20 77 77 77 2e 67 65 6f 74 72 75 73 74 2e 63 6f 6d 2f 72 65 73 6f 75 72 63 65 73 2f 63 70 73 20 28 63 29 30 39 31 37 30 35 06 03 55 04 0b 13 2e 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c 20 56 61 6c 69 64 61 74 65 64 20 2d 20 51 75 69 63 6b 53 53 4c 20 50 72 65 6d 69 75 6d 28 52 29 31 1b 30 19 06 03 55 04 03 13 12 6e 61 73 61 61 61 31 2e 79 6f 72 6b 2e 61 63 2e 75 6b 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 c6 c3 d3 7f e2 d0 c1 ef 20 37 34 a7 c5 f7 3b 37 f3 dc e3 98 81 49 2c 98 ed 89 10 70 e0 02 d8 99 b7 ea 40 ba 8e 24 88 74 04 8e ad 66 6b c5 44 59 53 f6 2b 0e 61 8d 89 8a 0b 2a 08 42 8a db d1 ab 3b a6 22 fd 56 71 0f 5e b4 9d b4 7b 5a 78 29 95 33 a4 23 b0 3f ef 23 0f 90 f5 df ff 3c 7c 02 fa 98 93 bd a3 14 77 21 97 44 ec 83 2c 76 b1 c5 27 1f 46 e1 98 3b a3 26 32 03 1a 10 d5 68 a3 c8 67 02 03 01 00 01 a3 81 ae 30 81 ab 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 04 f0 30 1d 06 03 55 1d 0e 04 16 04 14 7c 85 a6 b7 8b 86 0d 32 64 a7 f4 01 0a 01 9f 4d 62 60 c8 d2 30 3a 06 03 55 1d 1f 04 33 30 31 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 2e 67 65 6f 74 72 75 73 74 2e 63 6f 6d 2f 63 72 6c 73 2f 73 65 63 75 72 65 63 61 2e 63 72 6c 30 1f 06 03 55 1d 23 04 18 30 16 80 14 48 e6 68 f9 2b d2 b2 95 d7 47 d8 23 20 10 4f 33 98 90 9f d4 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 a5 4e 87 16 f3 c2 04 f3 40 6c 91 7b ce 83 0f 68 17 1c 05 6a 7c 39 7b e0 f2 3d 9e 71 08 44 aa a1 34 ca 0f 36 10 40 ab 4b 79 6a 18 1c 03 0c 2b c6 45 28 2d f1 74 fd 83 69 39 39 40 6a 4b 20 ca e4 e7 8e 9f 9f 0f 78 16 d0 58 a0 4d 6f f4 c4 e5 01 13 51 c4 ba eb d8 1a ea 25 9d 0d 32 70 72 af 6c d6 b8 b8 9f e1 a5 f3 0e 7f 3b 5e 74 84 98 b2 0b fe c3 80 55 b6 55 16 14 40 f7 e0 fa 26 0d 17 1b 16 03 01 01 8d 0c 00 01 89 00 80 f4 75 4e 1b 29 c2 09 bf b1 03 13 df 79 49 44 15 1e 35 20 a8 99 78 c2 f0 4b 39 b6 1a 37 1d 58 20 4d 10 a1 1f 40 84 d1 e1 eb 39 78 bc 3d 12 16 d6 e4 92 23 12 16 52 08 5d 9d c1 cc 32 43 93 03 bd 60 c2 ac 87 fa 31 49 a7 f1 23 e6 0c 3f ae 5c 08 c9 ee 42 79 10 7a 1c f1 9d 08 b2 2b 77 a2 74 eb ac ef 9c 51 45
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=16 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 1313
- SSL: Need 299 bytes more input data
- SSL: Building ACK (type=21 id=16 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 10 00 06 15 00
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=313): 01 00 01 35 01 11 01 35 15 80 00 00 05 21 f9 fd a7 c3 cf dd 71 5f cb 68 cb 07 db a1 f4 a0 97 d0 fc 0c 77 a3 f2 27 e5 2f 73 00 01 02 00 80 3e b4 ea e3 dd a1 f9 ef 32 bb 56 43 b2 b1 9c 84 d1 82 1a c5 1c c6 88 e8 a6 49 22 c8 b6 cd 89 cd 8e 6a ce 40 01 28 2e 56 a2 c8 11 ae 6c f8 ad 85 85 d2 07 ea 71 5a 1c a6 05 75 84 53 fb 01 25 c0 b4 89 7d 67 0d 77 de 49 f6 7c 8d 54 a8 c5 e9 11 c0 5e 03 6c ce 0f a2 ac be b5 8e b7 f9 38 a6 16 2e 91 4d b8 d1 7e ac a6 c9 62 a5 3a 27 76 2a 7d 79 6d 1c 5f 15 e2 0d 3e 9d 63 5f 61 16 dc 8d b7 00 80 86 35 40 c6 f1 40 88 9c ee 95 16 ac 0a 25 20 74 a7 74 c4 cc 53 15 43 7d ae 36 c2 7a dd 27 c9 b2 aa 4c 45 a1 d7 7a 93 7d b0 41 c8 5c b2 af 6b 73 c6 aa 5d d1 06 cf ba e6 72 10 8f b3 9c f3 b8 ac 7d e6 ce 0d dc cd 65 e6 a7 5e 68 e4 bf 64 8f a5 79 29 27 73 f5 c9 7b 4f 56 92 f3 58 34 bb 87 87 6f dd ed 8d 20 42 d6 e3 d3 38 49 1a 82 b9 17 b0 7b 9f e3 e4 48 0b 3b 1f 23 21 bd c1 25 1a 3e 5a 16 03 01 00 04 0e 00 00 00
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=17 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=309) - Flags 0x80
- SSL: TLS Message Length: 1313
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server hello A
- TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/C=GB/O=nasaaa1.york.ac.uk/OU=GT86326656/OU=See www.geotrust.com/resources/cps (c)09/OU=Domain Control Validated - QuickSSL Premium(R)/CN=nasaaa1.york.ac.uk'
- CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=GB/O=nasaaa1.york.ac.uk/OU=GT86326656/OU=See www.geotrust.com/resources/cps (c)09/OU=Domain Control Validated - QuickSSL Premium(R)/CN=nasaaa1.york.ac.uk'
- TLS: tls_verify_cb - preverify_ok=1 err=27 (certificate not trusted) ca_cert_verify=0 depth=0 buf='/C=GB/O=nasaaa1.york.ac.uk/OU=GT86326656/OU=See www.geotrust.com/resources/cps (c)09/OU=Domain Control Validated - QuickSSL Premium(R)/CN=nasaaa1.york.ac.uk'
- CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=GB/O=nasaaa1.york.ac.uk/OU=GT86326656/OU=See www.geotrust.com/resources/cps (c)09/OU=Domain Control Validated - QuickSSL Premium(R)/CN=nasaaa1.york.ac.uk'
- TLS: tls_verify_cb - preverify_ok=1 err=21 (unable to verify the first certificate) ca_cert_verify=0 depth=0 buf='/C=GB/O=nasaaa1.york.ac.uk/OU=GT86326656/OU=See www.geotrust.com/resources/cps (c)09/OU=Domain Control Validated - QuickSSL Premium(R)/CN=nasaaa1.york.ac.uk'
- CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=GB/O=nasaaa1.york.ac.uk/OU=GT86326656/OU=See www.geotrust.com/resources/cps (c)09/OU=Domain Control Validated - QuickSSL Premium(R)/CN=nasaaa1.york.ac.uk'
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server certificate A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server key exchange A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server done A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client key exchange A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write change cipher spec A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write finished A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 flush data
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server session ticket A
- SSL: SSL_connect - want more data
- SSL: 198 bytes pending from ssl_out
- SSL: 198 bytes left to be sent out (of total 198 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=208): 01 00 00 cc 02 11 00 cc 15 00 16 03 01 00 86 10 00 00 82 00 80 cc 47 49 18 b1 fb 7e 47 58 cc 29 bf 46 46 65 c6 93 c7 53 0b 2b da 92 71 fb 7b d7 41 95 ed 7d c6 e9 5c 19 5c f4 8f c8 ef 60 fb 28 5d 7e 0d 9a 2c c2 b1 94 4a 13 aa 20 4e 26 1b 74 44 58 bb b1 97 21 75 ae 62 85 85 56 2d be b6 8a dc 05 1a 35 ac 09 36 ce b7 cc 64 47 cc 50 85 b8 1a 43 7a a4 37 0b dd 4d dd f8 0c 92 30 7c 61 92 68 f8 89 8c 67 00 70 c6 f7 20 fd 1e 7c f9 0c 8b 8c c0 74 93 ac 14 03 01 00 01 01 16 03 01 00 30 88 ea ad 07 e6 c1 69 15 12 49 41 35 e5 86 2f 75 00 fc c0 a2 82 d4 c3 a8 9d 7c 8f 6a 0b 65 23 13 1a 77 3e c6 64 24 47 5e 54 89 3b 03 7d d4 24 c3
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=248): 01 00 00 f4 01 12 00 f4 15 80 00 00 00 ea 16 03 01 00 aa 04 00 00 a6 00 00 00 00 00 a0 36 c2 1c dc e1 1e a7 d3 08 56 f2 8e 6b 79 08 d3 61 d5 fc c8 16 1d c9 0a 1c 4e 36 f8 37 25 a7 1a 85 46 25 ef 3b 6e f0 60 2b f7 61 48 98 20 d2 ed c4 8b 93 cb 0c 3b cd 30 f5 5d 7d 3d 1e c4 de 6a 60 31 da b4 c2 75 4e d7 a9 11 75 c8 03 3f b3 aa 4f 5e 36 41 4e 61 e8 a1 15 5f 1a d1 f3 46 53 34 62 b8 4d 8d 56 69 7c 45 ef 9e 7b 78 34 86 24 a8 45 8a 78 c5 30 9c 3b 39 f4 e8 2c 3f e3 b5 99 5a b7 34 5f 51 ab 45 39 9f 6c 19 f9 84 90 6b 7f b5 f0 b2 d2 35 aa 4a f9 67 c5 ec 94 26 a8 75 92 4a 14 03 01 00 01 01 16 03 01 00 30 e1 b2 c7 4c 79 d8 f7 e8 d2 ba c7 00 62 81 06 86 a4 23 72 16 d9 3b 96 5b bf 67 a9 ef a5 f0 bd 97 5c c4 10 9e 2f 2f d1 30 dc 07 2c 34 18 cd f5 7b
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=18 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=244) - Flags 0x80
- SSL: TLS Message Length: 234
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server session ticket A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read finished A
- SSL: (where=0x20 ret=0x1)
- SSL: (where=0x1002 ret=0x1)
- SSL: 0 bytes pending from ssl_out
- SSL: No Application Data included
- SSL: No data to be sent out
- EAP-TTLS: TLS done, proceed to Phase 2
- EAP-TTLS: Derived key - hexdump(len=64): [REMOVED]
- EAP-TTLS: received 0 bytes encrypted data for Phase 2
- EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity
- EAP-TTLS: Phase 2 PAP Request
- EAP-TTLS: Encrypting Phase 2 data - hexdump(len=40): [REMOVED]
- SSL: 106 bytes left to be sent out (of total 106 bytes)
- EAP-TTLS: Authentication completed successfully
- EAP: method process -> ignore=FALSE methodState=DONE decision=COND_SUCC
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=01:80:c2:00:00:03
- TX EAPOL - hexdump(len=116): 01 00 00 70 02 12 00 70 15 00 17 03 01 00 20 50 a4 4f bb 70 96 c7 b3 dd c6 77 51 24 10 0f 92 c0 95 24 dc be 13 44 61 1d 4e 2d a2 df a7 84 8d 17 03 01 00 40 c3 82 b5 a9 d4 c9 48 9f 98 1b 5c 19 76 74 11 01 e7 c0 5a c1 44 35 71 54 11 9e 57 08 bb 80 be 06 f0 36 f7 c2 a3 c3 72 b3 24 ba f7 99 09 34 66 22 6c 81 48 32 fd 7e 0d 76 aa cf 18 ee 3a 04 f7 4d
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:1f:fe:0f:0f:00
- RX EAPOL - hexdump(len=46): 01 00 00 04 03 12 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Success
- EAP: EAP entering state SUCCESS
- CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
- EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required
- WPA: EAPOL processing complete
- Cancelling authentication timeout
- State: ASSOCIATED -> COMPLETED
- CTRL-EVENT-CONNECTED - Connection to 01:80:c2:00:00:03 completed (auth) [id=0 id_str=]
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state SUCCESS
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- CTRL-EVENT-TERMINATING - signal 2 received
- Removing interface eth0.2
- No keys have been configured - skip key clearing
- State: COMPLETED -> DISCONNECTED
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- No keys have been configured - skip key clearing
- EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
- ENGINE: engine deinit
- Cancelling scan request
- Cancelling authentication timeout
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement