Guest User

Untitled

a guest
Sep 9th, 2010
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 29.99 KB | None | 0 0
  1. Initializing interface 'wlan0' conf './wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  2. Configuration file './wpa_supplicant.conf' -> '/home/boudewijn/bin/./wpa_supplicant.conf'
  3. Reading configuration file '/home/boudewijn/bin/./wpa_supplicant.conf'
  4. ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=root'
  5. Priority group 0
  6. id=0 ssid='eduroam'
  7. Interface wlan0 set UP - waiting a second for the driver to complete initialization
  8. SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  9. capabilities: key_mgmt 0xf enc 0xf flags 0x0
  10. WEXT: Operstate: linkmode=1, operstate=5
  11. Own MAC address: 00:16:ea:e5:a5:fc
  12. wpa_driver_wext_set_wpa
  13. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  14. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  15. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  16. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  17. wpa_driver_wext_set_countermeasures
  18. wpa_driver_wext_set_drop_unencrypted
  19. RSN: flushing PMKID list in the driver
  20. Setting scan request: 0 sec 100000 usec
  21. WPS: UUID based on MAC address - hexdump(len=16): 74 f1 b5 3b 43 78 57 35 b5 c2 e1 4d 77 51 a1 dc
  22. WPS: Build Beacon and Probe Response IEs
  23. WPS: * Version
  24. WPS: * Wi-Fi Protected Setup State (0)
  25. WPS: * Version
  26. WPS: * Wi-Fi Protected Setup State (0)
  27. WPS: * Response Type (2)
  28. WPS: * UUID-E
  29. WPS: * Manufacturer
  30. WPS: * Model Name
  31. WPS: * Model Number
  32. WPS: * Serial Number
  33. WPS: * Primary Device Type
  34. WPS: * Device Name
  35. WPS: * Config Methods (0)
  36. WPS: * RF Bands (3)
  37. EAPOL: SUPP_PAE entering state DISCONNECTED
  38. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  39. EAPOL: SUPP_BE entering state INITIALIZE
  40. EAP: EAP entering state DISABLED
  41. ctrl_interface_group=0 (from group name 'root')
  42. Added interface wlan0
  43. RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
  44. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  45. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  46. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  47. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  48. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  49. Wireless event: cmd=0x8b06 len=12
  50. State: DISCONNECTED -> SCANNING
  51. Starting AP scan (specific SSID)
  52. Scan SSID - hexdump_ascii(len=7):
  53. 65 64 75 72 6f 61 6d eduroam
  54. Trying to get current scan results first without requesting a new scan to speed up initial association
  55. Received 389 bytes of scan results (1 BSSes)
  56. New scan results available
  57. Selecting BSS from priority group 0
  58. Try to find WPA-enabled AP
  59. 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  60. selected based on RSN IE
  61. selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
  62. Trying to associate with 00:21:d8:c0:18:f1 (SSID='eduroam' freq=2412 MHz)
  63. Cancelling scan request
  64. WPA: clearing own WPA/RSN IE
  65. Automatic auth_alg selection: 0x1
  66. RSN: using IEEE 802.11i/D9.0
  67. WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  68. WPA: clearing AP WPA IE
  69. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  70. WPA: using GTK CCMP
  71. WPA: using PTK CCMP
  72. WPA: using KEY_MGMT 802.1X
  73. WPA: not using MGMT group cipher
  74. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  75. No keys have been configured - skip key clearing
  76. wpa_driver_wext_set_drop_unencrypted
  77. State: SCANNING -> ASSOCIATING
  78. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  79. WEXT: Operstate: linkmode=-1, operstate=5
  80. wpa_driver_wext_associate
  81. wpa_driver_wext_set_psk
  82. Setting authentication timeout: 10 sec 0 usec
  83. EAPOL: External notification - EAP success=0
  84. EAPOL: External notification - EAP fail=0
  85. EAPOL: External notification - portControl=Auto
  86. RSN: Ignored PMKID candidate without preauth flag
  87. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  88. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  89. Wireless event: cmd=0x8b06 len=12
  90. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  91. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  92. Wireless event: cmd=0x8b04 len=16
  93. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  94. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  95. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  96. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  97. Wireless event: cmd=0x8c08 len=50
  98. AssocResp IE wireless event - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  99. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  100. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  101. Wireless event: cmd=0x8b15 len=24
  102. Wireless event: new AP: 00:21:d8:c0:18:f1
  103. Association info event
  104. resp_ies - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  105. State: ASSOCIATING -> ASSOCIATED
  106. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  107. WEXT: Operstate: linkmode=-1, operstate=5
  108. Associated to a new BSS: BSSID=00:21:d8:c0:18:f1
  109. No keys have been configured - skip key clearing
  110. Associated with 00:21:d8:c0:18:f1
  111. WPA: Association event - clear replay counter
  112. WPA: Clear old PTK
  113. EAPOL: External notification - portEnabled=0
  114. EAPOL: External notification - portValid=0
  115. EAPOL: External notification - portEnabled=1
  116. EAPOL: SUPP_PAE entering state CONNECTING
  117. EAPOL: SUPP_BE entering state IDLE
  118. EAP: EAP entering state INITIALIZE
  119. EAP: EAP entering state IDLE
  120. Setting authentication timeout: 10 sec 0 usec
  121. Cancelling scan request
  122. RX EAPOL from 00:21:d8:c0:18:f1
  123. Setting authentication timeout: 70 sec 0 usec
  124. EAPOL: Received EAP-Packet frame
  125. EAPOL: SUPP_PAE entering state RESTART
  126. EAP: EAP entering state INITIALIZE
  127. EAP: EAP entering state IDLE
  128. EAPOL: SUPP_PAE entering state AUTHENTICATING
  129. EAPOL: SUPP_BE entering state REQUEST
  130. EAPOL: getSuppRsp
  131. EAP: EAP entering state RECEIVED
  132. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  133. EAP: EAP entering state IDENTITY
  134. CTRL-EVENT-EAP-STARTED EAP authentication started
  135. EAP: EAP-Request Identity data - hexdump_ascii(len=43):
  136. 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
  137. 61 6d 2c 6e 61 73 69 64 3d 6f 6d 68 70 2d 77 31 am,nasid=omhp-w1
  138. 61 2c 70 6f 72 74 69 64 3d 32 39 a,portid=29
  139. EAP: using real identity - hexdump_ascii(len=26):
  140. 42 6f 75 64 65 77 69 6a 6e 2e 45 63 74 6f 72 40 Boudewijn.Ector@
  141. 73 75 72 66 6e 65 74 2e 6e 6c surfnet.nl
  142. EAP: EAP entering state SEND_RESPONSE
  143. EAP: EAP entering state IDLE
  144. EAPOL: SUPP_BE entering state RESPONSE
  145. EAPOL: txSuppRsp
  146. TX EAPOL: dst=00:21:d8:c0:18:f1
  147. EAPOL: SUPP_BE entering state RECEIVE
  148. RX EAPOL from 00:21:d8:c0:18:f1
  149. EAPOL: Received EAP-Packet frame
  150. EAPOL: SUPP_BE entering state REQUEST
  151. EAPOL: getSuppRsp
  152. EAP: EAP entering state RECEIVED
  153. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  154. EAP: EAP entering state GET_METHOD
  155. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  156. TLS: using phase1 config options
  157. TLS: Trusted root certificate(s) loaded
  158. OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
  159. OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
  160. OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib
  161. OpenSSL: SSL_use_certificate_file (PEM) --> OK
  162. OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094068:asn1 encoding routines:d2i_ASN1_SET:bad tag
  163. OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
  164. OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
  165. OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib
  166. OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib
  167. OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK
  168. SSL: Private key loaded successfully
  169. CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  170. EAP: EAP entering state METHOD
  171. SSL: Received packet(len=6) - Flags 0x20
  172. EAP-TLS: Start
  173. SSL: (where=0x10 ret=0x1)
  174. SSL: (where=0x1001 ret=0x1)
  175. SSL: SSL_connect:before/connect initialization
  176. SSL: (where=0x1001 ret=0x1)
  177. SSL: SSL_connect:SSLv3 write client hello A
  178. SSL: (where=0x1002 ret=0xffffffff)
  179. SSL: SSL_connect:error in SSLv3 read server hello A
  180. SSL: SSL_connect - want more data
  181. SSL: 93 bytes pending from ssl_out
  182. SSL: 93 bytes left to be sent out (of total 93 bytes)
  183. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  184. EAP: EAP entering state SEND_RESPONSE
  185. EAP: EAP entering state IDLE
  186. EAPOL: SUPP_BE entering state RESPONSE
  187. EAPOL: txSuppRsp
  188. TX EAPOL: dst=00:21:d8:c0:18:f1
  189. EAPOL: SUPP_BE entering state RECEIVE
  190. RX EAPOL from 00:21:d8:c0:18:f1
  191. EAPOL: Received EAP-Packet frame
  192. EAPOL: SUPP_BE entering state REQUEST
  193. EAPOL: getSuppRsp
  194. EAP: EAP entering state RECEIVED
  195. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  196. EAP: EAP entering state METHOD
  197. SSL: Received packet(len=778) - Flags 0xc0
  198. SSL: TLS Message Length: 4897
  199. SSL: Need 4129 bytes more input data
  200. SSL: Building ACK (type=13 id=3 ver=0)
  201. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  202. EAP: EAP entering state SEND_RESPONSE
  203. EAP: EAP entering state IDLE
  204. EAPOL: SUPP_BE entering state RESPONSE
  205. EAPOL: txSuppRsp
  206. TX EAPOL: dst=00:21:d8:c0:18:f1
  207. EAPOL: SUPP_BE entering state RECEIVE
  208. RX EAPOL from 00:21:d8:c0:18:f1
  209. EAPOL: Received EAP-Packet frame
  210. EAPOL: SUPP_BE entering state REQUEST
  211. EAPOL: getSuppRsp
  212. EAP: EAP entering state RECEIVED
  213. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  214. EAP: EAP entering state METHOD
  215. SSL: Received packet(len=774) - Flags 0x40
  216. SSL: Need 3361 bytes more input data
  217. SSL: Building ACK (type=13 id=4 ver=0)
  218. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  219. EAP: EAP entering state SEND_RESPONSE
  220. EAP: EAP entering state IDLE
  221. EAPOL: SUPP_BE entering state RESPONSE
  222. EAPOL: txSuppRsp
  223. TX EAPOL: dst=00:21:d8:c0:18:f1
  224. EAPOL: SUPP_BE entering state RECEIVE
  225. RX EAPOL from 00:21:d8:c0:18:f1
  226. EAPOL: Received EAP-Packet frame
  227. EAPOL: SUPP_BE entering state REQUEST
  228. EAPOL: getSuppRsp
  229. EAP: EAP entering state RECEIVED
  230. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  231. EAP: EAP entering state METHOD
  232. SSL: Received packet(len=774) - Flags 0x40
  233. SSL: Need 2593 bytes more input data
  234. SSL: Building ACK (type=13 id=5 ver=0)
  235. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  236. EAP: EAP entering state SEND_RESPONSE
  237. EAP: EAP entering state IDLE
  238. EAPOL: SUPP_BE entering state RESPONSE
  239. EAPOL: txSuppRsp
  240. TX EAPOL: dst=00:21:d8:c0:18:f1
  241. EAPOL: SUPP_BE entering state RECEIVE
  242. RX EAPOL from 00:21:d8:c0:18:f1
  243. EAPOL: Received EAP-Packet frame
  244. EAPOL: SUPP_BE entering state REQUEST
  245. EAPOL: getSuppRsp
  246. EAP: EAP entering state RECEIVED
  247. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  248. EAP: EAP entering state METHOD
  249. SSL: Received packet(len=774) - Flags 0x40
  250. SSL: Need 1825 bytes more input data
  251. SSL: Building ACK (type=13 id=6 ver=0)
  252. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  253. EAP: EAP entering state SEND_RESPONSE
  254. EAP: EAP entering state IDLE
  255. EAPOL: SUPP_BE entering state RESPONSE
  256. EAPOL: txSuppRsp
  257. TX EAPOL: dst=00:21:d8:c0:18:f1
  258. EAPOL: SUPP_BE entering state RECEIVE
  259. RX EAPOL from 00:21:d8:c0:18:f1
  260. EAPOL: Received EAP-Packet frame
  261. EAPOL: SUPP_BE entering state REQUEST
  262. EAPOL: getSuppRsp
  263. EAP: EAP entering state RECEIVED
  264. EAP: Received EAP-Request id=7 method=13 vendor=0 vendorMethod=0
  265. EAP: EAP entering state METHOD
  266. SSL: Received packet(len=774) - Flags 0x40
  267. SSL: Need 1057 bytes more input data
  268. SSL: Building ACK (type=13 id=7 ver=0)
  269. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  270. EAP: EAP entering state SEND_RESPONSE
  271. EAP: EAP entering state IDLE
  272. EAPOL: SUPP_BE entering state RESPONSE
  273. EAPOL: txSuppRsp
  274. TX EAPOL: dst=00:21:d8:c0:18:f1
  275. EAPOL: SUPP_BE entering state RECEIVE
  276. RX EAPOL from 00:21:d8:c0:18:f1
  277. EAPOL: Received EAP-Packet frame
  278. EAPOL: SUPP_BE entering state REQUEST
  279. EAPOL: getSuppRsp
  280. EAP: EAP entering state RECEIVED
  281. EAP: Received EAP-Request id=8 method=13 vendor=0 vendorMethod=0
  282. EAP: EAP entering state METHOD
  283. SSL: Received packet(len=774) - Flags 0x40
  284. SSL: Need 289 bytes more input data
  285. SSL: Building ACK (type=13 id=8 ver=0)
  286. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  287. EAP: EAP entering state SEND_RESPONSE
  288. EAP: EAP entering state IDLE
  289. EAPOL: SUPP_BE entering state RESPONSE
  290. EAPOL: txSuppRsp
  291. TX EAPOL: dst=00:21:d8:c0:18:f1
  292. EAPOL: SUPP_BE entering state RECEIVE
  293. RX EAPOL from 00:21:d8:c0:18:f1
  294. EAPOL: Received EAP-Packet frame
  295. EAPOL: SUPP_BE entering state REQUEST
  296. EAPOL: getSuppRsp
  297. EAP: EAP entering state RECEIVED
  298. EAP: Received EAP-Request id=9 method=13 vendor=0 vendorMethod=0
  299. EAP: EAP entering state METHOD
  300. SSL: Received packet(len=295) - Flags 0x00
  301. SSL: (where=0x1001 ret=0x1)
  302. SSL: SSL_connect:SSLv3 read server hello A
  303. TLS: Certificate verification failed, error 19 (self signed certificate in certificate chain) depth 3 for '/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root'
  304. SSL: (where=0x4008 ret=0x230)
  305. SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
  306. SSL: (where=0x1002 ret=0xffffffff)
  307. SSL: SSL_connect:error in SSLv3 read server certificate B
  308. OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
  309. SSL: 7 bytes pending from ssl_out
  310. SSL: Failed - tls_out available to report error
  311. SSL: 7 bytes left to be sent out (of total 7 bytes)
  312. EAP-TLS: TLS processing failed
  313. EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
  314. EAP: EAP entering state SEND_RESPONSE
  315. EAP: EAP entering state IDLE
  316. EAPOL: SUPP_BE entering state RESPONSE
  317. EAPOL: txSuppRsp
  318. TX EAPOL: dst=00:21:d8:c0:18:f1
  319. EAPOL: SUPP_BE entering state RECEIVE
  320. RX EAPOL from 00:21:d8:c0:18:f1
  321. EAPOL: Received EAP-Packet frame
  322. EAPOL: SUPP_BE entering state REQUEST
  323. EAPOL: getSuppRsp
  324. EAP: EAP entering state RECEIVED
  325. EAP: Received EAP-Failure
  326. EAP: EAP entering state FAILURE
  327. CTRL-EVENT-EAP-FAILURE EAP authentication failed
  328. EAPOL: SUPP_PAE entering state HELD
  329. EAPOL: SUPP_BE entering state RECEIVE
  330. EAPOL: SUPP_BE entering state FAIL
  331. EAPOL: SUPP_BE entering state IDLE
  332. EAPOL authentication completed unsuccessfully
  333. Setting authentication timeout: 2 sec 0 usec
  334. EAPOL: startWhen --> 0
  335. Authentication with 00:21:d8:c0:18:f1 timed out.
  336. Added BSSID 00:21:d8:c0:18:f1 into blacklist
  337. wpa_driver_wext_disassociate
  338. No keys have been configured - skip key clearing
  339. State: ASSOCIATED -> DISCONNECTED
  340. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  341. WEXT: Operstate: linkmode=-1, operstate=5
  342. EAPOL: External notification - portEnabled=0
  343. EAPOL: SUPP_PAE entering state DISCONNECTED
  344. EAPOL: SUPP_BE entering state INITIALIZE
  345. EAP: EAP entering state DISABLED
  346. EAPOL: External notification - portValid=0
  347. Setting scan request: 0 sec 0 usec
  348. State: DISCONNECTED -> SCANNING
  349. Starting AP scan (broadcast SSID)
  350. Scan requested (ret=0) - scan timeout 5 seconds
  351. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  352. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  353. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  354. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  355. Wireless event: cmd=0x8b15 len=24
  356. Wireless event: new AP: 00:00:00:00:00:00
  357. Added BSSID 00:00:00:00:00:00 into blacklist
  358. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  359. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  360. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  361. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  362. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  363. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  364. State: SCANNING -> DISCONNECTED
  365. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  366. WEXT: Operstate: linkmode=-1, operstate=5
  367. EAPOL: External notification - portEnabled=0
  368. EAPOL: External notification - portValid=0
  369. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  370. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  371. Wireless event: cmd=0x8b19 len=16
  372. Received 390 bytes of scan results (1 BSSes)
  373. New scan results available
  374. Selecting BSS from priority group 0
  375. Try to find WPA-enabled AP
  376. 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  377. selected based on RSN IE
  378. selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
  379. Trying to associate with 00:21:d8:c0:18:f1 (SSID='eduroam' freq=2412 MHz)
  380. Cancelling scan request
  381. WPA: clearing own WPA/RSN IE
  382. Automatic auth_alg selection: 0x1
  383. RSN: using IEEE 802.11i/D9.0
  384. WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  385. WPA: clearing AP WPA IE
  386. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  387. WPA: using GTK CCMP
  388. WPA: using PTK CCMP
  389. WPA: using KEY_MGMT 802.1X
  390. WPA: not using MGMT group cipher
  391. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  392. No keys have been configured - skip key clearing
  393. wpa_driver_wext_set_drop_unencrypted
  394. State: DISCONNECTED -> ASSOCIATING
  395. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  396. WEXT: Operstate: linkmode=-1, operstate=5
  397. wpa_driver_wext_associate
  398. wpa_driver_wext_set_psk
  399. Setting authentication timeout: 10 sec 0 usec
  400. EAPOL: External notification - EAP success=0
  401. EAPOL: External notification - EAP fail=0
  402. EAPOL: External notification - portControl=Auto
  403. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  404. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  405. Wireless event: cmd=0x8b19 len=16
  406. Received 390 bytes of scan results (1 BSSes)
  407. New scan results available
  408. Selecting BSS from priority group 0
  409. Try to find WPA-enabled AP
  410. 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  411. selected based on RSN IE
  412. selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
  413. Already associated with the selected AP.
  414. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  415. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  416. Wireless event: cmd=0x8b06 len=12
  417. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  418. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  419. Wireless event: cmd=0x8b04 len=16
  420. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  421. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  422. Wireless event: cmd=0x8b19 len=16
  423. Received 390 bytes of scan results (1 BSSes)
  424. New scan results available
  425. Selecting BSS from priority group 0
  426. Try to find WPA-enabled AP
  427. 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  428. selected based on RSN IE
  429. selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
  430. Already associated with the selected AP.
  431. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  432. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  433. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  434. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  435. Wireless event: cmd=0x8c08 len=50
  436. AssocResp IE wireless event - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  437. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  438. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  439. Wireless event: cmd=0x8b15 len=24
  440. Wireless event: new AP: 00:21:d8:c0:18:f1
  441. Association info event
  442. resp_ies - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  443. State: ASSOCIATING -> ASSOCIATED
  444. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  445. WEXT: Operstate: linkmode=-1, operstate=5
  446. Associated to a new BSS: BSSID=00:21:d8:c0:18:f1
  447. No keys have been configured - skip key clearing
  448. Associated with 00:21:d8:c0:18:f1
  449. WPA: Association event - clear replay counter
  450. WPA: Clear old PTK
  451. EAPOL: External notification - portEnabled=0
  452. EAPOL: External notification - portValid=0
  453. EAPOL: External notification - portEnabled=1
  454. EAPOL: SUPP_PAE entering state CONNECTING
  455. EAPOL: SUPP_BE entering state IDLE
  456. EAP: EAP entering state INITIALIZE
  457. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  458. ENGINE: engine deinit
  459. EAP: EAP entering state IDLE
  460. Setting authentication timeout: 10 sec 0 usec
  461. Cancelling scan request
  462. RX EAPOL from 00:21:d8:c0:18:f1
  463. Setting authentication timeout: 70 sec 0 usec
  464. EAPOL: Received EAP-Packet frame
  465. EAPOL: SUPP_PAE entering state RESTART
  466. EAP: EAP entering state INITIALIZE
  467. EAP: EAP entering state IDLE
  468. EAPOL: SUPP_PAE entering state AUTHENTICATING
  469. EAPOL: SUPP_BE entering state REQUEST
  470. EAPOL: getSuppRsp
  471. EAP: EAP entering state RECEIVED
  472. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  473. EAP: EAP entering state IDENTITY
  474. CTRL-EVENT-EAP-STARTED EAP authentication started
  475. EAP: EAP-Request Identity data - hexdump_ascii(len=43):
  476. 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
  477. 61 6d 2c 6e 61 73 69 64 3d 6f 6d 68 70 2d 77 31 am,nasid=omhp-w1
  478. 61 2c 70 6f 72 74 69 64 3d 32 39 a,portid=29
  479. EAP: using real identity - hexdump_ascii(len=26):
  480. 42 6f 75 64 65 77 69 6a 6e 2e 45 63 74 6f 72 40 Boudewijn.Ector@
  481. 73 75 72 66 6e 65 74 2e 6e 6c surfnet.nl
  482. EAP: EAP entering state SEND_RESPONSE
  483. EAP: EAP entering state IDLE
  484. EAPOL: SUPP_BE entering state RESPONSE
  485. EAPOL: txSuppRsp
  486. TX EAPOL: dst=00:21:d8:c0:18:f1
  487. EAPOL: SUPP_BE entering state RECEIVE
  488. RX EAPOL from 00:21:d8:c0:18:f1
  489. EAPOL: Received EAP-Packet frame
  490. EAPOL: SUPP_BE entering state REQUEST
  491. EAPOL: getSuppRsp
  492. EAP: EAP entering state RECEIVED
  493. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  494. EAP: EAP entering state GET_METHOD
  495. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  496. TLS: using phase1 config options
  497. TLS: Trusted root certificate(s) loaded
  498. OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
  499. OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
  500. OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib
  501. OpenSSL: SSL_use_certificate_file (PEM) --> OK
  502. OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094068:asn1 encoding routines:d2i_ASN1_SET:bad tag
  503. OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
  504. OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
  505. OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib
  506. OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib
  507. OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK
  508. SSL: Private key loaded successfully
  509. CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  510. EAP: EAP entering state METHOD
  511. SSL: Received packet(len=6) - Flags 0x20
  512. EAP-TLS: Start
  513. SSL: (where=0x10 ret=0x1)
  514. SSL: (where=0x1001 ret=0x1)
  515. SSL: SSL_connect:before/connect initialization
  516. SSL: (where=0x1001 ret=0x1)
  517. SSL: SSL_connect:SSLv3 write client hello A
  518. SSL: (where=0x1002 ret=0xffffffff)
  519. SSL: SSL_connect:error in SSLv3 read server hello A
  520. SSL: SSL_connect - want more data
  521. SSL: 93 bytes pending from ssl_out
  522. SSL: 93 bytes left to be sent out (of total 93 bytes)
  523. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  524. EAP: EAP entering state SEND_RESPONSE
  525. EAP: EAP entering state IDLE
  526. EAPOL: SUPP_BE entering state RESPONSE
  527. EAPOL: txSuppRsp
  528. TX EAPOL: dst=00:21:d8:c0:18:f1
  529. EAPOL: SUPP_BE entering state RECEIVE
  530. RX EAPOL from 00:21:d8:c0:18:f1
  531. EAPOL: Received EAP-Packet frame
  532. EAPOL: SUPP_BE entering state REQUEST
  533. EAPOL: getSuppRsp
  534. EAP: EAP entering state RECEIVED
  535. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  536. EAP: EAP entering state METHOD
  537. SSL: Received packet(len=778) - Flags 0xc0
  538. SSL: TLS Message Length: 4897
  539. SSL: Need 4129 bytes more input data
  540. SSL: Building ACK (type=13 id=3 ver=0)
  541. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  542. EAP: EAP entering state SEND_RESPONSE
  543. EAP: EAP entering state IDLE
  544. EAPOL: SUPP_BE entering state RESPONSE
  545. EAPOL: txSuppRsp
  546. TX EAPOL: dst=00:21:d8:c0:18:f1
  547. EAPOL: SUPP_BE entering state RECEIVE
  548. RX EAPOL from 00:21:d8:c0:18:f1
  549. EAPOL: Received EAP-Packet frame
  550. EAPOL: SUPP_BE entering state REQUEST
  551. EAPOL: getSuppRsp
  552. EAP: EAP entering state RECEIVED
  553. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  554. EAP: EAP entering state METHOD
  555. SSL: Received packet(len=774) - Flags 0x40
  556. SSL: Need 3361 bytes more input data
  557. SSL: Building ACK (type=13 id=4 ver=0)
  558. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  559. EAP: EAP entering state SEND_RESPONSE
  560. EAP: EAP entering state IDLE
  561. EAPOL: SUPP_BE entering state RESPONSE
  562. EAPOL: txSuppRsp
  563. TX EAPOL: dst=00:21:d8:c0:18:f1
  564. EAPOL: SUPP_BE entering state RECEIVE
  565. RX EAPOL from 00:21:d8:c0:18:f1
  566. EAPOL: Received EAP-Packet frame
  567. EAPOL: SUPP_BE entering state REQUEST
  568. EAPOL: getSuppRsp
  569. EAP: EAP entering state RECEIVED
  570. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  571. EAP: EAP entering state METHOD
  572. SSL: Received packet(len=774) - Flags 0x40
  573. SSL: Need 2593 bytes more input data
  574. SSL: Building ACK (type=13 id=5 ver=0)
  575. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  576. EAP: EAP entering state SEND_RESPONSE
  577. EAP: EAP entering state IDLE
  578. EAPOL: SUPP_BE entering state RESPONSE
  579. EAPOL: txSuppRsp
  580. TX EAPOL: dst=00:21:d8:c0:18:f1
  581. EAPOL: SUPP_BE entering state RECEIVE
  582. RX EAPOL from 00:21:d8:c0:18:f1
  583. EAPOL: Received EAP-Packet frame
  584. EAPOL: SUPP_BE entering state REQUEST
  585. EAPOL: getSuppRsp
  586. EAP: EAP entering state RECEIVED
  587. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  588. EAP: EAP entering state METHOD
  589. SSL: Received packet(len=774) - Flags 0x40
  590. SSL: Need 1825 bytes more input data
  591. SSL: Building ACK (type=13 id=6 ver=0)
  592. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  593. EAP: EAP entering state SEND_RESPONSE
  594. EAP: EAP entering state IDLE
  595. EAPOL: SUPP_BE entering state RESPONSE
  596. EAPOL: txSuppRsp
  597. TX EAPOL: dst=00:21:d8:c0:18:f1
  598. EAPOL: SUPP_BE entering state RECEIVE
  599. RX EAPOL from 00:21:d8:c0:18:f1
  600. EAPOL: Received EAP-Packet frame
  601. EAPOL: SUPP_BE entering state REQUEST
  602. EAPOL: getSuppRsp
  603. EAP: EAP entering state RECEIVED
  604. EAP: Received EAP-Request id=7 method=13 vendor=0 vendorMethod=0
  605. EAP: EAP entering state METHOD
  606. SSL: Received packet(len=774) - Flags 0x40
  607. SSL: Need 1057 bytes more input data
  608. SSL: Building ACK (type=13 id=7 ver=0)
  609. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  610. EAP: EAP entering state SEND_RESPONSE
  611. EAP: EAP entering state IDLE
  612. EAPOL: SUPP_BE entering state RESPONSE
  613. EAPOL: txSuppRsp
  614. TX EAPOL: dst=00:21:d8:c0:18:f1
  615. EAPOL: SUPP_BE entering state RECEIVE
  616. RX EAPOL from 00:21:d8:c0:18:f1
  617. EAPOL: Received EAP-Packet frame
  618. EAPOL: SUPP_BE entering state REQUEST
  619. EAPOL: getSuppRsp
  620. EAP: EAP entering state RECEIVED
  621. EAP: Received EAP-Request id=8 method=13 vendor=0 vendorMethod=0
  622. EAP: EAP entering state METHOD
  623. SSL: Received packet(len=774) - Flags 0x40
  624. SSL: Need 289 bytes more input data
  625. SSL: Building ACK (type=13 id=8 ver=0)
  626. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  627. EAP: EAP entering state SEND_RESPONSE
  628. EAP: EAP entering state IDLE
  629. EAPOL: SUPP_BE entering state RESPONSE
  630. EAPOL: txSuppRsp
  631. TX EAPOL: dst=00:21:d8:c0:18:f1
  632. EAPOL: SUPP_BE entering state RECEIVE
  633. RX EAPOL from 00:21:d8:c0:18:f1
  634. EAPOL: Received EAP-Packet frame
  635. EAPOL: SUPP_BE entering state REQUEST
  636. EAPOL: getSuppRsp
  637. EAP: EAP entering state RECEIVED
  638. EAP: Received EAP-Request id=9 method=13 vendor=0 vendorMethod=0
  639. EAP: EAP entering state METHOD
  640. SSL: Received packet(len=295) - Flags 0x00
  641. SSL: (where=0x1001 ret=0x1)
  642. SSL: SSL_connect:SSLv3 read server hello A
  643. TLS: Certificate verification failed, error 19 (self signed certificate in certificate chain) depth 3 for '/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root'
  644. SSL: (where=0x4008 ret=0x230)
  645. SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
  646. SSL: (where=0x1002 ret=0xffffffff)
  647. SSL: SSL_connect:error in SSLv3 read server certificate B
  648. OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
  649. SSL: 7 bytes pending from ssl_out
  650. SSL: Failed - tls_out available to report error
  651. SSL: 7 bytes left to be sent out (of total 7 bytes)
  652. EAP-TLS: TLS processing failed
  653. EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
  654. EAP: EAP entering state SEND_RESPONSE
  655. EAP: EAP entering state IDLE
  656. EAPOL: SUPP_BE entering state RESPONSE
  657. EAPOL: txSuppRsp
  658. TX EAPOL: dst=00:21:d8:c0:18:f1
  659. EAPOL: SUPP_BE entering state RECEIVE
  660. RX EAPOL from 00:21:d8:c0:18:f1
  661. EAPOL: Received EAP-Packet frame
  662. EAPOL: SUPP_BE entering state REQUEST
  663. EAPOL: getSuppRsp
  664. EAP: EAP entering state RECEIVED
  665. EAP: Received EAP-Failure
  666. EAP: EAP entering state FAILURE
  667. CTRL-EVENT-EAP-FAILURE EAP authentication failed
  668. EAPOL: SUPP_PAE entering state HELD
  669. EAPOL: SUPP_BE entering state RECEIVE
  670. EAPOL: SUPP_BE entering state FAIL
  671. EAPOL: SUPP_BE entering state IDLE
  672. EAPOL authentication completed unsuccessfully
  673. Setting authentication timeout: 2 sec 0 usec
  674. EAPOL: startWhen --> 0
  675. CTRL-EVENT-TERMINATING - signal 2 received
  676. Removing interface wlan0
  677. State: ASSOCIATED -> DISCONNECTED
  678. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  679. WEXT: Operstate: linkmode=-1, operstate=5
  680. wpa_driver_wext_deauthenticate
  681. No keys have been configured - skip key clearing
  682. EAPOL: External notification - portEnabled=0
  683. EAPOL: SUPP_PAE entering state DISCONNECTED
  684. EAPOL: SUPP_BE entering state INITIALIZE
  685. EAP: EAP entering state DISABLED
  686. EAPOL: External notification - portValid=0
  687. wpa_driver_wext_set_wpa
  688. wpa_driver_wext_set_drop_unencrypted
  689. wpa_driver_wext_set_countermeasures
  690. No keys have been configured - skip key clearing
  691. EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit
  692. ENGINE: engine deinit
  693. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  694. Removed BSSID 00:21:d8:c0:18:f1 from blacklist (clear)
  695. Cancelling scan request
  696. Cancelling authentication timeout
  697. WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment