Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Initializing interface 'wlan0' conf './wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file './wpa_supplicant.conf' -> '/home/boudewijn/bin/./wpa_supplicant.conf'
- Reading configuration file '/home/boudewijn/bin/./wpa_supplicant.conf'
- ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=root'
- Priority group 0
- id=0 ssid='eduroam'
- Interface wlan0 set UP - waiting a second for the driver to complete initialization
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0xf flags 0x0
- WEXT: Operstate: linkmode=1, operstate=5
- Own MAC address: 00:16:ea:e5:a5:fc
- wpa_driver_wext_set_wpa
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- wpa_driver_wext_set_drop_unencrypted
- RSN: flushing PMKID list in the driver
- Setting scan request: 0 sec 100000 usec
- WPS: UUID based on MAC address - hexdump(len=16): 74 f1 b5 3b 43 78 57 35 b5 c2 e1 4d 77 51 a1 dc
- WPS: Build Beacon and Probe Response IEs
- WPS: * Version
- WPS: * Wi-Fi Protected Setup State (0)
- WPS: * Version
- WPS: * Wi-Fi Protected Setup State (0)
- WPS: * Response Type (2)
- WPS: * UUID-E
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Serial Number
- WPS: * Primary Device Type
- WPS: * Device Name
- WPS: * Config Methods (0)
- WPS: * RF Bands (3)
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- ctrl_interface_group=0 (from group name 'root')
- Added interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b06 len=12
- State: DISCONNECTED -> SCANNING
- Starting AP scan (specific SSID)
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- Trying to get current scan results first without requesting a new scan to speed up initial association
- Received 389 bytes of scan results (1 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- selected based on RSN IE
- selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
- Trying to associate with 00:21:d8:c0:18:f1 (SSID='eduroam' freq=2412 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- WPA: using GTK CCMP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT 802.1X
- WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8c08 len=50
- AssocResp IE wireless event - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:21:d8:c0:18:f1
- Association info event
- resp_ies - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:21:d8:c0:18:f1
- No keys have been configured - skip key clearing
- Associated with 00:21:d8:c0:18:f1
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RX EAPOL from 00:21:d8:c0:18:f1
- Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=43):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
- 61 6d 2c 6e 61 73 69 64 3d 6f 6d 68 70 2d 77 31 am,nasid=omhp-w1
- 61 2c 70 6f 72 74 69 64 3d 32 39 a,portid=29
- EAP: using real identity - hexdump_ascii(len=26):
- 42 6f 75 64 65 77 69 6a 6e 2e 45 63 74 6f 72 40 Boudewijn.Ector@
- 73 75 72 66 6e 65 74 2e 6e 6c surfnet.nl
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
- OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
- OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib
- OpenSSL: SSL_use_certificate_file (PEM) --> OK
- OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094068:asn1 encoding routines:d2i_ASN1_SET:bad tag
- OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
- OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
- OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib
- OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib
- OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK
- SSL: Private key loaded successfully
- CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 93 bytes pending from ssl_out
- SSL: 93 bytes left to be sent out (of total 93 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=778) - Flags 0xc0
- SSL: TLS Message Length: 4897
- SSL: Need 4129 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 3361 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 2593 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 1825 bytes more input data
- SSL: Building ACK (type=13 id=6 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 1057 bytes more input data
- SSL: Building ACK (type=13 id=7 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 289 bytes more input data
- SSL: Building ACK (type=13 id=8 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=9 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=295) - Flags 0x00
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server hello A
- TLS: Certificate verification failed, error 19 (self signed certificate in certificate chain) depth 3 for '/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root'
- SSL: (where=0x4008 ret=0x230)
- SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server certificate B
- OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
- SSL: 7 bytes pending from ssl_out
- SSL: Failed - tls_out available to report error
- SSL: 7 bytes left to be sent out (of total 7 bytes)
- EAP-TLS: TLS processing failed
- EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- Setting authentication timeout: 2 sec 0 usec
- EAPOL: startWhen --> 0
- Authentication with 00:21:d8:c0:18:f1 timed out.
- Added BSSID 00:21:d8:c0:18:f1 into blacklist
- wpa_driver_wext_disassociate
- No keys have been configured - skip key clearing
- State: ASSOCIATED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: SCANNING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b19 len=16
- Received 390 bytes of scan results (1 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- selected based on RSN IE
- selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
- Trying to associate with 00:21:d8:c0:18:f1 (SSID='eduroam' freq=2412 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- WPA: using GTK CCMP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT 802.1X
- WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: DISCONNECTED -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b19 len=16
- Received 390 bytes of scan results (1 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- selected based on RSN IE
- selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
- Already associated with the selected AP.
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b19 len=16
- Received 390 bytes of scan results (1 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:21:d8:c0:18:f1 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- selected based on RSN IE
- selected WPA AP 00:21:d8:c0:18:f1 ssid='eduroam'
- Already associated with the selected AP.
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8c08 len=50
- AssocResp IE wireless event - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:21:d8:c0:18:f1
- Association info event
- resp_ies - hexdump(len=34): 01 06 98 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:21:d8:c0:18:f1
- No keys have been configured - skip key clearing
- Associated with 00:21:d8:c0:18:f1
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- ENGINE: engine deinit
- EAP: EAP entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RX EAPOL from 00:21:d8:c0:18:f1
- Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=43):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
- 61 6d 2c 6e 61 73 69 64 3d 6f 6d 68 70 2d 77 31 am,nasid=omhp-w1
- 61 2c 70 6f 72 74 69 64 3d 32 39 a,portid=29
- EAP: using real identity - hexdump_ascii(len=26):
- 42 6f 75 64 65 77 69 6a 6e 2e 45 63 74 6f 72 40 Boudewijn.Ector@
- 73 75 72 66 6e 65 74 2e 6e 6c surfnet.nl
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
- OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
- OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib
- OpenSSL: SSL_use_certificate_file (PEM) --> OK
- OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094068:asn1 encoding routines:d2i_ASN1_SET:bad tag
- OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
- OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error
- OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib
- OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib
- OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK
- SSL: Private key loaded successfully
- CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 93 bytes pending from ssl_out
- SSL: 93 bytes left to be sent out (of total 93 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=778) - Flags 0xc0
- SSL: TLS Message Length: 4897
- SSL: Need 4129 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 3361 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 2593 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 1825 bytes more input data
- SSL: Building ACK (type=13 id=6 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 1057 bytes more input data
- SSL: Building ACK (type=13 id=7 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=774) - Flags 0x40
- SSL: Need 289 bytes more input data
- SSL: Building ACK (type=13 id=8 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=9 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=295) - Flags 0x00
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server hello A
- TLS: Certificate verification failed, error 19 (self signed certificate in certificate chain) depth 3 for '/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root'
- SSL: (where=0x4008 ret=0x230)
- SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server certificate B
- OpenSSL: tls_connection_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
- SSL: 7 bytes pending from ssl_out
- SSL: Failed - tls_out available to report error
- SSL: 7 bytes left to be sent out (of total 7 bytes)
- EAP-TLS: TLS processing failed
- EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:21:d8:c0:18:f1
- EAPOL: SUPP_BE entering state RECEIVE
- RX EAPOL from 00:21:d8:c0:18:f1
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- Setting authentication timeout: 2 sec 0 usec
- EAPOL: startWhen --> 0
- CTRL-EVENT-TERMINATING - signal 2 received
- Removing interface wlan0
- State: ASSOCIATED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_deauthenticate
- No keys have been configured - skip key clearing
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- wpa_driver_wext_set_wpa
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_countermeasures
- No keys have been configured - skip key clearing
- EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit
- ENGINE: engine deinit
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 00:21:d8:c0:18:f1 from blacklist (clear)
- Cancelling scan request
- Cancelling authentication timeout
- WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment