Guest User

hostapd log

a guest
May 8th, 2015
260
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.18 KB | None | 0 0
  1. 1431101834.596845: Configuration file: hostapd.conf
  2. 1431101834.596913: Line 10: DEPRECATED: 'debug' configuration variable is not used anymore
  3. 1431101834.626788: ctrl_interface_group=0
  4. 1431101834.627088: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
  5. 1431101834.627098: Completing interface initialization
  6. 1431101834.627101: Flushing old station entries
  7. 1431101834.627109: Deauthenticate all stations
  8. 1431101834.627113: bsd_set_privacy: enabled=0
  9. 1431101834.627117: bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  10. 1431101834.627120: bsd_del_key: key_idx=0
  11. 1431101834.627124: bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  12. 1431101834.627127: bsd_del_key: key_idx=1
  13. 1431101834.627130: bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  14. 1431101834.627133: bsd_del_key: key_idx=2
  15. 1431101834.627136: bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  16. 1431101834.627139: bsd_del_key: key_idx=3
  17. 1431101834.627143: Using interface wlan0 with hwaddr 00:0e:2e:c4:2f:e7 and ssid 'RADIUS'
  18. 1431101834.627155: wlan0: RADIUS Authentication server 10.146.20.137:1812
  19. 1431101834.627257: RADIUS local address: 10.146.103.7:14137
  20. 1431101834.627270: wlan0: RADIUS Accounting server 10.146.20.137:1813
  21. 1431101834.627288: RADIUS local address: 10.146.103.7:14773
  22. 1431101834.627294: bsd_set_ieee8021x: enabled=1
  23. 1431101834.627296: bsd_configure_wpa: enable WPA= 0x1
  24. 1431101834.627514: WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
  25. 1431101834.627527: GMK - hexdump(len=32): [REMOVED]
  26. 1431101834.627530: GTK - hexdump(len=32): [REMOVED]
  27. 1431101834.627532: WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
  28. 1431101834.627535: bsd_set_key: alg=2 addr=0x0 key_idx=1 set_tx=1 seq_len=0 key_len=32
  29. 1431101834.632173: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not configured
  30. 1431101834.632194: bsd_set_privacy: enabled=1
  31. 1431101834.632200: bsd_set_opt_ie: set WPA+RSN ie (len 24)
  32. 1431101834.632229: wlan0: RADIUS Sending RADIUS message to accounting server
  33. 1431101834.632259: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  34.  
  35. 1431101834.702842: wlan0: Setup of interface done.
  36. 1431101834.702886: Discard routing message to if#0 (not for us 8)
  37.  
  38. 1431101834.702897: wlan0: RADIUS Received 20 bytes from RADIUS server
  39. 1431101834.702914: wlan0: RADIUS Received RADIUS message
  40. 1431101834.702925: wlan0: STA 00:00:00:00:00:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.07 sec
  41. 1431101867.876189: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: associated
  42. 1431101867.876215: STA included WPA IE in (Re)AssocReq
  43. 1431101867.876220: New STA
  44. 1431101867.876230: wlan0: STA 00:24:d7:6f:eb:c4 WPA: event 1 notification
  45. 1431101867.876243: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  46. 1431101867.876248: bsd_del_key: addr=00:24:d7:6f:eb:c4
  47. 1431101867.876258: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: start authentication
  48. 1431101867.876270: EAP: Server state machine created
  49. 1431101867.876275: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state IDLE
  50. 1431101867.876279: IEEE 802.1X: 00:24:d7:6f:eb:c4 CTRL_DIR entering state FORCE_BOTH
  51. 1431101867.876291: wlan0: STA 00:24:d7:6f:eb:c4 WPA: start authentication
  52. 1431101867.876302: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITIALIZE
  53. 1431101867.876307: bsd_set_key: alg=0 addr=0x8014908d0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  54. 1431101867.876310: bsd_del_key: addr=00:24:d7:6f:eb:c4
  55. 1431101867.876316: WPA: 00:24:d7:6f:eb:c4 WPA_PTK_GROUP entering state IDLE
  56. 1431101867.876319: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state AUTHENTICATION
  57. 1431101867.876322: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state AUTHENTICATION2
  58. 1431101867.876329: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state DISCONNECTED
  59. 1431101867.876337: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: unauthorizing port
  60. 1431101867.876348: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state RESTART
  61. 1431101867.876354: EAP: EAP entering state INITIALIZE
  62. 1431101867.876358: CTRL-EVENT-EAP-STARTED 00:24:d7:6f:eb:c4
  63. 1431101867.876360: EAP: EAP entering state SELECT_ACTION
  64. 1431101867.876362: EAP: getDecision: no identity known yet -> CONTINUE
  65. 1431101867.876364: EAP: EAP entering state PROPOSE_METHOD
  66. 1431101867.876366: EAP: getNextMethod: vendor 0 type 1
  67. 1431101867.876369: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
  68. 1431101867.876371: EAP: EAP entering state METHOD_REQUEST
  69. 1431101867.876374: EAP: building EAP-Request: Identifier 77
  70. 1431101867.876377: EAP: EAP entering state SEND_REQUEST
  71. 1431101867.876379: EAP: EAP entering state IDLE
  72. 1431101867.876381: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  73. 1431101867.876383: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state CONNECTING
  74. 1431101867.876386: IEEE 802.1X: 00:24:d7:6f:eb:c4 AUTH_PAE entering state AUTHENTICATING
  75. 1431101867.876389: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  76. 1431101867.876394: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 77)
  77. 1431101867.880287: IEEE 802.1X: 14 bytes from 00:24:d7:6f:eb:c4
  78. 1431101867.880294: IEEE 802.1X: version=1 type=0 length=10
  79. 1431101867.880298: EAP: code=2 identifier=77 length=10
  80. 1431101867.880300: (response)
  81. 1431101867.880305: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=77 len=10) from STA: EAP Response-Identity (1)
  82. 1431101867.880322: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  83. 1431101867.880326: EAP: EAP entering state RECEIVED
  84. 1431101867.880328: EAP: parseEapResp: rxResp=1 respId=77 respMethod=1 respVendor=0 respVendorMethod=0
  85. 1431101867.880331: EAP: EAP entering state INTEGRITY_CHECK
  86. 1431101867.880333: EAP: EAP entering state METHOD_RESPONSE
  87. 1431101867.880335: EAP-Identity: Peer identity - hexdump_ascii(len=5):
  88. 7a 65 6e 6f 6e zenon
  89. 1431101867.880341: EAP: EAP entering state SELECT_ACTION
  90. 1431101867.880343: EAP: getDecision: -> PASSTHROUGH
  91. 1431101867.880345: EAP: EAP entering state INITIALIZE_PASSTHROUGH
  92. 1431101867.880347: EAP: EAP entering state AAA_REQUEST
  93. 1431101867.880348: EAP: EAP entering state AAA_IDLE
  94. 1431101867.880353: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: STA identity 'zenon'
  95. 1431101867.880363: Encapsulating EAP message into a RADIUS packet
  96. 1431101867.880379: wlan0: RADIUS Sending RADIUS message to authentication server
  97. 1431101867.880399: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  98.  
  99. 1431101867.882189: wlan0: RADIUS Received 64 bytes from RADIUS server
  100. 1431101867.882237: wlan0: RADIUS Received RADIUS message
  101. 1431101867.882254: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  102. 1431101867.882272: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  103. 1431101867.882284: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=78 len=6) from RADIUS server: EAP-Request-PEAP (25)
  104. 1431101867.882305: EAP: EAP entering state AAA_RESPONSE
  105. 1431101867.882308: EAP: getId: id=78
  106. 1431101867.882311: EAP: EAP entering state SEND_REQUEST2
  107. 1431101867.882313: EAP: EAP entering state IDLE2
  108. 1431101867.882314: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  109. 1431101867.882317: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  110. 1431101867.882322: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 78)
  111. 1431101867.883893: IEEE 802.1X: 122 bytes from 00:24:d7:6f:eb:c4
  112. 1431101867.883907: IEEE 802.1X: version=1 type=0 length=118
  113. 1431101867.883923: EAP: code=2 identifier=78 length=118
  114. 1431101867.883925: (response)
  115. 1431101867.883930: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=78 len=118) from STA: EAP Response-PEAP (25)
  116. 1431101867.883947: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  117. 1431101867.883952: EAP: EAP entering state RECEIVED2
  118. 1431101867.883954: EAP: parseEapResp: rxResp=1 respId=78 respMethod=25 respVendor=0 respVendorMethod=0
  119. 1431101867.883956: EAP: EAP entering state AAA_REQUEST
  120. 1431101867.883959: EAP: EAP entering state AAA_IDLE
  121. 1431101867.883961: Encapsulating EAP message into a RADIUS packet
  122. 1431101867.883969: Copied RADIUS State Attribute
  123. 1431101867.883975: wlan0: RADIUS Sending RADIUS message to authentication server
  124. 1431101867.883995: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  125.  
  126. 1431101867.890371: wlan0: RADIUS Received 1068 bytes from RADIUS server
  127. 1431101867.890413: wlan0: RADIUS Received RADIUS message
  128. 1431101867.890427: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  129. 1431101867.890450: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  130. 1431101867.890461: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=79 len=1004) from RADIUS server: EAP-Request-PEAP (25)
  131. 1431101867.890483: EAP: EAP entering state AAA_RESPONSE
  132. 1431101867.890486: EAP: getId: id=79
  133. 1431101867.890489: EAP: EAP entering state SEND_REQUEST2
  134. 1431101867.890491: EAP: EAP entering state IDLE2
  135. 1431101867.890493: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  136. 1431101867.890495: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  137. 1431101867.890500: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 79)
  138. 1431101867.892393: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4
  139. 1431101867.892408: IEEE 802.1X: version=1 type=0 length=6
  140. 1431101867.892423: EAP: code=2 identifier=79 length=6
  141. 1431101867.892426: (response)
  142. 1431101867.892430: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=79 len=6) from STA: EAP Response-PEAP (25)
  143. 1431101867.892450: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  144. 1431101867.892454: EAP: EAP entering state RECEIVED2
  145. 1431101867.892456: EAP: parseEapResp: rxResp=1 respId=79 respMethod=25 respVendor=0 respVendorMethod=0
  146. 1431101867.892459: EAP: EAP entering state AAA_REQUEST
  147. 1431101867.892461: EAP: EAP entering state AAA_IDLE
  148. 1431101867.892463: Encapsulating EAP message into a RADIUS packet
  149. 1431101867.892471: Copied RADIUS State Attribute
  150. 1431101867.892477: wlan0: RADIUS Sending RADIUS message to authentication server
  151. 1431101867.892496: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  152.  
  153. 1431101867.893138: wlan0: RADIUS Received 1064 bytes from RADIUS server
  154. 1431101867.893185: wlan0: RADIUS Received RADIUS message
  155. 1431101867.893204: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  156. 1431101867.893222: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  157. 1431101867.893229: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=80 len=1000) from RADIUS server: EAP-Request-PEAP (25)
  158. 1431101867.893245: EAP: EAP entering state AAA_RESPONSE
  159. 1431101867.893249: EAP: getId: id=80
  160. 1431101867.893251: EAP: EAP entering state SEND_REQUEST2
  161. 1431101867.893253: EAP: EAP entering state IDLE2
  162. 1431101867.893255: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  163. 1431101867.893257: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  164. 1431101867.893262: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 80)
  165. 1431101867.894019: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4
  166. 1431101867.894043: IEEE 802.1X: version=1 type=0 length=6
  167. 1431101867.894047: EAP: code=2 identifier=80 length=6
  168. 1431101867.894049: (response)
  169. 1431101867.894054: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=80 len=6) from STA: EAP Response-PEAP (25)
  170. 1431101867.894074: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  171. 1431101867.894078: EAP: EAP entering state RECEIVED2
  172. 1431101867.894080: EAP: parseEapResp: rxResp=1 respId=80 respMethod=25 respVendor=0 respVendorMethod=0
  173. 1431101867.894083: EAP: EAP entering state AAA_REQUEST
  174. 1431101867.894085: EAP: EAP entering state AAA_IDLE
  175. 1431101867.894087: Encapsulating EAP message into a RADIUS packet
  176. 1431101867.894095: Copied RADIUS State Attribute
  177. 1431101867.894101: wlan0: RADIUS Sending RADIUS message to authentication server
  178. 1431101867.894121: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  179.  
  180. 1431101867.894735: wlan0: RADIUS Received 968 bytes from RADIUS server
  181. 1431101867.894777: wlan0: RADIUS Received RADIUS message
  182. 1431101867.894792: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  183. 1431101867.894814: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  184. 1431101867.894828: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=81 len=904) from RADIUS server: EAP-Request-PEAP (25)
  185. 1431101867.894847: EAP: EAP entering state AAA_RESPONSE
  186. 1431101867.894851: EAP: getId: id=81
  187. 1431101867.894853: EAP: EAP entering state SEND_REQUEST2
  188. 1431101867.894855: EAP: EAP entering state IDLE2
  189. 1431101867.894857: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  190. 1431101867.894859: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  191. 1431101867.894864: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 81)
  192. 1431101867.902143: IEEE 802.1X: 212 bytes from 00:24:d7:6f:eb:c4
  193. 1431101867.902157: IEEE 802.1X: version=1 type=0 length=208
  194. 1431101867.902173: EAP: code=2 identifier=81 length=208
  195. 1431101867.902175: (response)
  196. 1431101867.902180: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=81 len=208) from STA: EAP Response-PEAP (25)
  197. 1431101867.902198: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  198. 1431101867.902203: EAP: EAP entering state RECEIVED2
  199. 1431101867.902205: EAP: parseEapResp: rxResp=1 respId=81 respMethod=25 respVendor=0 respVendorMethod=0
  200. 1431101867.902207: EAP: EAP entering state AAA_REQUEST
  201. 1431101867.902209: EAP: EAP entering state AAA_IDLE
  202. 1431101867.902211: Encapsulating EAP message into a RADIUS packet
  203. 1431101867.902219: Copied RADIUS State Attribute
  204. 1431101867.902225: wlan0: RADIUS Sending RADIUS message to authentication server
  205. 1431101867.902244: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  206.  
  207. 1431101867.905030: wlan0: RADIUS Received 123 bytes from RADIUS server
  208. 1431101867.905067: wlan0: RADIUS Received RADIUS message
  209. 1431101867.905078: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  210. 1431101867.905090: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  211. 1431101867.905097: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=82 len=65) from RADIUS server: EAP-Request-PEAP (25)
  212. 1431101867.905114: EAP: EAP entering state AAA_RESPONSE
  213. 1431101867.905118: EAP: getId: id=82
  214. 1431101867.905120: EAP: EAP entering state SEND_REQUEST2
  215. 1431101867.905122: EAP: EAP entering state IDLE2
  216. 1431101867.905124: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  217. 1431101867.905126: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  218. 1431101867.905131: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 82)
  219. 1431101867.905787: IEEE 802.1X: 10 bytes from 00:24:d7:6f:eb:c4
  220. 1431101867.905794: IEEE 802.1X: version=1 type=0 length=6
  221. 1431101867.905797: EAP: code=2 identifier=82 length=6
  222. 1431101867.905799: (response)
  223. 1431101867.905804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=82 len=6) from STA: EAP Response-PEAP (25)
  224. 1431101867.905822: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  225. 1431101867.905826: EAP: EAP entering state RECEIVED2
  226. 1431101867.905828: EAP: parseEapResp: rxResp=1 respId=82 respMethod=25 respVendor=0 respVendorMethod=0
  227. 1431101867.905831: EAP: EAP entering state AAA_REQUEST
  228. 1431101867.905833: EAP: EAP entering state AAA_IDLE
  229. 1431101867.905835: Encapsulating EAP message into a RADIUS packet
  230. 1431101867.905843: Copied RADIUS State Attribute
  231. 1431101867.905848: wlan0: RADIUS Sending RADIUS message to authentication server
  232. 1431101867.905867: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  233.  
  234. 1431101867.906465: wlan0: RADIUS Received 101 bytes from RADIUS server
  235. 1431101867.906501: wlan0: RADIUS Received RADIUS message
  236. 1431101867.906512: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  237. 1431101867.906523: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  238. 1431101867.906529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=83 len=43) from RADIUS server: EAP-Request-PEAP (25)
  239. 1431101867.906541: EAP: EAP entering state AAA_RESPONSE
  240. 1431101867.906544: EAP: getId: id=83
  241. 1431101867.906546: EAP: EAP entering state SEND_REQUEST2
  242. 1431101867.906548: EAP: EAP entering state IDLE2
  243. 1431101867.906550: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  244. 1431101867.906552: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  245. 1431101867.906556: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 83)
  246. 1431101867.907142: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4
  247. 1431101867.907155: IEEE 802.1X: version=1 type=0 length=80
  248. 1431101867.907172: EAP: code=2 identifier=83 length=80
  249. 1431101867.907174: (response)
  250. 1431101867.907179: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=83 len=80) from STA: EAP Response-PEAP (25)
  251. 1431101867.907196: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  252. 1431101867.907200: EAP: EAP entering state RECEIVED2
  253. 1431101867.907202: EAP: parseEapResp: rxResp=1 respId=83 respMethod=25 respVendor=0 respVendorMethod=0
  254. 1431101867.907204: EAP: EAP entering state AAA_REQUEST
  255. 1431101867.907206: EAP: EAP entering state AAA_IDLE
  256. 1431101867.907208: Encapsulating EAP message into a RADIUS packet
  257. 1431101867.907216: Copied RADIUS State Attribute
  258. 1431101867.907221: wlan0: RADIUS Sending RADIUS message to authentication server
  259. 1431101867.907240: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  260.  
  261. 1431101867.907972: wlan0: RADIUS Received 133 bytes from RADIUS server
  262. 1431101867.908012: wlan0: RADIUS Received RADIUS message
  263. 1431101867.908027: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  264. 1431101867.908046: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  265. 1431101867.908057: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=84 len=75) from RADIUS server: EAP-Request-PEAP (25)
  266. 1431101867.908077: EAP: EAP entering state AAA_RESPONSE
  267. 1431101867.908080: EAP: getId: id=84
  268. 1431101867.908082: EAP: EAP entering state SEND_REQUEST2
  269. 1431101867.908085: EAP: EAP entering state IDLE2
  270. 1431101867.908086: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  271. 1431101867.908089: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  272. 1431101867.908094: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 84)
  273. 1431101867.909646: IEEE 802.1X: 148 bytes from 00:24:d7:6f:eb:c4
  274. 1431101867.909670: IEEE 802.1X: version=1 type=0 length=144
  275. 1431101867.909674: EAP: code=2 identifier=84 length=144
  276. 1431101867.909677: (response)
  277. 1431101867.909684: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=84 len=144) from STA: EAP Response-PEAP (25)
  278. 1431101867.909709: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  279. 1431101867.909716: EAP: EAP entering state RECEIVED2
  280. 1431101867.909719: EAP: parseEapResp: rxResp=1 respId=84 respMethod=25 respVendor=0 respVendorMethod=0
  281. 1431101867.909724: EAP: EAP entering state AAA_REQUEST
  282. 1431101867.909728: EAP: EAP entering state AAA_IDLE
  283. 1431101867.909732: Encapsulating EAP message into a RADIUS packet
  284. 1431101867.909743: Copied RADIUS State Attribute
  285. 1431101867.909753: wlan0: RADIUS Sending RADIUS message to authentication server
  286. 1431101867.909781: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  287.  
  288. 1431101867.920871: wlan0: RADIUS Received 149 bytes from RADIUS server
  289. 1431101867.920907: wlan0: RADIUS Received RADIUS message
  290. 1431101867.920923: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.01 sec
  291. 1431101867.920942: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  292. 1431101867.920952: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=85 len=91) from RADIUS server: EAP-Request-PEAP (25)
  293. 1431101867.920972: EAP: EAP entering state AAA_RESPONSE
  294. 1431101867.920976: EAP: getId: id=85
  295. 1431101867.920977: EAP: EAP entering state SEND_REQUEST2
  296. 1431101867.920979: EAP: EAP entering state IDLE2
  297. 1431101867.920981: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  298. 1431101867.920984: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  299. 1431101867.920988: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 85)
  300. 1431101867.922767: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4
  301. 1431101867.922782: IEEE 802.1X: version=1 type=0 length=80
  302. 1431101867.922798: EAP: code=2 identifier=85 length=80
  303. 1431101867.922800: (response)
  304. 1431101867.922804: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=85 len=80) from STA: EAP Response-PEAP (25)
  305. 1431101867.922823: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  306. 1431101867.922827: EAP: EAP entering state RECEIVED2
  307. 1431101867.922829: EAP: parseEapResp: rxResp=1 respId=85 respMethod=25 respVendor=0 respVendorMethod=0
  308. 1431101867.922832: EAP: EAP entering state AAA_REQUEST
  309. 1431101867.922834: EAP: EAP entering state AAA_IDLE
  310. 1431101867.922837: Encapsulating EAP message into a RADIUS packet
  311. 1431101867.922844: Copied RADIUS State Attribute
  312. 1431101867.922850: wlan0: RADIUS Sending RADIUS message to authentication server
  313. 1431101867.922869: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  314.  
  315. 1431101867.962095: wlan0: RADIUS Received 101 bytes from RADIUS server
  316. 1431101867.962130: wlan0: RADIUS Received RADIUS message
  317. 1431101867.962140: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.03 sec
  318. 1431101867.962152: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  319. 1431101867.962158: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=1 id=86 len=43) from RADIUS server: EAP-Request-PEAP (25)
  320. 1431101867.962171: EAP: EAP entering state AAA_RESPONSE
  321. 1431101867.962174: EAP: getId: id=86
  322. 1431101867.962176: EAP: EAP entering state SEND_REQUEST2
  323. 1431101867.962178: EAP: EAP entering state IDLE2
  324. 1431101867.962179: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  325. 1431101867.962182: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state REQUEST
  326. 1431101867.962186: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 86)
  327. 1431101867.970388: IEEE 802.1X: 84 bytes from 00:24:d7:6f:eb:c4
  328. 1431101867.970403: IEEE 802.1X: version=1 type=0 length=80
  329. 1431101867.970419: EAP: code=2 identifier=86 length=80
  330. 1431101867.970421: (response)
  331. 1431101867.970426: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: received EAP packet (code=2 id=86 len=80) from STA: EAP Response-PEAP (25)
  332. 1431101867.970446: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state RESPONSE
  333. 1431101867.970450: EAP: EAP entering state RECEIVED2
  334. 1431101867.970452: EAP: parseEapResp: rxResp=1 respId=86 respMethod=25 respVendor=0 respVendorMethod=0
  335. 1431101867.970455: EAP: EAP entering state AAA_REQUEST
  336. 1431101867.970457: EAP: EAP entering state AAA_IDLE
  337. 1431101867.970459: Encapsulating EAP message into a RADIUS packet
  338. 1431101867.970467: Copied RADIUS State Attribute
  339. 1431101867.970473: wlan0: RADIUS Sending RADIUS message to authentication server
  340. 1431101867.970492: wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  341.  
  342. 1431101867.971435: wlan0: RADIUS Received 167 bytes from RADIUS server
  343. 1431101867.971473: wlan0: RADIUS Received RADIUS message
  344. 1431101867.971489: wlan0: STA 00:24:d7:6f:eb:c4 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  345. 1431101867.971507: RADIUS packet matching with station 00:24:d7:6f:eb:c4
  346. 1431101867.971520: MS-MPPE-Send-Key - hexdump(len=32): [REMOVED]
  347. 1431101867.971524: MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED]
  348. 1431101867.971529: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: old identity 'zenon' updated with User-Name from Access-Accept 'zenon'
  349. 1431101867.971545: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: decapsulated EAP packet (code=3 id=86 len=4) from RADIUS server: EAP Success
  350. 1431101867.971558: EAP: EAP entering state SUCCESS2
  351. 1431101867.971561: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state SUCCESS
  352. 1431101867.971566: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.1X: Sending EAP Packet (identifier 86)
  353. 1431101867.971586: IEEE 802.1X: 00:24:d7:6f:eb:c4 BE_AUTH entering state IDLE
  354. 1431101867.971597: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state INITPMK
  355. 1431101867.971600: WPA: PMK from EAPOL state machine (len=64)
  356. 1431101867.971603: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKSTART
  357. 1431101867.971607: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 1/4 msg of 4-Way Handshake
  358. 1431101867.971618: WPA: Send EAPOL(version=1 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
  359. 1431101867.986144: IEEE 802.1X: 123 bytes from 00:24:d7:6f:eb:c4
  360. 1431101867.986164: IEEE 802.1X: version=1 type=3 length=119
  361. 1431101867.986174: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key frame (2/4 Pairwise)
  362. 1431101867.986192: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKCALCNEGOTIATING
  363. 1431101867.986213: WPA: PTK derivation - A1=00:0e:2e:c4:2f:e7 A2=00:24:d7:6f:eb:c4
  364. 1431101867.986220: WPA: PMK - hexdump(len=32): [REMOVED]
  365. 1431101867.986224: WPA: PTK - hexdump(len=64): [REMOVED]
  366. 1431101867.986232: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKCALCNEGOTIATING2
  367. 1431101867.986237: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKINITNEGOTIATING
  368. 1431101867.986243: bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1
  369. 1431101867.986255: wlan0: STA 00:24:d7:6f:eb:c4 WPA: sending 3/4 msg of 4-Way Handshake
  370. 1431101867.986272: WPA: Send EAPOL(version=1 secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=24 keyidx=0 encr=0)
  371. 1431101867.986765: IEEE 802.1X: 99 bytes from 00:24:d7:6f:eb:c4
  372. 1431101867.986779: IEEE 802.1X: version=1 type=3 length=95
  373. 1431101867.986797: wlan0: STA 00:24:d7:6f:eb:c4 WPA: received EAPOL-Key frame (4/4 Pairwise)
  374. 1431101867.986814: WPA: 00:24:d7:6f:eb:c4 WPA_PTK entering state PTKINITDONE
  375. 1431101867.986818: bsd_set_key: alg=2 addr=0x8014908d0 key_idx=0 set_tx=1 seq_len=0 key_len=32
  376. 1431101867.986868: ioctl[SIOCS80211, op=19, val=0, arg_len=64]: Device not configured
  377. 1431101867.986874: hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:24:d7:6f:eb:c4 reason 2
  378. 1431101867.986901: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: deauthenticated due to local deauth request
  379. 1431101867.986919: EAP: Server state machine removed
  380. 1431101867.986928: wlan0: STA 00:24:d7:6f:eb:c4 IEEE 802.11: disassociated
  381. 1431101867.986936: Disassociation notification for unknown STA 00:24:d7:6f:eb:c4
  382. ^C1431101872.085020: Signal 2 received - terminating
  383. 1431101872.085031: Flushing old station entries
  384. 1431101872.085040: Deauthenticate all stations
  385. 1431101872.085121: wlan0: RADIUS Sending RADIUS message to accounting server
  386. 1431101872.085149: bsd_set_privacy: enabled=0
  387. 1431101872.085156: bsd_set_opt_ie: set WPA+RSN ie (len 0)
  388. 1431101872.085166: bsd_set_ieee8021x: enabled=0
Advertisement
Add Comment
Please, Sign In to add comment