wpa_supplicant v2.0 Successfully initialized wpa_supplicant Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_networkers.conf' -> '/home/jwidel/wpa_networkers.conf' Reading configuration file '/home/jwidel/wpa_networkers.conf' Line: 2 - start of a new network block ssid - hexdump_ascii(len=10): 6e 65 74 77 6f 72 6b 65 72 73 networkers key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel password - hexdump_ascii(len=10): [REMOVED] ca_cert - hexdump_ascii(len=38): 2f 68 6f 6d 65 2f 6a 77 69 64 65 6c 2f 74 6d 70 /home/jwidel/tmp 2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65 /rootca-networke 72 73 2e 70 65 6d rs.pem phase1 - hexdump_ascii(len=11): 70 65 61 70 6c 61 62 65 6c 3d 30 peaplabel=0 phase2 - hexdump_ascii(len=13): 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 priority=10 (0xa) Priority group 10 id=0 ssid='networkers' WEXT: cfg80211-based driver detected wext: interface wlan0 phy: phy0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 rfkill: initial event: idx=1 type=1 op=0 soft=1 hard=0 rfkill: WLAN soft blocked rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0 SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0x1f flags 0x0 netlink: Operstate: linkmode=1, operstate=5 wlan0: Own MAC address: 20:68:9d:d0:49:25 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wlan0: RSN: flushing PMKID list in the driver wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): 2f 09 dc a4 48 dd 58 bd 9f ba 5e 5e c0 f2 ea c8 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized wlan0: Added interface wlan0 wlan0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Received 3726 bytes of scan results (7 BSSes) wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 20:3a:07:97:15:72 SSID 'networkers' wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:70 SSID 'networkers-data' wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:71 SSID '\x00' wlan0: BSS: Add new id 3 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42' wlan0: BSS: Add new id 4 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279' wlan0: BSS: Add new id 5 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0' wlan0: BSS: Add new id 6 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET' BSS: last_scan_res_used=7/32 last_scan_full=0 wlan0: New scan results available WPS: AP 90:94:e4:35:57:ba type 0 added WPS: AP 00:19:70:79:97:c8 type 0 added WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlan0: Selecting BSS from priority group 10 wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57 wlan0: selected based on RSN IE wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers' wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2462 MHz) wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 RSN: Search for BSSID 20:3a:07:97:15:72 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT 802.1X WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Limit connection to BSSID 20:3a:07:97:15:72 freq=2462 MHz based on scan results (bssid_set=0) wlan0: set_disable_max_amsdu: -1 wlan0: set_ampdu_factor: -1 wlan0: set_ampdu_density: -1 wlan0: set_disable_ht40: 0 wlan0: set_disable_sgi: 0 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk wlan0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=26 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=110 AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 20:3a:07:97:15:72 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72 wlan0: No keys have been configured - skip key clearing wlan0: Associated with 20:3a:07:97:15:72 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 wlan0: Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 03 2b 41 ac 1b 9b b8 c6 ad bc c1 c6 bb bd 23 3b EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 51 95 51 4c 8d 09 c9 f5 05 66 7b 0d 95 b1 a8 c3 62 46 fe b4 24 8d 16 e1 df a0 92 b0 5c 2b aa 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=1028): 02 00 04 00 01 04 04 00 19 c0 00 00 0f 0c 16 03 01 00 31 02 00 00 2d 03 01 51 51 95 53 6b ae 47 e4 4a f7 67 eb b7 d8 85 65 52 5f a8 de 2e 36 19 3f 9e 20 16 f4 a1 ca bc ba 00 00 39 00 00 05 ff 01 00 01 00 16 03 01 0c b6 0b 00 0c b2 00 0c af 00 04 13 30 82 04 0f 30 82 02 f7 a0 03 02 01 02 02 01 0d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 32 32 32 31 32 36 35 32 5a 17 0d 32 38 30 32 31 39 32 31 32 36 35 32 5a 30 81 94 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 21 30 1f 06 03 55 04 03 13 18 72 61 64 69 75 73 31 2e 6e 65 74 77 6f 72 6b 65 72 73 2e 6c 6f 63 61 6c 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e0 79 50 d8 dc 34 e3 84 41 fb 6d c2 ad 77 1c 2e 0c 7e 06 fa 57 9c 58 1e 6b d1 84 25 a2 12 de 0d 82 18 af d7 ee 9a f1 16 24 26 25 e0 15 8b 70 24 98 17 93 5b 4e 43 04 ac 1c 91 db 6a bf 82 45 65 d5 53 d4 01 8c 78 27 07 5d 5e 6a 02 8e d9 8c 37 47 2b a4 fc a5 f7 f8 dd 3f 7d 3d bc bd 09 e7 0c 13 1a 62 ca 44 2c 1d 96 6e 84 37 83 98 53 a0 ec dd 7e 7a ef 60 31 21 66 07 03 0c bd 5e d9 c7 78 26 11 3f 2f 9f 94 5e 67 ed 27 78 2a 56 86 dc 4f 38 c8 f1 56 f6 aa 2d f7 05 c4 87 f5 ed 08 b2 73 45 fb 52 c5 d4 bd 53 ed 34 d8 90 ab d1 25 d6 fd 0e 92 68 a8 c5 aa 5f 83 70 bb e8 fb cd cf 96 a6 90 e1 f0 61 23 16 9d 2e 34 ed a5 6b be 8e 0b 92 79 de 5f 5f e7 4d 4e 65 b4 32 c6 61 e0 30 f9 e4 fe 06 28 c3 14 69 11 a2 87 33 7b d1 4f 7f 05 91 79 5b c3 5d 7f 6e e2 52 08 3e 9c 40 6f fc 36 93 02 03 01 00 01 a3 7b 30 79 30 09 06 03 55 1d 13 04 02 30 00 30 2c 06 09 60 86 48 01 86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 53 4c 20 47 65 6e 65 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 16 04 14 55 33 38 cb 7d 01 e7 6d a7 b6 b9 3f e8 33 05 22 95 2a 9b 6c 30 1f 06 03 55 1d 23 04 18 30 16 80 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 68 cd 51 3b 47 b3 5f 86 55 b7 9f a3 20 59 2f f5 2c 6d 90 58 2f 9f a2 f4 e5 0b 30 ea 7e 4a ed f1 e5 cc 24 86 d2 b8 f1 12 b0 59 be 5a 38 9f 89 12 17 86 69 aa c5 29 61 21 e9 be 6b ae 9c a4 70 de a2 37 50 c7 e4 68 d3 29 d8 79 79 92 1f f8 e0 31 de c2 5f 33 71 a6 fc fb c0 03 54 e0 a8 72 22 d3 d5 6f f0 91 b0 0f 61 d7 35 ff 71 4b 57 65 cd 13 d9 64 d8 f6 df 1d f7 65 f9 47 c2 16 8f 9f 1d 19 bd 98 1f 30 c3 fd ec a2 3b bc a4 1e b2 a4 4b 4f 3b b3 be 89 80 73 d3 81 ff ff cc d3 90 a1 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1024) - Flags 0xc0 SSL: TLS Message Length: 3852 SSL: Need 2838 bytes more input data SSL: Building ACK (type=25 id=4 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 05 03 fc 19 40 81 86 8c 71 0d 01 40 f4 81 e1 4a 8c 19 2d 1d 1c 05 b1 98 5e fa 21 b7 d2 0a dc 65 2c e8 99 5d 53 2d c4 13 b2 ab e3 52 46 aa 1f b9 3f ce f2 c1 95 57 98 de 6c fe 88 63 40 13 5a 34 1b 2f 0e ac ec e7 b2 fa 1f c5 46 cf 30 55 09 18 06 7c 57 55 d0 4e 07 be 0f 25 c3 88 fd 19 4d 80 41 e3 12 56 02 34 1f 00 04 53 30 82 04 4f 30 82 03 37 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b ea 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 32 30 33 30 34 33 5a 17 0d 33 33 30 31 32 37 32 30 33 30 34 33 5a 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 dc 31 39 98 9c a1 6f 4e fb 31 7a ec 6d 0c 59 5d 7b 2c 11 74 76 06 87 d2 60 97 c4 95 35 1b 35 89 61 a9 bb 6f 83 6a 76 dd e6 77 4e 9d 1b b0 b0 c0 e0 f7 0b 66 e3 2d 6d d0 f2 63 60 15 cc f1 8b 7a c6 79 28 9f a9 53 06 5b 63 6d b0 e3 d7 9e 17 a0 f2 dc 55 b5 5f 74 31 4d 4c 91 bc 9f 3c ac 6a 17 37 69 6d 03 43 0c 3c 97 fe c4 c3 70 38 6a b3 7a 95 9e 9a 72 b3 50 58 a7 a8 f6 47 74 8b 67 7f fb d4 82 7c 67 12 73 70 28 d5 ff a6 ed 42 07 e5 8d 2f 1c db de 44 f4 b3 6b ff 36 e7 67 cf 18 08 e6 4e 7a d7 9e 5a f5 0f 0e 05 26 42 76 5f 30 ed 5a 94 5b f3 a9 64 1d a1 e8 7c 8f eb 81 64 38 e1 15 fa 75 0a 94 1a 24 0d 71 d0 d4 8e 67 be e3 84 38 e8 1d 48 7e 85 9e b8 a5 5a bf f2 0d bd 3b fc 08 04 48 4b bd 93 39 27 fc f2 bc 79 bc e2 c8 4c 06 e3 3b d9 72 af 25 ce 3e ef 73 99 6e ba 74 ac 73 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 53 2a d6 45 13 bc a6 a7 49 b3 a9 32 65 b3 23 fc 97 48 f3 22 ea c7 03 c7 40 bc 4b 44 86 49 cd 3c da b6 7d 4b a0 fb 0d 87 cc 9e 7c 92 14 0c 6d 47 86 8f 26 8a 0a d5 98 8f 30 1d f6 55 66 75 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1020) - Flags 0x40 SSL: Need 1824 bytes more input data SSL: Building ACK (type=25 id=5 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 06 03 fc 19 40 e8 5a 74 a4 94 66 39 f6 8e bd bd 33 a0 bf 10 c5 29 3c c8 9e 50 f9 32 52 42 8f 19 65 75 cf fc ac a2 58 c7 87 c5 bc 04 71 9f 13 82 d4 13 ae 46 67 b1 34 34 20 91 bb b2 a0 f2 e3 d4 17 b5 6a 7e 5c ff 65 09 c1 4a 4d 4d 2e 06 7a 0b 20 c2 12 67 d9 67 67 de a3 86 c4 f2 36 4e 4a 56 c4 ee e4 b2 06 6b e2 4b 0b 33 35 74 3d 3e 74 dc 86 10 cd 54 71 3a 6b b7 c7 e8 9a 01 70 54 f2 2f de cb 67 c9 be 3a ba 01 cc e0 9f 95 ab 7d d7 0b d2 79 a4 c2 7c 48 54 68 b1 23 17 78 b3 1e 59 e4 78 90 a9 9c 01 5d c8 ea 07 76 43 db b0 66 e1 84 10 9f 55 a8 2b 41 99 ab 7b ca f7 6e 0b bd b0 5b 0f c8 95 4d b9 64 b0 00 04 40 30 82 04 3c 30 82 03 24 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b e9 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 31 38 35 34 34 39 5a 17 0d 34 33 30 31 32 35 31 38 35 34 34 39 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a9 73 32 65 98 c1 13 31 31 63 37 b7 e1 d0 a5 77 e1 07 28 1e 5c 9b c0 21 29 99 29 49 46 61 83 3c 66 f7 cf e7 88 5c da 07 ee 8d 22 1f 77 7c f0 88 34 9d 75 c3 6f cf 54 72 17 1e 11 41 b7 0f 8e 15 c9 c4 ad 90 b8 e0 e4 2d 6b 9f cf 3c 9f e0 00 20 d1 1c 35 df 08 d3 92 25 15 b6 4c d2 58 36 d2 c0 52 8b 80 1c 5c 11 e7 28 7e e1 31 59 5e 81 a4 d7 80 bc 06 92 9f f4 6e 7c 3d a6 f7 a2 c1 ed 7c c5 91 4e fc 03 da ed b7 da 1c e7 b9 c4 4c bc df 69 c6 08 58 b0 f2 02 36 ee 52 d4 04 79 e2 61 87 3f 9e 31 bb ae 9f d8 b8 69 67 3f c4 58 ac 46 94 6f 99 c0 34 e1 85 90 ca 2e 9d c1 e0 2d 3e b7 65 5e bd 8c 6f 9d af 54 70 e8 4c 1b be e4 5d 51 47 1a 8f c9 0c 78 69 f2 bc f6 77 9d cd 06 a4 4a fd 95 a5 2b 7f 73 e3 1d 7a 94 0c a5 2b 3a 1c 9a 9a a9 ff 1d 31 94 1b a9 f4 e8 63 0d 29 bb 38 43 cc 35 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1020) - Flags 0x40 SSL: Need 810 bytes more input data SSL: Building ACK (type=25 id=6 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=820): 02 00 03 30 01 07 03 30 19 00 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 2b d4 1d a8 76 72 e7 52 60 a7 68 fe 7f d7 f0 58 42 9a 94 d4 5f f8 65 5c 2e d9 c1 ff de 33 30 f3 89 c8 67 55 8e eb e5 94 66 ad df ff 95 ea f0 c5 50 4b 5e d1 94 9a b8 3f f3 68 41 f3 68 b8 b2 37 69 36 90 80 27 e9 90 15 b2 0f 12 89 9b 9f af a7 48 25 7d 7c ad 56 04 cd c3 68 7c 8d b1 7c 66 5b 3e 45 90 b2 c8 76 78 3d 6e 4c fd 77 a1 37 d7 e5 15 60 d4 18 fc 40 40 f0 82 d3 45 0e ca c3 5c 49 d8 20 9d 22 63 ca 48 79 9d ca 26 b7 f1 39 e1 e3 7d 82 64 d0 51 b9 05 96 e4 6a fc 59 5a 10 2c 1b 56 ff c3 7f d1 81 db bf ce fb 0f 71 a4 df 22 84 92 87 62 a0 7a 39 ed 2f 0b 26 6c 8f ad d4 32 c0 93 6b c9 7f df 18 73 52 ff 00 cd 54 84 b9 30 bd 7f 03 51 99 ed d9 a7 d2 e8 65 58 0e 73 1d c9 c8 47 53 4b 85 5a 0e 4d dd e9 7a 79 61 e6 ef bd d3 11 a8 93 54 d9 fb 4c 0a b1 3a 0a 77 0c 0b 49 87 16 03 01 02 0d 0c 00 02 09 00 80 e1 1c b9 f7 d1 bd 7a 76 58 0e 61 57 73 03 a4 eb 32 66 db 69 5b f2 c6 fa e8 37 86 dc b6 b2 c4 0d ca 4c 03 61 78 69 af 20 aa c0 12 71 12 4a c6 86 5d c1 45 80 68 9f a9 79 23 bf 23 d5 5d 70 93 f5 7e ce 9a 65 99 8e dd 35 b9 07 c8 cb 31 27 f0 05 4c 6d cf 90 1e ac 1a 8c f1 4d 85 d4 4b ab f4 1a 8a bf 04 c4 83 93 f7 5b 67 da bf 27 c6 0f 61 f3 c7 bf 97 66 4e 36 c9 3f c1 9a 7f db 9a 86 2b 5b 00 01 02 00 80 68 fb bc 03 aa ad f4 2c 29 ab f9 b1 09 b6 02 cf c5 1f 8a f6 2c 9d 46 fe 60 7a 28 8d 7c 5a 64 bb 6a 07 a8 f6 d8 1f f4 cf bb 82 fc 78 c8 fa c2 75 ca ec 95 02 15 3d 43 6b ac a1 87 8b ec 03 10 89 9f c1 09 67 5d 48 b6 36 7f 08 87 dd d7 1e 4c 1e fb 86 d9 fb 31 98 a4 b4 ba aa ff b9 44 de 98 29 fc 08 cb cf 62 7c 92 69 27 79 ec 1d 31 58 bc 72 fc 9d 63 ab b6 0c 2b 61 2b bf d5 fe 96 a9 74 9a 01 00 60 9c ee a9 72 c9 9f 12 ef 5d 88 d1 7e 50 8d fe 84 74 ea 20 d1 51 16 ab 8c df 40 0a be c4 8a 33 b0 fe 5f a1 1a be 69 f9 8d a3 c0 d3 3f 94 d1 39 45 30 e4 ea 5b 91 40 16 bb d3 7c 3e 53 ea 3b 8a 46 40 a3 ac 0a 02 59 09 20 b7 99 4e 68 4d 17 6b 62 4d bc 2a 8b a7 1d 28 0e c9 af 3a ba 21 93 cd cb 56 c2 a0 60 9a ac ef ef c1 f9 ca 1d 21 fe 73 5e 93 79 45 38 e9 10 25 d5 df ba 0d f2 75 48 e8 ce f3 24 6d 9e b8 51 77 7a 23 e9 dd b3 36 ae fe aa a4 97 cf 8a fd fb 45 0f 7a a5 87 d8 af ec 73 fd d8 33 70 4b 93 8a d1 4c 09 33 6e 4e 8c 8c 02 86 0d 12 fd 31 c9 a4 9f 8b 64 91 a5 3b 01 4b 6a ca 96 b6 7a 89 ad 9f ab a2 11 db 0a 35 a5 32 3b 4a 10 fb 35 52 25 34 47 23 92 37 c0 c7 1f c4 0a 82 35 74 7f 39 3f e3 07 e4 f5 9d 40 1d 6e fe fc e0 66 c4 a0 dd 1a 55 f9 ca 16 c8 70 a8 fd 2c 30 16 03 01 00 04 0e 00 00 00 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=816) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 buf='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl' wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl' wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl' wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl' EAP: Status notification: remote certificate verification (param=success) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 198 bytes pending from ssl_out SSL: 198 bytes left to be sent out (of total 198 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=212): 01 00 00 d0 02 07 00 d0 19 80 00 00 00 c6 16 03 01 00 86 10 00 00 82 00 80 44 9d ab 74 09 e0 54 ba 19 b5 0e bd 66 3d 90 ae 12 82 02 2a e1 ca 0f 8d 54 2f 6c b5 4f 3f 65 35 f2 d6 a3 bf af 80 87 6a a7 a7 f1 57 62 87 60 b8 b8 57 ed 6d 6a f0 82 44 83 91 ea 40 3d fd 1d a6 73 da 4f c3 b4 85 bb 09 0c 8b fb 2f bb 6d 46 02 f1 7a e0 1d a8 0d f1 7e 81 f7 fa d2 e7 21 67 aa 84 63 0a ee cd 00 e9 14 6e 14 31 79 b1 97 60 e7 cc 40 89 b8 19 d9 40 59 c6 d4 93 c0 53 41 bc a5 14 03 01 00 01 01 16 03 01 00 30 11 71 f2 f9 20 24 22 ea 6f 99 36 f9 1f a0 10 f6 55 ca b7 d2 50 f8 03 db 3c 60 48 58 62 87 0e bc 6b a0 a7 4e a2 7e ac f4 6a 12 e2 78 f2 7c 9f e9 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=69): 02 00 00 41 01 08 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 13 3c 18 b1 39 30 91 9f c6 0a b1 2a 28 95 86 0f 9f b7 9c f9 ae e9 a9 7a 14 1c 80 89 24 54 ce 24 c8 89 0e b4 e6 8c 6b dc 21 3f a6 f5 a0 7f cc ca EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=65) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out SSL: No Application Data included SSL: No data to be sent out EAP-PEAP: TLS done, proceed to Phase 2 EAP-PEAP: using label 'client EAP encryption' in key derivation OpenSSL: Using internal PRF EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] SSL: Building ACK (type=25 id=8 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=47): 02 00 00 2b 01 09 00 2b 19 00 17 03 01 00 20 f1 5a 03 23 52 5c 5f 71 b2 79 b0 61 4b 26 78 37 e0 cb 40 e3 ea 65 2a 10 81 ae 99 5d 86 00 2b 17 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=43) - Flags 0x00 EAP-PEAP: received 37 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 09 00 05 01 EAP-PEAP: received Phase 2: code=1 identifier=9 length=5 EAP-PEAP: Phase 2 Request: type=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=84): 01 00 00 50 02 09 00 50 19 00 17 03 01 00 20 40 d6 a0 72 da 2c 74 de 5e 94 dd 38 7e 02 51 37 dd 05 4e f7 3f 5d 3a c8 2b 84 20 6a 4c e1 d7 ad 17 03 01 00 20 54 15 30 c7 03 cd 45 c9 28 73 cb 00 dd 16 ca 93 cd 95 12 2d f2 ac 89 f6 03 b2 25 83 87 33 eb 6f EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=79): 02 00 00 4b 01 0a 00 4b 19 00 17 03 01 00 40 9e 4b 8d ba 68 f7 9a 0c 51 57 53 c1 b5 a8 74 c6 f7 df ee e0 d8 36 7f d8 11 91 49 70 11 49 8d b7 c4 b4 f0 13 93 e7 29 20 79 c8 f7 32 15 d6 e2 d4 81 d0 76 19 88 0c 50 df 19 e6 04 72 2d bb 7c 74 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=75) - Flags 0x00 EAP-PEAP: received 69 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=28): 1a 01 0a 00 1b 10 9c af 34 80 9d a8 56 c2 3d d5 25 b5 68 9c ba c0 6a 77 69 64 65 6c EAP-PEAP: received Phase 2: code=1 identifier=10 length=32 EAP-PEAP: Phase 2 Request: type=26 EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10 EAP-MSCHAPV2: Received challenge EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP-MSCHAPV2: Generating Challenge Response MSCHAPV2: Identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel MSCHAPV2: Username - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel MSCHAPV2: auth_challenge - hexdump(len=16): 9c af 34 80 9d a8 56 c2 3d d5 25 b5 68 9c ba c0 MSCHAPV2: peer_challenge - hexdump(len=16): 92 0b de c6 b2 ac f7 52 aa 83 f4 59 30 bd 39 b0 MSCHAPV2: username - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel MSCHAPV2: password - hexdump_ascii(len=10): [REMOVED] MSCHAPV2: NT Response - hexdump(len=24): f7 43 ef f4 9b 2f fb db d5 38 b5 42 31 54 5c e8 67 10 cf 78 01 2d f0 73 MSCHAPV2: Auth Response - hexdump(len=20): c0 a5 d0 36 ec a1 2a 9c eb b6 02 2d 51 47 3e 17 a9 db 35 ba MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response) EAP-PEAP: Encrypting Phase 2 data - hexdump(len=65): [REMOVED] SSL: 138 bytes left to be sent out (of total 138 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=148): 01 00 00 90 02 0a 00 90 19 00 17 03 01 00 20 01 4c fb f9 28 e5 33 11 f1 1c 3e 4c 78 c1 46 e0 40 5c f0 2f c8 e5 6f fc 9e 60 a9 c5 62 00 b1 53 17 03 01 00 60 9c 75 f7 63 34 ca 0a 0f 29 98 52 a7 b5 3f 16 ec 2b 12 27 a2 38 cd e7 f5 8f 01 1b b8 6b 6d 57 6d d1 12 22 6b dc 74 4e 8a a5 63 f3 d7 59 6a 9c 1e 19 a9 0f 17 fb ac 4d 9c 00 1d 74 b0 cb b3 e0 ca 6e 79 93 97 ca 52 17 3b 9b e7 7a 57 e4 5d 8d b3 33 40 ce 3a a7 0e b7 b7 6f 01 ed 25 b3 50 8f a4 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=95): 02 00 00 5b 01 0b 00 5b 19 00 17 03 01 00 50 54 35 b3 92 4f 32 1c 40 cb b2 28 b9 13 32 b9 69 47 11 23 fb 7e c5 f3 36 00 3d 06 19 e7 45 1b 61 cf cc 68 1c 27 27 c1 a8 4c b5 3c 3f 04 7c fd f2 7b 99 3d 0f 01 0f 36 e5 7f 9d dc e4 9d d0 61 3c d9 ff bf 0b 04 53 43 6a e4 6d 65 7e 9f ea 7b 2e EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=91) - Flags 0x00 EAP-PEAP: received 85 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53 3d 43 30 41 35 44 30 33 36 45 43 41 31 32 41 39 43 45 42 42 36 30 32 32 44 35 31 34 37 33 45 31 37 41 39 44 42 33 35 42 41 EAP-PEAP: received Phase 2: code=1 identifier=11 length=51 EAP-PEAP: Phase 2 Request: type=26 EAP-MSCHAPV2: RX identifier 11 mschapv2_id 10 EAP-MSCHAPV2: Received success EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): EAP-MSCHAPV2: Authentication succeeded EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=84): 01 00 00 50 02 0b 00 50 19 00 17 03 01 00 20 fc b3 d5 62 4e d5 9e 8c 88 93 61 b6 20 0b cf c0 61 74 ea 8f 98 77 9e f6 a4 7d 96 f5 16 80 f1 ed 17 03 01 00 20 31 c8 7f 3c 46 3e 3f 50 f6 f1 19 9c 9b 13 36 d1 3c d7 8a 68 da 52 a7 7d ec 5d eb 87 93 7e 17 fb EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=47): 02 00 00 2b 01 0c 00 2b 19 00 17 03 01 00 20 9b a3 9c 4e 36 39 b3 eb 66 c8 c3 e1 be ef e1 1e 7f d4 a9 de 71 71 ab ec a3 9f 13 0f e4 0a 0c 69 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=43) - Flags 0x00 EAP-PEAP: received 37 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 01 EAP-PEAP: received Phase 2: code=1 identifier=12 length=11 EAP-PEAP: Phase 2 Request: type=33 EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 EAP-TLV: Result TLV - hexdump(len=2): 00 01 EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=84): 01 00 00 50 02 0c 00 50 19 00 17 03 01 00 20 a5 ac 6d 8b 72 c4 d4 42 04 74 fc 52 2a d4 96 e9 5a a7 94 99 6a 0c df a5 3c a8 7b 76 d7 81 1a df 17 03 01 00 20 e7 1e 97 26 11 a4 f3 f7 3d d3 70 16 00 f0 ed 64 9c 3e a2 f1 63 32 c3 14 f0 60 89 51 36 6a ef 02 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=8): 02 00 00 04 03 0c 00 04 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (param=success) EAP: EAP entering state SUCCESS wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines wlan0: IEEE 802.1X RX: version=2 type=3 length=117 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 20:3a:07:97:15:72 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80 WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80 RSN: PMKID from Authenticator - hexdump(len=16): 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80 wlan0: RSN: no matching PMKID found EAPOL: Successfully fetched key (len=32) WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] RSN: Added PMKSA cache entry for 20:3a:07:97:15:72 network_ctx=0x1028460 wlan0: RSN: the new PMK matches with the PMKID WPA: Renewed SNonce - hexdump(len=32): 40 a7 ea 8f 98 25 d6 ef 38 49 6b 5d 49 e3 35 48 df 28 c4 e1 6b ab 8a 36 c5 21 ff 76 60 39 a8 fb WPA: PTK derivation - A1=20:68:9d:d0:49:25 A2=20:3a:07:97:15:72 WPA: Nonce1 - hexdump(len=32): 40 a7 ea 8f 98 25 d6 ef 38 49 6b 5d 49 e3 35 48 df 28 c4 e1 6b ab 8a 36 c5 21 ff 76 60 39 a8 fb WPA: Nonce2 - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 6d 38 84 18 ae ef e5 a4 6b 9e 32 85 56 ed 4e 3a WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 40 a7 ea 8f 98 25 d6 ef 38 49 6b 5d 49 e3 35 48 df 28 c4 e1 6b ab 8a 36 c5 21 ff 76 60 39 a8 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 38 84 18 ae ef e5 a4 6b 9e 32 85 56 ed 4e 3a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 ad 13 ac 53 22 1b b5 ff c6 38 6f b8 d1 dd 57 00 38 b9 e3 06 38 b6 61 d3 2d 02 b2 c3 a1 da 34 13 18 4b 59 7a bd 6b 6b 6c 85 27 b3 c7 e7 6c 7b 83 82 2a 6e 2b 1c e3 9d ce c3 65 20 a6 20 aa 99 d6 79 f6 1d 7e d3 04 18 59 1c EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines wlan0: IEEE 802.1X RX: version=2 type=3 length=151 wlan0: EAPOL-Key type=2 wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlan0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(le