Advertisement
Guest User

Untitled

a guest
Sep 14th, 2012
40
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Reading configuration file 'eapol_config'
  2. Line: 3 - start of a new network block
  3. eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
  4. eapol_flags=0 (0x0)
  5. key_mgmt: 0x8
  6. identity - hexdump_ascii(len=8):
  7. 74 65 73 74 75 73 65 72 testuser
  8. password - hexdump_ascii(len=12):
  9. 74 65 73 74 70 61 73 73 77 6f 72 64 testpassword
  10. ca_cert - hexdump_ascii(len=16):
  11. 2f 72 6f 6f 74 2f 73 65 72 76 65 72 2e 70 65 6d /root/server.pem
  12. phase2 - hexdump_ascii(len=9):
  13. 61 75 74 68 3d 54 54 4c 53 auth=TTLS
  14. Priority group 0
  15. id=0 ssid=''
  16. Authentication server 127.0.0.1:1812
  17. RADIUS local address: 127.0.0.1:34129
  18. EAPOL: SUPP_PAE entering state DISCONNECTED
  19. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  20. EAPOL: SUPP_BE entering state INITIALIZE
  21. EAP: EAP entering state DISABLED
  22. EAPOL: External notification - portValid=0
  23. EAPOL: External notification - portEnabled=1
  24. EAPOL: SUPP_PAE entering state CONNECTING
  25. EAPOL: SUPP_BE entering state IDLE
  26. EAP: EAP entering state INITIALIZE
  27. EAP: EAP entering state IDLE
  28. Sending fake EAP-Request-Identity
  29. EAPOL: Received EAP-Packet frame
  30. EAPOL: SUPP_PAE entering state RESTART
  31. EAP: EAP entering state INITIALIZE
  32. EAP: EAP entering state IDLE
  33. EAPOL: SUPP_PAE entering state AUTHENTICATING
  34. EAPOL: SUPP_BE entering state REQUEST
  35. EAPOL: getSuppRsp
  36. EAP: EAP entering state RECEIVED
  37. EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
  38. EAP: EAP entering state IDENTITY
  39. CTRL-EVENT-EAP-STARTED EAP authentication started
  40. EAP: EAP-Request Identity data - hexdump_ascii(len=0):
  41. EAP: using real identity - hexdump_ascii(len=8):
  42. 74 65 73 74 75 73 65 72 testuser
  43. EAP: EAP entering state SEND_RESPONSE
  44. EAP: EAP entering state IDLE
  45. EAPOL: SUPP_BE entering state RESPONSE
  46. EAPOL: txSuppRsp
  47. WPA: eapol_test_eapol_send(type=0 len=13)
  48. TX EAP -> RADIUS - hexdump(len=13): 02 00 00 0d 01 74 65 73 74 75 73 65 72
  49. Encapsulating EAP message into a RADIUS packet
  50. Learned identity from EAP-Response-Identity - hexdump(len=8): 74 65 73 74 75 73 65 72
  51. Sending RADIUS message to authentication server
  52. RADIUS message: code=1 (Access-Request) identifier=0 length=124
  53. Attribute 1 (User-Name) length=10
  54. Value: 'testuser'
  55. Attribute 4 (NAS-IP-Address) length=6
  56. Value: 127.0.0.1
  57. Attribute 31 (Calling-Station-Id) length=19
  58. Value: '02-00-00-00-00-01'
  59. Attribute 12 (Framed-MTU) length=6
  60. Value: 1400
  61. Attribute 61 (NAS-Port-Type) length=6
  62. Value: 19
  63. Attribute 77 (Connect-Info) length=24
  64. Value: 'CONNECT 11Mbps 802.11b'
  65. Attribute 79 (EAP-Message) length=15
  66. Value: 02 00 00 0d 01 74 65 73 74 75 73 65 72
  67. Attribute 80 (Message-Authenticator) length=18
  68. Value: 27 58 80 0c bb 7e 69 e0 59 58 05 5a 27 1d c9 f6
  69. Next RADIUS client retransmit in 3 seconds
  70.  
  71. EAPOL: SUPP_BE entering state RECEIVE
  72. Received 64 bytes from RADIUS server
  73. Received RADIUS message
  74. RADIUS message: code=11 (Access-Challenge) identifier=0 length=64
  75. Attribute 79 (EAP-Message) length=8
  76. Value: 01 01 00 06 15 20
  77. Attribute 80 (Message-Authenticator) length=18
  78. Value: 1e 72 5c 28 c8 4a 0a 30 5d 89 b7 09 05 fe d3 fa
  79. Attribute 24 (State) length=18
  80. Value: a1 02 8f 51 a1 03 9a f4 85 7d 6c 05 24 ec 9e 91
  81. STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  82.  
  83. RADIUS packet matching with station
  84. decapsulated EAP packet (code=1 id=1 len=6) from RADIUS server: EAP-Request-TTLS (21)
  85. EAPOL: Received EAP-Packet frame
  86. EAPOL: SUPP_BE entering state REQUEST
  87. EAPOL: getSuppRsp
  88. EAP: EAP entering state RECEIVED
  89. EAP: Received EAP-Request id=1 method=21 vendor=0 vendorMethod=0
  90. EAP: EAP entering state GET_METHOD
  91. CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
  92. EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS)
  93. EAP-TTLS: Phase2 type: EAP
  94. TLS: Phase2 EAP types - hexdump(len=40): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 11 00 00 00
  95. CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
  96. EAP: EAP entering state METHOD
  97. SSL: Received packet(len=6) - Flags 0x20
  98. EAP-TTLS: Start (server ver=0, own ver=0)
  99. TLS: using phase1 config options
  100. TLS: Trusted root certificate(s) loaded
  101. EAP-TTLS: Start
  102. SSL: (where=0x10 ret=0x1)
  103. SSL: (where=0x1001 ret=0x1)
  104. SSL: SSL_connect:before/connect initialization
  105. SSL: (where=0x1001 ret=0x1)
  106. SSL: SSL_connect:SSLv3 write client hello A
  107. SSL: (where=0x1002 ret=0xffffffff)
  108. SSL: SSL_connect:error in SSLv3 read server hello A
  109. SSL: SSL_connect - want more data
  110. SSL: 95 bytes pending from ssl_out
  111. SSL: 95 bytes left to be sent out (of total 95 bytes)
  112. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  113. EAP: EAP entering state SEND_RESPONSE
  114. EAP: EAP entering state IDLE
  115. EAPOL: SUPP_BE entering state RESPONSE
  116. EAPOL: txSuppRsp
  117. WPA: eapol_test_eapol_send(type=0 len=101)
  118. TX EAP -> RADIUS - hexdump(len=101): 02 01 00 65 15 00 16 03 01 00 5a 01 00 00 56 03 01 50 53 f0 f9 7d 1c f1 61 cc d8 a6 f5 eb 95 cb 8f 02 ea 42 7b 49 ec 01 6a 73 bb 46 38 cd 79 80 89 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 0$
  119. Encapsulating EAP message into a RADIUS packet
  120. Copied RADIUS State Attribute
  121. Sending RADIUS message to authentication server
  122. RADIUS message: code=1 (Access-Request) identifier=1 length=230
  123. Attribute 1 (User-Name) length=10
  124. Value: 'testuser'
  125. Attribute 4 (NAS-IP-Address) length=6
  126. Value: 127.0.0.1
  127. Attribute 31 (Calling-Station-Id) length=19
  128. Value: '02-00-00-00-00-01'
  129. Attribute 12 (Framed-MTU) length=6
  130. Value: 1400
  131. Attribute 61 (NAS-Port-Type) length=6
  132. Value: 19
  133. Attribute 77 (Connect-Info) length=24
  134. Value: 'CONNECT 11Mbps 802.11b'
  135. Attribute 79 (EAP-Message) length=103
  136. Value: 02 01 00 65 15 00 16 03 01 00 5a 01 00 00 56 03 01 50 53 f0 f9 7d 1c f1 61 cc d8 a6 f5 eb 95 cb 8f 02 ea 42 7b 49 ec 01 6a 73 bb 46 38 cd 79 80 89 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 0$
  137. Attribute 24 (State) length=18
  138. Value: a1 02 8f 51 a1 03 9a f4 85 7d 6c 05 24 ec 9e 91
  139. Attribute 80 (Message-Authenticator) length=18
  140. Value: 11 8f 74 6c fe 60 20 b8 b8 2f f6 1f c8 7b 50 f6
  141. Next RADIUS client retransmit in 3 seconds
  142.  
  143. EAPOL: SUPP_BE entering state RECEIVE
  144. Received 1090 bytes from RADIUS server
  145. Received RADIUS message
  146. RADIUS message: code=11 (Access-Challenge) identifier=1 length=1090
  147. Attribute 79 (EAP-Message) length=255
  148. Value: 01 02 04 00 15 c0 00 00 0a b4 16 03 01 00 31 02 00 00 2d 03 01 50 53 f0 f9 f4 97 de dd b8 02 c3 e4 30 4b 45 c1 9d 20 7b 9e 4c 72 59 22 f5 f3 34 11 61 b1 d4 e0 00 00 39 01 00 05 ff 01 00 01 00 16 03 01 08 5e 0b 00 08 5a 00 0$
  149. Attribute 79 (EAP-Message) length=255
  150. Value: 74 68 6f 72 69 74 79 30 1e 17 0d 31 32 30 39 31 35 30 32 34 36 32 33 5a 17 0d 31 33 30 39 31 35 30 32 34 36 32 33 5a 30 7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 52 61 64 69 75 73 31 15 30 1$
  151. Attribute 79 (EAP-Message) length=255
  152. Value: a8 af 65 a4 6b 1a 8c 68 80 81 7f c0 fe 82 32 24 5d 6b bd 3d bf d3 c4 57 0f 99 65 09 44 67 94 15 eb fa eb 8f 41 49 e6 f9 a6 2a df 6b 79 de a6 84 d5 e9 08 37 65 3f 59 5b 83 13 87 ac 57 bb 2a 06 13 42 18 b3 a5 a7 9a 5a b2 d8 f$
  153. Attribute 79 (EAP-Message) length=255
  154. Value: 56 5c 8a b5 a9 32 91 51 ff 2b bc f0 a5 9e 79 6b df 6e d3 1b 41 1c 8d ad 1c b9 81 ce f5 4d c4 cd 9f 24 f7 5d 05 f7 bf a8 f2 c1 64 ad 74 b0 c5 94 09 a8 97 d2 3c 6a 5b 9d 16 e3 e0 0d 23 ab 9c c1 45 b3 45 6d 68 d9 2b c8 80 a3 5$
  155. Attribute 79 (EAP-Message) length=14
  156. Value: 5b 00 04 ab 30 82 04 a7 30 82 03 8f
  157. Attribute 80 (Message-Authenticator) length=18
  158. Value: d5 af 28 bb cd 1f 7e 07 2e 81 21 bf 16 55 e9 48
  159. Attribute 24 (State) length=18
  160. Value: a1 02 8f 51 a0 00 9a f4 85 7d 6c 05 24 ec 9e 91
  161. STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  162.  
  163. RADIUS packet matching with station
  164. decapsulated EAP packet (code=1 id=2 len=1024) from RADIUS server: EAP-Request-TTLS (21)
  165. EAPOL: Received EAP-Packet frame
  166. EAPOL: SUPP_BE entering state REQUEST
  167. EAPOL: getSuppRsp
  168. EAP: EAP entering state RECEIVED
  169. EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0
  170. EAP: EAP entering state METHOD
  171. SSL: Received packet(len=1024) - Flags 0xc0
  172. SSL: TLS Message Length: 2740
  173. SSL: Need 1726 bytes more input data
  174. SSL: Building ACK (type=21 id=2 ver=0)
  175. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  176. EAP: EAP entering state SEND_RESPONSE
  177. EAP: EAP entering state IDLE
  178. EAPOL: SUPP_BE entering state RESPONSE
  179. EAPOL: txSuppRsp
  180. WPA: eapol_test_eapol_send(type=0 len=6)
  181. TX EAP -> RADIUS - hexdump(len=6): 02 02 00 06 15 00
  182. Encapsulating EAP message into a RADIUS packet
  183. Copied RADIUS State Attribute
  184. Sending RADIUS message to authentication server
  185. RADIUS message: code=1 (Access-Request) identifier=2 length=135
  186. Attribute 1 (User-Name) length=10
  187. Value: 'testuser'
  188. Attribute 4 (NAS-IP-Address) length=6
  189. Value: 127.0.0.1
  190. Attribute 31 (Calling-Station-Id) length=19
  191. Value: '02-00-00-00-00-01'
  192. Attribute 12 (Framed-MTU) length=6
  193. Value: 1400
  194. Attribute 61 (NAS-Port-Type) length=6
  195. Value: 19
  196. Attribute 77 (Connect-Info) length=24
  197. Value: 'CONNECT 11Mbps 802.11b'
  198. Attribute 79 (EAP-Message) length=8
  199. Value: 02 02 00 06 15 00
  200. Attribute 24 (State) length=18
  201. Value: a1 02 8f 51 a0 00 9a f4 85 7d 6c 05 24 ec 9e 91
  202. Attribute 80 (Message-Authenticator) length=18
  203. Value: a7 dd 33 ac e1 ce 75 64 df f1 87 07 4c 44 f8 3a
  204. Next RADIUS client retransmit in 3 seconds
  205.  
  206. EAPOL: SUPP_BE entering state RECEIVE
  207. Received 1090 bytes from RADIUS server
  208. Received RADIUS message
  209. RADIUS message: code=11 (Access-Challenge) identifier=2 length=1090
  210. Attribute 79 (EAP-Message) length=255
  211. Value: 01 03 04 00 15 c0 00 00 0a b4 a0 03 02 01 02 02 09 00 84 70 ef c0 5f 91 2a 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 52 61 64 69 75 73 3$
  212. Attribute 79 (EAP-Message) length=255
  213. Value: 69 75 73 31 12 30 10 06 03 55 04 07 13 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 13 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6$
  214. Attribute 79 (EAP-Message) length=255
  215. Value: 58 53 bd b5 49 e6 b3 a2 f1 e9 e5 90 88 b8 fa 04 f6 6f 3b 61 c3 ab 2a fc d8 ca ff 6c e9 86 7b ef fe 24 8d 99 df b3 88 b8 99 1f ee 7a 58 c3 e3 f8 c5 c6 db 79 ab 69 d8 c6 6c b3 7a 2b 79 db b1 ce 45 ed b7 a1 67 28 fd 41 25 31 6$
  216. Attribute 79 (EAP-Message) length=255
  217. Value: 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 13 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 13 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0$
  218. Attribute 79 (EAP-Message) length=14
  219. Value: 1d c6 a2 85 ee e9 3e dd d1 ab 2f 6a
  220. Attribute 80 (Message-Authenticator) length=18
  221. Value: a2 ab 00 56 09 b0 63 cd f5 aa 71 ce db b0 71 96
  222. Attribute 24 (State) length=18
  223. Value: a1 02 8f 51 a3 01 9a f4 85 7d 6c 05 24 ec 9e 91
  224. STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  225.  
  226. RADIUS packet matching with station
  227. decapsulated EAP packet (code=1 id=3 len=1024) from RADIUS server: EAP-Request-TTLS (21)
  228. EAPOL: Received EAP-Packet frame
  229. EAPOL: SUPP_BE entering state REQUEST
  230. EAPOL: getSuppRsp
  231. EAP: EAP entering state RECEIVED
  232. EAP: Received EAP-Request id=3 method=21 vendor=0 vendorMethod=0
  233. EAP: EAP entering state METHOD
  234. SSL: Received packet(len=1024) - Flags 0xc0
  235. SSL: TLS Message Length: 2740
  236. SSL: Need 712 bytes more input data
  237. SSL: Building ACK (type=21 id=3 ver=0)
  238. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  239. EAP: EAP entering state SEND_RESPONSE
  240. EAP: EAP entering state IDLE
  241. EAPOL: SUPP_BE entering state RESPONSE
  242. EAPOL: txSuppRsp
  243. WPA: eapol_test_eapol_send(type=0 len=6)
  244. TX EAP -> RADIUS - hexdump(len=6): 02 03 00 06 15 00
  245. Encapsulating EAP message into a RADIUS packet
  246. Copied RADIUS State Attribute
  247. Sending RADIUS message to authentication server
  248. RADIUS message: code=1 (Access-Request) identifier=3 length=135
  249. Attribute 1 (User-Name) length=10
  250. Value: 'testuser'
  251. Attribute 4 (NAS-IP-Address) length=6
  252. Value: 127.0.0.1
  253. Attribute 31 (Calling-Station-Id) length=19
  254. Value: '02-00-00-00-00-01'
  255. Attribute 12 (Framed-MTU) length=6
  256. Value: 1400
  257. Attribute 61 (NAS-Port-Type) length=6
  258. Value: 19
  259. Attribute 77 (Connect-Info) length=24
  260. Value: 'CONNECT 11Mbps 802.11b'
  261. Attribute 79 (EAP-Message) length=8
  262. Value: 02 03 00 06 15 00
  263. Attribute 24 (State) length=18
  264. Value: a1 02 8f 51 a3 01 9a f4 85 7d 6c 05 24 ec 9e 91
  265. Attribute 80 (Message-Authenticator) length=18
  266. Value: b3 eb 97 e6 44 1e ef c5 b3 65 97 1b 70 b1 6d e7
  267. Next RADIUS client retransmit in 3 seconds
  268.  
  269. EAPOL: SUPP_BE entering state RECEIVE
  270. Received 784 bytes from RADIUS server
  271. Received RADIUS message
  272. RADIUS message: code=11 (Access-Challenge) identifier=3 length=784
  273. Attribute 79 (EAP-Message) length=255
  274. Value: 01 04 02 d2 15 80 00 00 0a b4 40 d7 f0 7d f1 57 f5 aa 06 ae e8 cc 99 5e 36 79 f1 72 2d 6c 0e b1 50 da cd 41 0f 0a 44 77 e8 e9 dd ef b5 1d 97 9b f1 8c fc 35 c5 e4 b4 e8 a5 a6 c3 85 ac cf 7b 46 64 19 7d c0 ca 45 91 6f 9c 8c 9$
  275. Attribute 79 (EAP-Message) length=255
  276. Value: 18 07 0b 4a 10 ce 3d a5 89 ff 66 e4 2a 47 f9 be 88 d8 06 b4 f7 03 e0 ba 23 5f 01 ff 01 55 9e dd 6a bd 46 b0 51 79 57 64 51 f8 48 3e 7a c5 51 d0 0c dd 39 70 a0 d2 fc 70 8f 60 c1 7a 2e 50 a7 2a 97 8d 06 9d 43 00 01 02 00 80 6$
  277. Attribute 79 (EAP-Message) length=218
  278. Value: b1 72 50 5c c7 f3 29 0c b9 10 9b a6 11 8f 1e 1d e2 d8 f3 a1 d6 70 5f c3 a4 4c 46 4b 17 7f 2c 67 0e da ad ad 82 89 08 cc 4d 4c 50 0d 65 d0 b0 c7 c4 f3 02 4b dd 1a 96 08 95 d6 54 5a a3 be 57 ea 36 2d f3 2c 27 58 81 a7 25 b4 a$
  279. Attribute 80 (Message-Authenticator) length=18
  280. Value: a1 4d 94 78 b0 9d 98 88 e1 71 11 27 4b 96 8d 23
  281. Attribute 24 (State) length=18
  282. Value: a1 02 8f 51 a2 06 9a f4 85 7d 6c 05 24 ec 9e 91
  283. STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  284.  
  285. RADIUS packet matching with station
  286. decapsulated EAP packet (code=1 id=4 len=722) from RADIUS server: EAP-Request-TTLS (21)
  287. EAPOL: Received EAP-Packet frame
  288. EAPOL: SUPP_BE entering state REQUEST
  289. EAPOL: getSuppRsp
  290. EAP: EAP entering state RECEIVED
  291. EAP: Received EAP-Request id=4 method=21 vendor=0 vendorMethod=0
  292. EAP: EAP entering state METHOD
  293. SSL: Received packet(len=722) - Flags 0x80
  294. SSL: TLS Message Length: 2740
  295. SSL: (where=0x1001 ret=0x1)
  296. SSL: SSL_connect:SSLv3 read server hello A
  297. TLS: Certificate verification failed, error 19 (self signed certificate in certificate chain) depth 1 for '/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.com/CN=Example Certificate Authority'
  298. CTRL-EVENT-EAP-TLS-CERT-ERROR reason=1 depth=1 subject='/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.com/CN=Example Certificate Authority' err='self signed certificate in certificate chain'
  299. SSL: (where=0x4008 ret=0x230)
  300. SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
  301. SSL: (where=0x1002 ret=0xffffffff)
  302. SSL: SSL_connect:error in SSLv3 read server certificate B
  303. OpenSSL: openssl_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
  304. SSL: 7 bytes pending from ssl_out
  305. SSL: Failed - tls_out available to report error
  306. SSL: 7 bytes left to be sent out (of total 7 bytes)
  307. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  308. EAP: EAP entering state SEND_RESPONSE
  309. EAP: EAP entering state IDLE
  310. EAPOL: SUPP_BE entering state RESPONSE
  311. EAPOL: txSuppRsp
  312. WPA: eapol_test_eapol_send(type=0 len=13)
  313. TX EAP -> RADIUS - hexdump(len=13): 02 04 00 0d 15 00 15 03 01 00 02 02 30
  314. Encapsulating EAP message into a RADIUS packet
  315. Copied RADIUS State Attribute
  316. Sending RADIUS message to authentication server
  317. RADIUS message: code=1 (Access-Request) identifier=4 length=142
  318. Attribute 1 (User-Name) length=10
  319. Value: 'testuser'
  320. Attribute 4 (NAS-IP-Address) length=6
  321. Value: 127.0.0.1
  322. Attribute 31 (Calling-Station-Id) length=19
  323. Value: '02-00-00-00-00-01'
  324. Attribute 12 (Framed-MTU) length=6
  325. Value: 1400
  326. Attribute 61 (NAS-Port-Type) length=6
  327. Value: 19
  328. Attribute 77 (Connect-Info) length=24
  329. Value: 'CONNECT 11Mbps 802.11b'
  330. Attribute 79 (EAP-Message) length=15
  331. Value: 02 04 00 0d 15 00 15 03 01 00 02 02 30
  332. Attribute 24 (State) length=18
  333. Value: a1 02 8f 51 a2 06 9a f4 85 7d 6c 05 24 ec 9e 91
  334. Attribute 80 (Message-Authenticator) length=18
  335. Value: 93 8f 95 ed d7 20 03 7a 3e a5 9a e0 88 b8 43 0a
  336. Next RADIUS client retransmit in 3 seconds
  337.  
  338. EAPOL: SUPP_BE entering state RECEIVE
  339. Received 44 bytes from RADIUS server
  340. Received RADIUS message
  341. RADIUS message: code=3 (Access-Reject) identifier=4 length=44
  342. Attribute 79 (EAP-Message) length=6
  343. Value: 04 04 00 04
  344. Attribute 80 (Message-Authenticator) length=18
  345. Value: b1 f0 cf c8 f1 0c f7 d1 c2 47 5a cd 45 e3 d1 c0
  346. STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 1.00 sec
  347.  
  348. RADIUS packet matching with station
  349. decapsulated EAP packet (code=4 id=4 len=4) from RADIUS server: EAP Failure
  350. EAPOL: Received EAP-Packet frame
  351. EAPOL: SUPP_BE entering state REQUEST
  352. EAPOL: getSuppRsp
  353. EAP: EAP entering state RECEIVED
  354. EAP: Received EAP-Failure
  355. EAP: EAP entering state FAILURE
  356. CTRL-EVENT-EAP-FAILURE EAP authentication failed
  357. EAPOL: SUPP_PAE entering state HELD
  358. EAPOL: SUPP_BE entering state RECEIVE
  359. EAPOL: SUPP_BE entering state FAIL
  360. EAPOL: SUPP_BE entering state IDLE
  361. eapol_sm_cb: success=0
  362. EAPOL: EAP key not available
  363. EAPOL: EAP key not available
  364. EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
  365. ENGINE: engine deinit
  366. MPPE keys OK: 0 mismatch: 2
  367. FAILURE
Advertisement
Advertisement
Advertisement
RAW Paste Data Copied
Advertisement