Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Reading configuration file 'eapol_config'
- Line: 3 - start of a new network block
- eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
- eapol_flags=0 (0x0)
- key_mgmt: 0x8
- identity - hexdump_ascii(len=8):
- 74 65 73 74 75 73 65 72 testuser
- password - hexdump_ascii(len=12):
- 74 65 73 74 70 61 73 73 77 6f 72 64 testpassword
- ca_cert - hexdump_ascii(len=16):
- 2f 72 6f 6f 74 2f 73 65 72 76 65 72 2e 70 65 6d /root/server.pem
- phase2 - hexdump_ascii(len=9):
- 61 75 74 68 3d 54 54 4c 53 auth=TTLS
- Priority group 0
- id=0 ssid=''
- Authentication server 127.0.0.1:1812
- RADIUS local address: 127.0.0.1:34129
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- Sending fake EAP-Request-Identity
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=0):
- EAP: using real identity - hexdump_ascii(len=8):
- 74 65 73 74 75 73 65 72 testuser
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- WPA: eapol_test_eapol_send(type=0 len=13)
- TX EAP -> RADIUS - hexdump(len=13): 02 00 00 0d 01 74 65 73 74 75 73 65 72
- Encapsulating EAP message into a RADIUS packet
- Learned identity from EAP-Response-Identity - hexdump(len=8): 74 65 73 74 75 73 65 72
- Sending RADIUS message to authentication server
- RADIUS message: code=1 (Access-Request) identifier=0 length=124
- Attribute 1 (User-Name) length=10
- Value: 'testuser'
- Attribute 4 (NAS-IP-Address) length=6
- Value: 127.0.0.1
- Attribute 31 (Calling-Station-Id) length=19
- Value: '02-00-00-00-00-01'
- Attribute 12 (Framed-MTU) length=6
- Value: 1400
- Attribute 61 (NAS-Port-Type) length=6
- Value: 19
- Attribute 77 (Connect-Info) length=24
- Value: 'CONNECT 11Mbps 802.11b'
- Attribute 79 (EAP-Message) length=15
- Value: 02 00 00 0d 01 74 65 73 74 75 73 65 72
- Attribute 80 (Message-Authenticator) length=18
- Value: 27 58 80 0c bb 7e 69 e0 59 58 05 5a 27 1d c9 f6
- Next RADIUS client retransmit in 3 seconds
- EAPOL: SUPP_BE entering state RECEIVE
- Received 64 bytes from RADIUS server
- Received RADIUS message
- RADIUS message: code=11 (Access-Challenge) identifier=0 length=64
- Attribute 79 (EAP-Message) length=8
- Value: 01 01 00 06 15 20
- Attribute 80 (Message-Authenticator) length=18
- Value: 1e 72 5c 28 c8 4a 0a 30 5d 89 b7 09 05 fe d3 fa
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a1 03 9a f4 85 7d 6c 05 24 ec 9e 91
- STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station
- decapsulated EAP packet (code=1 id=1 len=6) from RADIUS server: EAP-Request-TTLS (21)
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
- EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS)
- EAP-TTLS: Phase2 type: EAP
- TLS: Phase2 EAP types - hexdump(len=40): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 11 00 00 00
- CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TTLS: Start (server ver=0, own ver=0)
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- EAP-TTLS: Start
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 95 bytes pending from ssl_out
- SSL: 95 bytes left to be sent out (of total 95 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- WPA: eapol_test_eapol_send(type=0 len=101)
- TX EAP -> RADIUS - hexdump(len=101): 02 01 00 65 15 00 16 03 01 00 5a 01 00 00 56 03 01 50 53 f0 f9 7d 1c f1 61 cc d8 a6 f5 eb 95 cb 8f 02 ea 42 7b 49 ec 01 6a 73 bb 46 38 cd 79 80 89 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 0$
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- Sending RADIUS message to authentication server
- RADIUS message: code=1 (Access-Request) identifier=1 length=230
- Attribute 1 (User-Name) length=10
- Value: 'testuser'
- Attribute 4 (NAS-IP-Address) length=6
- Value: 127.0.0.1
- Attribute 31 (Calling-Station-Id) length=19
- Value: '02-00-00-00-00-01'
- Attribute 12 (Framed-MTU) length=6
- Value: 1400
- Attribute 61 (NAS-Port-Type) length=6
- Value: 19
- Attribute 77 (Connect-Info) length=24
- Value: 'CONNECT 11Mbps 802.11b'
- Attribute 79 (EAP-Message) length=103
- Value: 02 01 00 65 15 00 16 03 01 00 5a 01 00 00 56 03 01 50 53 f0 f9 7d 1c f1 61 cc d8 a6 f5 eb 95 cb 8f 02 ea 42 7b 49 ec 01 6a 73 bb 46 38 cd 79 80 89 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 0$
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a1 03 9a f4 85 7d 6c 05 24 ec 9e 91
- Attribute 80 (Message-Authenticator) length=18
- Value: 11 8f 74 6c fe 60 20 b8 b8 2f f6 1f c8 7b 50 f6
- Next RADIUS client retransmit in 3 seconds
- EAPOL: SUPP_BE entering state RECEIVE
- Received 1090 bytes from RADIUS server
- Received RADIUS message
- RADIUS message: code=11 (Access-Challenge) identifier=1 length=1090
- Attribute 79 (EAP-Message) length=255
- Value: 01 02 04 00 15 c0 00 00 0a b4 16 03 01 00 31 02 00 00 2d 03 01 50 53 f0 f9 f4 97 de dd b8 02 c3 e4 30 4b 45 c1 9d 20 7b 9e 4c 72 59 22 f5 f3 34 11 61 b1 d4 e0 00 00 39 01 00 05 ff 01 00 01 00 16 03 01 08 5e 0b 00 08 5a 00 0$
- Attribute 79 (EAP-Message) length=255
- Value: 74 68 6f 72 69 74 79 30 1e 17 0d 31 32 30 39 31 35 30 32 34 36 32 33 5a 17 0d 31 33 30 39 31 35 30 32 34 36 32 33 5a 30 7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 52 61 64 69 75 73 31 15 30 1$
- Attribute 79 (EAP-Message) length=255
- Value: a8 af 65 a4 6b 1a 8c 68 80 81 7f c0 fe 82 32 24 5d 6b bd 3d bf d3 c4 57 0f 99 65 09 44 67 94 15 eb fa eb 8f 41 49 e6 f9 a6 2a df 6b 79 de a6 84 d5 e9 08 37 65 3f 59 5b 83 13 87 ac 57 bb 2a 06 13 42 18 b3 a5 a7 9a 5a b2 d8 f$
- Attribute 79 (EAP-Message) length=255
- Value: 56 5c 8a b5 a9 32 91 51 ff 2b bc f0 a5 9e 79 6b df 6e d3 1b 41 1c 8d ad 1c b9 81 ce f5 4d c4 cd 9f 24 f7 5d 05 f7 bf a8 f2 c1 64 ad 74 b0 c5 94 09 a8 97 d2 3c 6a 5b 9d 16 e3 e0 0d 23 ab 9c c1 45 b3 45 6d 68 d9 2b c8 80 a3 5$
- Attribute 79 (EAP-Message) length=14
- Value: 5b 00 04 ab 30 82 04 a7 30 82 03 8f
- Attribute 80 (Message-Authenticator) length=18
- Value: d5 af 28 bb cd 1f 7e 07 2e 81 21 bf 16 55 e9 48
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a0 00 9a f4 85 7d 6c 05 24 ec 9e 91
- STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station
- decapsulated EAP packet (code=1 id=2 len=1024) from RADIUS server: EAP-Request-TTLS (21)
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 2740
- SSL: Need 1726 bytes more input data
- SSL: Building ACK (type=21 id=2 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- WPA: eapol_test_eapol_send(type=0 len=6)
- TX EAP -> RADIUS - hexdump(len=6): 02 02 00 06 15 00
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- Sending RADIUS message to authentication server
- RADIUS message: code=1 (Access-Request) identifier=2 length=135
- Attribute 1 (User-Name) length=10
- Value: 'testuser'
- Attribute 4 (NAS-IP-Address) length=6
- Value: 127.0.0.1
- Attribute 31 (Calling-Station-Id) length=19
- Value: '02-00-00-00-00-01'
- Attribute 12 (Framed-MTU) length=6
- Value: 1400
- Attribute 61 (NAS-Port-Type) length=6
- Value: 19
- Attribute 77 (Connect-Info) length=24
- Value: 'CONNECT 11Mbps 802.11b'
- Attribute 79 (EAP-Message) length=8
- Value: 02 02 00 06 15 00
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a0 00 9a f4 85 7d 6c 05 24 ec 9e 91
- Attribute 80 (Message-Authenticator) length=18
- Value: a7 dd 33 ac e1 ce 75 64 df f1 87 07 4c 44 f8 3a
- Next RADIUS client retransmit in 3 seconds
- EAPOL: SUPP_BE entering state RECEIVE
- Received 1090 bytes from RADIUS server
- Received RADIUS message
- RADIUS message: code=11 (Access-Challenge) identifier=2 length=1090
- Attribute 79 (EAP-Message) length=255
- Value: 01 03 04 00 15 c0 00 00 0a b4 a0 03 02 01 02 02 09 00 84 70 ef c0 5f 91 2a 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 52 61 64 69 75 73 3$
- Attribute 79 (EAP-Message) length=255
- Value: 69 75 73 31 12 30 10 06 03 55 04 07 13 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 13 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6$
- Attribute 79 (EAP-Message) length=255
- Value: 58 53 bd b5 49 e6 b3 a2 f1 e9 e5 90 88 b8 fa 04 f6 6f 3b 61 c3 ab 2a fc d8 ca ff 6c e9 86 7b ef fe 24 8d 99 df b3 88 b8 99 1f ee 7a 58 c3 e3 f8 c5 c6 db 79 ab 69 d8 c6 6c b3 7a 2b 79 db b1 ce 45 ed b7 a1 67 28 fd 41 25 31 6$
- Attribute 79 (EAP-Message) length=255
- Value: 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 13 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 13 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0$
- Attribute 79 (EAP-Message) length=14
- Value: 1d c6 a2 85 ee e9 3e dd d1 ab 2f 6a
- Attribute 80 (Message-Authenticator) length=18
- Value: a2 ab 00 56 09 b0 63 cd f5 aa 71 ce db b0 71 96
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a3 01 9a f4 85 7d 6c 05 24 ec 9e 91
- STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station
- decapsulated EAP packet (code=1 id=3 len=1024) from RADIUS server: EAP-Request-TTLS (21)
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 2740
- SSL: Need 712 bytes more input data
- SSL: Building ACK (type=21 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- WPA: eapol_test_eapol_send(type=0 len=6)
- TX EAP -> RADIUS - hexdump(len=6): 02 03 00 06 15 00
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- Sending RADIUS message to authentication server
- RADIUS message: code=1 (Access-Request) identifier=3 length=135
- Attribute 1 (User-Name) length=10
- Value: 'testuser'
- Attribute 4 (NAS-IP-Address) length=6
- Value: 127.0.0.1
- Attribute 31 (Calling-Station-Id) length=19
- Value: '02-00-00-00-00-01'
- Attribute 12 (Framed-MTU) length=6
- Value: 1400
- Attribute 61 (NAS-Port-Type) length=6
- Value: 19
- Attribute 77 (Connect-Info) length=24
- Value: 'CONNECT 11Mbps 802.11b'
- Attribute 79 (EAP-Message) length=8
- Value: 02 03 00 06 15 00
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a3 01 9a f4 85 7d 6c 05 24 ec 9e 91
- Attribute 80 (Message-Authenticator) length=18
- Value: b3 eb 97 e6 44 1e ef c5 b3 65 97 1b 70 b1 6d e7
- Next RADIUS client retransmit in 3 seconds
- EAPOL: SUPP_BE entering state RECEIVE
- Received 784 bytes from RADIUS server
- Received RADIUS message
- RADIUS message: code=11 (Access-Challenge) identifier=3 length=784
- Attribute 79 (EAP-Message) length=255
- Value: 01 04 02 d2 15 80 00 00 0a b4 40 d7 f0 7d f1 57 f5 aa 06 ae e8 cc 99 5e 36 79 f1 72 2d 6c 0e b1 50 da cd 41 0f 0a 44 77 e8 e9 dd ef b5 1d 97 9b f1 8c fc 35 c5 e4 b4 e8 a5 a6 c3 85 ac cf 7b 46 64 19 7d c0 ca 45 91 6f 9c 8c 9$
- Attribute 79 (EAP-Message) length=255
- Value: 18 07 0b 4a 10 ce 3d a5 89 ff 66 e4 2a 47 f9 be 88 d8 06 b4 f7 03 e0 ba 23 5f 01 ff 01 55 9e dd 6a bd 46 b0 51 79 57 64 51 f8 48 3e 7a c5 51 d0 0c dd 39 70 a0 d2 fc 70 8f 60 c1 7a 2e 50 a7 2a 97 8d 06 9d 43 00 01 02 00 80 6$
- Attribute 79 (EAP-Message) length=218
- Value: b1 72 50 5c c7 f3 29 0c b9 10 9b a6 11 8f 1e 1d e2 d8 f3 a1 d6 70 5f c3 a4 4c 46 4b 17 7f 2c 67 0e da ad ad 82 89 08 cc 4d 4c 50 0d 65 d0 b0 c7 c4 f3 02 4b dd 1a 96 08 95 d6 54 5a a3 be 57 ea 36 2d f3 2c 27 58 81 a7 25 b4 a$
- Attribute 80 (Message-Authenticator) length=18
- Value: a1 4d 94 78 b0 9d 98 88 e1 71 11 27 4b 96 8d 23
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a2 06 9a f4 85 7d 6c 05 24 ec 9e 91
- STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station
- decapsulated EAP packet (code=1 id=4 len=722) from RADIUS server: EAP-Request-TTLS (21)
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=722) - Flags 0x80
- SSL: TLS Message Length: 2740
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server hello A
- TLS: Certificate verification failed, error 19 (self signed certificate in certificate chain) depth 1 for '/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.com/CN=Example Certificate Authority'
- CTRL-EVENT-EAP-TLS-CERT-ERROR reason=1 depth=1 subject='/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.com/CN=Example Certificate Authority' err='self signed certificate in certificate chain'
- SSL: (where=0x4008 ret=0x230)
- SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unknown CA
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server certificate B
- OpenSSL: openssl_handshake - SSL_connect error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
- SSL: 7 bytes pending from ssl_out
- SSL: Failed - tls_out available to report error
- SSL: 7 bytes left to be sent out (of total 7 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- WPA: eapol_test_eapol_send(type=0 len=13)
- TX EAP -> RADIUS - hexdump(len=13): 02 04 00 0d 15 00 15 03 01 00 02 02 30
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- Sending RADIUS message to authentication server
- RADIUS message: code=1 (Access-Request) identifier=4 length=142
- Attribute 1 (User-Name) length=10
- Value: 'testuser'
- Attribute 4 (NAS-IP-Address) length=6
- Value: 127.0.0.1
- Attribute 31 (Calling-Station-Id) length=19
- Value: '02-00-00-00-00-01'
- Attribute 12 (Framed-MTU) length=6
- Value: 1400
- Attribute 61 (NAS-Port-Type) length=6
- Value: 19
- Attribute 77 (Connect-Info) length=24
- Value: 'CONNECT 11Mbps 802.11b'
- Attribute 79 (EAP-Message) length=15
- Value: 02 04 00 0d 15 00 15 03 01 00 02 02 30
- Attribute 24 (State) length=18
- Value: a1 02 8f 51 a2 06 9a f4 85 7d 6c 05 24 ec 9e 91
- Attribute 80 (Message-Authenticator) length=18
- Value: 93 8f 95 ed d7 20 03 7a 3e a5 9a e0 88 b8 43 0a
- Next RADIUS client retransmit in 3 seconds
- EAPOL: SUPP_BE entering state RECEIVE
- Received 44 bytes from RADIUS server
- Received RADIUS message
- RADIUS message: code=3 (Access-Reject) identifier=4 length=44
- Attribute 79 (EAP-Message) length=6
- Value: 04 04 00 04
- Attribute 80 (Message-Authenticator) length=18
- Value: b1 f0 cf c8 f1 0c f7 d1 c2 47 5a cd 45 e3 d1 c0
- STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 1.00 sec
- RADIUS packet matching with station
- decapsulated EAP packet (code=4 id=4 len=4) from RADIUS server: EAP Failure
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- eapol_sm_cb: success=0
- EAPOL: EAP key not available
- EAPOL: EAP key not available
- EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
- ENGINE: engine deinit
- MPPE keys OK: 0 mismatch: 2
- FAILURE
Advertisement
Advertisement
Advertisement
RAW Paste Data
Copied
Advertisement