You are not logged in.

#1 2009-05-13 10:55:45

anhadikal
Member
Registered: 2009-05-13
Posts: 6

[solved] wpa_supplicant PEAP problem

hello,

I don't used Linux for some weeks in my university. I reinstall arch and now wpa_supplicant don't want connect to the wlan. The wpa_supplicant.conf is the same, the certificates are the same, I can't understand why wpa_supplicant do not connect. Here are some logs:

<anh@lappi> ~] $ sudo wpa_supplicant -D wext -i wlan0 -c /etc/wpa_supplicant.conf 

CTRL-EVENT-SCAN-RESULTS 
Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
Associated with 00:12:da:ae:73:81
CTRL-EVENT-EAP-STARTED EAP authentication started
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
EAP-TLV: TLV Result - Failure
CTRL-EVENT-EAP-FAILURE EAP authentication failed
Authentication with 00:12:da:ae:73:81 timed out.
CTRL-EVENT-SCAN-RESULTS 
Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
ioctl[SIOCSIWENCODEEXT]: No such file or directory
Associated with 00:12:da:ae:73:81
CTRL-EVENT-EAP-STARTED EAP authentication started
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
EAP-TLV: TLV Result - Failure
CTRL-EVENT-EAP-FAILURE EAP authentication failed
^CCTRL-EVENT-TERMINATING - signal 2 received
<anh@lappi> ~] $

and with -d option:

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Priority group 2
   id=0 ssid='anhHome'
Priority group 1
   id=1 ssid='ubi'
Initializing interface (2) 'wlan0'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:19:d2:71:a9:c9
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): ba f0 4e 66 89 ef 51 d2 99 03 91 ca bd f5 f2 81
WPS: Build Beacon and Probe Response IEs
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Response Type (2)
WPS:  * UUID-E
WPS:  * Manufacturer
WPS:  * Model Name
WPS:  * Model Number
WPS:  * Serial Number
WPS:  * Primary Device Type
WPS:  * Device Name
WPS:  * Config Methods (0)
WPS:  * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan0
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Cached scan results are empty - not posting
Selecting BSS from priority group 2
Try to find WPA-enabled AP
Try to find non-WPA AP
Selecting BSS from priority group 1
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Scan results did not fit - trying larger buffer (8192 bytes)
Received 7142 bytes of scan results (18 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 2
Try to find WPA-enabled AP
0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
6: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
7: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
8: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
9: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
10: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
11: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
12: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
13: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
14: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
15: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
16: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
17: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
6: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
7: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
8: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
9: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
10: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
11: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
12: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
13: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
14: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
15: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
16: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
17: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:12:da:ae:73:81 ssid='ubi'
Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=24): 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c02 len=223
Association info event
req_ies - hexdump(len=52): 00 03 75 62 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RX EAPOL from 00:12:da:ae:73:81
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:da:ae:73:81
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:12:da:ae:73:81
No keys have been configured - skip key clearing
Associated with 00:12:da:ae:73:81
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=00:12:da:ae:73:81
RX EAPOL from 00:12:da:ae:73:81
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=44):
     00 6e 65 74 77 6f 72 6b 69 64 3d 75 62 69 2c 6e   _networkid=ubi,n
     61 73 69 64 3d 73 30 31 2d 77 6c 63 34 34 30 30   asid=s01-wlc4400
     2d 32 2c 70 6f 72 74 69 64 3d 32 39               -2,portid=29    
EAP: using real identity - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 95 bytes pending from ssl_out
SSL: 95 bytes left to be sent out (of total 95 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1010) - Flags 0xc0
SSL: TLS Message Length: 4710
SSL: Need 3710 bytes more input data
SSL: Building ACK (type=25 id=4 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1006) - Flags 0x40
SSL: Need 2710 bytes more input data
SSL: Building ACK (type=25 id=5 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1006) - Flags 0x40
SSL: Need 1710 bytes more input data
SSL: Building ACK (type=25 id=6 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1006) - Flags 0x40
SSL: Need 710 bytes more input data
SSL: Building ACK (type=25 id=7 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=716) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=3 buf='/C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=2 buf='/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/O=Universitaet Bielefeld/CN=CA der Universitaet Bielefeld - G02/emailAddress=hrz-ra@uni-bielefeld.de'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0 buf='/C=DE/O=Universitaet Bielefeld/CN=radius.uni-bielefeld.de'
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 318 bytes pending from ssl_out
SSL: 318 bytes left to be sent out (of total 318 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=61) - Flags 0x80
SSL: TLS Message Length: 51
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
SSL: Building ACK (type=25 id=9 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=35) - Flags 0x00
EAP-PEAP: received 29 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=10 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=12): [REMOVED]
SSL: 66 bytes left to be sent out (of total 66 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=59) - Flags 0x00
EAP-PEAP: received 53 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 0b 00 1a 10 d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5 6c 64 61 70 36
EAP-PEAP: received Phase 2: code=1 identifier=11 length=31
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 11 mschapv2_id 11
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5):
     6c 64 61 70 36                                    ldap6           
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
MSCHAPV2: Username - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
MSCHAPV2: auth_challenge - hexdump(len=16): d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5
MSCHAPV2: peer_challenge - hexdump(len=16): 1d 5f c6 5a 21 6f 26 19 6d bd 80 00 a3 af 93 01
MSCHAPV2: username - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
MSCHAPV2: password - hexdump_ascii(len=32): [REMOVED]
MSCHAPV2: NT Response - hexdump(len=24): 03 98 14 44 ac 9c cf 07 ec 63 94 03 cb e6 17 51 81 6d a2 42 d8 8d 4f 8b
MSCHAPV2: Auth Response - hexdump(len=20): d3 e9 36 dc c7 f2 a3 35 a6 94 72 7d 6e f1 f2 2d b6 8b 47 7a
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
EAP-MSCHAPV2: TX identifier 11 mschapv2_id 11 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=66): [REMOVED]
SSL: 122 bytes left to be sent out (of total 122 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x00
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 02
EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 02
EAP-TLV: Result TLV - hexdump(len=2): 00 02
EAP-TLV: TLV Result - Failure
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
SSL: 66 bytes left to be sent out (of total 66 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed unsuccessfully
Setting authentication timeout: 2 sec 0 usec
Authentication with 00:12:da:ae:73:81 timed out.
Added BSSID 00:12:da:ae:73:81 into blacklist
wpa_driver_wext_disassociate
No keys have been configured - skip key clearing
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Scan results did not fit - trying larger buffer (8192 bytes)
Received 8184 bytes of scan results (21 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 2
Try to find WPA-enabled AP
0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
4: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
5: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
6: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
7: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
8: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
9: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
10: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
11: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
12: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
13: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
15: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
16: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
17: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
18: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
19: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
1: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
2: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
3: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
4: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
5: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
6: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
7: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
8: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
9: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
10: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
11: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
12: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
13: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
15: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
16: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
17: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
18: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
19: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:12:da:ae:73:81 ssid='ubi'
Trying to associate with 00:12:da:ae:73:81 (SSID='ubi' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=24): 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c02 len=223
Association info event
req_ies - hexdump(len=52): 00 03 75 62 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:da:ae:73:81
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:12:da:ae:73:81
No keys have been configured - skip key clearing
Associated with 00:12:da:ae:73:81
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
ENGINE: engine deinit
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:12:da:ae:73:81
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=44):
     00 6e 65 74 77 6f 72 6b 69 64 3d 75 62 69 2c 6e   _networkid=ubi,n
     61 73 69 64 3d 73 30 31 2d 77 6c 63 34 34 30 30   asid=s01-wlc4400
     2d 32 2c 70 6f 72 74 69 64 3d 32 39               -2,portid=29    
EAP: using real identity - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 95 bytes pending from ssl_out
SSL: 95 bytes left to be sent out (of total 95 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1010) - Flags 0xc0
SSL: TLS Message Length: 4710
SSL: Need 3710 bytes more input data
SSL: Building ACK (type=25 id=3 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state RETRANSMIT
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1006) - Flags 0x40
SSL: Need 2710 bytes more input data
SSL: Building ACK (type=25 id=4 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1006) - Flags 0x40
SSL: Need 1710 bytes more input data
SSL: Building ACK (type=25 id=5 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1006) - Flags 0x40
SSL: Need 710 bytes more input data
SSL: Building ACK (type=25 id=6 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=716) - Flags 0x00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=3 buf='/C=DE/O=Deutsche Telekom AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=2 buf='/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=DE/O=Universitaet Bielefeld/CN=CA der Universitaet Bielefeld - G02/emailAddress=hrz-ra@uni-bielefeld.de'
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0 buf='/C=DE/O=Universitaet Bielefeld/CN=radius.uni-bielefeld.de'
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 318 bytes pending from ssl_out
SSL: 318 bytes left to be sent out (of total 318 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=61) - Flags 0x80
SSL: TLS Message Length: 51
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0)
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
SSL: Building ACK (type=25 id=8 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=35) - Flags 0x00
EAP-PEAP: received 29 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=12): [REMOVED]
SSL: 66 bytes left to be sent out (of total 66 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=59) - Flags 0x00
EAP-PEAP: received 53 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 0a 00 1a 10 d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5 6c 64 61 70 36
EAP-PEAP: received Phase 2: code=1 identifier=10 length=31
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5):
     6c 64 61 70 36                                    ldap6           
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
MSCHAPV2: Username - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
MSCHAPV2: auth_challenge - hexdump(len=16): d4 8b c6 a6 66 72 b0 5d 94 ae 39 f9 2f ca 00 d5
MSCHAPV2: peer_challenge - hexdump(len=16): 72 ed a4 b2 77 67 32 3e 85 98 d0 f2 1c 97 7e 49
MSCHAPV2: username - hexdump_ascii(len=7):
     6d 6b 6f 63 68 32 32                              mkoch22         
MSCHAPV2: password - hexdump_ascii(len=32): [REMOVED]
MSCHAPV2: NT Response - hexdump(len=24): 0f 22 e8 1a b7 a9 e5 29 15 46 16 0c c6 c3 4e 36 69 7b e2 2c 47 44 da a6
MSCHAPV2: Auth Response - hexdump(len=20): 90 15 0d 8d 3a 5e 2f 5f ee af 2f aa 07 01 b7 25 f3 6a 9b 43
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=66): [REMOVED]
SSL: 122 bytes left to be sent out (of total 122 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=43) - Flags 0x00
EAP-PEAP: received 37 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0b 00 0b 21 80 03 00 02 00 02
EAP-PEAP: received Phase 2: code=1 identifier=11 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 02
EAP-TLV: Result TLV - hexdump(len=2): 00 02
EAP-TLV: TLV Result - Failure
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
SSL: 66 bytes left to be sent out (of total 66 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:12:da:ae:73:81
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:12:da:ae:73:81
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed unsuccessfully
Setting authentication timeout: 2 sec 0 usec
Authentication with 00:12:da:ae:73:81 timed out.
BSSID 00:12:da:ae:73:81 blacklist count incremented to 2
wpa_driver_wext_disassociate
No keys have been configured - skip key clearing
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b19 len=8
Scan results did not fit - trying larger buffer (8192 bytes)
Received 8185 bytes of scan results (21 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 2
Try to find WPA-enabled AP
0: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
1: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
2: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - blacklisted
3: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
6: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
7: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
8: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
9: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
10: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
11: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
12: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
13: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
15: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
16: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
17: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
18: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
19: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
1: 00:12:da:ae:72:12 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
2: 00:12:da:ae:73:81 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - blacklisted
3: 00:12:da:ae:73:82 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
4: 00:12:da:ae:72:31 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
5: 00:12:da:ae:72:32 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
6: 00:12:da:ae:72:52 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
7: 00:12:da:ae:72:51 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - SSID mismatch
8: 00:12:da:ae:72:10 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
9: 00:12:da:ae:72:13 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
10: 00:12:da:ae:72:14 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
11: 00:12:da:ae:73:84 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
12: 00:12:da:ae:73:80 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
13: 00:12:da:ae:73:83 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
14: 00:12:da:ae:72:33 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
15: 00:12:da:ae:72:54 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
16: 00:12:da:ae:72:50 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
17: 00:12:da:ae:72:30 ssid='unibi' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
18: 00:12:da:ae:72:34 ssid='guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
19: 00:12:da:ae:72:53 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
20: 00:15:fa:a1:f2:32 ssid='VPN/WEB' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
Selecting BSS from priority group 1
Try to find WPA-enabled AP
0: 00:12:da:ae:72:11 ssid='ubi' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:12:da:ae:72:11 ssid='ubi'
Trying to associate with 00:12:da:ae:72:11 (SSID='ubi' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=24): 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8c02 len=223
Association info event
req_ies - hexdump(len=52): 00 03 75 62 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RX EAPOL from 00:12:da:ae:72:11
EAPOL: Received EAP-Packet frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:12:da:ae:72:11
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:12:da:ae:72:11
No keys have been configured - skip key clearing
Associated with 00:12:da:ae:72:11
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
ENGINE: engine deinit
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=00:12:da:ae:72:11
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Removed BSSID 00:12:da:ae:73:81 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6

and here is wpa_supplicant.conf:

network={
    ssid="anhHome"
    #psk="XXX"
    psk=e240a6f7bbafcc2c3...XXX...2e80391
    priority=2
}
network={
    ssid="ubi"
    key_mgmt=WPA-EAP
    eap=PEAP
    phase2="auth=MSCHAPV2"
    ca_cert="/etc/ca-certificates/deutsche-telekom-root-ca-2.pem"
    identity="mkoch22"
    #password="AXXX"
    password=ac3049,...XXX...2b9956c0
    priority=1
}

please help me sad

greets

Last edited by anhadikal (2009-05-14 10:44:25)

Offline

#2 2009-05-14 10:43:53

anhadikal
Member
Registered: 2009-05-13
Posts: 6

Re: [solved] wpa_supplicant PEAP problem

oke, I found it ...

I changes the password to the plain password and not the passphrase. It works!

greets

Offline

Board footer

Powered by FluxBB