ALT Linux Bugzilla
– Attachment 2604 Details for
Bug 15569
(using ipw2200+wpa_supplicant) SSL: fatal:bad record mac
New bug
|
Search
|
[?]
|
Help
Register
|
Log In
[x]
|
Forgot Password
Login:
[x]
|
EN
|
RU
wpa.err
wpa.err (text/plain), 33.53 KB, created by
Ivan Zakharyaschev
on 2008-05-07 20:10:52 MSD
(
hide
)
Description:
wpa.err
Filename:
MIME Type:
Creator:
Ivan Zakharyaschev
Created:
2008-05-07 20:10:52 MSD
Size:
33.53 KB
patch
obsolete
>Initializing interface 'wlan' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' >Reading configuration file '/etc/wpa_supplicant.conf' >ap_scan=1 >Priority group 0 > id=0 ssid='MIAN' >Initializing interface (2) 'wlan' >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:13:ce:0e:b8:61 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >wpa_driver_wext_set_drop_unencrypted >Setting scan request: 0 sec 100000 usec >Added interface wlan >RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan' added >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=4): > 4d 49 41 4e MIAN >Trying to get current scan results first without requesting a new scan to speed up initial association >Scan results did not fit - trying larger buffer (8192 bytes) >Received 5377 bytes of scan results (22 BSSes) >Scan results: 22 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:11:95:8b:91:72 ssid='MIAN' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:11:95:8b:91:72 ssid='MIAN' >Try to find non-WPA AP >Trying to associate with 00:11:95:8b:91:72 (SSID='MIAN' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >Overriding auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 10 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:11:95:8b:91:72 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:11:95:8b:91:72 >No keys have been configured - skip key clearing >Associated with 00:11:95:8b:91:72 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan' added >RX EAPOL from 00:11:95:8b:91:72 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=1) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 88 bytes pending from ssl_out >SSL: 88 bytes left to be sent out (of total 88 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0xc0 >SSL: TLS Message Length: 4326 >SSL: Need 2852 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0x40 >SSL: Need 1374 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1380) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate request A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 194 bytes pending from ssl_out >SSL: 194 bytes left to be sent out (of total 194 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=53) - Flags 0x80 >SSL: TLS Message Length: 43 >SSL: (where=0x4008 ret=0x214) >SSL: SSL3 alert: write (local SSL3 detected an error):fatal:bad record mac >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >OpenSSL: tls_connection_handshake - SSL_connect error:1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad record mac >SSL: 23 bytes pending from ssl_out >SSL: Failed - tls_out available to report error >SSL: 23 bytes left to be sent out (of total 23 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: startWhen --> 0 >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Failure >EAP: EAP entering state FAILURE >CTRL-EVENT-EAP-FAILURE EAP authentication failed >EAPOL: SUPP_PAE entering state HELD >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state FAIL >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE >ENGINE: engine deinit >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=1) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 88 bytes pending from ssl_out >SSL: 88 bytes left to be sent out (of total 88 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0xc0 >SSL: TLS Message Length: 4326 >SSL: Need 2852 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b1a len=12 >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Failure >EAP: EAP entering state FAILURE >CTRL-EVENT-EAP-FAILURE EAP authentication failed >EAPOL: SUPP_PAE entering state HELD >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state FAIL >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE >ENGINE: engine deinit >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=9 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=1) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 88 bytes pending from ssl_out >SSL: 88 bytes left to be sent out (of total 88 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0xc0 >SSL: TLS Message Length: 4326 >SSL: Need 2852 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Failure >EAP: EAP entering state FAILURE >CTRL-EVENT-EAP-FAILURE EAP authentication failed >EAPOL: SUPP_PAE entering state HELD >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state FAIL >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE >ENGINE: engine deinit >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=12 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=1) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 88 bytes pending from ssl_out >SSL: 88 bytes left to be sent out (of total 88 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0xc0 >SSL: TLS Message Length: 4326 >SSL: Need 2852 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Failure >EAP: EAP entering state FAILURE >CTRL-EVENT-EAP-FAILURE EAP authentication failed >EAPOL: SUPP_PAE entering state HELD >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state FAIL >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE >ENGINE: engine deinit >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=15 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=16 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=1) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 88 bytes pending from ssl_out >SSL: 88 bytes left to be sent out (of total 88 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=17 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0xc0 >SSL: TLS Message Length: 4326 >SSL: Need 2852 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Failure >EAP: EAP entering state FAILURE >CTRL-EVENT-EAP-FAILURE EAP authentication failed >EAPOL: SUPP_PAE entering state HELD >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state FAIL >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE >ENGINE: engine deinit >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=18 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:11:95:8b:91:72 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: ASSOCIATED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:00:00:00:00:00 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 5 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1223 bytes of scan results (5 BSSes) >Scan results: 5 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:11:95:8b:91:72 ssid='<hidden>' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:02:cf:7b:b4:20 ssid='pbfoto' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >2: 00:1c:f0:47:5e:b6 ssid='voxnet_174' wpa_ie_len=28 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >3: 00:11:95:8f:da:25 ssid='Tel_134-73-45' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 > skip - no WPA/RSN IE >4: 00:1e:8c:77:c2:fd ssid='voxnet_219' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 > skip - no WPA/RSN IE >Try to find non-WPA AP >0: 00:11:95:8b:91:72 ssid='<hidden>' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:02:cf:7b:b4:20 ssid='pbfoto' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >2: 00:1c:f0:47:5e:b6 ssid='voxnet_174' wpa_ie_len=28 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >3: 00:11:95:8f:da:25 ssid='Tel_134-73-45' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >4: 00:1e:8c:77:c2:fd ssid='voxnet_219' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 > skip - SSID mismatch >No APs found - clear blacklist and try again >Removed BSSID 00:00:00:00:00:00 from blacklist (clear) >Removed BSSID 00:11:95:8b:91:72 from blacklist (clear) >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:11:95:8b:91:72 ssid='<hidden>' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:02:cf:7b:b4:20 ssid='pbfoto' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >2: 00:1c:f0:47:5e:b6 ssid='voxnet_174' wpa_ie_len=28 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >3: 00:11:95:8f:da:25 ssid='Tel_134-73-45' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 > skip - no WPA/RSN IE >4: 00:1e:8c:77:c2:fd ssid='voxnet_219' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 > skip - no WPA/RSN IE >Try to find non-WPA AP >0: 00:11:95:8b:91:72 ssid='<hidden>' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:02:cf:7b:b4:20 ssid='pbfoto' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >2: 00:1c:f0:47:5e:b6 ssid='voxnet_174' wpa_ie_len=28 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >3: 00:11:95:8f:da:25 ssid='Tel_134-73-45' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >4: 00:1e:8c:77:c2:fd ssid='voxnet_219' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 > skip - SSID mismatch >No suitable AP found. >Setting scan request: 0 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=4): > 4d 49 41 4e MIAN >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 1975 bytes of scan results (8 BSSes) >Scan results: 8 >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:11:95:8b:91:72 ssid='<hidden>' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:11:95:8b:91:72 ssid='MIAN' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:11:95:8b:91:72 ssid='MIAN' >Try to find non-WPA AP >Trying to associate with 00:11:95:8b:91:72 (SSID='MIAN' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >Overriding auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 10 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:11:95:8b:91:72 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:11:95:8b:91:72 >No keys have been configured - skip key clearing >Associated with 00:11:95:8b:91:72 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan' added >RX EAPOL from 00:11:95:8b:91:72 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=0): >EAP: using real identity - hexdump_ascii(len=8): > 6d 69 61 6e 63 6f 6e 66 mianconf >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=1) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 88 bytes pending from ssl_out >SSL: 88 bytes left to be sent out (of total 88 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:11:95:8b:91:72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1484) - Flags 0xc0 >SSL: TLS Message Length: 4326 >SSL: Need 2852 bytes more input data >SSL: Building ACK >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: startWhen --> 0 >CTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan >State: ASSOCIATED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >No keys have been configured - skip key clearing >EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit >ENGINE: engine deinit >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 15569
:
2603
| 2604