hello,<br>this is my client side output:<br>Authentication with 00:03:7f:09:60:a0 timed out.<br>Added BSSID 00:03:7f:09:60:a0 into blacklist<br>State: ASSOCIATED -> DISCONNECTED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>wpa_driver_wext_disassociate<br>No keys have been configured - skip key clearing<br>EAPOL: External notification - portEnabled=0<br>EAPOL: SUPP_PAE entering state DISCONNECTED<br>EAPOL: SUPP_BE entering state INITIALIZE<br>EAP: EAP entering state DISABLED<br>EAPOL: External notification - portValid=0<br>Setting scan request: 0 sec 0 usec<br>State: DISCONNECTED -> SCANNING<br>Starting AP scan (specific SSID)<br>Scan SSID - hexdump_ascii(len=6):<br> 41 54 48 31 38 32
ATH182<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:00:00:00:00:00<br>BSSID 00:03:7f:09:60:a0 blacklist count incremented to 2<br>CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys<br>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0<br>State: SCANNING -> DISCONNECTED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>EAPOL: External notification - portEnabled=0<br>EAPOL: External notification - portValid=0<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RTM_NEWLINK:
operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b19 len=8<br>Received 1844 bytes of scan results (7 BSSes)<br>Scan results: 7<br>Selecting BSS from priority group 0<br>0: 00:03:7f:09:60:7e ssid='ATH183' wpa_ie_len=0 rsn_ie_len=22 caps=0x11<br> skip - SSID mismatch<br>1: 00:03:7f:09:60:a0 ssid='ATH182' wpa_ie_len=0 rsn_ie_len=26 caps=0x11<br> skip - blacklisted<br>2: 00:18:0a:01:0f:31 ssid='AUKBC_MESH' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br> skip - no WPA/RSN IE<br>3: 00:a0:f8:ce:7d:18 ssid='symbol3' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br> skip - no WPA/RSN IE<br>4: 00:03:7f:09:60:15 ssid='AUKBC4' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br> skip - no WPA/RSN IE<br>5: 00:18:0a:01:03:fe ssid='AUKBC_MESH' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br> skip - no WPA/RSN IE<br>6: 00:18:0a:01:07:34 ssid='AUKBC_MESH' wpa_ie_len=0 rsn_ie_len=0 caps=0x1<br> skip - no WPA/RSN IE<br>No APs found - clear
blacklist and try again<br>Removed BSSID 00:03:7f:09:60:a0 from blacklist (clear)<br>Selecting BSS from priority group 0<br>0: 00:03:7f:09:60:7e ssid='ATH183' wpa_ie_len=0 rsn_ie_len=22 caps=0x11<br> skip - SSID mismatch<br>1: 00:03:7f:09:60:a0 ssid='ATH182' wpa_ie_len=0 rsn_ie_len=26 caps=0x11<br> selected based on RSN IE<br>Trying to associate with 00:03:7f:09:60:a0 (SSID='ATH182' freq=2437 MHz)<br>Cancelling scan request<br>WPA: clearing own WPA/RSN IE<br>Automatic auth_alg selection: 0x1<br>RSN: using IEEE 802.11i/D9.0<br>WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2<br>WPA: clearing AP WPA IE<br>WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 01 00<br>WPA: using GTK TKIP<br>WPA: using PTK CCMP<br>WPA: using KEY_MGMT 802.1X<br>WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00<br>No keys have been
configured - skip key clearing<br>wpa_driver_wext_set_drop_unencrypted<br>State: DISCONNECTED -> ASSOCIATING<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>wpa_driver_wext_associate<br>Setting authentication timeout: 10 sec 0 usec<br>EAPOL: External notification - portControl=Auto<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b06 len=8<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b04 len=12<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b1a len=14<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:03:7f:09:60:a0<br>State: ASSOCIATING -> ASSOCIATED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>Associated to a new BSS: BSSID=00:03:7f:09:60:a0<br>No keys have been
configured - skip key clearing<br>Associated with 00:03:7f:09:60:a0<br>WPA: Association event - clear replay counter<br>EAPOL: External notification - portEnabled=0<br>EAPOL: External notification - portValid=0<br>EAPOL: External notification - portEnabled=1<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>EAP: EAP entering state INITIALIZE<br>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>EAP: EAP entering state IDLE<br>Setting authentication timeout: 10 sec 0 usec<br>Cancelling scan request<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01<br>Setting authentication timeout: 70 sec 0 usec<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE
entering state AUTHENTICATING<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>EAP: using real identity - hexdump_ascii(len=8):<br> 74 65 73 74 75 73 65 72 testuser<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 00 00 0d 01 74 65 73 74 75 73 65 72<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL - hexdump(len=26): 01 00 00 16 01 01 00 16 04 10 6d db 12 c2 ff 1f c6
22 64 45 01 07 f9 73 8b 14<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=1 method=4 vendor=0 vendorMethod=0<br>EAP: EAP entering state GET_METHOD<br>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)<br>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>EAP: EAP entering state METHOD<br>EAP-MD5: Challenge - hexdump(len=16): 6d db 12 c2 ff 1f c6 22 64 45 01 07 f9 73 8b 14<br>EAP-MD5: Generating Challenge Response<br>EAP-MD5: Response - hexdump(len=16): e8 5f fa a3 fe 5d 10 a6 4a 65 11 6d f0 25 19 35<br>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=26): 01 00 00 16 02 01 00 16 04 10 e8 5f fa a3 fe 5d 10 a6 4a 65 11 6d f0 25 19 35<br>EAPOL: SUPP_BE
entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL - hexdump(len=8): 01 00 00 04 04 01 00 04<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Failure<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>EAPOL: startWhen --> 0<br>EAPOL: authWhile --> 0<br>EAPOL: SUPP_BE entering state TIMEOUT<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05 01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL:
getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>EAP: using real identity - hexdump_ascii(len=8):<br> 74 65 73 74 75 73 65 72 testuser<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 02 00 0d 01 74 65 73 74 75 73 65 72<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL - hexdump(len=26): 01 00 00 16 01 03 00 16 04 10 68 c8 ea 0c 97 f7 11 d3 f3 2a cd 62 8c 37 4d 40<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE
entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=3 method=4 vendor=0 vendorMethod=0<br>EAP: EAP entering state GET_METHOD<br>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)<br>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>EAP: EAP entering state METHOD<br>EAP-MD5: Challenge - hexdump(len=16): 68 c8 ea 0c 97 f7 11 d3 f3 2a cd 62 8c 37 4d 40<br>EAP-MD5: Generating Challenge Response<br>EAP-MD5: Response - hexdump(len=16): 03 76 fc e7 ce bc 66 b6 cd 50 2a 73 b3 cf eb 93<br>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=26): 01 00 00 16 02 03 00 16 04 10 03 76 fc e7 ce bc 66 b6 cd 50 2a 73 b3 cf eb 93<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL -
hexdump(len=8): 01 00 00 04 04 03 00 04<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Failure<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>EAPOL: startWhen --> 0<br>EAPOL: authWhile --> 0<br>EAPOL: SUPP_BE entering state TIMEOUT<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>RX EAPOL from 00:03:7f:09:60:a0<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 04 00 05 01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=4
method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>EAP: using real identity - hexdump_ascii(len=8):<br> 74 65 73 74 75 73 65 72 testuser<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br><br><br>the problem is i am getting EAP-FAILURE on client side even when server is giving ACCESS-ACCEPT!!!!<br>i am not able to figure out the problem output of server is same as that in earlier mail,<br>one more thing what will be end message of this, will it be authentication or association? When i run GUI for supplicant it is showing associated not authenticated! is it end of connection and after it should i get
an IP from that AP, even if i try for DHCP i am not able to get an IP!!!!<br>it is all messed up, please do reply for this prob!!!<br>regards <br>shantanu<br><br><b><i>tnt@kalik.co.yu</i></b> wrote:<blockquote class="replbq" style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"> Well, now you dont have any IP address in your accept packet. Not a<br>problem if you are doing DHCP. Otherwise you need to return IP address,<br>netmask, MTU, Service-Type, DNS servers etc.<br><br>Leave that Framed-User DEFAULT entry alone - it should be there. You need<br>to add stuff to your user config:<br><br>testuser Cleartext-Password:=yourpassword<br> Framed-IP-Address=1.2.3.4<br> Framed-MTU=yourMTU<br> Framed-IP-Netmask=255.255.255.255<br>etc.<br><br>Ivan Kalik<br>Kalik Informatika ISP<br><br><br>Dana 30/5/2007, "shantanu choudhary" <shantanu_843@yahoo.co.in> piše:<br><br>--- snip ---<br>>Sending
Access-Accept of id 2 to 192.168.2.182 port 1028<br>> EAP-Message = 0x03020004<br>> Message-Authenticator = 0x00000000000000000000000000000000<br>> User-Name = "testuser"<br>>Finished request 1<br>>Going to the next request<br>>Waking up in 6 seconds...<br>>--- Walking the entire request list ---<br>>Cleaning up request 0 ID 1 with timestamp 465d506e<br>>Cleaning up request 1 ID 2 with timestamp 465d506e<br>>Nothing to do. Sleeping until we see a request.<br>><br>>it is sending ACCESS ACCEPT but no access reject or failure!!!!<br>>and when i try to check AP statistics from server it is showing an entry for AUTHENTICATION FAILURE!!!!!!!<br>><br>>sorry for disturbing u again n again but can u help me out????<br>>please!!<br>>shantanu<br>><br><br>- <br>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html<br></shantanu_843@yahoo.co.in></blockquote><br><BR><BR><p>
<hr size=1></hr> Did you know? You can CHAT without downloading messenger. <a href="http://us.rd.yahoo.com/mail/in/ywebmessenger1/*http://in.messenger.yahoo.com/webmessengerpromo.php"> Know how!</a>