well i m using DHCP to get an ip. now i have retried and now i m not getting any message like cannot assign requested address but i m still getting that EAP-FAILIURE message.<br>i m sending you output for client side hope u can trace the problem<br>thanks for ur help!<br>Selecting BSS from priority group 0<br>0: 00:03:7f:09:60:7e ssid='ATH183' wpa_ie_len=24 rsn_ie_len=0 caps=0x11<br> selected based on WPA IE<br>Trying to associate with 00:03:7f:09:60:7e (SSID='ATH183' freq=2462 MHz)<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>Cancelling scan request<br>WPA: clearing own WPA/RSN IE<br>Automatic auth_alg selection: 0x1<br>WPA: using IEEE 802.11i/D3.0<br>WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1<br>WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01<br>WPA: clearing AP RSN IE<br>WPA: using GTK TKIP<br>WPA: using
PTK TKIP<br>WPA: using KEY_MGMT 802.1X<br>WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01<br>No keys have been configured - skip key clearing<br>wpa_driver_wext_set_drop_unencrypted<br>State: DISCONNECTED -> ASSOCIATING<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>wpa_driver_wext_associate<br>Setting authentication timeout: 10 sec 0 usec<br>EAPOL: External notification - portControl=Auto<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b06 len=8<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b04 len=12<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b1a len=14<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:03:7f:09:60:7e<br>State: ASSOCIATING ->
ASSOCIATED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>Associated to a new BSS: BSSID=00:03:7f:09:60:7e<br>No keys have been configured - skip key clearing<br>Associated with 00:03:7f:09:60:7e<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>WPA: Association event - clear replay counter<br>EAPOL: External notification - portEnabled=0<br>EAPOL: External notification - portValid=0<br>EAPOL: External notification - portEnabled=1<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>EAP: EAP entering state INITIALIZE<br>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>EAP: EAP entering state IDLE<br>Setting authentication timeout: 10 sec 0 usec<br>Cancelling scan request<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RX
EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01<br>Setting authentication timeout: 70 sec 0 usec<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>EAP: using real identity - hexdump_ascii(len=8):<br> 74 65 73 74 75 73 65
72 testuser<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 00 00 0d 01 74 65 73 74 75 73 65 72<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=26): 01 00 00 16 01 01 00 16 04 10 a5 9b 8e 83 0e 3c fd aa 30 e8 29 32 07 e2 c3 c5<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=1 method=4 vendor=0 vendorMethod=0<br>EAP: EAP entering state GET_METHOD<br>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)<br>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74
6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>EAP: EAP entering state METHOD<br>EAP-MD5: Challenge - hexdump(len=16): a5 9b 8e 83 0e 3c fd aa 30 e8 29 32 07 e2 c3 c5<br>EAP-MD5: Generating Challenge Response<br>EAP-MD5: Response - hexdump(len=16): 13 e3 bb c0 31 ca a7 ad 5c d0 4d 54 d7 5b 57 32<br>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=26): 01 00 00 16 02 01 00 16 04 10 13 e3 bb c0 31 ca a7 ad 5c d0 4d 54 d7 5b 57 32<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=8): 01 00 00 04 04 01 00 04<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Failure<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering
state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=13):<br> 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>EAPOL: startWhen --> 0<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>Wireless event: cmd=0x8b06 len=8<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface -
hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>Wireless event: cmd=0x8b19 len=8<br>Received 2199 bytes of scan results (9 BSSes)<br>Scan results: 9<br>Selecting BSS from priority group 0<br>0: 00:03:7f:09:60:7e ssid='ATH183' wpa_ie_len=24 rsn_ie_len=0 caps=0x11<br> selected based on WPA IE<br>Already associated with the selected AP.<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface -
hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface -
hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface -
hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05 01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE
entering state RECEIVE<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface -
hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05 01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05 01<br>EAPOL: Received EAP-Packet
frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05 01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface -
hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 02 00 05
01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:00:00:00:00:00<br>Setting scan request: 0 sec 100000 usec<br>Added BSSID 00:03:7f:09:60:7e into blacklist<br>CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0
seq_len=0 key_len=0<br>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0<br>State: ASSOCIATED -> DISCONNECTED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>EAPOL: External notification - portEnabled=0<br>EAPOL: SUPP_PAE entering state DISCONNECTED<br>EAPOL: SUPP_BE entering state INITIALIZE<br>EAP: EAP entering state DISABLED<br>EAPOL: External notification - portValid=0<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:03:7f:09:60:7e<br>State: DISCONNECTED -> ASSOCIATED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>Associated to a new BSS: BSSID=00:03:7f:09:60:7e<br>No keys have been configured - skip key clearing<br>Associated with 00:03:7f:09:60:7e<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38
33 39 37 2d 35 00<br>WPA: Association event - clear replay counter<br>EAPOL: External notification - portEnabled=0<br>EAPOL: External notification - portValid=0<br>EAPOL: External notification - portEnabled=1<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>EAP: EAP entering state INITIALIZE<br>EAP: deinitialize previously used EAP method (4, MD5) at INITIALIZE<br>EAP: EAP entering state IDLE<br>Setting authentication timeout: 10 sec 0 usec<br>Cancelling scan request<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01<br>Setting authentication timeout: 70 sec 0 usec<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>EAPOL: SUPP_BE
entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>EAP: using real identity - hexdump_ascii(len=8):<br> 74 65 73 74 75 73 65 72 testuser<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 00 00 0d 01 74 65 73 74 75 73 65 72<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX ctrl_iface -
hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=13):<br> 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>EAPOL: startWhen --> 0<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0<br>EAP: EAP entering state RETRANSMIT<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state
IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=17): 01 00 00 0d 02 00 00 0d 01 74 65 73 74 75 73 65 72<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=26): 01 00 00 16 01 01 00 16 04 10 93 4a 43 e7 27 aa b2 cc f6 ad ca 6e e6 3d 21 53<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=1 method=4 vendor=0 vendorMethod=0<br>EAP: EAP entering state GET_METHOD<br>EAP: Initialize selected EAP method: vendor 0 method 4 (MD5)<br>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 4 (MD5) selected<br>CTRL_IFACE monitor send - hexdump(len=22): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 31 38 33 39 37 2d 35 00<br>EAP: EAP entering state METHOD<br>EAP-MD5: Challenge - hexdump(len=16): 93 4a 43 e7 27 aa b2 cc f6 ad ca 6e e6 3d 21 53<br>EAP-MD5: Generating Challenge Response<br>EAP-MD5:
Response - hexdump(len=16): cd 26 41 20 f8 fa 95 cb 00 2b 02 81 7d be b0 47<br>EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL - hexdump(len=26): 01 00 00 16 02 01 00 16 04 10 cd 26 41 20 f8 fa 95 cb 00 2b 02 81 7d be b0 47<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:03:7f:09:60:7e<br>RX EAPOL - hexdump(len=8): 01 00 00 04 04 01 00 04<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Failure<br>EAP: EAP entering state DISCARD<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=13):<br> 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55 53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=6):<br> 53 54 41 54 55
53 STATUS<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e
47 PING<br>RX ctrl_iface - hexdump_ascii(len=4):<br> 50 49 4e 47 PING<br>CTRL-EVENT-TERMINATING - signal 2 received<br>regards <br>shantanu<br><br><b><i>tnt@kalik.co.yu</i></b> wrote:<blockquote class="replbq" style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"> Yes, radius is now working fine. What are you using (? going to use) to<br>assign an IP address to the client - radius or DHCP? If you are using<br>DHCP something is wrong with address/netmask assignment. If
you are not<br>using anything at the moment you will need to pick one.<br><br>As for wpasupplicant log - it doesn't mean much to me (our WiFi lot is<br>all XP). At a glance, you fail to associate with an AP even before<br>radius traffic starts. It's complaining about IP address from the<br>start. Are you sure that's working properly?<br><br>Framed-IP-Address and Framed-IP-Netmask are used to assign them to the<br>client if NAS is not doing DHCP.<br><br>Ivan Kalik<br>Kalik Informatika ISP<br><br></blockquote><br><BR><BR><p>
<hr size=1></hr> Download prohibited? No problem! <a href="http://us.rd.yahoo.com/mail/in/ywebmessenger/*http://in.messenger.yahoo.com/webmessengerpromo.php">CHAT</a> from any browser, without download.