Reading configuration file 'eapol_test.conf' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=1 fast_reauth=1 Line: 940 - start of a new network block ssid - hexdump_ascii(len=7): 65 64 75 72 6f 61 6d eduroam key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 identity - hexdump_ascii(len=30): 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 300-145-415@wire 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b less.cam.ac.uk anonymous_identity - hexdump_ascii(len=19): 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 @wireless.cam.ac 2e 75 6b .uk password - hexdump_ascii(len=8): 78 77 65 33 67 37 6d 69 xwe3g7mi ca_cert - hexdump_ascii(len=61): 2f 75 73 72 2f 73 68 61 72 65 2f 63 61 2d 63 65 /usr/share/ca-ce 72 74 69 66 69 63 61 74 65 73 2f 6d 6f 7a 69 6c rtificates/mozil 6c 61 2f 41 64 64 54 72 75 73 74 5f 45 78 74 65 la/AddTrust_Exte 72 6e 61 6c 5f 52 6f 6f 74 2e 63 72 74 rnal_Root.crt phase1 - hexdump_ascii(len=11): 70 65 61 70 6c 61 62 65 6c 3d 31 peaplabel=1 phase2 - hexdump_ascii(len=16): 61 75 74 68 65 61 70 3d 4d 53 43 48 41 50 56 32 autheap=MSCHAPV2 Priority group 0 id=0 ssid='eduroam' Authentication server 131.111.8.231:1812 RADIUS local address: 193.60.89.41:46977 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=19): 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 @wireless.cam.ac 2e 75 6b .uk EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=24) TX EAP -> RADIUS - hexdump(len=24): 02 00 00 18 01 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len=19): 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=0 length=146 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=26 Value: 02 00 00 18 01 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b Attribute 80 (Message-Authenticator) length=18 Value: 06 17 a2 88 aa 63 62 6d 0a f6 90 ca 38 e1 f6 92 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=0 length=64 Attribute 79 (EAP-Message) length=8 Value: 01 01 00 06 19 20 Attribute 80 (Message-Authenticator) length=18 Value: 55 fe d2 2f 63 95 93 e8 92 b6 30 e3 0f 4a e1 16 Attribute 24 (State) length=18 Value: 13 b7 13 d3 13 b6 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.27 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=1 len=6) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) EAP-PEAP: Force new label for key derivation TLS: Phase2 EAP types - hexdump(len=40): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 11 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 221 bytes pending from ssl_out SSL: 221 bytes left to be sent out (of total 221 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=231) TX EAP -> RADIUS - hexdump(len=231): 02 01 00 e7 19 80 00 00 00 dd 16 03 01 00 d8 01 00 00 d4 03 01 53 8e 09 de 94 a9 ae f5 1a 7d 43 4a 87 59 61 d8 c4 bb 16 d3 22 a3 fc f2 bc 27 8d 35 d7 65 93 85 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=1 length=371 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=233 Value: 02 01 00 e7 19 80 00 00 00 dd 16 03 01 00 d8 01 00 00 d4 03 01 53 8e 09 de 94 a9 ae f5 1a 7d 43 4a 87 59 61 d8 c4 bb 16 d3 22 a3 fc f2 bc 27 8d 35 d7 65 93 85 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 Attribute 24 (State) length=18 Value: 13 b7 13 d3 13 b6 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 12 a5 70 3a b4 59 68 9b ad ba 1c 2b 37 f6 73 5a Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1090 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=1 length=1090 Attribute 79 (EAP-Message) length=255 Value: 01 02 04 00 19 c0 00 00 0f 58 16 03 01 00 31 02 00 00 2d 03 01 53 8e 09 de 79 8a 7d c0 49 66 68 b3 02 38 51 2a a7 f2 79 ed 94 eb e9 d1 b0 95 2f d5 db 4f 40 20 00 c0 14 00 00 05 ff 01 00 01 00 16 03 01 0d c4 0b 00 0d c0 00 0d bd 00 04 d8 30 82 04 d4 30 82 03 bc a0 03 02 01 02 02 10 6d 8d 87 77 66 fc 2b 6c 8e d6 22 40 1b d4 a9 7e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 36 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 16 30 14 06 03 55 04 03 13 0d 54 45 52 45 4e 41 20 53 53 4c 20 43 41 30 1e 17 0d 31 33 30 31 31 38 30 30 30 30 30 30 5a 17 0d 31 36 30 31 31 38 32 33 35 39 35 39 5a 30 81 98 31 0b 30 09 06 03 55 04 06 13 02 47 42 31 10 30 0e 06 03 55 04 08 13 07 45 6e 67 6c 61 6e 64 31 12 30 10 06 03 Attribute 79 (EAP-Message) length=255 Value: 55 04 07 13 09 43 61 6d 62 72 69 64 67 65 31 20 30 1e 06 03 55 04 0a 13 17 55 6e 69 76 65 72 73 69 74 79 20 6f 66 20 43 61 6d 62 72 69 64 67 65 31 1a 30 18 06 03 55 04 0b 13 11 43 6f 6d 70 75 74 69 6e 67 20 53 65 72 76 69 63 65 31 25 30 23 06 03 55 04 03 13 1c 6e 65 74 77 6f 72 6b 2e 74 6f 6b 65 6e 73 2e 63 73 78 2e 63 61 6d 2e 61 63 2e 75 6b 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e3 5b 2a ec 53 55 d2 88 b2 b2 53 c4 70 43 3a b5 73 de 61 ea 8b 3f 91 15 48 4c 5e 75 56 59 36 69 cc 26 76 93 40 ff c2 9d 27 13 d2 31 e2 1a 79 49 c9 de b2 c3 18 46 7b 80 9e cc d2 38 ee d0 97 24 dd 92 60 81 3e af 29 a3 fc 40 b8 dc 79 b8 fc 75 30 08 cd a9 cb 29 31 f9 d7 a3 9f 41 0f 6c 40 aa 6c 19 37 b7 30 b6 22 4c 4f Attribute 79 (EAP-Message) length=255 Value: d9 19 d0 6e 9c d7 b0 c5 59 ec aa c3 e2 52 1e 6a 5c 65 0b d2 25 87 fc 04 1d 41 ba 16 6e 7e 37 32 da 30 39 db b1 c1 c8 aa d8 73 84 87 72 e5 72 42 14 33 07 22 34 18 7f c0 df e3 b3 7d 1c 30 8e 69 62 4a d2 6d 84 1d fa 17 78 37 b6 b4 34 f2 33 e0 cf 04 58 64 a0 71 d4 a9 ee 91 7e e0 26 3c 8a 72 fe bf a0 9b ea 39 71 7f 79 07 d8 6b 0d b9 e6 7d f0 b3 c7 dc c0 9f f5 d5 94 c4 5a ed a2 ac f3 e7 bf e5 26 2a ca 6e 9c 8e a1 fe 5e 80 fe b3 89 8b c7 1a 91 8d 07 3b 99 02 03 01 00 01 a3 82 01 79 30 82 01 75 30 1f 06 03 55 1d 23 04 18 30 16 80 14 0c bd 93 68 0c f3 de ab a3 49 6b 2b 37 57 47 ea 90 e3 b9 ed 30 1d 06 03 55 1d 0e 04 16 04 14 94 52 5b a1 e3 00 e7 76 03 d7 47 ad 15 90 46 d3 0f c3 19 b3 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 0c 06 03 55 1d 13 01 01 Attribute 79 (EAP-Message) length=255 Value: ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 22 06 03 55 1d 20 04 1b 30 19 30 0d 06 0b 2b 06 01 04 01 b2 31 01 02 02 1d 30 08 06 06 67 81 0c 01 02 02 30 3a 06 03 55 1d 1f 04 33 30 31 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 2e 74 63 73 2e 74 65 72 65 6e 61 2e 6f 72 67 2f 54 45 52 45 4e 41 53 53 4c 43 41 2e 63 72 6c 30 6d 06 08 2b 06 01 05 05 07 01 01 04 61 30 5f 30 35 06 08 2b 06 01 05 05 07 30 02 86 29 68 74 74 70 3a 2f 2f 63 72 74 2e 74 63 73 2e 74 65 72 65 6e 61 2e 6f 72 67 2f 54 45 52 45 4e 41 53 53 4c 43 41 2e 63 72 74 30 26 06 08 2b 06 01 05 05 07 30 01 86 1a 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 74 63 73 2e 74 65 72 65 6e 61 2e 6f 72 67 30 27 06 03 55 1d 11 04 20 30 Attribute 79 (EAP-Message) length=14 Value: 1e 82 1c 6e 65 74 77 6f 72 6b 2e 74 Attribute 80 (Message-Authenticator) length=18 Value: c3 c6 d9 bd 52 e2 02 da ea 49 06 95 d2 46 c2 ae Attribute 24 (State) length=18 Value: 13 b7 13 d3 12 b5 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=2 len=1024) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1024) - Flags 0xc0 SSL: TLS Message Length: 3928 SSL: Need 2914 bytes more input data SSL: Building ACK (type=25 id=2 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 02 00 06 19 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=2 length=146 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 02 02 00 06 19 00 Attribute 24 (State) length=18 Value: 13 b7 13 d3 12 b5 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: e5 4f a0 94 33 91 bf 57 51 da a1 60 0b c9 b9 0b Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1086 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=2 length=1086 Attribute 79 (EAP-Message) length=255 Value: 01 03 03 fc 19 40 6f 6b 65 6e 73 2e 63 73 78 2e 63 61 6d 2e 61 63 2e 75 6b 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 7a b0 c3 21 2f bd bf a9 00 17 46 e9 a9 41 6f de 5c 91 38 7a e5 8a b2 77 e3 b9 75 03 9f cb f6 42 6b e2 4a 81 97 62 0c ac a3 a6 a6 e5 72 89 3a 35 2c af 95 26 2a 6d cf 77 d0 cc 5e 85 c7 55 96 81 73 e0 5b 46 2f 4c 67 e9 a9 74 70 69 26 33 de cc 37 ec 03 99 72 16 bd 8b ce 78 7a d8 5b d3 d8 39 42 ff 20 d2 3e 13 6a 36 f4 19 73 10 3b 23 1a af e5 53 44 5c 21 ed 6c 92 ac a9 ca 85 9a af 39 b6 af 85 14 13 1f 7a 0e a5 a8 e4 f7 1c 00 25 e0 ee 9c 7c 94 98 0f 27 3c 4b ef 9c 55 20 3e 02 9b 3c 54 c7 cd 62 fd fb 16 cc 30 45 aa ea cf c0 46 a3 4b 7c 93 c9 41 23 f8 fa 54 b3 92 08 dd ed a1 1e e2 22 8b 36 77 fc be 63 4e 76 64 b9 7b a1 be b6 Attribute 79 (EAP-Message) length=255 Value: ef 71 a4 a4 7d 61 f2 50 f3 ae 6a 6a c9 fb d0 e4 95 ae 15 e8 f3 f0 0f d1 66 11 c3 2b c3 d0 18 e3 0c a7 bd c2 f3 4a 06 70 74 6b 89 04 97 d7 18 24 00 04 9c 30 82 04 98 30 82 03 80 a0 03 02 01 02 02 10 4b c8 14 03 2f 07 fa 6a a4 f0 da 29 df 61 79 ba 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 97 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 55 54 31 17 30 15 06 03 55 04 07 13 0e 53 61 6c 74 20 4c 61 6b 65 20 43 69 74 79 31 1e 30 1c 06 03 55 04 0a 13 15 54 68 65 20 55 53 45 52 54 52 55 53 54 20 4e 65 74 77 6f 72 6b 31 21 30 1f 06 03 55 04 0b 13 18 68 74 74 70 3a 2f 2f 77 77 77 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 31 1f 30 1d 06 03 55 04 03 13 16 55 54 4e 2d 55 53 45 52 46 69 72 73 74 2d 48 61 72 64 77 61 72 65 30 1e Attribute 79 (EAP-Message) length=255 Value: 17 0d 30 39 30 35 31 38 30 30 30 30 30 30 5a 17 0d 32 30 30 35 33 30 31 30 34 38 33 38 5a 30 36 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 16 30 14 06 03 55 04 03 13 0d 54 45 52 45 4e 41 20 53 53 4c 20 43 41 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c3 e3 48 c4 2f 5c c1 cb a9 99 fd 1b a2 83 5d 8a 3d ad 3a d0 e2 a4 43 1f 4d 0e fe 35 25 30 a5 69 1b c4 e8 e5 c1 8f 54 7e e1 6a a2 9a 5c 5c de 3d fc 02 ce 96 b8 5f 8f 83 5b cc 60 40 90 f8 e4 b6 3a 25 9c 5f 14 51 ec b1 e7 af 9e 50 a1 31 55 c7 02 bd ac 52 8a 7f 35 8e 82 fa 84 ad 15 fe a2 7f 83 10 3a 55 53 94 2c 01 16 74 94 54 63 28 a3 f2 5b 29 3d 94 88 80 20 e2 14 59 21 19 b4 a4 98 e1 60 e6 f2 eb a2 80 Attribute 79 (EAP-Message) length=255 Value: 83 43 e0 ad 68 f3 79 19 8b 68 43 51 3f 8a 9b 41 85 0c 35 8c 5d b5 f1 b6 e5 a7 c3 83 b5 6b 23 6f d4 a5 eb 50 e5 94 f1 4a 5f ee 27 4b 14 12 15 24 4c 0d cf 62 8d b7 00 21 ad 3a 32 0f 58 0b 5f 1e 9b d1 df 9d 8e a9 19 35 50 2f 41 a9 ad 3b c6 e0 45 b2 53 39 7f 21 bf 22 1a 87 5c 34 ae 52 6f 07 7d a2 0b 4e 9f 2b 79 a6 7d 13 dd f5 7f 83 7c 2f 5a 5d 77 78 78 91 a0 14 bf 7d 02 03 01 00 01 a3 82 01 3e 30 82 01 3a 30 1f 06 03 55 1d 23 04 18 30 16 80 14 a1 72 5f 26 1b 28 98 43 95 5d 07 37 d5 85 96 9d 4b d2 c3 45 30 1d 06 03 55 1d 0e 04 16 04 14 0c bd 93 68 0c f3 de ab a3 49 6b 2b 37 57 47 ea 90 e3 b9 ed 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 18 06 03 55 1d 20 04 11 30 0f 30 0d 06 0b 2b 06 01 Attribute 79 (EAP-Message) length=10 Value: 04 01 b2 31 01 02 02 1d Attribute 80 (Message-Authenticator) length=18 Value: ca 2a 91 d6 50 08 f6 0b 41 93 f9 62 f1 c3 b5 0a Attribute 24 (State) length=18 Value: 13 b7 13 d3 11 b4 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=3 len=1020) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1020) - Flags 0x40 SSL: Need 1900 bytes more input data SSL: Building ACK (type=25 id=3 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 03 00 06 19 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=3 length=146 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 02 03 00 06 19 00 Attribute 24 (State) length=18 Value: 13 b7 13 d3 11 b4 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 68 b2 bb e3 84 9b bf ab 7b e7 bb 20 7c 69 0f 9c Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1086 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=3 length=1086 Attribute 79 (EAP-Message) length=255 Value: 01 04 03 fc 19 40 30 44 06 03 55 1d 1f 04 3d 30 3b 30 39 a0 37 a0 35 86 33 68 74 74 70 3a 2f 2f 63 72 6c 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 55 54 4e 2d 55 53 45 52 46 69 72 73 74 2d 48 61 72 64 77 61 72 65 2e 63 72 6c 30 74 06 08 2b 06 01 05 05 07 01 01 04 68 30 66 30 3d 06 08 2b 06 01 05 05 07 30 02 86 31 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 55 54 4e 41 64 64 54 72 75 73 74 53 65 72 76 65 72 5f 43 41 2e 63 72 74 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 4e 23 ee 48 9c f6 85 8b 71 c4 0a 6e 73 93 72 c0 3a 8e 80 8a d9 b3 ca b2 d4 01 9c 28 cf f2 5c 0e 21 44 93 0b b6 1a 21 Attribute 79 (EAP-Message) length=255 Value: e3 98 01 94 0e 67 49 81 1e be 3d 0d 4e 60 da ef a0 31 4e 95 ef f3 dd 7a 5a 82 20 43 b6 a1 63 43 b3 50 69 43 62 4b 56 62 b0 34 8a b9 13 43 59 93 ec 14 79 88 f3 48 93 e8 9d c9 fa 87 72 0c 6b 56 a0 c3 15 8d 68 a5 87 1f 71 2d e6 5a 6d 3c 69 71 40 04 55 dc a0 43 94 20 45 38 78 d7 bd 8a d8 39 c6 df 09 b7 5a 9a a9 03 b8 28 10 78 cd bf 01 1b 5a 11 3e 38 f4 d8 1b 34 79 cf 33 d2 01 fd ac 98 cd 6d 47 11 90 4c bb b9 5b d8 70 e7 d5 af b6 cc c4 86 e6 75 c0 9e 29 b6 2b 0f 2a a5 69 02 0d e3 e9 a2 b4 5d c0 f3 ce 2c 6a 85 38 76 61 c6 49 82 ab 51 b3 82 a6 b9 41 98 28 98 fb 6b fe 8a 16 ff 31 7e 54 47 a8 3c dc 43 26 a9 9b 05 b7 9e c0 34 43 91 30 d4 32 c3 11 5a e1 00 04 40 30 82 04 3c 30 82 03 24 a0 03 02 01 02 02 10 48 4b ac f1 aa c7 d7 13 43 d1 a2 74 35 49 97 25 30 0d Attribute 79 (EAP-Message) length=255 Value: 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 30 1e 17 0d 30 35 30 36 30 37 30 38 30 39 31 30 5a 17 0d 32 30 30 35 33 30 31 30 34 38 33 38 5a 30 81 97 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 55 54 31 17 30 15 06 03 55 04 07 13 0e 53 61 6c 74 20 4c 61 6b 65 20 43 69 74 79 31 1e 30 1c 06 03 55 04 0a 13 15 54 68 65 20 55 53 45 52 54 52 55 53 54 20 4e 65 74 77 6f 72 6b 31 21 30 1f 06 03 55 04 0b Attribute 79 (EAP-Message) length=255 Value: 13 18 68 74 74 70 3a 2f 2f 77 77 77 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 31 1f 30 1d 06 03 55 04 03 13 16 55 54 4e 2d 55 53 45 52 46 69 72 73 74 2d 48 61 72 64 77 61 72 65 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 b1 f7 c3 38 3f b4 a8 7f cf 39 82 51 67 d0 6d 9f d2 ff 58 f3 e7 9f 2b ec 0d 89 54 99 b9 38 99 16 f7 e0 21 79 48 c2 bb 61 74 12 96 1d 3c 6a 72 d5 3c 10 67 3a 39 ed 2b 13 cd 66 eb 95 09 33 a4 6c 97 b1 e8 c6 ec c1 75 79 9c 46 5e 8d ab d0 6a fd b9 2a 55 17 10 54 b3 19 f0 9a f6 f1 b1 5d b6 a7 6d fb e0 71 17 6b a2 88 fb 00 df fe 1a 31 77 0c 9a 01 7a b1 32 e3 2b 01 07 38 6e c3 a5 5e 23 bc 45 9b 7b 50 c1 c9 30 8f db e5 2b 7a d3 5b fb 33 40 1e a0 d5 98 17 bc 8b 87 c3 89 d3 5d a0 8e b2 aa Attribute 79 (EAP-Message) length=10 Value: aa f6 8e 69 88 06 c5 fa Attribute 80 (Message-Authenticator) length=18 Value: e5 f2 81 aa 1f 39 1c 1e 30 15 87 91 25 2c 1c 07 Attribute 24 (State) length=18 Value: 13 b7 13 d3 10 b3 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=4 len=1020) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1020) - Flags 0x40 SSL: Need 886 bytes more input data SSL: Building ACK (type=25 id=4 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 04 00 06 19 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=4 length=146 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 02 04 00 06 19 00 Attribute 24 (State) length=18 Value: 13 b7 13 d3 10 b3 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 25 e1 1d 04 87 cf bd ca 14 90 af 06 a4 13 19 38 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 956 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=4 length=956 Attribute 79 (EAP-Message) length=255 Value: 01 05 03 7c 19 00 89 21 f3 08 9d 69 2e 09 33 9b 29 0d 46 0f 8c cc 49 34 b0 69 51 bd f9 06 cd 68 ad 66 4c bc 3e ac 61 bd 0a 88 0e c8 df 3d ee 7c 04 4c 9d 0a 5e 6b 91 d6 ee c7 ed 28 8d ab 4d 87 89 73 d0 6e a4 d0 1e 16 8b 14 e1 76 44 03 7f 63 ac e4 cd 49 9c c5 92 f4 ab 32 a1 48 5b 02 03 01 00 01 a3 81 aa 30 81 a7 30 1f 06 03 55 1d 23 04 18 30 16 80 14 ad bd 98 7a 34 b4 26 f7 fa c4 26 54 ef 03 bd e0 24 cb 54 1a 30 1d 06 03 55 1d 0e 04 16 04 14 a1 72 5f 26 1b 28 98 43 95 5d 07 37 d5 85 96 9d 4b d2 c3 45 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 44 06 03 55 1d 1f 04 3d 30 3b 30 39 a0 37 a0 35 86 33 68 74 74 70 3a 2f 2f 63 72 6c 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 Attribute 79 (EAP-Message) length=255 Value: 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 3c ec 7b e0 ae a3 0e 96 6d 30 d7 85 c6 d2 68 5b 45 5a 82 a6 34 0f b0 c9 92 23 5e 11 6d 08 11 b2 74 09 23 3a 35 25 73 58 5e ca b9 7c 28 fa 47 ec f9 a0 03 58 50 b6 53 ef 8c db 39 e4 67 e9 d8 ca 28 46 d4 a7 e0 f5 38 75 f8 e7 cb 5c bf 1d 11 3c 6a 40 9b 2d 44 56 d3 f7 ff 05 28 32 0c 15 c8 64 45 93 e8 21 24 8f 2d da 7a 84 7b 4f cf cd b2 25 7c 77 10 d3 94 d1 04 91 a8 25 1c 09 22 0f 7d 44 35 11 14 ef af 00 fe 5e ea 5f 8e b0 d9 92 59 ba fc 13 96 a0 18 01 56 ce da f6 28 0b b1 af dd 5c 4f 5c b2 f3 8f 5a 71 cf ed 18 ad 63 88 1d 8e 95 f7 ea 95 e7 1f ad 90 b8 84 08 47 85 7f 22 2f 1a 1d 48 30 d6 4c 08 d8 37 19 67 32 2b eb 5c d0 b2 fc 6e 57 9f 04 35 5e Attribute 79 (EAP-Message) length=255 Value: 90 00 7e 11 c7 de 13 2a cd a4 6d 45 26 c7 88 56 a0 f0 6a f7 d8 e7 fc 27 7e 67 08 d0 bd fa b6 c3 61 02 01 65 b9 b8 2f cf 5a 16 03 01 01 4b 0c 00 01 47 03 00 17 41 04 14 03 ab 91 91 7c 84 6f 5d 1a 21 59 60 cc cd e5 a8 c3 22 b2 9d 18 42 d4 15 7a f9 8f ba 43 e8 ff 0c 4b c4 c7 6c eb 80 b7 b0 40 e3 3b 1a 6d 1e 3c 27 a2 86 00 d6 1b 94 30 21 78 fc 97 64 ca 31 1a 01 00 71 cc 50 6e ae d6 a4 fd 6c ec 34 57 cd 2f 13 09 07 54 c7 27 95 11 fb d3 5e ea 46 89 2a 30 a2 5d 83 1b 5d a4 8c 36 94 e7 b8 e6 28 32 3b e7 f7 6a 1e 93 69 32 84 b9 d4 90 22 c7 02 6f 2c 5c f4 6a f2 ef 8d 4e 2d 69 cf 32 d4 82 41 3c a8 89 6d f8 3f 93 c0 a4 6e 6a 8c 5e d6 4e e7 7a 25 cf 8b 52 81 1b c5 94 ec a6 50 6a 08 9c 51 9e 42 dc fe b3 7a 5b e5 b8 c2 da cd 06 51 77 a0 c6 6b f0 01 93 9a c5 93 99 Attribute 79 (EAP-Message) length=135 Value: 27 40 0b 0c dd 3f 19 58 93 75 56 2b b4 30 25 21 73 dd bc ca 4e 44 68 26 72 a6 6f 6b 93 e8 9e 1d bc 51 7b 4f 1b ab bb c6 4e 1e f0 30 0f 62 2d be 99 30 1b 64 f1 39 57 27 e9 e2 58 24 63 65 e6 12 4f 02 7b 86 e2 57 59 e5 dc 19 da e3 00 e1 5d 56 26 e7 9f 53 e3 03 dd 45 7f 50 81 ca d7 1f ac 8e ce 63 18 e1 f3 92 be fe a6 c9 2a 3a 3f d3 df 23 8e 14 d7 9b e6 a1 8b c1 b8 1f 88 c3 16 03 01 00 04 0e 00 00 00 Attribute 80 (Message-Authenticator) length=18 Value: c7 46 f0 c8 2f 93 6e a5 a7 76 83 76 aa a1 9c 15 Attribute 24 (State) length=18 Value: 13 b7 13 d3 17 b2 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=5 len=892) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=892) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=3 buf='/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root' CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 buf='/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=NL/O=TERENA/CN=TERENA SSL CA' CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=NL/O=TERENA/CN=TERENA SSL CA' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=GB/ST=England/L=Cambridge/O=University of Cambridge/OU=Computing Service/CN=network.tokens.csx.cam.ac.uk' CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=GB/ST=England/L=Cambridge/O=University of Cambridge/OU=Computing Service/CN=network.tokens.csx.cam.ac.uk' EAP: Status notification: remote certificate verification (param=success) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 134 bytes pending from ssl_out SSL: 134 bytes left to be sent out (of total 134 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=144) TX EAP -> RADIUS - hexdump(len=144): 02 05 00 90 19 80 00 00 00 86 16 03 01 00 46 10 00 00 42 41 04 da ea 88 80 2e 80 7c 16 d0 fb 30 a4 e6 b9 40 fe c7 29 6f dd ae 62 56 17 0f 64 ef 09 cd f7 39 e1 ba 1c 62 a7 2b 8a a0 5a b0 6f 0b 43 a4 2f 68 dc 43 a7 f3 7b 27 fa d7 40 f0 63 26 f6 53 4b a5 af 14 03 01 00 01 01 16 03 01 00 30 7d 09 cd c3 a9 10 09 cc 8d b4 fb 21 b2 c6 4d d1 8f 5d f8 f7 cd fd 72 1a 8a dc 3b 59 ea 0a da cc 0b 5b f1 eb 4b fe dd 4e 8f 7f 83 69 4c 0b b9 59 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=5 length=284 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=146 Value: 02 05 00 90 19 80 00 00 00 86 16 03 01 00 46 10 00 00 42 41 04 da ea 88 80 2e 80 7c 16 d0 fb 30 a4 e6 b9 40 fe c7 29 6f dd ae 62 56 17 0f 64 ef 09 cd f7 39 e1 ba 1c 62 a7 2b 8a a0 5a b0 6f 0b 43 a4 2f 68 dc 43 a7 f3 7b 27 fa d7 40 f0 63 26 f6 53 4b a5 af 14 03 01 00 01 01 16 03 01 00 30 7d 09 cd c3 a9 10 09 cc 8d b4 fb 21 b2 c6 4d d1 8f 5d f8 f7 cd fd 72 1a 8a dc 3b 59 ea 0a da cc 0b 5b f1 eb 4b fe dd 4e 8f 7f 83 69 4c 0b b9 59 Attribute 24 (State) length=18 Value: 13 b7 13 d3 17 b2 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: db 3c 42 27 d4 3d 2b 73 8a 19 be 29 2f c4 50 53 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 123 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=5 length=123 Attribute 79 (EAP-Message) length=67 Value: 01 06 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 f5 ea 85 1d 2e a6 4c d6 1a 54 b1 c4 5d 4a e9 1f 7a 2d 1c cb eb 3a b8 8d 4a 60 88 35 f8 0d e5 f3 12 40 2d 1a 2e b3 8a 2a a1 a7 4a 38 05 b3 14 d5 Attribute 80 (Message-Authenticator) length=18 Value: 12 b5 e0 d8 d3 e9 40 84 5b af cc 04 4d 76 54 48 Attribute 24 (State) length=18 Value: 13 b7 13 d3 16 b1 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=6 len=65) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=65) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out SSL: No Application Data included SSL: No data to be sent out EAP-PEAP: TLS done, proceed to Phase 2 EAP-PEAP: using label 'client PEAP encryption' in key derivation OpenSSL: Using internal PRF EAP-PEAP: Derived key - hexdump(len=64): bb 79 0b 52 cc 87 11 f3 fa 7e 59 19 2c 33 da 00 36 2a c4 9d de 8e 28 73 e4 34 75 26 bb 4c ab a2 5c 1e 62 57 8c 3f 92 47 94 26 82 40 53 85 74 0b aa bb 1e 4a b2 24 3f 48 b6 a6 4e a4 63 f3 7c da SSL: Building ACK (type=25 id=6 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 06 00 06 19 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=6 length=146 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 02 06 00 06 19 00 Attribute 24 (State) length=18 Value: 13 b7 13 d3 16 b1 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 8a df 99 f5 4a cf 9b 7a 94 e6 95 8b f8 4f f2 df Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 101 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=6 length=101 Attribute 79 (EAP-Message) length=45 Value: 01 07 00 2b 19 00 17 03 01 00 20 c4 f7 1e 2e 71 d3 2f 8b ac 56 1f 0e e5 ff 58 55 70 ad 88 94 38 28 12 e7 35 0e fb 34 5a 67 bc 70 Attribute 80 (Message-Authenticator) length=18 Value: a6 1a 20 3a b4 04 00 85 45 33 2c 38 61 df 7f 55 Attribute 24 (State) length=18 Value: 13 b7 13 d3 15 b0 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=7 len=43) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=43) - Flags 0x00 EAP-PEAP: received 37 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 07 00 05 01 EAP-PEAP: received Phase 2: code=1 identifier=7 length=5 EAP-PEAP: Phase 2 Request: type=1 EAP: using real identity - hexdump_ascii(len=30): 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 300-145-415@wire 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b less.cam.ac.uk EAP-PEAP: Encrypting Phase 2 data - hexdump(len=35): 02 07 00 23 01 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b SSL: 106 bytes left to be sent out (of total 106 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=112) TX EAP -> RADIUS - hexdump(len=112): 02 07 00 70 19 00 17 03 01 00 20 38 bf 19 a2 78 01 c6 45 7a 4f 20 3d 86 4e 3f 12 35 31 d8 96 f4 15 f3 27 56 3e 68 ee 5e ac dc 3a 17 03 01 00 40 38 d0 5b 52 e2 fb e6 0b 79 1a 0d 0b 85 da 4b ff ee a4 7c f7 69 8e 06 b4 31 68 b0 88 69 d4 cb c9 86 ef f0 6f 5d f3 ce 88 9c 93 6f 83 ba e3 55 f6 57 b7 99 60 a3 4c f1 b0 b5 0f f3 e9 ca a8 1e 4f Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=7 length=252 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=114 Value: 02 07 00 70 19 00 17 03 01 00 20 38 bf 19 a2 78 01 c6 45 7a 4f 20 3d 86 4e 3f 12 35 31 d8 96 f4 15 f3 27 56 3e 68 ee 5e ac dc 3a 17 03 01 00 40 38 d0 5b 52 e2 fb e6 0b 79 1a 0d 0b 85 da 4b ff ee a4 7c f7 69 8e 06 b4 31 68 b0 88 69 d4 cb c9 86 ef f0 6f 5d f3 ce 88 9c 93 6f 83 ba e3 55 f6 57 b7 99 60 a3 4c f1 b0 b5 0f f3 e9 ca a8 1e 4f Attribute 24 (State) length=18 Value: 13 b7 13 d3 15 b0 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 24 28 76 21 e0 98 f3 6f 17 19 16 6b 66 08 10 6a Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 149 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=7 length=149 Attribute 79 (EAP-Message) length=93 Value: 01 08 00 5b 19 00 17 03 01 00 50 24 f5 b6 19 df 1b 84 e4 4c 0c 98 f9 cd 34 5d 5e 40 9f f2 6d 19 f1 c2 bd dc e7 2e e3 1f 05 22 d4 66 8e 0f ae 9b 0a f7 04 93 a8 58 8d bf 20 d7 7b a4 c8 59 7c fb 85 84 13 f7 79 a1 12 ad bb a7 6a 79 38 ae 0d c1 1e 0b 01 d2 a3 5a 30 37 f1 1c 18 Attribute 80 (Message-Authenticator) length=18 Value: b9 3f 0f e1 02 ff fe 83 98 05 1d 25 92 ec e7 6f Attribute 24 (State) length=18 Value: 13 b7 13 d3 14 bf 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.20 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=8 len=91) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=91) - Flags 0x00 EAP-PEAP: received 85 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=52): 1a 01 08 00 33 10 7c 64 03 5c 4f d1 b1 87 31 a5 9d 73 fd 5f 52 0e 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b EAP-PEAP: received Phase 2: code=1 identifier=8 length=56 EAP-PEAP: Phase 2 Request: type=26 EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 EAP-MSCHAPV2: RX identifier 8 mschapv2_id 8 EAP-MSCHAPV2: Received challenge EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=30): 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 300-145-415@wire 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b less.cam.ac.uk EAP-MSCHAPV2: Generating Challenge Response Get randomness: len=16 entropy=0 random from os_get_random - hexdump(len=16): 39 a1 1d ee fa 34 fc 37 64 24 36 50 c4 7e 56 d2 random_mix_pool - hexdump(len=20): 0d b9 b1 bf 70 7c bd fa 8b 8c 0a 46 d8 96 87 a4 8e 89 0d 7d random from internal pool - hexdump(len=16): 52 c7 66 0a bf 85 ed d3 d8 c1 5b 8c 5d 36 f0 8e mixed random - hexdump(len=16): 6b 66 7b e4 45 b1 11 e4 bc e5 6d dc 99 48 a6 5c MSCHAPV2: Identity - hexdump_ascii(len=30): 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 300-145-415@wire 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b less.cam.ac.uk MSCHAPV2: Username - hexdump_ascii(len=30): 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 300-145-415@wire 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b less.cam.ac.uk MSCHAPV2: auth_challenge - hexdump(len=16): 7c 64 03 5c 4f d1 b1 87 31 a5 9d 73 fd 5f 52 0e MSCHAPV2: peer_challenge - hexdump(len=16): 6b 66 7b e4 45 b1 11 e4 bc e5 6d dc 99 48 a6 5c MSCHAPV2: username - hexdump_ascii(len=30): 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 300-145-415@wire 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b less.cam.ac.uk MSCHAPV2: password - hexdump_ascii(len=8): 78 77 65 33 67 37 6d 69 xwe3g7mi MSCHAPV2: NT Response - hexdump(len=24): 05 e3 be bb a8 4d 6a bf a7 aa c6 5a 27 d1 f8 33 5a d0 38 35 b1 e6 14 58 MSCHAPV2: Auth Response - hexdump(len=20): 45 a6 66 b5 c2 2a 19 fd c7 bb da 8d 58 57 75 ff 8f a1 a2 0c MSCHAPV2: Master Key - hexdump(len=16): c0 eb 05 19 4c 0d 63 af 4b 20 b6 2d 38 ed 66 c0 EAP-MSCHAPV2: TX identifier 8 mschapv2_id 8 (response) EAP-PEAP: Encrypting Phase 2 data - hexdump(len=89): 02 08 00 59 1a 02 08 00 54 31 6b 66 7b e4 45 b1 11 e4 bc e5 6d dc 99 48 a6 5c 00 00 00 00 00 00 00 00 05 e3 be bb a8 4d 6a bf a7 aa c6 5a 27 d1 f8 33 5a d0 38 35 b1 e6 14 58 00 33 30 30 2d 31 34 35 2d 34 31 35 40 77 69 72 65 6c 65 73 73 2e 63 61 6d 2e 61 63 2e 75 6b SSL: 154 bytes left to be sent out (of total 154 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=160) TX EAP -> RADIUS - hexdump(len=160): 02 08 00 a0 19 00 17 03 01 00 20 31 54 ea 1f 7d ce aa 2e 49 60 27 e3 ca 3f 16 c8 05 56 35 fc 1a 23 42 b8 07 0f cf 4b c9 07 4c aa 17 03 01 00 70 48 52 8a 43 14 e9 e0 27 2b 3c 0f d0 0a 54 0a c2 d7 31 56 5e fa 88 65 d7 a9 9d 9f c6 f8 d5 58 47 19 9f 9c 2f c4 94 d4 61 62 6d 4b 04 3f a4 2a 1c ba 16 58 0e b9 80 84 b6 be 9d b6 aa e6 d2 23 b6 40 85 86 e9 d7 0e a5 bb f2 d1 27 17 d8 2c 5d b4 b5 3e 86 70 d1 a9 c1 f7 54 2c 19 56 02 d9 07 5e a1 08 84 cd 47 5a 26 eb 11 08 dd 81 05 25 90 fc Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=8 length=300 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=162 Value: 02 08 00 a0 19 00 17 03 01 00 20 31 54 ea 1f 7d ce aa 2e 49 60 27 e3 ca 3f 16 c8 05 56 35 fc 1a 23 42 b8 07 0f cf 4b c9 07 4c aa 17 03 01 00 70 48 52 8a 43 14 e9 e0 27 2b 3c 0f d0 0a 54 0a c2 d7 31 56 5e fa 88 65 d7 a9 9d 9f c6 f8 d5 58 47 19 9f 9c 2f c4 94 d4 61 62 6d 4b 04 3f a4 2a 1c ba 16 58 0e b9 80 84 b6 be 9d b6 aa e6 d2 23 b6 40 85 86 e9 d7 0e a5 bb f2 d1 27 17 d8 2c 5d b4 b5 3e 86 70 d1 a9 c1 f7 54 2c 19 56 02 d9 07 5e a1 08 84 cd 47 5a 26 eb 11 08 dd 81 05 25 90 fc Attribute 24 (State) length=18 Value: 13 b7 13 d3 14 bf 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 7d 25 60 55 7b 24 ca c0 0f 9b 40 e0 09 68 6a 0e Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 149 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=8 length=149 Attribute 79 (EAP-Message) length=93 Value: 01 09 00 5b 19 00 17 03 01 00 50 41 c8 b1 c2 44 d6 83 0e 71 db 8f 2b e5 c4 1f 50 62 7e 6e b2 51 9c 12 9d 7b 0d a2 bb 7a 9f 2f 65 d1 56 86 54 6b a4 38 46 01 43 02 5d 44 8b 39 26 f5 b2 92 cd 44 cc 2c dc fa cd fd 9d 8e b1 26 fc ef 41 06 fc 86 4d 1b 39 ee 76 9d f4 a3 66 b1 53 Attribute 80 (Message-Authenticator) length=18 Value: 9e 46 ea 80 19 d5 af 17 e4 79 b8 b8 56 a0 0a 23 Attribute 24 (State) length=18 Value: 13 b7 13 d3 1b be 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.21 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=9 len=91) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=91) - Flags 0x00 EAP-PEAP: received 85 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 08 00 2e 53 3d 34 35 41 36 36 36 42 35 43 32 32 41 31 39 46 44 43 37 42 42 44 41 38 44 35 38 35 37 37 35 46 46 38 46 41 31 41 32 30 43 EAP-PEAP: received Phase 2: code=1 identifier=9 length=51 EAP-PEAP: Phase 2 Request: type=26 EAP-MSCHAPV2: RX identifier 9 mschapv2_id 8 EAP-MSCHAPV2: Received success EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): EAP-MSCHAPV2: Authentication succeeded EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): 02 09 00 06 1a 03 SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=80) TX EAP -> RADIUS - hexdump(len=80): 02 09 00 50 19 00 17 03 01 00 20 47 db 23 28 1e 28 a8 ee 1c 59 c8 fc 3c 0b fb 21 84 1a 86 c6 8b c1 c8 fd 2a 34 ba d7 9f 4e 7f 11 17 03 01 00 20 ae f7 9d ee ef fb 10 2b 2f be 43 a0 24 7b ca 0b b1 ff 90 5c 7b c0 e0 da 89 84 73 84 d7 af 23 6f Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=9 length=220 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=82 Value: 02 09 00 50 19 00 17 03 01 00 20 47 db 23 28 1e 28 a8 ee 1c 59 c8 fc 3c 0b fb 21 84 1a 86 c6 8b c1 c8 fd 2a 34 ba d7 9f 4e 7f 11 17 03 01 00 20 ae f7 9d ee ef fb 10 2b 2f be 43 a0 24 7b ca 0b b1 ff 90 5c 7b c0 e0 da 89 84 73 84 d7 af 23 6f Attribute 24 (State) length=18 Value: 13 b7 13 d3 1b be 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 19 8a f1 c8 88 77 80 63 99 78 43 de 58 23 0e be Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 101 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=9 length=101 Attribute 79 (EAP-Message) length=45 Value: 01 0a 00 2b 19 00 17 03 01 00 20 8f 7b 76 77 2b 30 fa ee c5 2d 16 23 8c 23 66 3d 57 a0 ed c3 f5 16 7a c4 22 a4 80 ec 4d 85 ef 21 Attribute 80 (Message-Authenticator) length=18 Value: ac 28 1f ee f9 af d0 e6 76 f4 78 75 f6 46 3a 50 Attribute 24 (State) length=18 Value: 13 b7 13 d3 1a bd 0a 21 6f c3 a4 0c ef 8a b0 8d STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.20 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=10 len=43) from RADIUS server: EAP-Request-PEAP (25) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=43) - Flags 0x00 EAP-PEAP: received 37 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0a 00 0b 21 80 03 00 02 00 01 EAP-PEAP: received Phase 2: code=1 identifier=10 length=11 EAP-PEAP: Phase 2 Request: type=33 EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 EAP-TLV: Result TLV - hexdump(len=2): 00 01 EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): 02 0a 00 0b 21 80 03 00 02 00 01 SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=80) TX EAP -> RADIUS - hexdump(len=80): 02 0a 00 50 19 00 17 03 01 00 20 7a 76 c6 af b9 17 4e 3b 07 0b 5c 21 b0 b7 8b 25 cd 5f 44 23 30 81 71 a0 27 41 e7 a4 8c 9c 86 ce 17 03 01 00 20 e6 7f 2f 2d bf 7c 48 5f 79 27 40 d2 d5 58 77 dd ba 11 7f b0 9a 37 17 a1 0d b0 13 a3 c4 fc e8 8f Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=10 length=220 Attribute 1 (User-Name) length=21 Value: '@wireless.cam.ac.uk' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=82 Value: 02 0a 00 50 19 00 17 03 01 00 20 7a 76 c6 af b9 17 4e 3b 07 0b 5c 21 b0 b7 8b 25 cd 5f 44 23 30 81 71 a0 27 41 e7 a4 8c 9c 86 ce 17 03 01 00 20 e6 7f 2f 2d bf 7c 48 5f 79 27 40 d2 d5 58 77 dd ba 11 7f b0 9a 37 17 a1 0d b0 13 a3 c4 fc e8 8f Attribute 24 (State) length=18 Value: 13 b7 13 d3 1a bd 0a 21 6f c3 a4 0c ef 8a b0 8d Attribute 80 (Message-Authenticator) length=18 Value: 98 22 f1 cc a1 e9 30 9a dd 86 0a 03 78 65 6e 8f Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 238 bytes from RADIUS server Received RADIUS message RADIUS message: code=2 (Access-Accept) identifier=10 length=238 Attribute 18 (Reply-Message) length=48 Value: '[cam.ac.uk] Successful authentication ' Attribute 1 (User-Name) length=30 Value: '300145415@wireless.cam.ac.uk' Attribute 26 (Vendor-Specific) length=58 Value: 00 00 01 37 11 34 8f 02 c5 e8 e7 23 1c f6 2d ca 8d 19 fa 37 33 2f 5f dc 0e fa a6 7a 64 5a f1 96 c3 e0 13 67 39 69 f3 d0 9f 95 87 93 51 80 ed 04 77 d2 30 4a 7e 27 e6 38 Attribute 26 (Vendor-Specific) length=58 Value: 00 00 01 37 10 34 95 a8 40 73 86 90 6d 38 68 a0 f3 6f 9a 04 d1 95 c5 7a e1 e5 c5 c2 65 7e ab f6 2d 1c 49 b7 6f 0a a9 0c 3d 32 ff 0f 94 55 8a 5d 5a a9 ef 0c 65 ad 41 7c Attribute 79 (EAP-Message) length=6 Value: 03 0a 00 04 Attribute 80 (Message-Authenticator) length=18 Value: 9d 32 0d d5 f3 17 fc 57 43 40 84 77 c9 25 1a 90 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.09 sec RADIUS packet matching with station MS-MPPE-Send-Key (sign) - hexdump(len=32): 07 0d dd 19 22 84 bc 1a 62 47 26 07 99 df 29 e7 59 16 bd 22 7f 0d 75 2c a3 41 3e dc a4 55 d4 e4 MS-MPPE-Recv-Key (crypt) - hexdump(len=32): 26 5e af d6 fe 3e 7a ea cd be 10 c7 72 a8 42 3c cf e3 c4 c7 0d b6 38 32 f0 0b 80 ca ad 81 b4 c2 decapsulated EAP packet (code=3 id=10 len=4) from RADIUS server: EAP Success EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (param=success) EAP: EAP entering state SUCCESS CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required WPA: EAPOL processing complete EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE eapol_sm_cb: success=1 EAPOL: Successfully fetched key (len=32) PMK from EAPOL - hexdump(len=32): bb 79 0b 52 cc 87 11 f3 fa 7e 59 19 2c 33 da 00 36 2a c4 9d de 8e 28 73 e4 34 75 26 bb 4c ab a2 WARNING: PMK mismatch PMK from AS - hexdump(len=32): 26 5e af d6 fe 3e 7a ea cd be 10 c7 72 a8 42 3c cf e3 c4 c7 0d b6 38 32 f0 0b 80 ca ad 81 b4 c2 EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit ENGINE: engine deinit MPPE keys OK: 0 mismatch: 0 SUCCESS