Connection issues with Android Marshmallow

Tod A. Sandman sandmant at rice.edu
Thu Oct 15 22:49:02 CEST 2015


> It would be useful to have the output of eapol_test run against one of these servers.

I configured my desktop as a radius client, followed your instructions and built eapol_test on my desktop (RHEL6.7, openssl-1.0.1e-42.el6.x86_64).  Attached is the output of eapol_test (which fails) along with my peap-mschapv2.conf.

rb3:/var/tmp/radius: $(./eapol_test-build.sh) -c./peap-mschapv2.conf -ssecret -a10.137.93.19 > /tmp/OUT

BTW, I doubt this matters, but I built freeradius an a RHEL6.4 box running an older version of openssl (openssl-1.0.0-27.el6_4.2.x86_64) than on the radius server.  I -think- it's all dynamically linked and this shouldn't matter.
-------------- next part --------------
Reading configuration file './peap-mschapv2.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=12):
     52 42 33 2d 54 6f 64 2d 50 45 41 50               RB3-Tod-PEAP    
key_mgmt: 0x1
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=8):
     73 61 6e 64 6d 61 6e 74                           sandmant        
anonymous_identity - hexdump_ascii(len=13):
     73 61 6e 64 6d 61 6e 74 2d 70 65 61 70            sandmant-peap   
password - hexdump_ascii(len=8):
     65 72 70 68 39 61 6e 2c                           t90*p_gfdd,        
phase2 - hexdump_ascii(len=16):
     61 75 74 68 65 61 70 3d 4d 53 43 48 41 50 56 32   autheap=MSCHAPV2
Priority group 0
   id=0 ssid='RB3-Tod-PEAP'
Authentication server 10.137.93.19:1812
RADIUS local address: 168.7.56.224:55830
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Sending fake EAP-Request-Identity
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=13):
     73 61 6e 64 6d 61 6e 74 2d 70 65 61 70            sandmant-peap   
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=18)
TX EAP -> RADIUS - hexdump(len=18): 02 00 00 12 01 73 61 6e 64 6d 61 6e 74 2d 70 65 61 70
Encapsulating EAP message into a RADIUS packet
Learned identity from EAP-Response-Identity - hexdump(len=13): 73 61 6e 64 6d 61 6e 74 2d 70 65 61 70
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=0 length=134
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=20
      Value: 020000120173616e646d616e742d70656170
   Attribute 80 (Message-Authenticator) length=18
      Value: ac2c8acb269baeb092912491769b0ab5
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 76 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=0 length=76
   Attribute 64 (Tunnel-Type) length=6
      Value: 0000000d
   Attribute 65 (Tunnel-Medium-Type) length=6
      Value: 00000006
   Attribute 79 (EAP-Message) length=8
      Value: 010100060d20
   Attribute 80 (Message-Authenticator) length=18
      Value: 6f9b27ccca011b72d42086138175a024
   Attribute 24 (State) length=18
      Value: b45abf70b45bb2a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=1 len=6) from RADIUS server: EAP-Request-TLS (13)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=13 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: configuration does not allow: vendor 0 method 13
EAP: vendor 0 method 13 not allowed
CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13 -> NAK
EAP: Status notification: refuse proposed method (param=TLS)
EAP: Building EAP-Nak (requested type 13 vendor=0 method=0 not allowed)
EAP: allowed methods - hexdump(len=1): 19
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=6)
TX EAP -> RADIUS - hexdump(len=6): 02 01 00 06 03 19
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=1 length=140
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=8
      Value: 020100060319
   Attribute 24 (State) length=18
      Value: b45abf70b45bb2a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: de430a90a5574c6251ad3781ce975e41
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 76 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=1 length=76
   Attribute 64 (Tunnel-Type) length=6
      Value: 0000000d
   Attribute 65 (Tunnel-Medium-Type) length=6
      Value: 00000006
   Attribute 79 (EAP-Message) length=8
      Value: 010200061920
   Attribute 80 (Message-Authenticator) length=18
      Value: 4e3329e12fded46e8e2f88ea7af0b7dd
   Attribute 24 (State) length=18
      Value: b45abf70b558a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=2 len=6) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=120): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 2e 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 33 00 00 00 00 00 00 00 31 00 00 00 00 00 00 00 26 00 00 00 00 00 00 00 34 00 00 00 00 00 00 00 35 00 00 00
TLS: using phase1 config options
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
OpenSSL: Message - hexdump(len=240): 01 00 00 ec 03 03 56 20 0d d0 7c 36 65 e8 8e 1b 54 9b 6c 9c 74 05 c0 f4 50 60 92 35 01 eb b6 e7 19 8a 88 57 11 cf 00 00 84 c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a3 00 9f 00 6b 00 6a 00 39 00 38 00 88 00 87 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a2 00 9e 00 67 00 40 00 33 00 32 c0 12 c0 08 00 9a 00 99 00 45 00 44 00 16 00 13 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 c0 0d c0 03 00 9c 00 3c 00 2f 00 96 00 41 00 0a 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 ff 01 00 00 3f 00 0b 00 04 03 00 01 02 00 0a 00 08 00 06 00 19 00 18 00 17 00 0d 00 22 00 20 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 01 01 00 0f 00 01 01
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 245 bytes pending from ssl_out
SSL: 245 bytes left to be sent out (of total 245 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e60780
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=255)
TX EAP -> RADIUS - hexdump(len=255): 02 02 00 ff 19 80 00 00 00 f5 16 03 01 00 f0 01 00 00 ec 03 03 56 20 0d d0 7c 36 65 e8 8e 1b 54 9b 6c 9c 74 05 c0 f4 50 60 92 35 01 eb b6 e7 19 8a 88 57 11 cf 00 00 84 c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a3 00 9f 00 6b 00 6a 00 39 00 38 00 88 00 87 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a2 00 9e 00 67 00 40 00 33 00 32 c0 12 c0 08 00 9a 00 99 00 45 00 44 00 16 00 13 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 c0 0d c0 03 00 9c 00 3c 00 2f 00 96 00 41 00 0a 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 ff 01 00 00 3f 00 0b 00 04 03 00 01 02 00 0a 00 08 00 06 00 19 00 18 00 17 00 0d 00 22 00 20 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 01 01 00 0f 00 01 01
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=2 length=391
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=4
      Value: 0101
   Attribute 24 (State) length=18
      Value: b45abf70b558a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 8cb98f179889690bcac9a8cd1cfcf57e
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 1090 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=2 length=1090
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=14
      Value: 043630343032a030a02e862c
   Attribute 80 (Message-Authenticator) length=18
      Value: cf42edf5b019292b26c7b1618b83b54f
   Attribute 24 (State) length=18
      Value: b45abf70b659a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=3 len=1024) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1024) - Flags 0xc0
SSL: TLS Message Length: 4730
SSL: Need 3716 bytes more input data
SSL: Building ACK (type=25 id=3 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e4ea20
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=6)
TX EAP -> RADIUS - hexdump(len=6): 02 03 00 06 19 00
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=3 length=140
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=8
      Value: 020300061900
   Attribute 24 (State) length=18
      Value: b45abf70b659a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 5b65a6dd70538e3ce41d16767e311b17
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 1086 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=3 length=1086
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=10
      Value: 7fa6980be4e238af
   Attribute 80 (Message-Authenticator) length=18
      Value: 220ef7239fa25674df15aa8264e3d4ba
   Attribute 24 (State) length=18
      Value: b45abf70b75ea6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=4 len=1020) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1020) - Flags 0x40
SSL: Need 2702 bytes more input data
SSL: Building ACK (type=25 id=4 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e4ea20
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=6)
TX EAP -> RADIUS - hexdump(len=6): 02 04 00 06 19 00
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=4 length=140
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=8
      Value: 020400061900
   Attribute 24 (State) length=18
      Value: b45abf70b75ea6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 0b52ef1000f8f85eb207d3adc205a8df
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 1086 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=4 length=1086
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=10
      Value: 0355040613025345
   Attribute 80 (Message-Authenticator) length=18
      Value: b4adbf3cffb27a2ec7ffc1935a126ef7
   Attribute 24 (State) length=18
      Value: b45abf70b05fa6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=5 len=1020) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1020) - Flags 0x40
SSL: Need 1688 bytes more input data
SSL: Building ACK (type=25 id=5 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e4ea20
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=6)
TX EAP -> RADIUS - hexdump(len=6): 02 05 00 06 19 00
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=5 length=140
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=8
      Value: 020500061900
   Attribute 24 (State) length=18
      Value: b45abf70b05fa6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 7806e4020628016ca6e076bebcf51009
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 1086 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=5 length=1086
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 71949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a47130
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=10
      Value: df6440f8210c7d10
   Attribute 80 (Message-Authenticator) length=18
      Value: 86d448c7e775a00e2d088dbe0e4247a6
   Attribute 24 (State) length=18
      Value: b45abf70b15ca6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=6 len=1020) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1020) - Flags 0x40
SSL: Need 674 bytes more input data
SSL: Building ACK (type=25 id=6 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e4ea20
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=6)
TX EAP -> RADIUS - hexdump(len=6): 02 06 00 06 19 00
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=6 length=140
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=8
      Value: 020600061900
   Attribute 24 (State) length=18
      Value: b45abf70b15ca6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 34dfb9e50f106ca889f1ab5c7672ae27
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 742 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=6 length=742
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=176
      Value: 95b314ff6f464eb3c4e823aa0738519ea6514762df494cbc1d3adb3dfcc90c3a609d122de2b032ea8c4ce5ad8d752dbbe8c895aa5a0c7cef9dcc5d9f5955f9707ebd6cf545839c78fb8f829049ee3cafdd952b70c634444d20cb35f551f8cdaa12e51d53c601c9a207b1a667d0a5233ebf54577a82653b4f0c06b475aea0483756347029a30d8e197ad4a99e3b12a1fdc12f0abd15927ca27c6ab6517cdabf9232611eb1c316030300040e000000
   Attribute 80 (Message-Authenticator) length=18
      Value: 28551a5da3a90ecea0aec91e683bb7a2
   Attribute 24 (State) length=18
      Value: b45abf70b25da6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=7 len=680) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=680) - Flags 0x00
OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
OpenSSL: Message - hexdump(len=86): 02 00 00 52 03 03 56 20 0d d0 51 2e 13 1d 00 5c 6b 87 ef 72 05 8f 68 91 b6 da cb e0 3d c2 ce b5 39 f1 57 57 9d 6f 20 0b 11 f9 4a 23 c9 0e 93 da 42 b2 cc 62 b9 35 82 d4 45 40 b3 de 7c 47 f1 4e 31 d7 41 0c 64 e4 bd 00 9f 00 00 0a ff 01 00 01 00 00 0f 00 01 01
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server hello A
OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
OpenSSL: Message - hexdump(len=3837): 0b 00 0e f9 00 0e f6 00 05 ec 30 82 05 e8 30 82 04 d0 a0 03 02 01 02 02 11 00 d2 21 43 25 af da 98 a2 98 32 0a 31 39 10 b0 a7 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 51 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 12 30 10 06 03 55 04 0a 13 09 49 6e 74 65 72 6e 65 74 32 31 11 30 0f 06 03 55 04 0b 13 08 49 6e 43 6f 6d 6d 6f 6e 31 1b 30 19 06 03 55 04 03 13 12 49 6e 43 6f 6d 6d 6f 6e 20 53 65 72 76 65 72 20 43 41 30 1e 17 0d 31 34 30 38 32 35 30 30 30 30 30 30 5a 17 0d 31 37 30 38 32 34 32 33 35 39 35 39 5a 30 81 c0 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 11 13 0a 37 37 32 35 31 2d 31 38 39 32 31 0e 30 0c 06 03 55 04 08 13 05 54 65 78 61 73 31 10 30 0e 06 03 55 04 07 13 07 48 6f 75 73 74 6f 6e 31 14 30 12 06 03 55 04 09 13 0b 50 4f 20 42 6f 78 20 31 38 39 32 31 0f 30 0d 06 03 55 04 09 13 06 4d 53 20 31 31 39 31 18 30 16 06 03 55 04 0a 13 0f 52 69 63 65 20 55 6e 69 76 65 72 73 69 74 79 31 1f 30 1d 06 03 55 04 0b 13 16 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 54 65 63 68 6e 6f 6c 6f 67 79 31 18 30 16 06 03 55 04 03 13 0f 72 61 64 69 75 73 2e 72 69 63 65 2e 65 64 75 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c0 ab af e1 28 6b c3 0d f0 a3 c2 d2 81 9a e8 9a 3c 0e 47 84 95 6c 31 ce 16 f7 84 5b 0f 72 b8 dd 7d cc 63 e3 1b 61 b3 94 31 79 e7 4f ee b4 f6 74 71 21 04 b8 73 e2 1b 03 c0 24 c1 a9 2c 32 2b c1 12 e7 6c e4 bf 12 6a 94 4f 32 fe 70 e7 21 28 cb e6 68 8c 2b d6 4e 4b 97 10 74 10 d7 7d 80 bf 40 90 46 21 d1 9b 59 77 aa 0a 2c 6f f5 09 7a a8 4c 4d 38 63 03 20 07 db 7b a7 38 83 35 94 f2 95 47 be 59 6c 89 89 f2 68 24 bc 26 02 41 46 e1 b6 78 d2 8f b1 8f 3d 7d a5 a8 21 75 29 d9 dc c5 1d 67 d2 b6 b7 9e 89 36 30 50 ed 5e 11 f5 ad 64 16 7d 11 ae 80 a9 c8 b0 bb 2b cf 54 97 4c 2c 4d de fe 3b dd af ee e7 b0 84 85 80 c7 50 c9 64 b0 5b b9 70 00 44 eb c7 79 44 bf af ae d6 27 0f cb a7 e5 fa 88 21 b1 5b c6 2e 01 37 f8 f4 0f 6f 5c af 9c 1c 39 91 26 17 ac b6 ae 03 7e f8 12 44 2e 4c cd 02 03 01 00 01 a3 82 02 49 30 82 02 45 30 1f 06 03 55 1d 23 04 18 30 16 80 14 48 4f 5a fa 2f 4a 9a 5e e0 50 f3 6b 7b 55 a5 de f5 be 34 5d 30 1d 06 03 55 1d 0e 04 16 04 14 fc a7 1d b4 ce 69 39 1b 70 02 43 65 07 21 24 6b eb c4 64 97 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 67 06 03 55 1d 20 04 60 30 5e 30 52 06 0c 2b 06 01 04 01 ae 23 01 04 03 01 01 30 42 30 40 06 08 2b 06 01 05 05 07 02 01 16 34 68 74 74 70 73 3a 2f 2f 77 77 77 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 63 65 72 74 2f 72 65 70 6f 73 69 74 6f 72 79 2f 63 70 73 5f 73 73 6c 2e 70 64 66 30 08 06 06 67 81 0c 01 02 02 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 49 6e 43 6f 6d 6d 6f 6e 53 65 72 76 65 72 43 41 2e 63 72 6c 30 6f 06 08 2b 06 01 05 05 07 01 01 04 63 30 61 30 39 06 08 2b 06 01 05 05 07 30 02 86 2d 68 74 74 70 3a 2f 2f 63 65 72 74 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 49 6e 43 6f 6d 6d 6f 6e 53 65 72 76 65 72 43 41 2e 63 72 74 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 30 81 ac 06 03 55 1d 11 04 81 a4 30 81 a1 82 0f 72 61 64 69 75 73 2e 72 69 63 65 2e 65 64 75 82 18 6e 65 77 72 61 64 69 75 73 2d 61 2e 6e 65 74 2e 72 69 63 65 2e 65 64 75 82 18 6e 65 77 72 61 64 69 75 73 2d 62 2e 6e 65 74 2e 72 69 63 65 2e 65 64 75 82 15 72 61 64 69 75 73 2d 61 2e 6e 65 74 2e 72 69 63 65 2e 65 64 75 82 15 72 61 64 69 75 73 2d 62 2e 6e 65 74 2e 72 69 63 65 2e 65 64 75 82 15 72 61 64 69 75 73 2d 63 2e 6e 65 74 2e 72 69 63 65 2e 65 64 75 82 15 72 61 64 69 75 73 2d 64 2e 6e 65 74 2e 72 69 63 65 2e 65 64 75 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 24 b8 ca 39 f8 c5 c7 f3 0b 29 b4 3b 46 d5 a2 05 a1 3c ff 52 1c 12 aa 70 9d ba 4a 38 b2 db 77 d2 0a 72 7a dc f7 a1 f9 fb b1 4b a8 ef 4b 42 ff 5a 17 d4 a5 0a fa 05 39 28 4f 32 56 6b 1a a6 c4 ce 17 9c ca eb 57 84 9e 15 46 5a 59 2e 9a 66 87 ea 84 ba 8c fe ce 9d 54 80 91 1b 6b 1b f0 e5 39 70 7e 8e 47 95 1f bb 90 db cd ce 93 54 8f a1 a8 a2 e3 64 44 b8 78 c8 4f be 52 74 00 39 e7 94 68 6c d8 1d 29 ac 09 fc b9 fc 39 7d 5b 5c 47 b4 90 4d d5 46 40 d8 70 9c 42 a9 dd 05 16 95 e9 df c9 12 3a 2f 34 88 1e b6 88 8f f9 44 bb 07 11 cf f3 ea 08 02 87 db dd 52 81 1c 91 ea 34 1f 31 0e 1f f2 bd 19 6b 94 6d 47 26 4e c2 97 d2 9e b6 5d ba 20 2b 43 09 df 30 3a 2b 8b 80 39 3a ea 3e 91 4d 7a df c9 ad 59 6a 26 d3 86 6f 22 1e f1 7e 0d b5 7a 05 73 48 14 57 39 3e cd 67 87 88 ce 4a fa 12 36 00 04 c7 30 82 04 c3 30 82 03 ab a0 03 02 01 02 02 10 7f 71 c1 d3 a2 26 b0 d2 b1 13 f3 e6 81 67 64 3e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 30 1e 17 0d 31 30 31 32 30 37 30 30 30 30 30 30 5a 17 0d 32 30 30 35 33 30 31 30 34 38 33 38 5a 30 51 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 12 30 10 06 03 55 04 0a 13 09 49 6e 74 65 72 6e 65 74 32 31 11 30 0f 06 03 55 04 0b 13 08 49 6e 43 6f 6d 6d 6f 6e 31 1b 30 19 06 03 55 04 03 13 12 49 6e 43 6f 6d 6d 6f 6e 20 53 65 72 76 65 72 20 43 41 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 97 7c c7 c8 fe b3 e9 20 6a a3 a4 4f 8e 8e 34 56 06 b3 7a 6c aa 10 9b 48 61 2b 36 90 69 e3 34 0a 47 a7 bb 7b de aa 6a fb eb 82 95 8f ca 1d 7f af 75 a6 a8 4c da 20 67 61 1a 0d 86 c1 ca c1 87 af ac 4e e4 de 62 1b 2f 9d b1 98 af c6 01 fb 17 70 db ac 14 59 ec 6f 3f 33 7f a6 98 0b e4 e2 38 af f5 7f 85 6d 0e 74 04 9d f6 27 86 c7 9b 8f e7 71 2a 08 f4 03 02 40 63 24 7d 40 57 8f 54 e0 54 7e b6 13 48 61 f1 de ce 0e bd b6 fa 4d 98 b2 d9 0d 8d 79 a6 e0 aa cd 0c 91 9a a5 df ab 73 bb ca 14 78 5c 47 29 a1 ca c5 ba 9f c7 da 60 f7 ff e7 7f f2 d9 da a1 2d 0f 49 16 a7 d3 00 92 cf 8a 47 d9 4d f8 d5 95 66 d3 74 f9 80 63 00 4f 4c 84 16 1f b3 f5 24 1f a1 4e de e8 95 d6 b2 0b 09 8b 2c 6b c7 5c 2f 8c 63 c9 99 cb 52 b1 62 7b 73 01 62 7f 63 6c d8 68 a0 ee 6a a8 8d 1f 29 f3 d0 18 ac ad 02 03 01 00 01 a3 82 01 77 30 82 01 73 30 1f 06 03 55 1d 23 04 18 30 16 80 14 ad bd 98 7a 34 b4 26 f7 fa c4 26 54 ef 03 bd e0 24 cb 54 1a 30 1d 06 03 55 1d 0e 04 16 04 14 48 4f 5a fa 2f 4a 9a 5e e0 50 f3 6b 7b 55 a5 de f5 be 34 5d 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 11 06 03 55 1d 20 04 0a 30 08 30 06 06 04 55 1d 20 00 30 44 06 03 55 1d 1f 04 3d 30 3b 30 39 a0 37 a0 35 86 33 68 74 74 70 3a 2f 2f 63 72 6c 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 63 72 6c 30 81 b3 06 08 2b 06 01 05 05 07 01 01 04 81 a6 30 81 a3 30 3f 06 08 2b 06 01 05 05 07 30 02 86 33 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 70 37 63 30 39 06 08 2b 06 01 05 05 07 30 02 86 2d 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 55 54 4e 53 47 43 43 41 2e 63 72 74 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 93 66 21 80 74 45 85 4b c2 ab ce 32 b0 29 fe dd df d6 24 5b bf 03 6a 6f 50 3e 0e 1b b3 0d 88 a3 5b ee c4 a4 12 3b 56 ef 06 7f cf 7f 21 95 56 3b 41 31 fe e1 aa 93 d2 95 f3 95 0d 3c 47 ab ca 5c 26 ad 3e f1 f9 8c 34 6e 11 be f4 67 e3 02 49 f9 a6 7c 7b 64 25 dd 17 46 f2 50 e3 e3 0a 21 3a 49 24 cd c6 84 65 68 67 68 b0 45 2d 47 99 cd 9c ab 86 29 11 72 dc d6 9c 36 43 74 f3 d4 97 9e 56 a0 fe 5f 40 58 d2 d5 d7 7e 7c c5 8e 1a b2 04 5c 92 66 0e 85 ad 2e 06 ce c8 a3 d8 eb 14 27 91 de cf 17 30 81 53 b6 66 12 ad 37 e4 f5 ef 96 5c 20 0e 36 e9 ac 62 7d 19 81 8a f5 90 61 a6 49 ab ce 3c df e6 ca 64 ee 82 65 39 45 95 16 ba 41 06 00 98 ba 0c 56 61 e4 c6 c6 86 01 cf 66 a9 22 29 02 d6 3d cf c4 2a 8d 99 de fb 09 14 9e 0e d1 d5 c6 d7 81 dd ad 24 ab ac 07 05 e2 1d 68 c3 70 66 5f d3 00 04 3a 30 82 04 36 30 82 03 1e a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 30 1e 17 0d 30 30 30 35 33 30 31 30 34 38 33 38 5a 17 0d 32 30 30 35 33 30 31 30 34 38 33 38 5a 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 b7 f7 1a 33 e6 f2 00 04 2d 39 e0 4e 5b ed 1f bc 6c 0f cd b5 fa 23 b6 ce de 9b 11 33 97 a4 29 4c 7d 93 9f bd 4a bc 93 ed 03 1a e3 8f cf e5 6d 50 5a d6 97 29 94 5a 80 b0 49 7a db 2e 95 fd b8 ca bf 37 38 2d 1e 3e 91 41 ad 70 56 c7 f0 4f 3f e8 32 9e 74 ca c8 90 54 e9 c6 5f 0f 78 9d 9a 40 3c 0e ac 61 aa 5e 14 8f 9e 87 a1 6a 50 dc d7 9a 4e af 05 b3 a6 71 94 9c 71 b3 50 60 0a c7 13 9d 38 07 86 02 a8 e9 a8 69 26 18 90 ab 4c b0 4f 23 ab 3a 4f 84 d8 df ce 9f e1 69 6f bb d7 42 d7 6b 44 e4 c7 ad ee 6d 41 5f 72 5a 71 08 37 b3 79 65 a4 59 a0 94 37 f7 00 2f 0d c2 92 72 da d0 38 72 db 14 a8 45 c4 5d 2a 7d b7 b4 d6 c4 ee ac cd 13 44 b7 c9 2b dd 43 00 25 fa 61 b9 69 6a 58 23 11 b7 a7 33 8f 56 75 59 f5 cd 29 d7 46 b7 0a 2b 65 b6 d3 42 6f 15 b2 b8 7b fb ef e9 5d 53 d5 34 5a 27 02 03 01 00 01 a3 81 dc 30 81 d9 30 1d 06 03 55 1d 0e 04 16 04 14 ad bd 98 7a 34 b4 26 f7 fa c4 26 54 ef 03 bd e0 24 cb 54 1a 30 0b 06 03 55 1d 0f 04 04 03 02 01 06 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 81 99 06 03 55 1d 23 04 81 91 30 81 8e 80 14 ad bd 98 7a 34 b4 26 f7 fa c4 26 54 ef 03 bd e0 24 cb 54 1a a1 73 a4 71 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 82 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 b0 9b e0 85 25 c2 d6 23 e2 0f 96 06 92 9d 41 98 9c d9 84 79 81 d9 1e 5b 14 07 23 36 65 8f b0 d8 77 bb ac 41 6c 47 60 83 51 b0 f9 32 3d e7 fc f6 26 13 c7 80 16 a5 bf 5a fc 87 cf 78 79 89 21 9a e2 4c 07 0a 86 35 bc f2 de 51 c4 d2 96 b7 dc 7e 4e ee 70 fd 1c 39 eb 0c 02 51 14 2d 8e bd 16 e0 c1 df 46 75 e7 24 ad ec f4 42 b4 85 93 70 10 67 ba 9d 06 35 4a 18 d3 2b 7a cc 51 42 a1 7a 63 d1 e6 bb a1 c5 2b c2 36 be 13 0d e6 bd 63 7e 79 7b a7 09 0d 40 ab 6a dd 8f 8a c3 f6 f6 8c 1a 42 05 51 d4 45 f5 9f a7 62 21 68 15 20 43 3c 99 e7 7c bd 24 d8 a9 91 17 73 88 3f 56 1b 31 38 18 b4 71 0f 9a cd c8 0e 9e 8e 2e 1b e1 8c 98 83 cb 1f 31 f1 44 4c c6 04 73 49 76 60 0f c7 f8 bd 17 80 6b 2e e9 cc 4c 0e 5a 9a 79 0f 20 0a 2e d5 9e 63 26 1e 55 92 94 d8 82 17 5a 7b d0 bc c7 8f 4e 86 04
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root'
CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root' hash=687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff2
EAP: Status notification: remote certificate verification (param=success)
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root'
CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root' hash=687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff2
EAP: Status notification: remote certificate verification (param=success)
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA'
CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA' hash=623727ec472644a6bb70d240565c24223fdb0f2f5ac698027e3012489c70e817
EAP: Status notification: remote certificate verification (param=success)
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='/C=US/postalCode=77251-1892/ST=Texas/L=Houston/street=PO Box 1892/street=MS 119/O=Rice University/OU=Information Technology/CN=radius.rice.edu'
CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=US/postalCode=77251-1892/ST=Texas/L=Houston/street=PO Box 1892/street=MS 119/O=Rice University/OU=Information Technology/CN=radius.rice.edu' hash=401aaa03700fa5f55bbcebb6f6457da0223fda6de63d29d5ae6bc94387686bdf
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius.rice.edu
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:newradius-a.net.rice.edu
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:newradius-b.net.rice.edu
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-a.net.rice.edu
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-b.net.rice.edu
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-c.net.rice.edu
CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-d.net.rice.edu
EAP: Status notification: remote certificate verification (param=success)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server certificate A
OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
OpenSSL: Message - hexdump(len=783): 0c 00 03 0b 01 00 ed 62 d5 4d 0d 16 ab dd db f7 75 ef 67 9a f5 03 cb 1d cb 2a 0e 46 89 0f 93 35 b9 2c fd 62 fc b5 ae ea 94 a4 b2 69 f6 e2 d8 7a df e9 07 6b a5 cd f9 b4 f0 e4 c3 ad 53 1c ac b4 aa 5d 94 c7 32 ba 34 3a c7 d6 a7 0d ee 76 81 cc 09 cc e6 d3 87 65 4d ff 62 53 af 21 6b 50 c9 36 e9 95 07 4e ab ff 87 a5 3f e2 b3 d4 f6 fa df 64 40 f8 21 0c 7d 10 e0 f1 3c d6 eb 23 51 17 f2 8a 47 b4 79 5e cf e8 c2 41 d8 cb 16 a3 fb b1 55 ef 7b c9 fe 89 f4 db 16 8e 17 71 80 2c bb 8c c4 07 db 26 e8 0f 26 a0 d6 f6 03 d3 89 87 19 36 a4 7a d4 4c 83 2a 1f 43 4a 0d ce 68 1e 47 76 ba ed d4 55 ff 6a b4 6b e0 e1 8b d0 fd c9 68 d0 99 cc 7b f1 96 17 7a 05 28 bc 3f b3 42 1c 5c 7e 0a 67 50 ed 98 c2 51 68 37 9f 2d 60 72 df 0e 47 9a f6 b7 99 86 83 0f 9d f1 d2 33 c2 06 46 27 6b cd c8 f7 6b c0 64 67 74 db 00 01 02 01 00 07 1f 0d 2c a7 2b 76 bc c7 fc 06 6a 29 d3 7a cf 37 ba 7f ce cf 1d 92 0e 0f ee 07 63 e5 4a 7d ea 49 c9 21 ab 57 46 b4 40 21 53 d9 13 c8 c6 46 bd ba 75 26 d6 43 fa 63 94 21 c8 de 5b 39 12 b9 22 92 4e 3b ce ff 7a f8 d4 5a 07 3f b4 06 74 95 df 5c 70 6b 34 22 81 0b 6b c5 d9 c8 27 5f e8 a0 a6 a2 af f0 e4 80 2d e8 3a 4d 90 0e 83 21 3c bf 5b 2b d2 65 9b e8 53 f0 2c 67 44 8f 5d 2d 5a a6 e2 35 b6 82 12 0d 9f d3 2a 58 04 35 e2 8d ab be 18 c3 50 5a dd 57 ac 18 4f 08 39 1f 6a 0a 09 7f 81 f4 97 ce 46 f1 00 45 1f 62 5c 58 a9 dc e8 71 8f 96 ea c1 ea 21 97 87 e9 13 db 51 31 1f 56 c8 51 c3 3b 97 82 61 13 09 8a 2c cb de 87 c0 a3 c3 cb 6d f2 7d d6 ba 6a 6f 86 39 12 65 f7 9a 25 9c 3a df 66 07 a1 4a 84 94 f7 db 9b 81 a3 48 69 84 38 f9 4a b9 6b 25 d8 c0 b1 8e a0 f8 44 5a 85 ed 2b 06 01 01 00 76 89 e8 57 c7 ae 06 fa f0 4d 9a 82 1e 5b db cd c8 56 6f 1e 33 1b fb b5 da da 01 0f 9d 74 7d ab 2c 94 b3 ee 41 02 39 ff 91 4d 4a 0e 8f 48 0d a1 d3 13 01 f7 03 f9 f6 73 d2 df 8d 47 4f 6b ab 28 00 2b 12 40 15 78 f6 a8 07 ee 13 62 fd 6d 87 8a cc ce b4 d7 f3 cf 81 cc a4 0c ff 95 b3 14 ff 6f 46 4e b3 c4 e8 23 aa 07 38 51 9e a6 51 47 62 df 49 4c bc 1d 3a db 3d fc c9 0c 3a 60 9d 12 2d e2 b0 32 ea 8c 4c e5 ad 8d 75 2d bb e8 c8 95 aa 5a 0c 7c ef 9d cc 5d 9f 59 55 f9 70 7e bd 6c f5 45 83 9c 78 fb 8f 82 90 49 ee 3c af dd 95 2b 70 c6 34 44 4d 20 cb 35 f5 51 f8 cd aa 12 e5 1d 53 c6 01 c9 a2 07 b1 a6 67 d0 a5 23 3e bf 54 57 7a 82 65 3b 4f 0c 06 b4 75 ae a0 48 37 56 34 70 29 a3 0d 8e 19 7a d4 a9 9e 3b 12 a1 fd c1 2f 0a bd 15 92 7c a2 7c 6a b6 51 7c da bf 92 32 61 1e b1 c3
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server key exchange A
OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
OpenSSL: Message - hexdump(len=4): 0e 00 00 00
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read server done A
OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
OpenSSL: Message - hexdump(len=262): 10 00 01 02 01 00 6a aa ad 63 8e 82 ea 84 ae 79 84 fd 06 89 81 71 94 e5 f3 7d 95 4c 9f 0e 12 96 04 af 27 df bb 80 ae 99 c4 89 d3 f8 16 12 44 4f 29 39 06 fb 44 bd e6 97 16 d6 f4 35 46 fe 31 98 f4 3e 6b ec 11 e8 87 7c 48 e3 e0 45 a8 d6 99 0d 50 ff 36 18 dd 4f 9d e0 eb af bf a2 ab 9a 44 bc 2c 2b 73 11 e5 c1 7d 87 93 03 e8 59 7d ca 8a 8c 0c 90 59 91 6a 4c 1d b8 69 64 46 30 34 3c e8 28 e3 0c 18 cb 57 26 92 5a 0c 90 7e 14 e8 eb 6c 49 da d8 f6 c1 2a f7 4f 8a 3d 7e 19 39 b4 ff e4 13 42 d7 96 bc e8 73 8f 07 e5 bb df a1 5b 6b b8 70 97 5e e0 65 5c d3 8a cc 2f 30 9c ce 70 79 1c a0 3f bd ee 8c 53 47 8c 0a e7 4a a6 a3 b7 91 c8 f1 c6 58 8e 02 ef 24 ea 4f 91 24 55 d0 a7 1c 06 f8 df 73 d2 f1 c3 dd 5a f1 f0 42 a3 8c 16 20 fb 94 fb a3 8e 13 df 30 bb 1c 8c 6d 65 61 db a2 08 98 3d e1 95 f4 52 f1
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client key exchange A
OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
OpenSSL: Message - hexdump(len=1): 01
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write change cipher spec A
OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
OpenSSL: Message - hexdump(len=16): 14 00 00 0c d9 da d9 41 82 23 1d 2f 68 ef a9 59
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write finished A
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 flush data
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect - want more data
SSL: 318 bytes pending from ssl_out
SSL: 318 bytes left to be sent out (of total 318 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e67430
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=328)
TX EAP -> RADIUS - hexdump(len=328): 02 07 01 48 19 80 00 00 01 3e 16 03 03 01 06 10 00 01 02 01 00 6a aa ad 63 8e 82 ea 84 ae 79 84 fd 06 89 81 71 94 e5 f3 7d 95 4c 9f 0e 12 96 04 af 27 df bb 80 ae 99 c4 89 d3 f8 16 12 44 4f 29 39 06 fb 44 bd e6 97 16 d6 f4 35 46 fe 31 98 f4 3e 6b ec 11 e8 87 7c 48 e3 e0 45 a8 d6 99 0d 50 ff 36 18 dd 4f 9d e0 eb af bf a2 ab 9a 44 bc 2c 2b 73 11 e5 c1 7d 87 93 03 e8 59 7d ca 8a 8c 0c 90 59 91 6a 4c 1d b8 69 64 46 30 34 3c e8 28 e3 0c 18 cb 57 26 92 5a 0c 90 7e 14 e8 eb 6c 49 da d8 f6 c1 2a f7 4f 8a 3d 7e 19 39 b4 ff e4 13 42 d7 96 bc e8 73 8f 07 e5 bb df a1 5b 6b b8 70 97 5e e0 65 5c d3 8a cc 2f 30 9c ce 70 79 1c a0 3f bd ee 8c 53 47 8c 0a e7 4a a6 a3 b7 91 c8 f1 c6 58 8e 02 ef 24 ea 4f 91 24 55 d0 a7 1c 06 f8 df 73 d2 f1 c3 dd 5a f1 f0 42 a3 8c 16 20 fb 94 fb a3 8e 13 df 30 bb 1c 8c 6d 65 61 db a2 08 98 3d e1 95 f4 52 f1 14 03 03 00 01 01 16 03 03 00 28 b1 87 58 4c b8 e2 64 ae 40 ad 77 f3 ab f5 f2 bf b1 fc db 33 7c 33 73 08 92 56 63 a3 b6 2f 3e a1 67 00 15 1f df 50 c2 5f
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=7 length=464
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=255
      Value: 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
   Attribute 79 (EAP-Message) length=77
      Value: fb94fba38e13df30bb1c8c6d6561dba208983de195f452f11403030001011603030028b187584cb8e264ae40ad77f3abf5f2bfb1fcdb337c337308925663a3b62f3ea16700151fdf50c25f
   Attribute 24 (State) length=18
      Value: b45abf70b25da6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 68235e3e485c7e54b4e05270cc32d345
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 115 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=7 length=115
   Attribute 79 (EAP-Message) length=59
      Value: 0108003919001403030001011603030028e002e22f1c7a09d9274c0f04e13031556071f76ea39b55b5935da522b0659af8e4e0d2dbedd96bc5
   Attribute 80 (Message-Authenticator) length=18
      Value: 87dbc8e0f5da1de4e88d78606b0efe97
   Attribute 24 (State) length=18
      Value: b45abf70b352a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=8 len=57) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=57) - Flags 0x00
OpenSSL: RX ver=0x303 content_type=20 (change cipher spec/)
OpenSSL: Message - hexdump(len=1): 01
OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
OpenSSL: Message - hexdump(len=16): 14 00 00 0c 27 94 1d ac df c1 80 80 c2 e8 54 cb
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 read finished A
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: Handshake finished - resumed=0
SSL: No Application Data included
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
OpenSSL: Using internal PRF
EAP-PEAP: Derived key - hexdump(len=64): 3c b8 d0 48 da 43 4d 75 f4 24 2f 1a 4f 8a 86 68 c6 8c e6 fb a0 e0 79 3d 80 0e 38 70 23 68 51 37 b8 ac 8c 54 1e 20 dc 21 02 1d fa 22 58 f8 74 19 61 67 97 b8 9c 8e 8c 44 73 ce 48 5e c9 c7 62 eb
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 56 20 0d d0 7c 36 65 e8 8e 1b 54 9b 6c 9c 74 05 c0 f4 50 60 92 35 01 eb b6 e7 19 8a 88 57 11 cf 56 20 0d d0 51 2e 13 1d 00 5c 6b 87 ef 72 05 8f 68 91 b6 da cb e0 3d c2 ce b5 39 f1 57 57 9d 6f
SSL: Building ACK (type=25 id=8 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e51640
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=6)
TX EAP -> RADIUS - hexdump(len=6): 02 08 00 06 19 00
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=8 length=140
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=8
      Value: 020800061900
   Attribute 24 (State) length=18
      Value: b45abf70b352a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 54845fc61ded94a7aa01ffe0cc8f5bf6
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 98 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=8 length=98
   Attribute 79 (EAP-Message) length=42
      Value: 010900281900170303001de002e22f1c7a09da5ead1d2742beb7a96d37d728ec1806131bd1c236fa
   Attribute 80 (Message-Authenticator) length=18
      Value: 508a2a1461e2237a24940b507386e8ee
   Attribute 24 (State) length=18
      Value: b45abf70bc53a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=9 len=40) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=40) - Flags 0x00
EAP-PEAP: received 34 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 09 00 05 01
EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=8):
     73 61 6e 64 6d 61 6e 74                           sandmant        
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=13): 02 09 00 0d 01 73 61 6e 64 6d 61 6e 74
SSL: 38 bytes left to be sent out (of total 38 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e51600
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=44)
TX EAP -> RADIUS - hexdump(len=44): 02 09 00 2c 19 00 17 03 03 00 21 b1 87 58 4c b8 e2 64 af a1 40 bc 41 28 cc d9 1f 87 38 b1 be 72 39 3c 79 27 d7 74 6e b8 0b 24 c0 b5
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=9 length=178
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=46
      Value: 0209002c19001703030021b187584cb8e264afa140bc4128ccd91f8738b1be72393c7927d7746eb80b24c0b5
   Attribute 24 (State) length=18
      Value: b45abf70bc53a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: e2212ac1b11cffa951be44a315d5f9a9
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 123 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=9 length=123
   Attribute 79 (EAP-Message) length=67
      Value: 010a004119001703030036e002e22f1c7a09dbd7fdac0c1c7c9ea6bd6b52b39429560c3dfb44984dedce53c1e2b3ff90c67c81bd20e931e81936dfcb9d2e1bde96
   Attribute 80 (Message-Authenticator) length=18
      Value: 64a628ad547e3956fa30ca5ef636f64e
   Attribute 24 (State) length=18
      Value: b45abf70bd50a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=10 len=65) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=65) - Flags 0x00
EAP-PEAP: received 59 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=30): 1a 01 0a 00 1d 10 58 00 76 79 2f 9a e5 75 42 5b d4 84 83 1f 40 9a 73 61 6e 64 6d 61 6e 74
EAP-PEAP: received Phase 2: code=1 identifier=10 length=34
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=8):
     73 61 6e 64 6d 61 6e 74                           sandmant        
EAP-MSCHAPV2: Generating Challenge Response
Get randomness: len=16 entropy=0
random from os_get_random - hexdump(len=16): dd dc 49 9a 48 b7 b6 2f 22 c3 48 8f 9b a7 5f da
random_mix_pool - hexdump(len=20): 0d b9 b1 bf 70 7c bd fa 8b 8c 0a 46 d8 96 87 a4 8e 89 0d 7d
random from internal pool - hexdump(len=16): 52 c7 66 0a bf 85 ed d3 d8 c1 5b 8c 5d 36 f0 8e
mixed random - hexdump(len=16): 8f 1b 2f 90 f7 32 5b fc fa 02 13 03 c6 91 af 54
MSCHAPV2: Identity - hexdump_ascii(len=8):
     73 61 6e 64 6d 61 6e 74                           sandmant        
MSCHAPV2: Username - hexdump_ascii(len=8):
     73 61 6e 64 6d 61 6e 74                           sandmant        
MSCHAPV2: auth_challenge - hexdump(len=16): 58 00 76 79 2f 9a e5 75 42 5b d4 84 83 1f 40 9a
MSCHAPV2: peer_challenge - hexdump(len=16): 8f 1b 2f 90 f7 32 5b fc fa 02 13 03 c6 91 af 54
MSCHAPV2: username - hexdump_ascii(len=8):
     73 61 6e 64 6d 61 6e 74                           sandmant        
MSCHAPV2: password - hexdump_ascii(len=8):
     65 72 70 68 39 61 6e 2c                           t90*p_gfdd,        
MSCHAPV2: NT Response - hexdump(len=24): eb 0d 79 b2 25 c8 bf c9 b1 66 34 98 a2 10 13 09 b5 25 6f 93 2c 16 cb 7d
MSCHAPV2: Auth Response - hexdump(len=20): a5 00 f4 16 f3 e8 95 c3 f4 5e 08 fe 75 dc a6 e4 54 f2 f9 83
MSCHAPV2: Master Key - hexdump(len=16): b1 77 c3 d9 2c 7b 22 a6 4a 05 92 c3 28 51 99 d7
EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=67): 02 0a 00 43 1a 02 0a 00 3e 31 8f 1b 2f 90 f7 32 5b fc fa 02 13 03 c6 91 af 54 00 00 00 00 00 00 00 00 eb 0d 79 b2 25 c8 bf c9 b1 66 34 98 a2 10 13 09 b5 25 6f 93 2c 16 cb 7d 00 73 61 6e 64 6d 61 6e 74
SSL: 92 bytes left to be sent out (of total 92 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e4ea50
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=98)
TX EAP -> RADIUS - hexdump(len=98): 02 0a 00 62 19 00 17 03 03 00 57 b1 87 58 4c b8 e2 64 b0 78 17 fa 5d 40 5a 7b 0d 45 e6 02 25 8a 79 9c aa b5 c9 a0 c7 e7 08 ae 1e e0 c1 22 b4 e8 a9 5d 8b 0b 32 50 9c 60 99 a6 e8 be ba 04 a4 dc 17 de 3a 0a 6c e3 43 ef 52 8d 3b 16 64 00 d8 9e 42 73 18 1e 20 44 8a e1 c0 da 7f 88 5d f7 af b9 e1 3f
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=10 length=232
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=100
      Value: 020a006219001703030057b187584cb8e264b07817fa5d405a7b0d45e602258a799caab5c9a0c7e708ae1ee0c122b4e8a95d8b0b32509c6099a6e8beba04a4dc17de3a0a6ce343ef528d3b166400d89e4273181e20448ae1c0da7f885df7afb9e13f
   Attribute 24 (State) length=18
      Value: b45abf70bd50a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 4710192e75553f4d865918b20660dec5
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 140 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=10 length=140
   Attribute 79 (EAP-Message) length=84
      Value: 010b005219001703030047e002e22f1c7a09dc79d2e086569358ebda0942e699c927e79e9fb9d0966ff4e40ff57baa80769e736352b36c0b446654d5696c6f4e4565fc1eef2561bbb5e8eb4df8d3b07cc07e
   Attribute 80 (Message-Authenticator) length=18
      Value: 4a1d9e65e04aa13802bfe395a3d6c45b
   Attribute 24 (State) length=18
      Value: b45abf70be51a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.03 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=11 len=82) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=82) - Flags 0x00
EAP-PEAP: received 76 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53 3d 41 35 30 30 46 34 31 36 46 33 45 38 39 35 43 33 46 34 35 45 30 38 46 45 37 35 44 43 41 36 45 34 35 34 46 32 46 39 38 33
EAP-PEAP: received Phase 2: code=1 identifier=11 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-MSCHAPV2: RX identifier 11 mschapv2_id 10
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): 02 0b 00 06 1a 03
SSL: 31 bytes left to be sent out (of total 31 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e51f50
EAP: Session-Id - hexdump(len=65): 19 56 20 0d d0 7c 36 65 e8 8e 1b 54 9b 6c 9c 74 05 c0 f4 50 60 92 35 01 eb b6 e7 19 8a 88 57 11 cf 56 20 0d d0 51 2e 13 1d 00 5c 6b 87 ef 72 05 8f 68 91 b6 da cb e0 3d c2 ce b5 39 f1 57 57 9d 6f
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=37)
TX EAP -> RADIUS - hexdump(len=37): 02 0b 00 25 19 00 17 03 03 00 1a b1 87 58 4c b8 e2 64 b1 72 72 c6 ea 81 a9 9f 00 e5 e6 2f 86 d3 ff 95 20 8b c2
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=11 length=171
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=39
      Value: 020b00251900170303001ab187584cb8e264b17272c6ea81a99f00e5e62f86d3ff95208bc2
   Attribute 24 (State) length=18
      Value: b45abf70be51a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 9544114179464ca54b68e8dfc0d9d864
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 114 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=11 (Access-Challenge) identifier=11 length=114
   Attribute 1 (User-Name) length=10
      Value: 'sandmant'
   Attribute 79 (EAP-Message) length=48
      Value: 010c002e19001703030023e002e22f1c7a09ddf8bcf042e1897c246c0e8692c58415de92d67dd29006f30e4ae713
   Attribute 80 (Message-Authenticator) length=18
      Value: 06563d06b7a8713fc6435918539da26a
   Attribute 24 (State) length=18
      Value: b45abf70bf56a6a7fe85e0e67aac2b27
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
decapsulated EAP packet (code=1 id=12 len=46) from RADIUS server: EAP-Request-PEAP (25)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=46) - Flags 0x00
EAP-PEAP: received 40 bytes encrypted data for Phase 2
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-TLV: Result TLV - hexdump(len=2): 00 01
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): 02 0c 00 0b 21 80 03 00 02 00 01
SSL: 40 bytes left to be sent out (of total 40 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1e52040
EAP: Session-Id - hexdump(len=65): 19 56 20 0d d0 7c 36 65 e8 8e 1b 54 9b 6c 9c 74 05 c0 f4 50 60 92 35 01 eb b6 e7 19 8a 88 57 11 cf 56 20 0d d0 51 2e 13 1d 00 5c 6b 87 ef 72 05 8f 68 91 b6 da cb e0 3d c2 ce b5 39 f1 57 57 9d 6f
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
WPA: eapol_test_eapol_send(type=0 len=46)
TX EAP -> RADIUS - hexdump(len=46): 02 0c 00 2e 19 00 17 03 03 00 23 b1 87 58 4c b8 e2 64 b2 22 41 75 32 75 76 ae 70 8e 99 73 7a b9 34 e1 5e a9 ba 57 1f bf b8 6c 30 62 b2 88
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
Sending RADIUS message to authentication server
RADIUS message: code=1 (Access-Request) identifier=12 length=180
   Attribute 1 (User-Name) length=15
      Value: 'sandmant-peap'
   Attribute 4 (NAS-IP-Address) length=6
      Value: 127.0.0.1
   Attribute 31 (Calling-Station-Id) length=19
      Value: '02-00-00-00-00-01'
   Attribute 12 (Framed-MTU) length=6
      Value: 1400
   Attribute 61 (NAS-Port-Type) length=6
      Value: 19
   Attribute 77 (Connect-Info) length=24
      Value: 'CONNECT 11Mbps 802.11b'
   Attribute 79 (EAP-Message) length=48
      Value: 020c002e19001703030023b187584cb8e264b2224175327576ae708e99737ab934e15ea9ba571fbfb86c3062b288
   Attribute 24 (State) length=18
      Value: b45abf70bf56a6a7fe85e0e67aac2b27
   Attribute 80 (Message-Authenticator) length=18
      Value: 39fab40a60b0e830aee5cb5c803cc806
Next RADIUS client retransmit in 3 seconds
EAPOL: SUPP_BE entering state RECEIVE
Received 198 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=2 (Access-Accept) identifier=12 length=198
   Attribute 77 (Connect-Info) length=7
      Value: 'staff'
   Attribute 65 (Tunnel-Medium-Type) length=6
      Value: 00000006
   Attribute 64 (Tunnel-Type) length=6
      Value: 0000000d
   Attribute 81 (Tunnel-Private-Group-Id) length=9
      Value: 73746166663037
   Attribute 1 (User-Name) length=10
      Value: 'sandmant'
   Attribute 26 (Vendor-Specific) length=58
      Value: 000001371134eaa67fc8625235ad610037a6fc22e423d7c71c6f4eab6df273cc137f50e6a3a1743bdb4c1e8a49469e2639cfd460be24305b
   Attribute 26 (Vendor-Specific) length=58
      Value: 000001371034f32f51da4b4379340094b4137f9358c4ef7b65c7d96cb81efb77b4d2af730af812c2eb9566c2b6c13b17ab16642590ff0f17
   Attribute 79 (EAP-Message) length=6
      Value: 030c0004
   Attribute 80 (Message-Authenticator) length=18
      Value: cef4a0eaa323ddabb0943f4e1cdee4f2
STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec

RADIUS packet matching with station
MS-MPPE-Send-Key (sign) - hexdump(len=32): bd ed 71 51 5c 54 9d 7d 6e 4f 03 9b 03 09 b3 bc fc 76 6f 11 24 9a 7f ca de 55 20 74 bb 84 cf f5
MS-MPPE-Recv-Key (crypt) - hexdump(len=32): 46 c2 64 36 05 33 22 a3 3c 28 55 10 79 ba 77 0b de 88 ac bd 7f 1c 47 89 2b 7a 18 a4 da d0 d0 e4
decapsulated EAP packet (code=3 id=12 len=4) from RADIUS server: EAP Success
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required
WPA: EAPOL processing complete
Cancelling authentication timeout
State: DISCONNECTED -> COMPLETED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
eapol_sm_cb: result=1
EAPOL: Successfully fetched key (len=32)
PMK from EAPOL - hexdump(len=32): 3c b8 d0 48 da 43 4d 75 f4 24 2f 1a 4f 8a 86 68 c6 8c e6 fb a0 e0 79 3d 80 0e 38 70 23 68 51 37
WARNING: PMK mismatch
PMK from AS - hexdump(len=32): 46 c2 64 36 05 33 22 a3 3c 28 55 10 79 ba 77 0b de 88 ac bd 7f 1c 47 89 2b 7a 18 a4 da d0 d0 e4
No EAP-Key-Name received from server
WPA: Clear old PMK and PTK
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 0  mismatch: 1
FAILURE
-------------- next part --------------
network={
	ssid="RB3-Tod-PEAP"
	key_mgmt=WPA-EAP
	eap=PEAP
	identity="sandmant"
	anonymous_identity="sandmant-peap"
	password="t90*p_gfdd,"
	phase2="autheap=MSCHAPV2"
}


More information about the Freeradius-Users mailing list