Re: EAP-TLV: Earlier failure - force failed Phase 2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2016-01-04 at 19:29 -0800, Adam Jacobs wrote:
> Okay, here's some better logging showing the failure.  I reproduced
> this by starting wpa_supplicant manually, with the same flags as DBUS
> uses plus -dd.  It does appear the problem is cryptobinding-related.
> 
> I still haven't found a combination of options that reproduces the
> failure without using NetworkManager, but I've only tried a few.
> 
> 
> Also, the failure seems to happen pretty consistently after around 30
> minutes.

The relevant pieces:

1451963729.358345: EAP-PEAP: Compound_MAC data - hexdump(len=61): 00 0c
00 38 00 00 00 00 a8 c8 90 39 15 20 a4 c6 90 9d 62 2c 02 e6 84 85 d9 04
4c 44 76 40 f5 00 03 0c 4f de cd aa 5a 36 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 19
1451963729.358417: EAP-PEAP: Invalid Compound_MAC in cryptobinding TLV
1451963729.358431: EAP-PEAP: Received MAC - hexdump(len=20): c2 57 d5
64 8d d3 a6 08 bc de 5e ab bc e4 20 22 55 57 76 6f
1451963729.358448: EAP-PEAP: Expected MAC - hexdump(len=20): c9 26 98
4a 2b 87 4c 54 b0 f8 28 81 75 cc 3d 3c 46 2d 61 e9
1451963729.358464: EAP-TLV: Result TLV - hexdump(len=2): 00 01
1451963729.358475: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2
Completed
1451963729.358488: EAP-TLV: Earlier failure - force failed Phase 2

I'll leave it for Jouni to dig into...

Dan

> 
> 
> 
> 
> 1451963600.200010: wlan0: BSS: Remove id 134 BSSID f8:4f:57:13:f3:6d
> SSID 'QA-testnet' due to wpa_bss_flush_by_age
> 1451963600.200048: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/134'
> 1451963600.200123: wlan0: BSS: Remove id 136 BSSID f8:4f:57:13:f3:6b
> SSID 'NoFrags' due to wpa_bss_flush_by_age
> 1451963600.200136: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/136'
> 1451963600.200173: wlan0: BSS: Remove id 137 BSSID f8:4f:57:13:f3:6c
> SSID 'key-testnet' due to wpa_bss_flush_by_age
> 1451963600.200184: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/137'
> 1451963600.200218: wlan0: BSS: Remove id 113 BSSID 00:1d:7e:ce:85:97
> SSID 'demonet' due to wpa_bss_flush_by_age
> 1451963600.200229: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/113'
> 1451963600.200261: wlan0: BSS: Remove id 138 BSSID f8:4f:57:13:f3:64
> SSID 'NoFrags' due to wpa_bss_flush_by_age
> 1451963600.200272: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/138'
> 1451963600.200304: wlan0: BSS: Remove id 139 BSSID 84:61:a0:d8:68:00
> SSID 'Sandwiches2' due to wpa_bss_flush_by_age
> 1451963600.200314: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/139'
> 1451963600.200347: wlan0: BSS: Remove id 127 BSSID c0:25:5c:de:10:8f
> SSID 'Mocana-SECURE' due to wpa_bss_flush_by_age
> 1451963600.200357: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/127'
> 1451963600.200388: wlan0: BSS: Remove id 98 BSSID c0:25:5c:de:10:8b
> SSID 'NoFrags' due to wpa_bss_flush_by_age
> 1451963600.200399: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/98'
> 1451963600.200429: wlan0: BSS: Remove id 128 BSSID c0:25:5c:de:10:8d
> SSID 'QA-testnet' due to wpa_bss_flush_by_age
> 1451963600.200440: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/128'
> 1451963600.200469: wlan0: BSS: Remove id 126 BSSID c0:25:5c:de:10:8c
> SSID 'key-testnet' due to wpa_bss_flush_by_age
> 1451963600.200480: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/126'
> 1451963600.200509: wlan0: BSS: Remove id 129 BSSID 84:b8:02:22:98:80
> SSID 'EONCRNA' due to wpa_bss_flush_by_age
> 1451963600.200520: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/129'
> 1451963600.200550: wlan0: BSS: Remove id 118 BSSID 84:b8:02:22:98:81
> SSID 'EONCRNA-Guest' due to wpa_bss_flush_by_age
> 1451963600.200561: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/118'
> 1451963600.200590: wlan0: BSS: Remove id 140 BSSID 34:a8:4e:1c:b3:21
> SSID 'EONCRNA-Guest' due to wpa_bss_flush_by_age
> 1451963600.200601: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/140'
> 1451963600.200630: wlan0: BSS: Remove id 141 BSSID 24:a2:e1:ee:14:a8
> SSID 'Edutect Wireless Network' due to wpa_bss_flush_by_age
> 1451963600.200641: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/141'
> 1451963600.200670: wlan0: BSS: Remove id 124 BSSID f8:4f:57:13:f3:6e
> SSID 'Mocana-GUEST' due to wpa_bss_flush_by_age
> 1451963600.200680: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/124'
> 1451963600.200710: wlan0: BSS: Remove id 131 BSSID c0:25:5c:de:10:8e
> SSID 'Mocana-GUEST' due to wpa_bss_flush_by_age
> 1451963600.200720: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/131'
> 1451963600.200757: p2p-dev-wlan0: BSS: Remove id 134 BSSID
> f8:4f:57:13:f3:6d SSID 'QA-testnet' due to wpa_bss_flush_by_age
> 1451963600.200771: p2p-dev-wlan0: BSS: Remove id 136 BSSID
> f8:4f:57:13:f3:6b SSID 'NoFrags' due to wpa_bss_flush_by_age
> 1451963600.200785: p2p-dev-wlan0: BSS: Remove id 137 BSSID
> f8:4f:57:13:f3:6c SSID 'key-testnet' due to wpa_bss_flush_by_age
> 1451963600.200798: p2p-dev-wlan0: BSS: Remove id 113 BSSID
> 00:1d:7e:ce:85:97 SSID 'demonet' due to wpa_bss_flush_by_age
> 1451963600.200811: p2p-dev-wlan0: BSS: Remove id 138 BSSID
> f8:4f:57:13:f3:64 SSID 'NoFrags' due to wpa_bss_flush_by_age
> 1451963600.200824: p2p-dev-wlan0: BSS: Remove id 139 BSSID
> 84:61:a0:d8:68:00 SSID 'Sandwiches2' due to wpa_bss_flush_by_age
> 1451963600.200837: p2p-dev-wlan0: BSS: Remove id 127 BSSID
> c0:25:5c:de:10:8f SSID 'Mocana-SECURE' due to wpa_bss_flush_by_age
> 1451963600.200850: p2p-dev-wlan0: BSS: Remove id 98 BSSID
> c0:25:5c:de:10:8b SSID 'NoFrags' due to wpa_bss_flush_by_age
> 1451963600.200863: p2p-dev-wlan0: BSS: Remove id 128 BSSID
> c0:25:5c:de:10:8d SSID 'QA-testnet' due to wpa_bss_flush_by_age
> 1451963600.200876: p2p-dev-wlan0: BSS: Remove id 126 BSSID
> c0:25:5c:de:10:8c SSID 'key-testnet' due to wpa_bss_flush_by_age
> 1451963600.200889: p2p-dev-wlan0: BSS: Remove id 129 BSSID
> 84:b8:02:22:98:80 SSID 'EONCRNA' due to wpa_bss_flush_by_age
> 1451963600.200902: p2p-dev-wlan0: BSS: Remove id 118 BSSID
> 84:b8:02:22:98:81 SSID 'EONCRNA-Guest' due to wpa_bss_flush_by_age
> 1451963600.200916: p2p-dev-wlan0: BSS: Remove id 140 BSSID
> 34:a8:4e:1c:b3:21 SSID 'EONCRNA-Guest' due to wpa_bss_flush_by_age
> 1451963600.200930: p2p-dev-wlan0: BSS: Remove id 141 BSSID
> 24:a2:e1:ee:14:a8 SSID 'Edutect Wireless Network' due to
> wpa_bss_flush_by_age
> 1451963600.200943: p2p-dev-wlan0: BSS: Remove id 124 BSSID
> f8:4f:57:13:f3:6e SSID 'Mocana-GUEST' due to wpa_bss_flush_by_age
> 1451963600.200959: p2p-dev-wlan0: BSS: Remove id 131 BSSID
> c0:25:5c:de:10:8e SSID 'Mocana-GUEST' due to wpa_bss_flush_by_age
> 1451963600.205178: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3
> 1451963657.605411: dbus: fi.w1.wpa_supplicant1.Interface.Scan
> (/fi/w1/wpa_supplicant1/Interfaces/3) [a{sv}]
> 1451963657.605461: wlan0: Add radio work 'scan'@0x555b677d8300
> 1451963657.605474: wlan0: First radio work item in the queue -
> schedule start immediately
> 1451963657.605673: wlan0: Starting radio work 'scan'@0x555b677d8300 a
> fter 0.000196 second wait
> 1451963657.605859: wlan0: nl80211: scan request
> 1451963657.605900: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
> 1451963657.606464: Scan requested (ret=0) - scan timeout 30 seconds
> 1451963657.606504: nl80211: Event message available
> 1451963657.606523: nl80211: Ignored event (cmd=33) for foreign
> interface (ifindex 3 wdev 0x0)
> 1451963657.606539: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN)
> received for wlan0
> 1451963657.606554: wlan0: nl80211: Scan trigger
> 1451963657.606570: wlan0: Event SCAN_STARTED (47) received
> 1451963657.606585: wlan0: Own scan request started a scan in 0.000087
> seconds
> 1451963657.611014: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3
> 1451963659.208171: RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext
> ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> 1451963659.208233: nl80211: Event message available
> 1451963659.208267: nl80211: Ignored event (cmd=34) for foreign
> interface (ifindex 3 wdev 0x0)
> 1451963659.208285: nl80211: Drv Event 34
> (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
> 1451963659.208304: wlan0: nl80211: New scan results available
> 1451963659.208323: nl80211: Scan probed for SSID ''
> 1451963659.208352: nl80211: Scan included frequencies: 2412 2417 2422
> 2427 2432 2437 2442 2447 2452 2457 2462 5180 5200 5220 5240 5260 5280
> 5300 5320 5745 5765 5785 5805 5825
> 1451963659.208447: wlan0: Event SCAN_RESULTS (3) received
> 1451963659.208462: wlan0: Scan completed in 1.601878 seconds
> 1451963659.208658: nl80211: Associated on 5785 MHz
> 1451963659.208711: nl80211: Associated with 3c:0e:23:8e:48:3f
> 1451963659.208843: nl80211: Received scan results (31 BSSes)
> 1451963659.209113: nl80211: Scan results indicate BSS status with
> 3c:0e:23:8e:48:3f as associated
> 1451963659.209242: wlan0: BSS: Start scan result update 20
> 1451963659.209394: wlan0: BSS: Add new id 146 BSSID f8:4f:57:13:f3:6b
> SSID 'NoFrags'
> 1451963659.209417: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/146'
> 1451963659.209611: wlan0: BSS: Add new id 147 BSSID f8:4f:57:13:f3:6d
> SSID 'QA-testnet'
> 1451963659.209635: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/147'
> 1451963659.209812: wlan0: BSS: Add new id 148 BSSID f8:4f:57:13:f3:6c
> SSID 'key-testnet'
> 1451963659.209836: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/148'
> 1451963659.210008: wlan0: BSS: Add new id 149 BSSID 00:1d:7e:ce:85:97
> SSID 'demonet'
> 1451963659.210031: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/149'
> 1451963659.210178: wlan0: BSS: Add new id 150 BSSID f8:4f:57:13:f3:64
> SSID 'NoFrags'
> 1451963659.210201: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/150'
> 1451963659.210355: wlan0: BSS: Add new id 151 BSSID 30:b5:c2:3e:70:be
> SSID 'surfsup'
> 1451963659.210377: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/151'
> 1451963659.210477: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.210497: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.210607: wlan0: BSS: Add new id 152 BSSID 84:b8:02:22:98:80
> SSID 'EONCRNA'
> 1451963659.210629: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/152'
> 1451963659.210804: wlan0: BSS: Add new id 153 BSSID 84:b8:02:22:98:81
> SSID 'EONCRNA-Guest'
> 1451963659.210828: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/153'
> 1451963659.210982: wlan0: BSS: Add new id 154 BSSID 34:a8:4e:1c:b3:21
> SSID 'EONCRNA-Guest'
> 1451963659.211005: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/154'
> 1451963659.211202: wlan0: BSS: Add new id 155 BSSID f8:4f:57:13:f3:6e
> SSID 'Mocana-GUEST'
> 1451963659.211226: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/155'
> 1451963659.211556: wlan0: BSS: Add new id 156 BSSID 24:de:c6:79:d4:81
> SSID 'vlguest'
> 1451963659.211607: dbus: Register BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/156'
> 1451963659.211903: BSS: last_scan_res_used=31/64
> 1451963659.211956: wlan0: New scan results available (own=1 ext=0)
> 1451963659.212044: bgscan simple: scan result notification
> 1451963659.212087: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.212115: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.212141: WPS: AP[0] e4:f4:c6:14:7b:9d type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.212171: WPS: AP[1] 30:b5:c2:3e:70:be type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.212199: WPS: AP[2] 30:b5:c2:3e:70:bf type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.212225: WPS: AP[3] e4:f4:c6:14:7b:9e type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.212266: wlan0: Radio work 'scan'@0x555b677d8300 done in
> 1.606589 seconds
> 1451963659.212294: wlan0: Selecting BSS from priority group 0
> 1451963659.212335: wlan0: 0: 74:a0:2f:63:4f:ef ssid='ETSYguest'
> wpa_ie_len=0 rsn_ie_len=20 caps=0x1111 level=-66
> 1451963659.212365: wlan0:    skip - SSID mismatch
> 1451963659.212406: wlan0: 1: 74:a0:2f:63:4f:ee ssid='CarrierPigeon'
> wpa_ie_len=0 rsn_ie_len=24 caps=0x1111 level=-66
> 1451963659.212434: wlan0:    skip - SSID mismatch
> 1451963659.212473: wlan0: 2: 74:a0:2f:63:4f:ed ssid='MostlyHarmless'
> wpa_ie_len=0 rsn_ie_len=20 caps=0x1111 level=-67
> 1451963659.212500: wlan0:    skip - SSID mismatch
> 1451963659.212538: wlan0: 3: 3c:0e:23:8e:48:3f ssid='Mocana-SECURE'
> wpa_ie_len=0 rsn_ie_len=20 caps=0x1011 level=-60
> 1451963659.212748: wlan0:    selected based on RSN IE
> 1451963659.212923: wlan0:    selected BSS 3c:0e:23:8e:48:3f
> ssid='Mocana-SECURE'
> 1451963659.213083: p2p-dev-wlan0: Updating scan results from sibling
> 1451963659.213563: nl80211: Received scan results (31 BSSes)
> 1451963659.213906: p2p-dev-wlan0: BSS: Start scan result update 18
> 1451963659.214135: p2p-dev-wlan0: BSS: Add new id 146 BSSID
> f8:4f:57:13:f3:6b SSID 'NoFrags'
> 1451963659.214262: p2p-dev-wlan0: BSS: Add new id 147 BSSID
> f8:4f:57:13:f3:6d SSID 'QA-testnet'
> 1451963659.214308: p2p-dev-wlan0: BSS: Add new id 148 BSSID
> f8:4f:57:13:f3:6c SSID 'key-testnet'
> 1451963659.214366: p2p-dev-wlan0: BSS: Add new id 149 BSSID
> 00:1d:7e:ce:85:97 SSID 'demonet'
> 1451963659.214405: p2p-dev-wlan0: BSS: Add new id 150 BSSID
> f8:4f:57:13:f3:64 SSID 'NoFrags'
> 1451963659.214439: p2p-dev-wlan0: BSS: Add new id 151 BSSID
> 30:b5:c2:3e:70:be SSID 'surfsup'
> 1451963659.214474: p2p-dev-wlan0: BSS: Add new id 152 BSSID
> 84:b8:02:22:98:80 SSID 'EONCRNA'
> 1451963659.214522: p2p-dev-wlan0: BSS: Add new id 153 BSSID
> 84:b8:02:22:98:81 SSID 'EONCRNA-Guest'
> 1451963659.214559: p2p-dev-wlan0: BSS: Add new id 154 BSSID
> 34:a8:4e:1c:b3:21 SSID 'EONCRNA-Guest'
> 1451963659.214617: p2p-dev-wlan0: BSS: Add new id 155 BSSID
> f8:4f:57:13:f3:6e SSID 'Mocana-GUEST'
> 1451963659.214658: p2p-dev-wlan0: BSS: Add new id 156 BSSID
> 24:de:c6:79:d4:81 SSID 'vlguest'
> 1451963659.214690: BSS: last_scan_res_used=31/64
> 1451963659.214727: p2p-dev-wlan0: New scan results available (own=0
> ext=0)
> 1451963659.214765: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.214795: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.214821: WPS: AP[0] 30:b5:c2:3e:70:be type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.214851: WPS: AP[1] 30:b5:c2:3e:70:bf type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.214878: WPS: AP[2] e4:f4:c6:14:7b:9d type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.214905: WPS: AP[3] e4:f4:c6:14:7b:9e type=0 tries=0
> last_attempt=-1 sec ago blacklist=0
> 1451963659.214963: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3
> 1451963659.215324: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2
> 1451963659.215707: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/1
> 1451963659.215992: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/0
> 1451963659.216207: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/3
> 1451963659.216381: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/4
> 1451963659.216586: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/5
> 1451963659.216842: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/6
> 1451963659.217052: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/84
> 1451963659.217268: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/133
> 1451963659.217511: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/135
> 1451963659.217768: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/16
> 1451963659.217914: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/17
> 1451963659.218045: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/24
> 1451963659.218187: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/144
> 1451963659.218446: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/130
> 1451963659.218587: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/101
> 1451963659.218726: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/54
> 1451963659.218991: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/36
> 1451963659.219247: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/145
> 1451963659.219483: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/142
> 1451963659.252932: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/146) [s]
> 1451963659.253312: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/147) [s]
> 1451963659.253640: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/148) [s]
> 1451963659.253958: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/149) [s]
> 1451963659.258493: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/150) [s]
> 1451963659.258789: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/151) [s]
> 1451963659.258872: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.258886: WPS: Unknown Vendor Extension (Vendor ID 9442)
> 1451963659.259057: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/153) [s]
> 1451963659.259255: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/152) [s]
> 1451963659.259504: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/154) [s]
> 1451963659.259728: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/155) [s]
> 1451963659.269528: dbus: org.freedesktop.DBus.Properties.GetAll
> (/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/156) [s]
> 1451963720.274518: wlan0: BSS: Remove id 69 BSSID 24:de:c6:79:d4:90
> SSID 'vlcorp' due to wpa_bss_flush_by_age
> 1451963720.274581: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/69'
> 1451963720.274702: wlan0: BSS: Remove id 106 BSSID 24:de:c6:79:d4:92
> SSID 'vlmobile' due to wpa_bss_flush_by_age
> 1451963720.274739: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/106'
> 1451963720.274790: wlan0: BSS: Remove id 143 BSSID 84:18:3a:02:46:68
> SSID 'RS_20_7.1' due to wpa_bss_flush_by_age
> 1451963720.274811: dbus: Unregister BSS object
> '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/143'
> 1451963720.274868: p2p-dev-wlan0: BSS: Remove id 69 BSSID
> 24:de:c6:79:d4:90 SSID 'vlcorp' due to wpa_bss_flush_by_age
> 1451963720.274893: p2p-dev-wlan0: BSS: Remove id 106 BSSID
> 24:de:c6:79:d4:92 SSID 'vlmobile' due to wpa_bss_flush_by_age
> 1451963720.274912: p2p-dev-wlan0: BSS: Remove id 143 BSSID
> 84:18:3a:02:46:68 SSID 'RS_20_7.1' due to wpa_bss_flush_by_age
> 1451963720.279823: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3
> 1451963729.285604: l2_packet_receive: src=3c:0e:23:8e:48:3f len=57
> 1451963729.285691: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.285710: RX EAPOL - hexdump(len=57): 02 00 00 35 01 01 00
> 35 01 00 6e 65 74 77 6f 72 6b 69 64 3d 4d 6f 63 61 6e 61 2d 53 45 43
> 55 52 45 2c 6e 61 73 69 64 3d 57 69 72 65 6c 65 73 73 2c 70 6f 72 74
> 69 64 3d 31
> 1451963729.285751: EAPOL: Received EAP-Packet frame
> 1451963729.285766: EAPOL: SUPP_PAE entering state RESTART
> 1451963729.285779: EAP: EAP entering state INITIALIZE
> 1451963729.285792: EAP: maintaining EAP method data for fast
> reauthentication
> 1451963729.285806: EAPOL: enable timer tick
> 1451963729.285824: EAP: EAP entering state IDLE
> 1451963729.285838: EAPOL: SUPP_PAE entering state AUTHENTICATING
> 1451963729.285852: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.285866: EAPOL: getSuppRsp
> 1451963729.285880: EAP: EAP entering state RECEIVED
> 1451963729.285907: EAP: Received EAP-Request id=1 method=1 vendor=0
> vendorMethod=0
> 1451963729.285923: EAP: EAP entering state IDENTITY
> 1451963729.285939: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication
> started
> 1451963729.285953: EAP: Status notification: started (param=)
> 1451963729.286060: EAP: EAP-Request Identity data -
> hexdump_ascii(len=48):
>      00 6e 65 74 77 6f 72 6b 69 64 3d 4d 6f 63 61 6e  
>  _networkid=Mocan
>      61 2d 53 45 43 55 52 45 2c 6e 61 73 69 64 3d 57   a
> -SECURE,nasid=W
>      69 72 65 6c 65 73 73 2c 70 6f 72 74 69 64 3d 31  
>  ireless,portid=1
> 1451963729.286185: EAP: using real identity - hexdump_ascii(len=7):
>      61 6a 61 63 6f 62 73                              ajacobs
> 1451963729.286236: EAP: EAP entering state SEND_RESPONSE
> 1451963729.286259: EAP: EAP entering state IDLE
> 1451963729.286280: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.286300: EAPOL: txSuppRsp
> 1451963729.286320: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.286343: TX EAPOL - hexdump(len=16): 01 00 00 0c 02 01 00
> 0c 01 61 6a 61 63 6f 62 73
> 1451963729.286429: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.298687: l2_packet_receive: src=3c:0e:23:8e:48:3f len=10
> 1451963729.298755: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.298773: RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00
> 06 19 20
> 1451963729.298797: EAPOL: Received EAP-Packet frame
> 1451963729.298810: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.298823: EAPOL: getSuppRsp
> 1451963729.298837: EAP: EAP entering state RECEIVED
> 1451963729.298860: EAP: Received EAP-Request id=2 method=25 vendor=0
> vendorMethod=0
> 1451963729.298875: EAP: EAP entering state GET_METHOD
> 1451963729.298892: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0
> method=25
> 1451963729.298905: EAP: Status notification: accept proposed method
> (param=PEAP)
> 1451963729.299014: EAP: Using previous method data for fast re
> -authentication
> 1451963729.299036: EAP: Initialize selected EAP method: vendor 0
> method 25 (PEAP)
> 1451963729.299065: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method
> 25 (PEAP) selected
> 1451963729.299089: EAP: EAP entering state METHOD
> 1451963729.299114: SSL: Received packet(len=6) - Flags 0x20
> 1451963729.299136: EAP-PEAP: Start (server ver=0, own ver=0)
> 1451963729.299156: EAP-PEAP: Using PEAP version 0
> 1451963729.299217: SSL: (where=0x10 ret=0x1)
> 1451963729.299474: SSL: (where=0x1001 ret=0x1)
> 1451963729.299505: SSL: SSL_connect:before/connect initialization
> 1451963729.299563: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.299588: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.299614: OpenSSL: TX ver=0x301 content_type=22
> 1451963729.299635: OpenSSL: Message - hexdump(len=220): [REMOVED]
> 1451963729.299657: SSL: (where=0x1001 ret=0x1)
> 1451963729.299677: SSL: SSL_connect:unknown state
> 1451963729.299700: SSL: (where=0x1002 ret=0xffffffff)
> 1451963729.299720: SSL: SSL_connect:error in unknown state
> 1451963729.299745: SSL: SSL_connect - want more data
> 1451963729.299766: SSL: 225 bytes pending from ssl_out
> 1451963729.299790: SSL: 225 bytes left to be sent out (of total 225
> bytes)
> 1451963729.299816: EAP: method process -> ignore=FALSE
> methodState=MAY_CONT decision=FAIL eapRespData=0x555b677d8300
> 1451963729.299844: EAP: EAP entering state SEND_RESPONSE
> 1451963729.299866: EAP: EAP entering state IDLE
> 1451963729.299889: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.299910: EAPOL: txSuppRsp
> 1451963729.299931: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.299955: TX EAPOL - hexdump(len=239): 01 00 00 eb 02 02 00
> eb 19 80 00 00 00 e1 16 03 01 00 dc 01 00 00 d8 03 01 db 8e 3c 7b a9
> bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00 ba
> 55 c8 65 d5 20 1f 48 00 00 c8 d4 6a ba 00 99 d0 0a 30 3d ea 8c 3a 69
> c8 1e 66 54 98 7e ce 77 c3 25 ae c3 af 43 00 62 c0 14 c0 0a 00 39 00
> 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13
> c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00
> 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05
> 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01
> 00 00 2d 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c
> 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0f 00
> 01 01
> 1451963729.300207: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.310898: l2_packet_receive: src=3c:0e:23:8e:48:3f len=159
> 1451963729.310987: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.311007: RX EAPOL - hexdump(len=159): 02 00 00 9b 01 03 00
> 9b 19 80 00 00 00 91 16 03 01 00 51 02 00 00 4d 03 01 56 8b 35 51 79
> fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c 66 81 8b 93 ce e6 a9 d3 be 76
> fb f6 c5 bd 20 1f 48 00 00 c8 d4 6a ba 00 99 d0 0a 30 3d ea 8c 3a 69
> c8 1e 66 54 98 7e ce 77 c3 25 ae c3 af 43 c0 14 00 00 05 ff 01 00 01
> 00 14 03 01 00 01 01 16 03 01 00 30 61 18 9d a5 c8 e2 5d c0 95 fe 04
> 73 ac 89 c0 10 55 93 59 5b f1 96 58 b1 8d ab 09 c5 d5 d7 85 7b 4c 32
> 58 38 ed 9a eb da 7f 8f 48 22 a6 86 02 fc
> 1451963729.311089: EAPOL: Received EAP-Packet frame
> 1451963729.311104: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.311119: EAPOL: getSuppRsp
> 1451963729.311134: EAP: EAP entering state RECEIVED
> 1451963729.311158: EAP: Received EAP-Request id=3 method=25 vendor=0
> vendorMethod=0
> 1451963729.311174: EAP: EAP entering state METHOD
> 1451963729.311195: SSL: Received packet(len=155) - Flags 0x80
> 1451963729.311209: SSL: TLS Message Length: 145
> 1451963729.311240: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.311275: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.311299: OpenSSL: RX ver=0x301 content_type=22
> 1451963729.311353: OpenSSL: Message - hexdump(len=81): [REMOVED]
> 1451963729.311387: SSL: (where=0x1001 ret=0x1)
> 1451963729.311411: SSL: SSL_connect:unknown state
> 1451963729.311425: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.311438: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.311451: OpenSSL: RX ver=0x301 content_type=20
> 1451963729.311464: OpenSSL: Message - hexdump(len=1): [REMOVED]
> 1451963729.311709: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.311726: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.311776: OpenSSL: RX ver=0x301 content_type=22
> 1451963729.311789: OpenSSL: Message - hexdump(len=16): [REMOVED]
> 1451963729.311801: SSL: (where=0x1001 ret=0x1)
> 1451963729.311813: SSL: SSL_connect:unknown state
> 1451963729.311826: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.311838: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.311852: OpenSSL: TX ver=0x301 content_type=20
> 1451963729.311863: OpenSSL: Message - hexdump(len=1): [REMOVED]
> 1451963729.311879: SSL: (where=0x1001 ret=0x1)
> 1451963729.311890: SSL: SSL_connect:unknown state
> 1451963729.311937: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.311949: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.311962: OpenSSL: TX ver=0x301 content_type=22
> 1451963729.311973: OpenSSL: Message - hexdump(len=16): [REMOVED]
> 1451963729.311984: SSL: (where=0x1001 ret=0x1)
> 1451963729.311995: SSL: SSL_connect:unknown state
> 1451963729.312007: SSL: (where=0x1001 ret=0x1)
> 1451963729.312018: SSL: SSL_connect:unknown state
> 1451963729.312040: SSL: (where=0x20 ret=0x1)
> 1451963729.312052: SSL: (where=0x1002 ret=0x1)
> 1451963729.312064: SSL: 59 bytes pending from ssl_out
> 1451963729.312081: SSL: No Application Data included
> 1451963729.312093: SSL: 59 bytes left to be sent out (of total 59
> bytes)
> 1451963729.312107: EAP-PEAP: TLS done, proceed to Phase 2
> 1451963729.312118: EAP-PEAP: using label 'client EAP encryption' in
> key derivation
> 1451963729.312227: OpenSSL: Using internal PRF
> 1451963729.312239: EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
> 1451963729.312252: EAP-PEAP: Derived Session-Id - hexdump(len=65): 19
> db 8e 3c 7b a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69
> 9e 2a ba 00 ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a
> c0 1f 47 1c 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.312286: EAP-PEAP: Workaround - allow outer EAP-Success to
> terminate PEAP resumption
> 1451963729.312298: EAP: method process -> ignore=FALSE
> methodState=MAY_CONT decision=COND_SUCC eapRespData=0x555b677937b0
> 1451963729.312314: EAP: Session-Id - hexdump(len=65): 19 db 8e 3c 7b
> a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00
> ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c
> 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.312346: EAP: EAP entering state SEND_RESPONSE
> 1451963729.312358: EAP: EAP entering state IDLE
> 1451963729.312370: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.312381: EAPOL: txSuppRsp
> 1451963729.312394: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.312407: TX EAPOL - hexdump(len=69): 01 00 00 41 02 03 00
> 41 19 00 14 03 01 00 01 01 16 03 01 00 30 f9 64 5b 0c c2 ab 90 ea a0
> b9 16 4a 37 6d f8 e2 a1 dc b9 99 e9 37 1f 57 0c 67 d6 01 d8 ed 82 bc
> 07 bd 60 e1 5f 7a 47 38 f8 83 ac 9d 6d 78 34 c1
> 1451963729.312483: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.319731: l2_packet_receive: src=3c:0e:23:8e:48:3f len=47
> 1451963729.319795: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.319816: RX EAPOL - hexdump(len=47): 02 00 00 2b 01 05 00
> 2b 19 00 17 03 01 00 20 b5 d2 47 17 de b2 ad 91 4e 02 55 3b 4d 07 7a
> 32 b2 8a 1b ab 9f d2 2b 16 57 fd 7c 7e d4 44 98 5a
> 1451963729.319862: EAPOL: Received EAP-Packet frame
> 1451963729.319880: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.319896: EAPOL: getSuppRsp
> 1451963729.319912: EAP: EAP entering state RECEIVED
> 1451963729.319935: EAP: Received EAP-Request id=5 method=25 vendor=0
> vendorMethod=0
> 1451963729.319955: EAP: EAP entering state METHOD
> 1451963729.319977: SSL: Received packet(len=43) - Flags 0x00
> 1451963729.320022: EAP-PEAP: received 37 bytes encrypted data for
> Phase 2
> 1451963729.320058: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.320081: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.320104: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1):
> 01
> 1451963729.320119: EAP-PEAP: received Phase 2: code=1 identifier=5
> length=5
> 1451963729.320133: EAP-PEAP: Phase 2 Request: type=1
> 1451963729.320146: EAP: using real identity - hexdump_ascii(len=7):
>      61 6a 61 63 6f 62 73                              ajacobs
> 1451963729.320186: EAP-PEAP: Encrypting Phase 2 data -
> hexdump(len=12): [REMOVED]
> 1451963729.320213: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.320232: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.320252: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.320271: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.320292: SSL: 74 bytes left to be sent out (of total 74
> bytes)
> 1451963729.320313: EAP: method process -> ignore=FALSE
> methodState=MAY_CONT decision=FAIL eapRespData=0x555b677acd90
> 1451963729.320337: EAP: Session-Id - hexdump(len=65): 19 db 8e 3c 7b
> a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00
> ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c
> 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.320396: EAP: EAP entering state SEND_RESPONSE
> 1451963729.320414: EAP: EAP entering state IDLE
> 1451963729.320432: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.320452: EAPOL: txSuppRsp
> 1451963729.320469: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.320487: TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00
> 50 19 00 17 03 01 00 20 cd 33 91 31 e1 01 15 e1 eb 0b f6 8b f0 63 71
> 1b 2a 29 22 24 20 18 4b 9b a2 52 c5 c3 7e 53 15 e6 17 03 01 00 20 b5
> fc 76 b6 b9 72 50 91 c5 72 25 fb a5 09 3a 41 bb 79 18 c6 e5 21 b3 75
> a2 18 e3 2b 54 5f 78 13
> 1451963729.320590: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.328439: l2_packet_receive: src=3c:0e:23:8e:48:3f len=63
> 1451963729.328518: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.328534: RX EAPOL - hexdump(len=63): 02 00 00 3b 01 06 00
> 3b 19 00 17 03 01 00 30 05 ba 86 0e 5b a7 5a 27 1d f9 b2 05 ee 77 06
> 84 46 ab 6a db 5a f8 10 30 f3 a1 1f ee 3f ee fa f7 39 40 0c d2 2d 2a
> b7 dc a4 8e b4 ae fc 79 17 96
> 1451963729.328573: EAPOL: Received EAP-Packet frame
> 1451963729.328586: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.328598: EAPOL: getSuppRsp
> 1451963729.328612: EAP: EAP entering state RECEIVED
> 1451963729.328633: EAP: Received EAP-Request id=6 method=25 vendor=0
> vendorMethod=0
> 1451963729.328648: EAP: EAP entering state METHOD
> 1451963729.328664: SSL: Received packet(len=59) - Flags 0x00
> 1451963729.328678: EAP-PEAP: received 53 bytes encrypted data for
> Phase 2
> 1451963729.328704: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.328739: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.328765: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=16):
> 01 06 00 10 fe 00 01 37 00 00 00 22 00 00 00 01
> 1451963729.328794: EAP-PEAP: received Phase 2: code=1 identifier=6
> length=20
> 1451963729.328808: EAP-PEAP: Phase 2 Request: type=1
> 1451963729.328820: EAP: using real identity - hexdump_ascii(len=7):
>      61 6a 61 63 6f 62 73                              ajacobs
> 1451963729.328851: EAP-PEAP: Encrypting Phase 2 data -
> hexdump(len=12): [REMOVED]
> 1451963729.328871: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.328884: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.328899: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.328911: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.328926: SSL: 74 bytes left to be sent out (of total 74
> bytes)
> 1451963729.328942: EAP: method process -> ignore=FALSE
> methodState=MAY_CONT decision=FAIL eapRespData=0x555b677acd90
> 1451963729.328958: EAP: Session-Id - hexdump(len=65): 19 db 8e 3c 7b
> a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00
> ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c
> 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.328996: EAP: EAP entering state SEND_RESPONSE
> 1451963729.329009: EAP: EAP entering state IDLE
> 1451963729.329022: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.329033: EAPOL: txSuppRsp
> 1451963729.329046: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.329059: TX EAPOL - hexdump(len=84): 01 00 00 50 02 06 00
> 50 19 00 17 03 01 00 20 75 83 4b 53 bd 61 9b b8 f5 65 8d 7f fb de cd
> 3d fa 00 41 7f 46 6e 8e 2a ac 5f 76 a2 44 21 28 bc 17 03 01 00 20 92
> 8f cb 83 6d 76 ea 66 52 0b 73 a7 a2 c6 ac 58 de 3c 75 33 cf a1 82 e2
> 9f 0d 82 04 f3 f8 14 08
> 1451963729.329147: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.336516: l2_packet_receive: src=3c:0e:23:8e:48:3f len=79
> 1451963729.336594: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.336611: RX EAPOL - hexdump(len=79): 02 00 00 4b 01 07 00
> 4b 19 00 17 03 01 00 40 91 06 2d 02 8d c9 30 0f c5 3b e9 8a c0 d6 f9
> 3c c7 07 52 df 7e 3e be 1f d4 e9 ef 2d 39 c6 fb 60 75 41 4b da 2c d8
> 5b 9b bd 5a 7f 3e f8 9b e2 fc f0 dc 13 8f 5a ee c5 32 b6 ab f6 46 11
> 8c f9 f0
> 1451963729.336656: EAPOL: Received EAP-Packet frame
> 1451963729.336669: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.336680: EAPOL: getSuppRsp
> 1451963729.336694: EAP: EAP entering state RECEIVED
> 1451963729.336714: EAP: Received EAP-Request id=7 method=25 vendor=0
> vendorMethod=0
> 1451963729.336729: EAP: EAP entering state METHOD
> 1451963729.336746: SSL: Received packet(len=75) - Flags 0x00
> 1451963729.336761: EAP-PEAP: received 69 bytes encrypted data for
> Phase 2
> 1451963729.336786: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.336820: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.336845: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=31):
> 1a 01 07 00 1e 10 08 e6 ff ea ab fa ef 05 f4 e0 44 c8 56 5c 8d 6d 52
> 41 44 49 55 53 2d 30 31
> 1451963729.336875: EAP-PEAP: received Phase 2: code=1 identifier=7
> length=35
> 1451963729.336889: EAP-PEAP: Phase 2 Request: type=26
> 1451963729.336902: EAP-MSCHAPV2: RX identifier 7 mschapv2_id 7
> 1451963729.336917: EAP-MSCHAPV2: Received challenge
> 1451963729.336928: EAP-MSCHAPV2: Authentication Servername -
> hexdump_ascii(len=9):
>      52 41 44 49 55 53 2d 30 31                        RADIUS-01
> 1451963729.336958: EAP-MSCHAPV2: Generating Challenge Response
> 1451963729.336971: Get randomness: len=16 entropy=340
> 1451963729.338033: MSCHAPV2: Identity - hexdump_ascii(len=7):
>      61 6a 61 63 6f 62 73                              ajacobs
> 1451963729.338073: MSCHAPV2: Username - hexdump_ascii(len=7):
>      61 6a 61 63 6f 62 73                              ajacobs
> 1451963729.338100: MSCHAPV2: auth_challenge - hexdump(len=16): 08 e6
> ff ea ab fa ef 05 f4 e0 44 c8 56 5c 8d 6d
> 1451963729.338118: MSCHAPV2: peer_challenge - hexdump(len=16): 9f a2
> ac c1 04 a0 36 6b fd 49 42 dd ea c7 93 fe
> 1451963729.338135: MSCHAPV2: username - hexdump_ascii(len=7):
>      61 6a 61 63 6f 62 73                              ajacobs
> 1451963729.338162: MSCHAPV2: password - hexdump_ascii(len=12):
> [REMOVED]
> 1451963729.338193: MSCHAPV2: NT Response - hexdump(len=24): 4e 48 06
> ec d8 1c ee 1a 47 1c a6 34 1c d6 79 ee f4 49 06 68 57 eb ab 76
> 1451963729.338219: MSCHAPV2: Auth Response - hexdump(len=20): a4 fc
> cb e6 86 12 e4 ff 4f 89 4a 39 58 83 42 6e 13 a9 e1 e9
> 1451963729.338240: MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
> 1451963729.338253: EAP-MSCHAPV2: TX identifier 7 mschapv2_id 7
> (response)
> 1451963729.338267: EAP-PEAP: Encrypting Phase 2 data -
> hexdump(len=66): [REMOVED]
> 1451963729.338286: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.338300: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.338315: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.338327: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.338342: SSL: 138 bytes left to be sent out (of total 138
> bytes)
> 1451963729.338358: EAP: method process -> ignore=FALSE
> methodState=MAY_CONT decision=FAIL eapRespData=0x555b677b4420
> 1451963729.338374: EAP: Session-Id - hexdump(len=65): 19 db 8e 3c 7b
> a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00
> ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c
> 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.338412: EAP: EAP entering state SEND_RESPONSE
> 1451963729.338424: EAP: EAP entering state IDLE
> 1451963729.338437: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.338449: EAPOL: txSuppRsp
> 1451963729.338461: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.338475: TX EAPOL - hexdump(len=148): 01 00 00 90 02 07 00
> 90 19 00 17 03 01 00 20 11 87 2f 26 02 4e 92 93 40 56 ac ad e6 a5 47
> cc 8b a2 7d 13 69 5d 09 7f 47 41 66 2b a7 43 ef 20 17 03 01 00 60 3a
> 1a 92 13 aa fd 40 a6 b3 a4 7b 67 3e bb ca 6b 61 a3 a5 e3 3c 40 aa 73
> b5 b2 a1 7b 97 c2 d9 85 20 4f 31 cc 9f a3 72 03 00 b7 63 79 42 7e c9
> fa 67 3b 93 0b ae 0d 6c f3 c3 d0 32 0b e5 fe 00 10 3f f5 0d 73 b5 c3
> f0 6a 3a ad 31 a8 97 42 9c 50 b0 66 27 a0 e3 0f 5c df 12 01 c1 5a b9
> ab f2 8e
> 1451963729.338579: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.349263: l2_packet_receive: src=3c:0e:23:8e:48:3f len=95
> 1451963729.349315: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.349328: RX EAPOL - hexdump(len=95): 02 00 00 5b 01 08 00
> 5b 19 00 17 03 01 00 50 9c 3c 73 86 ec 4c a6 c7 42 13 24 7d 35 7f dd
> 15 83 ae 4f 88 c0 ae e6 d5 d9 67 8a b0 d6 6b 50 94 f2 33 d7 21 e0 b5
> 95 e7 93 b4 bf ef 6a 78 56 b6 c9 63 d1 49 2c a7 a1 83 29 51 f1 b7 46
> ba 1d e7 1e 8f 46 11 35 d2 97 25 19 81 08 4d 77 4d dc 3e
> 1451963729.349367: EAPOL: Received EAP-Packet frame
> 1451963729.349378: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.349387: EAPOL: getSuppRsp
> 1451963729.349397: EAP: EAP entering state RECEIVED
> 1451963729.349414: EAP: Received EAP-Request id=8 method=25 vendor=0
> vendorMethod=0
> 1451963729.349425: EAP: EAP entering state METHOD
> 1451963729.349438: SSL: Received packet(len=91) - Flags 0x00
> 1451963729.349449: EAP-PEAP: received 85 bytes encrypted data for
> Phase 2
> 1451963729.349471: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.349482: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.349502: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47):
> 1a 03 07 00 2e 53 3d 41 34 46 43 43 42 45 36 38 36 31 32 45 34 46 46
> 34 46 38 39 34 41 33 39 35 38 38 33 34 32 36 45 31 33 41 39 45 31 45
> 39
> 1451963729.349526: EAP-PEAP: received Phase 2: code=1 identifier=8
> length=51
> 1451963729.349536: EAP-PEAP: Phase 2 Request: type=26
> 1451963729.349546: EAP-MSCHAPV2: RX identifier 8 mschapv2_id 7
> 1451963729.349556: EAP-MSCHAPV2: Received success
> 1451963729.349566: EAP-MSCHAPV2: Success message -
> hexdump_ascii(len=0):
> 1451963729.349576: EAP-MSCHAPV2: Authentication succeeded
> 1451963729.349586: EAP-PEAP: Encrypting Phase 2 data -
> hexdump(len=6): [REMOVED]
> 1451963729.349600: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.349609: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.349620: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.349629: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.349640: SSL: 74 bytes left to be sent out (of total 74
> bytes)
> 1451963729.349650: EAP: method process -> ignore=FALSE
> methodState=MAY_CONT decision=FAIL eapRespData=0x555b677acd90
> 1451963729.349663: EAP: Session-Id - hexdump(len=65): 19 db 8e 3c 7b
> a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00
> ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c
> 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.349690: EAP: EAP entering state SEND_RESPONSE
> 1451963729.349700: EAP: EAP entering state IDLE
> 1451963729.349710: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.349719: EAPOL: txSuppRsp
> 1451963729.349728: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.349738: TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00
> 50 19 00 17 03 01 00 20 26 48 e1 ed dd 9d cd fd 25 5f 9a 14 32 bd b2
> f7 95 e7 d5 94 e0 cb 16 c6 ca 11 d0 a9 94 41 ad 80 17 03 01 00 20 18
> 09 f9 67 97 ff d7 de 3a 98 2b bf 54 e4 dd fb 94 a1 5f bd f4 c9 6d f5
> 44 cc ae 15 f7 76 58 18
> 1451963729.349806: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.357577: l2_packet_receive: src=3c:0e:23:8e:48:3f len=111
> 1451963729.357677: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.357700: RX EAPOL - hexdump(len=111): 02 00 00 6b 01 0a 00
> 6b 19 00 17 03 01 00 60 b3 f5 a1 6d 73 91 4f f7 46 85 59 71 fd e9 5a
> f4 dd 00 02 4c 71 da 8d 18 2b 0a ec 18 7e 99 09 2f 1e 36 b3 56 17 b9
> f2 da 8a a2 ac 72 f1 aa 40 de 89 18 1e e0 68 42 c3 ee d0 21 c1 ef 1e
> 13 47 45 e7 43 80 61 e2 4b ff b5 55 81 ba 58 15 a9 25 10 e4 d3 b7 4e
> 39 0f 2e 53 a9 63 b6 d9 02 a0 5b a7
> 1451963729.357790: EAPOL: Received EAP-Packet frame
> 1451963729.357809: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.357825: EAPOL: getSuppRsp
> 1451963729.357843: EAP: EAP entering state RECEIVED
> 1451963729.357876: EAP: Received EAP-Request id=10 method=25 vendor=0
> vendorMethod=0
> 1451963729.357916: EAP: EAP entering state METHOD
> 1451963729.357942: SSL: Received packet(len=107) - Flags 0x00
> 1451963729.357968: EAP-PEAP: received 101 bytes encrypted data for
> Phase 2
> 1451963729.358006: OpenSSL: RX ver=0x0 content_type=256
> 1451963729.358028: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.358071: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=71):
> 01 0a 00 47 21 80 03 00 02 00 01 00 0c 00 38 00 00 00 00 a8 c8 90 39
> 15 20 a4 c6 90 9d 62 2c 02 e6 84 85 d9 04 4c 44 76 40 f5 00 03 0c 4f
> de cd aa 5a 36 c2 57 d5 64 8d d3 a6 08 bc de 5e ab bc e4 20 22 55 57
> 76 6f
> 1451963729.358139: EAP-PEAP: received Phase 2: code=1 identifier=10
> length=71
> 1451963729.358158: EAP-PEAP: Phase 2 Request: type=33
> 1451963729.358173: EAP-TLV: Received TLVs - hexdump(len=66): 80 03 00
> 02 00 01 00 0c 00 38 00 00 00 00 a8 c8 90 39 15 20 a4 c6 90 9d 62 2c
> 02 e6 84 85 d9 04 4c 44 76 40 f5 00 03 0c 4f de cd aa 5a 36 c2 57 d5
> 64 8d d3 a6 08 bc de 5e ab bc e4 20 22 55 57 76 6f
> 1451963729.358222: EAP-PEAP: Cryptobinding TLV - hexdump(len=56): 00
> 00 00 00 a8 c8 90 39 15 20 a4 c6 90 9d 62 2c 02 e6 84 85 d9 04 4c 44
> 76 40 f5 00 03 0c 4f de cd aa 5a 36 c2 57 d5 64 8d d3 a6 08 bc de 5e
> ab bc e4 20 22 55 57 76 6f
> 1451963729.358281: EAP-PEAP: TK - hexdump(len=60): [REMOVED]
> 1451963729.358296: EAP-PEAP: IPMK from TK - hexdump(len=40):
> [REMOVED]
> 1451963729.358313: EAP-PEAP: CMK from TK - hexdump(len=20): [REMOVED]
> 1451963729.358345: EAP-PEAP: Compound_MAC data - hexdump(len=61): 00
> 0c 00 38 00 00 00 00 a8 c8 90 39 15 20 a4 c6 90 9d 62 2c 02 e6 84 85
> d9 04 4c 44 76 40 f5 00 03 0c 4f de cd aa 5a 36 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 19
> 1451963729.358417: EAP-PEAP: Invalid Compound_MAC in cryptobinding
> TLV
> 1451963729.358431: EAP-PEAP: Received MAC - hexdump(len=20): c2 57 d5
> 64 8d d3 a6 08 bc de 5e ab bc e4 20 22 55 57 76 6f
> 1451963729.358448: EAP-PEAP: Expected MAC - hexdump(len=20): c9 26 98
> 4a 2b 87 4c 54 b0 f8 28 81 75 cc 3d 3c 46 2d 61 e9
> 1451963729.358464: EAP-TLV: Result TLV - hexdump(len=2): 00 01
> 1451963729.358475: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2
> Completed
> 1451963729.358488: EAP-TLV: Earlier failure - force failed Phase 2
> 1451963729.358504: EAP-PEAP: Encrypting Phase 2 data -
> hexdump(len=11): [REMOVED]
> 1451963729.358533: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.358547: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.358562: OpenSSL: TX ver=0x0 content_type=256
> 1451963729.358572: OpenSSL: Message - hexdump(len=5): [REMOVED]
> 1451963729.358587: SSL: 74 bytes left to be sent out (of total 74
> bytes)
> 1451963729.358602: EAP: method process -> ignore=FALSE
> methodState=DONE decision=FAIL eapRespData=0x555b677acd90
> 1451963729.358622: EAP: Session-Id - hexdump(len=65): 19 db 8e 3c 7b
> a9 bd ca 13 d4 da a3 fe 43 c2 2d cf a1 77 d1 cd 10 5f 69 9e 2a ba 00
> ba 55 c8 65 d5 56 8b 35 51 79 fb 1d 00 17 77 6b de f6 0a c0 1f 47 1c
> 66 81 8b 93 ce e6 a9 d3 be 76 fb f6 c5 bd
> 1451963729.358659: EAP: EAP entering state SEND_RESPONSE
> 1451963729.358672: EAP: EAP entering state IDLE
> 1451963729.358685: EAPOL: SUPP_BE entering state RESPONSE
> 1451963729.358696: EAPOL: txSuppRsp
> 1451963729.358710: TX EAPOL: dst=3c:0e:23:8e:48:3f
> 1451963729.358721: TX EAPOL - hexdump(len=84): 01 00 00 50 02 0a 00
> 50 19 00 17 03 01 00 20 b9 80 43 b3 2e 10 f0 6e cc 1b e0 22 01 d1 01
> 19 ce 73 e4 40 0b f5 ce cb b5 92 ae be 2c c4 02 91 17 03 01 00 20 76
> 5a a4 de 29 20 e9 df ad 47 a3 30 4a 20 24 f7 2e 2c 74 bf 3f cc 56 17
> ba 20 45 f2 30 a4 55 c3
> 1451963729.358832: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.366083: l2_packet_receive: src=3c:0e:23:8e:48:3f len=8
> 1451963729.366123: wlan0: RX EAPOL from 3c:0e:23:8e:48:3f
> 1451963729.366134: RX EAPOL - hexdump(len=8): 02 00 00 04 04 0a 00 04
> 1451963729.366149: EAPOL: Received EAP-Packet frame
> 1451963729.366159: EAPOL: SUPP_BE entering state REQUEST
> 1451963729.366167: EAPOL: getSuppRsp
> 1451963729.366176: EAP: EAP entering state RECEIVED
> 1451963729.366190: EAP: Received EAP-Failure
> 1451963729.366199: EAP: Status notification: completion
> (param=failure)
> 1451963729.366270: EAP: EAP entering state FAILURE
> 1451963729.366291: wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication
> failed
> 1451963729.366304: EAPOL: SUPP_PAE entering state HELD
> 1451963729.366319: EAPOL: Supplicant port status: Unauthorized
> 1451963729.366334: nl80211: Set supplicant port unauthorized for
> 3c:0e:23:8e:48:3f
> 1451963729.366546: EAPOL: SUPP_BE entering state RECEIVE
> 1451963729.366573: EAPOL: SUPP_BE entering state FAIL
> 1451963729.366586: EAPOL: SUPP_BE entering state IDLE
> 1451963729.366600: EAPOL authentication completed - result=FAILURE
> 1451963729.366621: wlan0: Setting authentication timeout: 2 sec 0
> usec
> 1451963731.366835: wlan0: Authentication with 3c:0e:23:8e:48:3f timed
> out.
> 1451963731.366868: Added BSSID 3c:0e:23:8e:48:3f into blacklist
> 1451963731.366878: TDLS: Remove peers on disassociation
> 1451963731.366885: wlan0: WPA: Clear old PMK and PTK
> 1451963731.366895: wlan0: Request to deauthenticate -
> bssid=3c:0e:23:8e:48:3f pending_bssid=00:00:00:00:00:00 reason=3
> state=COMPLETED
> 1451963731.366901: TDLS: Tear down peers
> 1451963731.366906:
> wpa_driver_nl80211_deauthenticate(addr=3c:0e:23:8e:48:3f
> reason_code=3)
> 1451963731.386988: wlan0: Event DEAUTH (12) received
> 1451963731.387015: wlan0: Deauthentication notification
> 1451963731.387024: wlan0:  * reason 3 (locally generated)
> 1451963731.387032: Deauthentication frame IE(s) - hexdump(len=0):
> [NULL]
> 1451963731.387047: wlan0: CTRL-EVENT-DISCONNECTED
> bssid=3c:0e:23:8e:48:3f reason=3 locally_generated=1
> 1451963731.387063: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="Mocana-SECURE" auth_failures=1 duration=10 reason=AUTH_FAILED
> 1451963731.387075: wlan0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=9)
> 1451963731.387087: wlan0: Setting scan request: 0.100000 sec
> 1451963731.387096: BSSID 3c:0e:23:8e:48:3f blacklist count
> incremented to 2
> 1451963731.387216: wlan0: Blacklist count 2 --> request scan in 500
> ms
> 1451963731.387233: wlan0: Ignore new scan request for 0.500000 sec
> since an earlier request is scheduled to trigger sooner
> 1451963731.387242: TDLS: Remove peers on disassociation
> 1451963731.387251: wlan0: WPA: Clear old PMK and PTK
> 1451963731.387354: wlan0: Disconnect event - remove keys
> 1451963731.387381: wpa_driver_nl80211_set_key: ifindex=3 (wlan0)
> alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
> 1451963731.387422: wpa_driver_nl80211_set_key: ifindex=3 (wlan0)
> alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
> 1451963731.387451: wpa_driver_nl80211_set_key: ifindex=3 (wlan0)
> alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
> 1451963731.387482: wpa_driver_nl80211_set_key: ifindex=3 (wlan0)
> alg=0 addr=0x555b677a6550 key_idx=0 set_tx=0 seq_len=0 key_len=0
> 1451963731.387496:    addr=3c:0e:23:8e:48:3f
> 1451963731.387518: wlan0: State: COMPLETED -> DISCONNECTED
> 1451963731.387529: nl80211: Set wlan0 operstate 1->0 (DORMANT)
> 1451963731.387539: netlink: Operstate: ifindex=3 linkmode=-1 (no
> change), operstate=5 (IF_OPER_DORMANT)
> 1451963731.387555: bgscan: Deinitializing module 'simple'
> 1451963731.387566: nl80211: Signal monitor threshold=0 hysteresis=0
> 1451963731.387587: WMM AC: WMM AC is disabled
> 1451963731.387630: EAPOL: External notification - portEnabled=0
> 1451963731.387642: EAPOL: SUPP_PAE entering state DISCONNECTED
> 1451963731.387650: EAPOL: Supplicant port status: Unauthorized
> 1451963731.387659: nl80211: Skip set_supp_port(unauthorized) while
> not associated
> 1451963731.387667: EAPOL: SUPP_BE entering state INITIALIZE
> 1451963731.387676: EAP: EAP entering state DISABLED
> 1451963731.387686: EAPOL: External notification - portValid=0
> 1451963731.387706: wlan0: State: DISCONNECTED -> DISCONNECTED
> 1451963731.387713: nl80211: Set wlan0 operstate 0->0 (DORMANT)
> 1451963731.387719: netlink: Operstate: ifindex=3 linkmode=-1 (no
> change), operstate=5 (IF_OPER_DORMANT)
> 1451963731.387729: EAPOL: External notification - portEnabled=0
> 1451963731.387737: EAPOL: External notification - portValid=0
> 1451963731.387745: wlan0: Ignore new scan request for 1.000000 sec
> since an earlier request is scheduled to trigger sooner
> 1451963731.387766: RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext
> ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
> 1451963731.387782: RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2
> linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
> 1451963731.387796: nl80211: Event message available
> 1451963731.387808: nl80211: Ignored event (cmd=20) for foreign
> interface (ifindex 3 wdev 0x0)
> 1451963731.387816: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION)
> received for wlan0
> 1451963731.387823: nl80211: Delete station 3c:0e:23:8e:48:3f
> 1451963731.387834: nl80211: Event message available
> 1451963731.387842: nl80211: Ignored event (cmd=39) for foreign
> interface (ifindex 3 wdev 0x0)
> 1451963731.387849: nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE)
> received for wlan0
> 1451963731.387855: nl80211: MLME event 39
> (NL80211_CMD_DEAUTHENTICATE) on wlan0(7c:7a:91:86:c9:3c)
> A1=3c:0e:23:8e:48:3f A2=7c:7a:91:86:c9:3c
> 1451963731.387865: nl80211: MLME event frame - hexdump(len=26): c0 00
> 00 00 3c 0e 23 8e 48 3f 7c 7a 91 86 c9 3c 3c 0e 23 8e 48 3f 00 00 03
> 00
> 1451963731.387877: nl80211: Deauthenticate event
> 1451963731.387883: nl80211: Ignore deauth event triggered due to own
> deauth request
> 1451963731.387892: nl80211: Event message available
> 1451963731.387900: nl80211: Ignored event (cmd=48) for foreign
> interface (ifindex 3 wdev 0x0)
> 1451963731.387907: nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT)
> received for wlan0
> 1451963731.387913: nl80211: Ignore disconnect event when using
> userspace SME
> 1451963731.389558: nl80211: Event message available
> 1451963731.389584: nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE)
> received for p2p-dev-wlan0
> 1451963731.389591: nl80211: Regulatory domain change
> 1451963731.389596:  * initiator=0
> 1451963731.389601:  * type=1
> 1451963731.389610: p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (28)
> received
> 1451963731.389619: p2p-dev-wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE
> type=WORLD
> 1451963731.389747: nl80211: Regulatory information - country=00
> 1451963731.389757: nl80211: 2402-2472 @ 40 MHz 20 mBm
> 1451963731.389764: nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
> 1451963731.389772: nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no
> IR)
> 1451963731.389779: nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
> 1451963731.389787: nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
> 1451963731.389794: nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
> 1451963731.389802: nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
> 1451963731.389809: nl80211: 57240-63720 @ 2160 MHz 0 mBm
> 1451963731.389826: nl80211: Added 802.11b mode based on 802.11g
> information
> 1451963731.389835: P2P: Add operating class 81
> 1451963731.389842: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06
> 07 08 09 0a 0b
> 1451963731.389858: P2P: Update channel list
> 1451963731.389869: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11
> 1451963731.389876: P2P: cli_channels:
> 1451963731.389882: wlan0: Updating hw mode
> 1451963731.389981: nl80211: Regulatory information - country=00
> 1451963731.389989: nl80211: 2402-2472 @ 40 MHz 20 mBm
> 1451963731.389996: nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
> 1451963731.390003: nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no
> IR)
> 1451963731.390011: nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
> 1451963731.390018: nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
> 1451963731.390025: nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
> 1451963731.390032: nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
> 1451963731.390039: nl80211: 57240-63720 @ 2160 MHz 0 mBm
> 1451963731.390055: nl80211: Added 802.11b mode based on 802.11g
> information
> 1451963731.392696: dbus: flush_object_timeout_handler: Timeout -
> sending changed properties of object
> /fi/w1/wpa_supplicant1/Interfaces/3
> 1451963731.487289: wlan0: State: DISCONNECTED -> SCANNING
> 1451963731.487386: Scan SSID - hexdump_ascii(len=13):
>      4d 6f 63 61 6e 61 2d 53 45 43 55 52 45            Mocana-SECURE
> 1451963731.487397: wlan0: Starting AP scan for wildcard SSID
> 
> ________________________________________
> From: Jouni Malinen [j@xxxxx]
> Sent: Monday, January 04, 2016 15:29
> To: Adam Jacobs
> Cc: hostap@xxxxxxxxxxxxxxxxxxx
> Subject: Re: EAP-TLV: Earlier failure - force failed Phase 2
> 
> On Mon, Jan 04, 2016 at 02:46:43PM -0800, Adam Jacobs wrote:
> > My laptop runs Ubuntu, and when I reproduced the error, it was
> > invoking wpa_supplicant via NetworkManager.  Of course, to test
> > disabling TLS1.2, I had to shut off NetworkManager and invoke
> > wpa_supplicant manually.
> > 
> > What I've now discovered is that if I invoke wpa_supplicant
> > manually, everything works fine even if I DON'T disable TLS1.2.
> 
> You might want to try to test this with NetworkManager and just
> increasing debug verbosity for wpa_supplicant, e.g., by killing the
> existing wpa_supplicant process and starting another one with
> something
> like "-dddtu -f /tmp/wpas.log" on the command line.
> 
> > My config looks like this:
> > 
> > network={
> >   ssid="Mocana-SECURE"
> >   key_mgmt=WPA-EAP
> >   eap=PEAP
> >   identity="ajacobs"
> >   password="**********"
> >   phase2="auth=MSCHAPV2"
> >   ca_cert="/usr/local/etc/MocanaRoot.pem"
> > }
> 
> Based on couple of logs that Dan pointed me to, the only real
> differences to that with NM would be addition of fragment_size=1300
> (or
> something around that value) and proactive_key_caching=1. I don't
> know
> how either of these would cause the issue, but well, I guess it is
> worth
> trying these (or that debugging mechanism with NM mentioned above).
> In
> any case, I don't think I can do much more without the issue being
> reproduced with verbose debugging enabled in wpa_supplicant.
> 
> > So it must be something about the way NetworkManager is
> > calling/managing NetworkSupplicant that causes this failure. 
> >  Unfortunately I don't know of any way to debug that further, and
> > as I've shown wpa_supplicant to be working properly it is probably
> > no longer the domain of this group, Still, I'm happy to take
> > suggestions if anyone has any ideas for debugging further.
> 
> NM should not be able to configure wpa_supplicant in a way that
> causes
> this type of interop issues, so I'd interpret that a bit differently:
> at
> least one configuration of wpa_supplicant works, but something else
> in
> the configuration or timing or whatever makes this fail in some other
> cases.
> 
> --
> Jouni Malinen                                            PGP id
> EFC895FA
> 
> _______________________________________________
> Hostap mailing list
> Hostap@xxxxxxxxxxxxxxxxxxx
> http://lists.infradead.org/mailman/listinfo/hostap

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap




[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux