1225891717.192151: Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant_test2.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' 1225891717.192250: Configuration file '/etc/wpa_supplicant/wpa_supplicant_test2.conf' -> '/etc/wpa_supplicant/wpa_supplicant_test2.conf' 1225891717.192259: Reading configuration file '/etc/wpa_supplicant/wpa_supplicant_test2.conf' 1225891717.192308: ctrl_interface='/var/run/wpa_supplicant' 1225891717.192364: Line 14: removed CCMP from group cipher list since it was not allowed for pairwise cipher 1225891717.192395: Priority group 0 1225891717.192402: id=0 ssid='NEWTEC_CORP' 1225891717.192406: Initializing interface (2) 'wlan0' 1225891717.255328: Interface wlan0 set UP - waiting a second for the driver to complete initialization 1225891718.255484: SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf 1225891718.255499: capabilities: key_mgmt 0xf enc 0xf flags 0x0 1225891718.331893: WEXT: Operstate: linkmode=1, operstate=5 1225891718.332980: Own MAC address: 00:13:02:6d:6b:7b 1225891718.332993: wpa_driver_wext_set_wpa 1225891718.333004: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891718.333018: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891718.333025: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891718.333032: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891718.333039: wpa_driver_wext_set_countermeasures 1225891718.333044: wpa_driver_wext_set_drop_unencrypted 1225891718.333049: RSN: flushing PMKID list in the driver 1225891718.333084: Setting scan request: 0 sec 100000 usec 1225891718.337504: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891718.337510: EAPOL: KEY_RX entering state NO_KEY_RECEIVE 1225891718.337517: EAPOL: SUPP_BE entering state INITIALIZE 1225891718.337525: EAP: EAP entering state DISABLED 1225891718.337766: Added interface wlan0 1225891718.337812: RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () 1225891718.337820: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891718.337833: Wireless event: cmd=0x8b19 len=8 1225891718.337851: Received 0 bytes of scan results (0 BSSes) 1225891718.337869: CTRL-EVENT-SCAN-RESULTS 1225891718.337874: Selecting BSS from priority group 0 1225891718.337879: Try to find WPA-enabled AP 1225891718.337883: Try to find non-WPA AP 1225891718.337887: No suitable AP found. 1225891718.337893: Setting scan request: 5 sec 0 usec 1225891718.337904: Ignore event for foreign ifindex 3 1225891718.337911: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891718.337917: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891718.337924: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891718.337930: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891718.337934: Wireless event: cmd=0x8b06 len=8 1225891719.339757: EAPOL: disable timer tick 1225891723.340606: State: DISCONNECTED -> SCANNING 1225891723.340635: Starting AP scan (broadcast SSID) 1225891723.340639: Trying to get current scan results first without requesting a new scan to speed up initial association 1225891723.340668: Received 0 bytes of scan results (0 BSSes) 1225891723.340678: CTRL-EVENT-SCAN-RESULTS 1225891723.340683: Selecting BSS from priority group 0 1225891723.340686: Try to find WPA-enabled AP 1225891723.340690: Try to find non-WPA AP 1225891723.340694: No suitable AP found. 1225891723.340699: Setting scan request: 0 sec 0 usec 1225891723.340712: Starting AP scan (broadcast SSID) 1225891723.340730: Scan requested (ret=0) - scan timeout 30 seconds 1225891725.615330: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891725.615349: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891725.615356: Wireless event: cmd=0x8b19 len=8 1225891725.615424: Scan results did not fit - trying larger buffer (8192 bytes) 1225891725.615563: Received 4615 bytes of scan results (18 BSSes) 1225891725.615598: CTRL-EVENT-SCAN-RESULTS 1225891725.615603: Selecting BSS from priority group 0 1225891725.615607: Try to find WPA-enabled AP 1225891725.615611: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891725.615735: selected based on WPA IE 1225891725.615739: selected WPA AP 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' 1225891725.615745: Try to find non-WPA AP 1225891725.615758: Trying to associate with 00:1b:8f:90:74:70 (SSID='NEWTEC_CORP' freq=5180 MHz) 1225891725.615764: Cancelling scan request 1225891725.615768: WPA: clearing own WPA/RSN IE 1225891725.615771: Automatic auth_alg selection: 0x1 1225891725.615774: Overriding auth_alg selection: 0x1 1225891725.615789: WPA: using IEEE 802.11i/D3.0 1225891725.615793: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 1225891725.615799: WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 1225891725.615818: WPA: clearing AP RSN IE 1225891725.615823: WPA: using GTK TKIP 1225891725.615827: WPA: using PTK TKIP 1225891725.615831: WPA: using KEY_MGMT 802.1X 1225891725.615835: WPA: not using MGMT group cipher 1225891725.615839: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891725.615857: No keys have been configured - skip key clearing 1225891725.615861: wpa_driver_wext_set_drop_unencrypted 1225891725.615866: State: SCANNING -> ASSOCIATING 1225891725.615871: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891725.615876: WEXT: Operstate: linkmode=-1, operstate=5 1225891725.615892: wpa_driver_wext_associate 1225891725.615925: wpa_driver_wext_set_psk 1225891725.618121: Setting authentication timeout: 10 sec 0 usec 1225891725.618130: EAPOL: External notification - portControl=Auto 1225891725.618152: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891725.618159: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891725.618164: Wireless event: cmd=0x8b06 len=8 1225891725.618170: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891725.618175: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891725.618179: Wireless event: cmd=0x8b04 len=12 1225891725.620661: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891725.620669: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891725.620674: Wireless event: cmd=0x8c02 len=219 1225891725.620690: Association info event 1225891725.620693: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891725.620726: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891725.620749: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891725.620771: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891725.620776: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891725.620780: Wireless event: cmd=0x8b15 len=20 1225891725.620784: Wireless event: new AP: 00:1b:8f:90:74:70 1225891725.620795: State: ASSOCIATING -> ASSOCIATED 1225891725.620799: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891725.620803: WEXT: Operstate: linkmode=-1, operstate=5 1225891725.620823: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891725.620827: No keys have been configured - skip key clearing 1225891725.620834: Associated with 00:1b:8f:90:74:70 1225891725.620837: WPA: Association event - clear replay counter 1225891725.620845: WPA: Clear old PTK 1225891725.620848: EAPOL: External notification - portEnabled=0 1225891725.620853: EAPOL: External notification - portValid=0 1225891725.620857: EAPOL: External notification - portEnabled=1 1225891725.620861: EAPOL: SUPP_PAE entering state CONNECTING 1225891725.620864: EAPOL: enable timer tick 1225891725.620870: EAPOL: SUPP_BE entering state IDLE 1225891725.620877: EAP: EAP entering state INITIALIZE 1225891725.620880: EAP: EAP entering state IDLE 1225891725.620887: Setting authentication timeout: 10 sec 0 usec 1225891725.620894: Cancelling scan request 1225891725.621602: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891725.621610: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891728.627978: EAPOL: startWhen --> 0 1225891728.627993: EAPOL: SUPP_PAE entering state CONNECTING 1225891728.627997: EAPOL: txStart 1225891728.628002: TX EAPOL: dst=00:1b:8f:90:74:70 1225891728.628922: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891728.628932: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891728.628939: Wireless event: cmd=0x8b15 len=20 1225891728.628944: Wireless event: new AP: 00:00:00:00:00:00 1225891728.628956: Setting scan request: 0 sec 100000 usec 1225891728.628964: Added BSSID 00:1b:8f:90:74:70 into blacklist 1225891728.628972: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891728.628976: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891728.628994: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891728.629001: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891728.629008: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891728.629015: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891728.629023: State: ASSOCIATED -> DISCONNECTED 1225891728.629029: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891728.629033: WEXT: Operstate: linkmode=-1, operstate=5 1225891728.629046: EAPOL: External notification - portEnabled=0 1225891728.629050: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891728.629053: EAPOL: SUPP_BE entering state INITIALIZE 1225891728.629058: EAP: EAP entering state DISABLED 1225891728.629062: EAPOL: External notification - portValid=0 1225891728.639177: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891728.639197: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891728.731778: State: DISCONNECTED -> SCANNING 1225891728.731796: Starting AP scan (broadcast SSID) 1225891728.731819: Scan requested (ret=0) - scan timeout 30 seconds 1225891729.629737: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891729.629751: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891729.629757: Wireless event: cmd=0x8c02 len=219 1225891729.629768: Association info event 1225891729.629773: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891729.629806: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891729.629829: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891729.629851: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891729.629857: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891729.629861: Wireless event: cmd=0x8b15 len=20 1225891729.629865: Wireless event: new AP: 00:1b:8f:90:74:70 1225891729.629871: State: SCANNING -> ASSOCIATED 1225891729.629876: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891729.629881: WEXT: Operstate: linkmode=-1, operstate=5 1225891729.631488: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891729.631494: No keys have been configured - skip key clearing 1225891729.631501: Associated with 00:1b:8f:90:74:70 1225891729.631504: WPA: Association event - clear replay counter 1225891729.631508: WPA: Clear old PTK 1225891729.631512: EAPOL: External notification - portEnabled=0 1225891729.631516: EAPOL: External notification - portValid=0 1225891729.631520: EAPOL: External notification - portEnabled=1 1225891729.631524: EAPOL: SUPP_PAE entering state CONNECTING 1225891729.631528: EAPOL: SUPP_BE entering state IDLE 1225891729.631532: EAP: EAP entering state INITIALIZE 1225891729.631535: EAP: EAP entering state IDLE 1225891729.631543: Setting authentication timeout: 10 sec 0 usec 1225891729.631568: Cancelling scan request 1225891729.631577: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891729.631659: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891729.631682: RX EAPOL from 00:1b:8f:90:74:70 1225891729.631703: Setting authentication timeout: 70 sec 0 usec 1225891729.631711: EAPOL: Received EAP-Packet frame 1225891729.631714: EAPOL: SUPP_PAE entering state RESTART 1225891729.631718: EAP: EAP entering state INITIALIZE 1225891729.631722: EAP: EAP entering state IDLE 1225891729.631726: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891729.631729: EAPOL: SUPP_BE entering state REQUEST 1225891729.631732: EAPOL: getSuppRsp 1225891729.631735: EAP: EAP entering state RECEIVED 1225891729.631766: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891729.631771: EAP: EAP entering state IDENTITY 1225891729.631776: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891729.631780: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891729.631825: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891729.631836: EAP: EAP entering state SEND_RESPONSE 1225891729.631840: EAP: EAP entering state IDLE 1225891729.631844: EAPOL: SUPP_BE entering state RESPONSE 1225891729.631847: EAPOL: txSuppRsp 1225891729.631851: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.631880: EAPOL: SUPP_BE entering state RECEIVE 1225891729.637390: RX EAPOL from 00:1b:8f:90:74:70 1225891729.637415: EAPOL: Received EAP-Packet frame 1225891729.637421: EAPOL: SUPP_BE entering state REQUEST 1225891729.637424: EAPOL: getSuppRsp 1225891729.637428: EAP: EAP entering state RECEIVED 1225891729.637437: EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 1225891729.637442: EAP: EAP entering state GET_METHOD 1225891729.637448: EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) 1225891729.637487: TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891729.637600: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected 1225891729.637606: EAP: EAP entering state METHOD 1225891729.637614: SSL: Received packet(len=6) - Flags 0x21 1225891729.637619: EAP-PEAP: Start (server ver=1, own ver=1) 1225891729.637623: EAP-PEAP: Using PEAP version 1 1225891729.637672: SSL: (where=0x10 ret=0x1) 1225891729.637754: SSL: (where=0x1001 ret=0x1) 1225891729.637762: SSL: SSL_connect:before/connect initialization 1225891729.637810: SSL: (where=0x1001 ret=0x1) 1225891729.637816: SSL: SSL_connect:SSLv3 write client hello A 1225891729.637831: SSL: (where=0x1002 ret=0xffffffff) 1225891729.637836: SSL: SSL_connect:error in SSLv3 read server hello A 1225891729.637846: SSL: SSL_connect - want more data 1225891729.637854: SSL: 93 bytes pending from ssl_out 1225891729.637861: SSL: 93 bytes left to be sent out (of total 93 bytes) 1225891729.637867: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.637872: EAP: EAP entering state SEND_RESPONSE 1225891729.637877: EAP: EAP entering state IDLE 1225891729.637882: EAPOL: SUPP_BE entering state RESPONSE 1225891729.637885: EAPOL: txSuppRsp 1225891729.637890: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.637936: EAPOL: SUPP_BE entering state RECEIVE 1225891729.644313: RX EAPOL from 00:1b:8f:90:74:70 1225891729.644343: EAPOL: Received EAP-Packet frame 1225891729.644348: EAPOL: SUPP_BE entering state REQUEST 1225891729.644351: EAPOL: getSuppRsp 1225891729.644356: EAP: EAP entering state RECEIVED 1225891729.644370: EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 1225891729.644375: EAP: EAP entering state METHOD 1225891729.644385: SSL: Received packet(len=1012) - Flags 0xc1 1225891729.644389: SSL: TLS Message Length: 3207 1225891729.644397: SSL: Need 2205 bytes more input data 1225891729.644402: SSL: Building ACK (type=25 id=4 ver=1) 1225891729.644407: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.644522: EAP: EAP entering state SEND_RESPONSE 1225891729.644529: EAP: EAP entering state IDLE 1225891729.644533: EAPOL: SUPP_BE entering state RESPONSE 1225891729.644536: EAPOL: txSuppRsp 1225891729.644541: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.644600: EAPOL: SUPP_BE entering state RECEIVE 1225891729.650144: RX EAPOL from 00:1b:8f:90:74:70 1225891729.650162: EAPOL: Received EAP-Packet frame 1225891729.650168: EAPOL: SUPP_BE entering state REQUEST 1225891729.650171: EAPOL: getSuppRsp 1225891729.650175: EAP: EAP entering state RECEIVED 1225891729.650189: EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 1225891729.650194: EAP: EAP entering state METHOD 1225891729.650203: SSL: Received packet(len=1008) - Flags 0x41 1225891729.650225: SSL: Need 1203 bytes more input data 1225891729.650230: SSL: Building ACK (type=25 id=5 ver=1) 1225891729.650235: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.650241: EAP: EAP entering state SEND_RESPONSE 1225891729.650245: EAP: EAP entering state IDLE 1225891729.650249: EAPOL: SUPP_BE entering state RESPONSE 1225891729.650253: EAPOL: txSuppRsp 1225891729.650257: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.650296: EAPOL: SUPP_BE entering state RECEIVE 1225891729.655896: RX EAPOL from 00:1b:8f:90:74:70 1225891729.655915: EAPOL: Received EAP-Packet frame 1225891729.655921: EAPOL: SUPP_BE entering state REQUEST 1225891729.655924: EAPOL: getSuppRsp 1225891729.655928: EAP: EAP entering state RECEIVED 1225891729.655941: EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 1225891729.655946: EAP: EAP entering state METHOD 1225891729.655955: SSL: Received packet(len=1008) - Flags 0x41 1225891729.655963: SSL: Need 201 bytes more input data 1225891729.655967: SSL: Building ACK (type=25 id=6 ver=1) 1225891729.655972: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.655978: EAP: EAP entering state SEND_RESPONSE 1225891729.655982: EAP: EAP entering state IDLE 1225891729.655987: EAPOL: SUPP_BE entering state RESPONSE 1225891729.655990: EAPOL: txSuppRsp 1225891729.655994: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.656030: EAPOL: SUPP_BE entering state RECEIVE 1225891729.660505: RX EAPOL from 00:1b:8f:90:74:70 1225891729.660523: EAPOL: Received EAP-Packet frame 1225891729.660528: EAPOL: SUPP_BE entering state REQUEST 1225891729.660531: EAPOL: getSuppRsp 1225891729.660535: EAP: EAP entering state RECEIVED 1225891729.660543: EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 1225891729.660549: EAP: EAP entering state METHOD 1225891729.660562: SSL: Received packet(len=207) - Flags 0x01 1225891729.660705: SSL: (where=0x1001 ret=0x1) 1225891729.660712: SSL: SSL_connect:SSLv3 read server hello A 1225891729.661467: SSL: (where=0x1001 ret=0x1) 1225891729.661473: SSL: SSL_connect:SSLv3 read server certificate A 1225891729.661512: SSL: (where=0x1001 ret=0x1) 1225891729.661517: SSL: SSL_connect:SSLv3 read server done A 1225891729.662721: SSL: (where=0x1001 ret=0x1) 1225891729.662731: SSL: SSL_connect:SSLv3 write client key exchange A 1225891729.662866: SSL: (where=0x1001 ret=0x1) 1225891729.662871: SSL: SSL_connect:SSLv3 write change cipher spec A 1225891729.662939: SSL: (where=0x1001 ret=0x1) 1225891729.662943: SSL: SSL_connect:SSLv3 write finished A 1225891729.662952: SSL: (where=0x1001 ret=0x1) 1225891729.662956: SSL: SSL_connect:SSLv3 flush data 1225891729.662961: SSL: (where=0x1002 ret=0xffffffff) 1225891729.662965: SSL: SSL_connect:error in SSLv3 read finished A 1225891729.662971: SSL: SSL_connect - want more data 1225891729.662975: SSL: 326 bytes pending from ssl_out 1225891729.662981: SSL: 326 bytes left to be sent out (of total 326 bytes) 1225891729.662988: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.662993: EAP: EAP entering state SEND_RESPONSE 1225891729.662998: EAP: EAP entering state IDLE 1225891729.663002: EAPOL: SUPP_BE entering state RESPONSE 1225891729.663005: EAPOL: txSuppRsp 1225891729.663010: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.663140: EAPOL: SUPP_BE entering state RECEIVE 1225891729.731530: RX EAPOL from 00:1b:8f:90:74:70 1225891729.731576: EAPOL: Received EAP-Packet frame 1225891729.731581: EAPOL: SUPP_BE entering state REQUEST 1225891729.731583: EAPOL: getSuppRsp 1225891729.731586: EAP: EAP entering state RECEIVED 1225891729.731592: EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 1225891729.731596: EAP: EAP entering state METHOD 1225891729.731604: SSL: Received packet(len=69) - Flags 0x81 1225891729.731606: SSL: TLS Message Length: 59 1225891729.731688: SSL: (where=0x1001 ret=0x1) 1225891729.731692: SSL: SSL_connect:SSLv3 read finished A 1225891729.731717: SSL: (where=0x20 ret=0x1) 1225891729.731719: SSL: (where=0x1002 ret=0x1) 1225891729.731722: SSL: 0 bytes pending from ssl_out 1225891729.731748: OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) 1225891729.731752: SSL: No data to be sent out 1225891729.731755: EAP-PEAP: TLS done, proceed to Phase 2 1225891729.731757: EAP-PEAP: using label 'client EAP encryption' in key derivation 1225891729.731799: EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] 1225891729.731802: SSL: Building ACK (type=25 id=8 ver=1) 1225891729.731805: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.731809: EAP: EAP entering state SEND_RESPONSE 1225891729.731812: EAP: EAP entering state IDLE 1225891729.731814: EAPOL: SUPP_BE entering state RESPONSE 1225891729.731817: EAPOL: txSuppRsp 1225891729.731820: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.731848: EAPOL: SUPP_BE entering state RECEIVE 1225891729.736643: RX EAPOL from 00:1b:8f:90:74:70 1225891729.736649: EAPOL: Received EAP-Packet frame 1225891729.736651: EAPOL: SUPP_BE entering state REQUEST 1225891729.736653: EAPOL: getSuppRsp 1225891729.736655: EAP: EAP entering state RECEIVED 1225891729.736658: EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 1225891729.736662: EAP: EAP entering state METHOD 1225891729.736665: SSL: Received packet(len=59) - Flags 0x01 1225891729.736668: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891729.736685: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 04 00 13 01 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891729.736694: EAP-PEAP: received Phase 2: code=1 identifier=4 length=19 1225891729.736698: EAP-PEAP: Phase 2 Request: type=1 1225891729.736700: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891729.736707: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=8): [REMOVED] 1225891729.736728: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891729.736732: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.736735: EAP: EAP entering state SEND_RESPONSE 1225891729.736737: EAP: EAP entering state IDLE 1225891729.736739: EAPOL: SUPP_BE entering state RESPONSE 1225891729.736741: EAPOL: txSuppRsp 1225891729.736744: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.736757: EAPOL: SUPP_BE entering state RECEIVE 1225891729.742463: RX EAPOL from 00:1b:8f:90:74:70 1225891729.742470: EAPOL: Received EAP-Packet frame 1225891729.742472: EAPOL: SUPP_BE entering state REQUEST 1225891729.742474: EAPOL: getSuppRsp 1225891729.742477: EAP: EAP entering state RECEIVED 1225891729.742480: EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 1225891729.742483: EAP: EAP entering state METHOD 1225891729.742486: SSL: Received packet(len=59) - Flags 0x01 1225891729.742489: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891729.742506: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 05 00 13 06 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891729.742514: EAP-PEAP: received Phase 2: code=1 identifier=5 length=19 1225891729.742517: EAP-PEAP: Phase 2 Request: type=6 1225891729.742520: TLS: Phase 2 Request: Nak type=6 1225891729.742522: TLS: Allowed Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891729.742527: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] 1225891729.742611: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891729.742615: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891729.742618: EAP: EAP entering state SEND_RESPONSE 1225891729.742621: EAP: EAP entering state IDLE 1225891729.742623: EAPOL: SUPP_BE entering state RESPONSE 1225891729.742625: EAPOL: txSuppRsp 1225891729.742627: TX EAPOL: dst=00:1b:8f:90:74:70 1225891729.742643: EAPOL: SUPP_BE entering state RECEIVE 1225891729.747039: RX EAPOL from 00:1b:8f:90:74:70 1225891729.747044: EAPOL: Received EAP-Packet frame 1225891729.747047: EAPOL: SUPP_BE entering state REQUEST 1225891729.747049: EAPOL: getSuppRsp 1225891729.747051: EAP: EAP entering state RECEIVED 1225891729.747054: EAP: Received EAP-Failure 1225891729.747056: EAP: EAP entering state FAILURE 1225891729.747061: CTRL-EVENT-EAP-FAILURE EAP authentication failed 1225891729.747064: EAPOL: SUPP_PAE entering state HELD 1225891729.747066: EAPOL: SUPP_BE entering state RECEIVE 1225891729.747068: EAPOL: SUPP_BE entering state FAIL 1225891729.747070: EAPOL: SUPP_BE entering state IDLE 1225891729.747073: EAPOL authentication completed unsuccessfully 1225891729.747465: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891729.747470: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891729.747475: Wireless event: cmd=0x8b15 len=20 1225891729.747478: Wireless event: new AP: 00:00:00:00:00:00 1225891729.747483: Setting scan request: 0 sec 100000 usec 1225891729.747489: BSSID 00:1b:8f:90:74:70 blacklist count incremented to 2 1225891729.747493: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891729.747496: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891729.747507: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891729.747511: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891729.747515: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891729.747519: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891729.747524: State: ASSOCIATED -> DISCONNECTED 1225891729.747527: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891729.747530: WEXT: Operstate: linkmode=-1, operstate=5 1225891729.747537: EAPOL: External notification - portEnabled=0 1225891729.747540: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891729.747542: EAPOL: SUPP_BE entering state INITIALIZE 1225891729.747545: EAP: EAP entering state DISABLED 1225891729.747570: EAPOL: External notification - portValid=0 1225891729.847615: State: DISCONNECTED -> SCANNING 1225891729.847631: Starting AP scan (broadcast SSID) 1225891729.847658: Scan requested (ret=0) - scan timeout 30 seconds 1225891730.628466: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891730.628485: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891730.745814: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891730.745828: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891730.745835: Wireless event: cmd=0x8c02 len=219 1225891730.745847: Association info event 1225891730.745851: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891730.745884: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891730.745907: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891730.745930: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891730.745935: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891730.745939: Wireless event: cmd=0x8b15 len=20 1225891730.745943: Wireless event: new AP: 00:1b:8f:90:74:70 1225891730.745950: State: SCANNING -> ASSOCIATED 1225891730.745954: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891730.745959: WEXT: Operstate: linkmode=-1, operstate=5 1225891730.747052: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891730.747108: No keys have been configured - skip key clearing 1225891730.747115: Associated with 00:1b:8f:90:74:70 1225891730.747119: WPA: Association event - clear replay counter 1225891730.747123: WPA: Clear old PTK 1225891730.747127: EAPOL: External notification - portEnabled=0 1225891730.747134: EAPOL: External notification - portValid=0 1225891730.747137: EAPOL: External notification - portEnabled=1 1225891730.747141: EAPOL: SUPP_PAE entering state CONNECTING 1225891730.747145: EAPOL: SUPP_BE entering state IDLE 1225891730.747148: EAP: EAP entering state INITIALIZE 1225891730.747152: EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE 1225891730.747312: ENGINE: engine deinit 1225891730.747318: EAP: EAP entering state IDLE 1225891730.747328: Setting authentication timeout: 10 sec 0 usec 1225891730.747335: Cancelling scan request 1225891730.747344: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891730.747350: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891730.748882: RX EAPOL from 00:1b:8f:90:74:70 1225891730.748893: Setting authentication timeout: 70 sec 0 usec 1225891730.748948: EAPOL: Received EAP-Packet frame 1225891730.748952: EAPOL: SUPP_PAE entering state RESTART 1225891730.748956: EAP: EAP entering state INITIALIZE 1225891730.748959: EAP: EAP entering state IDLE 1225891730.748963: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891730.748966: EAPOL: SUPP_BE entering state REQUEST 1225891730.748969: EAPOL: getSuppRsp 1225891730.748975: EAP: EAP entering state RECEIVED 1225891730.748983: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891730.748988: EAP: EAP entering state IDENTITY 1225891730.748993: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891730.748997: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891730.749038: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891730.749049: EAP: EAP entering state SEND_RESPONSE 1225891730.749053: EAP: EAP entering state IDLE 1225891730.749056: EAPOL: SUPP_BE entering state RESPONSE 1225891730.749059: EAPOL: txSuppRsp 1225891730.749064: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.749094: EAPOL: SUPP_BE entering state RECEIVE 1225891730.754182: RX EAPOL from 00:1b:8f:90:74:70 1225891730.754197: EAPOL: Received EAP-Packet frame 1225891730.754202: EAPOL: SUPP_BE entering state REQUEST 1225891730.754205: EAPOL: getSuppRsp 1225891730.754209: EAP: EAP entering state RECEIVED 1225891730.754216: EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 1225891730.754221: EAP: EAP entering state GET_METHOD 1225891730.754226: EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) 1225891730.754237: TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891730.754283: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected 1225891730.754288: EAP: EAP entering state METHOD 1225891730.754292: SSL: Received packet(len=6) - Flags 0x21 1225891730.754296: EAP-PEAP: Start (server ver=1, own ver=1) 1225891730.754300: EAP-PEAP: Using PEAP version 1 1225891730.754328: SSL: (where=0x10 ret=0x1) 1225891730.754346: SSL: (where=0x1001 ret=0x1) 1225891730.754351: SSL: SSL_connect:before/connect initialization 1225891730.754379: SSL: (where=0x1001 ret=0x1) 1225891730.754384: SSL: SSL_connect:SSLv3 write client hello A 1225891730.754392: SSL: (where=0x1002 ret=0xffffffff) 1225891730.754396: SSL: SSL_connect:error in SSLv3 read server hello A 1225891730.754402: SSL: SSL_connect - want more data 1225891730.754405: SSL: 93 bytes pending from ssl_out 1225891730.754410: SSL: 93 bytes left to be sent out (of total 93 bytes) 1225891730.754417: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.754502: EAP: EAP entering state SEND_RESPONSE 1225891730.754507: EAP: EAP entering state IDLE 1225891730.754511: EAPOL: SUPP_BE entering state RESPONSE 1225891730.754514: EAPOL: txSuppRsp 1225891730.754519: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.754553: EAPOL: SUPP_BE entering state RECEIVE 1225891730.761345: RX EAPOL from 00:1b:8f:90:74:70 1225891730.761370: EAPOL: Received EAP-Packet frame 1225891730.761375: EAPOL: SUPP_BE entering state REQUEST 1225891730.761378: EAPOL: getSuppRsp 1225891730.761382: EAP: EAP entering state RECEIVED 1225891730.761396: EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 1225891730.761401: EAP: EAP entering state METHOD 1225891730.761411: SSL: Received packet(len=1012) - Flags 0xc1 1225891730.761415: SSL: TLS Message Length: 3207 1225891730.761423: SSL: Need 2205 bytes more input data 1225891730.761428: SSL: Building ACK (type=25 id=6 ver=1) 1225891730.761433: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.761439: EAP: EAP entering state SEND_RESPONSE 1225891730.761443: EAP: EAP entering state IDLE 1225891730.761447: EAPOL: SUPP_BE entering state RESPONSE 1225891730.761450: EAPOL: txSuppRsp 1225891730.761455: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.761497: EAPOL: SUPP_BE entering state RECEIVE 1225891730.767221: RX EAPOL from 00:1b:8f:90:74:70 1225891730.767247: EAPOL: Received EAP-Packet frame 1225891730.767253: EAPOL: SUPP_BE entering state REQUEST 1225891730.767256: EAPOL: getSuppRsp 1225891730.767260: EAP: EAP entering state RECEIVED 1225891730.767273: EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 1225891730.767279: EAP: EAP entering state METHOD 1225891730.767288: SSL: Received packet(len=1008) - Flags 0x41 1225891730.767297: SSL: Need 1203 bytes more input data 1225891730.767302: SSL: Building ACK (type=25 id=7 ver=1) 1225891730.767307: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.767313: EAP: EAP entering state SEND_RESPONSE 1225891730.767317: EAP: EAP entering state IDLE 1225891730.767321: EAPOL: SUPP_BE entering state RESPONSE 1225891730.767324: EAPOL: txSuppRsp 1225891730.767329: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.767372: EAPOL: SUPP_BE entering state RECEIVE 1225891730.773162: RX EAPOL from 00:1b:8f:90:74:70 1225891730.773186: EAPOL: Received EAP-Packet frame 1225891730.773191: EAPOL: SUPP_BE entering state REQUEST 1225891730.773194: EAPOL: getSuppRsp 1225891730.773199: EAP: EAP entering state RECEIVED 1225891730.773212: EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 1225891730.773217: EAP: EAP entering state METHOD 1225891730.773226: SSL: Received packet(len=1008) - Flags 0x41 1225891730.773235: SSL: Need 201 bytes more input data 1225891730.773240: SSL: Building ACK (type=25 id=8 ver=1) 1225891730.773245: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.773251: EAP: EAP entering state SEND_RESPONSE 1225891730.773255: EAP: EAP entering state IDLE 1225891730.773259: EAPOL: SUPP_BE entering state RESPONSE 1225891730.773262: EAPOL: txSuppRsp 1225891730.773267: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.773306: EAPOL: SUPP_BE entering state RECEIVE 1225891730.778107: RX EAPOL from 00:1b:8f:90:74:70 1225891730.778131: EAPOL: Received EAP-Packet frame 1225891730.778136: EAPOL: SUPP_BE entering state REQUEST 1225891730.778139: EAPOL: getSuppRsp 1225891730.778144: EAP: EAP entering state RECEIVED 1225891730.778153: EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 1225891730.778159: EAP: EAP entering state METHOD 1225891730.778168: SSL: Received packet(len=207) - Flags 0x01 1225891730.778277: SSL: (where=0x1001 ret=0x1) 1225891730.778285: SSL: SSL_connect:SSLv3 read server hello A 1225891730.778929: SSL: (where=0x1001 ret=0x1) 1225891730.778936: SSL: SSL_connect:SSLv3 read server certificate A 1225891730.778950: SSL: (where=0x1001 ret=0x1) 1225891730.778953: SSL: SSL_connect:SSLv3 read server done A 1225891730.780106: SSL: (where=0x1001 ret=0x1) 1225891730.780220: SSL: SSL_connect:SSLv3 write client key exchange A 1225891730.780341: SSL: (where=0x1001 ret=0x1) 1225891730.780346: SSL: SSL_connect:SSLv3 write change cipher spec A 1225891730.780403: SSL: (where=0x1001 ret=0x1) 1225891730.780407: SSL: SSL_connect:SSLv3 write finished A 1225891730.780416: SSL: (where=0x1001 ret=0x1) 1225891730.780420: SSL: SSL_connect:SSLv3 flush data 1225891730.780425: SSL: (where=0x1002 ret=0xffffffff) 1225891730.780429: SSL: SSL_connect:error in SSLv3 read finished A 1225891730.780435: SSL: SSL_connect - want more data 1225891730.780439: SSL: 326 bytes pending from ssl_out 1225891730.780445: SSL: 326 bytes left to be sent out (of total 326 bytes) 1225891730.780452: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.780457: EAP: EAP entering state SEND_RESPONSE 1225891730.780462: EAP: EAP entering state IDLE 1225891730.780467: EAPOL: SUPP_BE entering state RESPONSE 1225891730.780471: EAPOL: txSuppRsp 1225891730.780476: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.780522: EAPOL: SUPP_BE entering state RECEIVE 1225891730.848234: RX EAPOL from 00:1b:8f:90:74:70 1225891730.848259: EAPOL: Received EAP-Packet frame 1225891730.848264: EAPOL: SUPP_BE entering state REQUEST 1225891730.848268: EAPOL: getSuppRsp 1225891730.848272: EAP: EAP entering state RECEIVED 1225891730.848280: EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 1225891730.848286: EAP: EAP entering state METHOD 1225891730.848296: SSL: Received packet(len=69) - Flags 0x81 1225891730.848300: SSL: TLS Message Length: 59 1225891730.848414: SSL: (where=0x1001 ret=0x1) 1225891730.848422: SSL: SSL_connect:SSLv3 read finished A 1225891730.848441: SSL: (where=0x20 ret=0x1) 1225891730.848445: SSL: (where=0x1002 ret=0x1) 1225891730.848449: SSL: 0 bytes pending from ssl_out 1225891730.848473: OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) 1225891730.848480: SSL: No data to be sent out 1225891730.848483: EAP-PEAP: TLS done, proceed to Phase 2 1225891730.848487: EAP-PEAP: using label 'client EAP encryption' in key derivation 1225891730.848560: EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] 1225891730.848565: SSL: Building ACK (type=25 id=10 ver=1) 1225891730.848570: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.848576: EAP: EAP entering state SEND_RESPONSE 1225891730.848581: EAP: EAP entering state IDLE 1225891730.848585: EAPOL: SUPP_BE entering state RESPONSE 1225891730.848589: EAPOL: txSuppRsp 1225891730.848593: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.848642: EAPOL: SUPP_BE entering state RECEIVE 1225891730.853472: RX EAPOL from 00:1b:8f:90:74:70 1225891730.853496: EAPOL: Received EAP-Packet frame 1225891730.853500: EAPOL: SUPP_BE entering state REQUEST 1225891730.853503: EAPOL: getSuppRsp 1225891730.853508: EAP: EAP entering state RECEIVED 1225891730.853517: EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0 1225891730.853522: EAP: EAP entering state METHOD 1225891730.853532: SSL: Received packet(len=59) - Flags 0x01 1225891730.853538: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891730.853588: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 06 00 13 01 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891730.853605: EAP-PEAP: received Phase 2: code=1 identifier=6 length=19 1225891730.853610: EAP-PEAP: Phase 2 Request: type=1 1225891730.853614: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891730.853627: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=8): [REMOVED] 1225891730.853662: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891730.853669: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.853675: EAP: EAP entering state SEND_RESPONSE 1225891730.853679: EAP: EAP entering state IDLE 1225891730.853684: EAPOL: SUPP_BE entering state RESPONSE 1225891730.853687: EAPOL: txSuppRsp 1225891730.853692: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.853844: EAPOL: SUPP_BE entering state RECEIVE 1225891730.858319: RX EAPOL from 00:1b:8f:90:74:70 1225891730.858333: EAPOL: Received EAP-Packet frame 1225891730.858337: EAPOL: SUPP_BE entering state REQUEST 1225891730.858340: EAPOL: getSuppRsp 1225891730.858344: EAP: EAP entering state RECEIVED 1225891730.858351: EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0 1225891730.858356: EAP: EAP entering state METHOD 1225891730.858363: SSL: Received packet(len=59) - Flags 0x01 1225891730.858369: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891730.858406: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 07 00 13 06 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891730.858422: EAP-PEAP: received Phase 2: code=1 identifier=7 length=19 1225891730.858427: EAP-PEAP: Phase 2 Request: type=6 1225891730.858431: TLS: Phase 2 Request: Nak type=6 1225891730.858434: TLS: Allowed Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891730.858444: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] 1225891730.858477: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891730.858483: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891730.858488: EAP: EAP entering state SEND_RESPONSE 1225891730.858493: EAP: EAP entering state IDLE 1225891730.858496: EAPOL: SUPP_BE entering state RESPONSE 1225891730.858499: EAPOL: txSuppRsp 1225891730.858504: TX EAPOL: dst=00:1b:8f:90:74:70 1225891730.858535: EAPOL: SUPP_BE entering state RECEIVE 1225891730.863410: RX EAPOL from 00:1b:8f:90:74:70 1225891730.863484: EAPOL: Received EAP-Packet frame 1225891730.863489: EAPOL: SUPP_BE entering state REQUEST 1225891730.863492: EAPOL: getSuppRsp 1225891730.863497: EAP: EAP entering state RECEIVED 1225891730.863504: EAP: Received EAP-Failure 1225891730.863508: EAP: EAP entering state FAILURE 1225891730.863518: CTRL-EVENT-EAP-FAILURE EAP authentication failed 1225891730.863524: EAPOL: SUPP_PAE entering state HELD 1225891730.863527: EAPOL: SUPP_BE entering state RECEIVE 1225891730.863531: EAPOL: SUPP_BE entering state FAIL 1225891730.863534: EAPOL: SUPP_BE entering state IDLE 1225891730.863538: EAPOL authentication completed unsuccessfully 1225891730.864013: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891730.864028: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891730.864035: Wireless event: cmd=0x8b15 len=20 1225891730.864039: Wireless event: new AP: 00:00:00:00:00:00 1225891730.864051: Setting scan request: 0 sec 100000 usec 1225891730.864058: BSSID 00:1b:8f:90:74:70 blacklist count incremented to 3 1225891730.864066: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891730.864070: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891730.864088: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891730.864096: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891730.864103: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891730.864110: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891730.864118: State: ASSOCIATED -> DISCONNECTED 1225891730.864123: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891730.864128: WEXT: Operstate: linkmode=-1, operstate=5 1225891730.864142: EAPOL: External notification - portEnabled=0 1225891730.864146: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891730.864149: EAPOL: SUPP_BE entering state INITIALIZE 1225891730.864154: EAP: EAP entering state DISABLED 1225891730.864158: EAPOL: External notification - portValid=0 1225891730.967624: State: DISCONNECTED -> SCANNING 1225891730.967641: Starting AP scan (broadcast SSID) 1225891730.967668: Scan requested (ret=0) - scan timeout 30 seconds 1225891731.646546: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891731.646567: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891731.869682: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891731.869693: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891731.869743: Wireless event: cmd=0x8c02 len=219 1225891731.869751: Association info event 1225891731.869753: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891731.869771: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891731.869783: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891731.869797: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891731.869800: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891731.869803: Wireless event: cmd=0x8b15 len=20 1225891731.869806: Wireless event: new AP: 00:1b:8f:90:74:70 1225891731.869810: State: SCANNING -> ASSOCIATED 1225891731.869813: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891731.869817: WEXT: Operstate: linkmode=-1, operstate=5 1225891731.869833: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891731.869837: No keys have been configured - skip key clearing 1225891731.869841: Associated with 00:1b:8f:90:74:70 1225891731.869843: WPA: Association event - clear replay counter 1225891731.869846: WPA: Clear old PTK 1225891731.869848: EAPOL: External notification - portEnabled=0 1225891731.869853: EAPOL: External notification - portValid=0 1225891731.869855: EAPOL: External notification - portEnabled=1 1225891731.869858: EAPOL: SUPP_PAE entering state CONNECTING 1225891731.869860: EAPOL: SUPP_BE entering state IDLE 1225891731.869863: EAP: EAP entering state INITIALIZE 1225891731.869866: EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE 1225891731.869988: ENGINE: engine deinit 1225891731.869993: EAP: EAP entering state IDLE 1225891731.870000: Setting authentication timeout: 10 sec 0 usec 1225891731.870005: Cancelling scan request 1225891731.870018: RX EAPOL from 00:1b:8f:90:74:70 1225891731.870023: Setting authentication timeout: 70 sec 0 usec 1225891731.870028: EAPOL: Received EAP-Packet frame 1225891731.870030: EAPOL: SUPP_PAE entering state RESTART 1225891731.870032: EAP: EAP entering state INITIALIZE 1225891731.870035: EAP: EAP entering state IDLE 1225891731.870037: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891731.870039: EAPOL: SUPP_BE entering state REQUEST 1225891731.870041: EAPOL: getSuppRsp 1225891731.870043: EAP: EAP entering state RECEIVED 1225891731.870049: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891731.870052: EAP: EAP entering state IDENTITY 1225891731.870055: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891731.870059: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891731.870080: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891731.870086: EAP: EAP entering state SEND_RESPONSE 1225891731.870088: EAP: EAP entering state IDLE 1225891731.870090: EAPOL: SUPP_BE entering state RESPONSE 1225891731.870093: EAPOL: txSuppRsp 1225891731.870096: TX EAPOL: dst=00:1b:8f:90:74:70 1225891731.870103: EAPOL: SUPP_BE entering state RECEIVE 1225891731.870970: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891731.870975: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891734.648656: EAPOL: startWhen --> 0 1225891760.971672: Scan timeout - try to get results 1225891760.971736: Received 247 bytes of scan results (1 BSSes) 1225891760.971747: CTRL-EVENT-SCAN-RESULTS 1225891760.971753: Selecting BSS from priority group 0 1225891760.971757: Try to find WPA-enabled AP 1225891760.971761: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891760.971769: skip - blacklisted 1225891760.971885: Try to find non-WPA AP 1225891760.971890: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891760.971897: skip - blacklisted 1225891760.971901: No APs found - clear blacklist and try again 1225891760.971904: Removed BSSID 00:1b:8f:90:74:70 from blacklist (clear) 1225891760.971910: Selecting BSS from priority group 0 1225891760.971914: Try to find WPA-enabled AP 1225891760.971917: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891760.971926: selected based on WPA IE 1225891760.971930: selected WPA AP 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' 1225891760.971935: Try to find non-WPA AP 1225891760.971938: Already associated with the selected AP. 1225891761.711619: EAPOL: authWhile --> 0 1225891761.711638: EAPOL: SUPP_BE entering state TIMEOUT 1225891761.711644: EAPOL: SUPP_PAE entering state CONNECTING 1225891761.711648: EAPOL: SUPP_BE entering state IDLE 1225891761.861217: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891761.861237: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891761.861243: Wireless event: cmd=0x8b15 len=20 1225891761.861248: Wireless event: new AP: 00:00:00:00:00:00 1225891761.861262: Setting scan request: 0 sec 100000 usec 1225891761.861270: Added BSSID 00:1b:8f:90:74:70 into blacklist 1225891761.861278: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891761.861282: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891761.861299: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891761.861306: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891761.861313: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891761.861320: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891761.861328: State: ASSOCIATED -> DISCONNECTED 1225891761.861333: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891761.861338: WEXT: Operstate: linkmode=-1, operstate=5 1225891761.861351: EAPOL: External notification - portEnabled=0 1225891761.861356: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891761.861360: EAPOL: SUPP_BE entering state INITIALIZE 1225891761.861366: EAP: EAP entering state DISABLED 1225891761.861370: EAPOL: External notification - portValid=0 1225891761.864060: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891761.864069: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891761.963624: State: DISCONNECTED -> SCANNING 1225891761.963641: Starting AP scan (broadcast SSID) 1225891761.963664: Scan requested (ret=0) - scan timeout 30 seconds 1225891762.861929: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891762.862222: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891762.862229: Wireless event: cmd=0x8c02 len=219 1225891762.862242: Association info event 1225891762.862246: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891762.862279: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891762.862302: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891762.862327: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891762.862332: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891762.862337: Wireless event: cmd=0x8b15 len=20 1225891762.862341: Wireless event: new AP: 00:1b:8f:90:74:70 1225891762.862347: State: SCANNING -> ASSOCIATED 1225891762.862352: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891762.862357: WEXT: Operstate: linkmode=-1, operstate=5 1225891762.863674: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891762.863681: No keys have been configured - skip key clearing 1225891762.863688: Associated with 00:1b:8f:90:74:70 1225891762.863691: WPA: Association event - clear replay counter 1225891762.863750: WPA: Clear old PTK 1225891762.863755: EAPOL: External notification - portEnabled=0 1225891762.863762: EAPOL: External notification - portValid=0 1225891762.863765: EAPOL: External notification - portEnabled=1 1225891762.863769: EAPOL: SUPP_PAE entering state CONNECTING 1225891762.863772: EAPOL: SUPP_BE entering state IDLE 1225891762.863776: EAP: EAP entering state INITIALIZE 1225891762.863780: EAP: EAP entering state IDLE 1225891762.863787: Setting authentication timeout: 10 sec 0 usec 1225891762.863795: Cancelling scan request 1225891762.863802: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891762.863808: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891762.863827: RX EAPOL from 00:1b:8f:90:74:70 1225891762.863835: Setting authentication timeout: 70 sec 0 usec 1225891762.863842: EAPOL: Received EAP-Packet frame 1225891762.863845: EAPOL: SUPP_PAE entering state RESTART 1225891762.863849: EAP: EAP entering state INITIALIZE 1225891762.863852: EAP: EAP entering state IDLE 1225891762.863855: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891762.863858: EAPOL: SUPP_BE entering state REQUEST 1225891762.863861: EAPOL: getSuppRsp 1225891762.863864: EAP: EAP entering state RECEIVED 1225891762.863872: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891762.863877: EAP: EAP entering state IDENTITY 1225891762.863881: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891762.863885: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891762.863925: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891762.863936: EAP: EAP entering state SEND_RESPONSE 1225891762.863941: EAP: EAP entering state IDLE 1225891762.863944: EAPOL: SUPP_BE entering state RESPONSE 1225891762.863947: EAPOL: txSuppRsp 1225891762.863951: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.863980: EAPOL: SUPP_BE entering state RECEIVE 1225891762.886811: RX EAPOL from 00:1b:8f:90:74:70 1225891762.886832: EAPOL: Received EAP-Packet frame 1225891762.886838: EAPOL: SUPP_BE entering state REQUEST 1225891762.886841: EAPOL: getSuppRsp 1225891762.886845: EAP: EAP entering state RECEIVED 1225891762.886853: EAP: Received EAP-Request id=16 method=25 vendor=0 vendorMethod=0 1225891762.886858: EAP: EAP entering state GET_METHOD 1225891762.886863: EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) 1225891762.886877: TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891762.886927: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected 1225891762.886932: EAP: EAP entering state METHOD 1225891762.886937: SSL: Received packet(len=6) - Flags 0x21 1225891762.886941: EAP-PEAP: Start (server ver=1, own ver=1) 1225891762.886945: EAP-PEAP: Using PEAP version 1 1225891762.886972: SSL: (where=0x10 ret=0x1) 1225891762.886991: SSL: (where=0x1001 ret=0x1) 1225891762.886996: SSL: SSL_connect:before/connect initialization 1225891762.887024: SSL: (where=0x1001 ret=0x1) 1225891762.887030: SSL: SSL_connect:SSLv3 write client hello A 1225891762.887037: SSL: (where=0x1002 ret=0xffffffff) 1225891762.887041: SSL: SSL_connect:error in SSLv3 read server hello A 1225891762.887047: SSL: SSL_connect - want more data 1225891762.887051: SSL: 93 bytes pending from ssl_out 1225891762.887056: SSL: 93 bytes left to be sent out (of total 93 bytes) 1225891762.887062: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.887067: EAP: EAP entering state SEND_RESPONSE 1225891762.887072: EAP: EAP entering state IDLE 1225891762.887076: EAPOL: SUPP_BE entering state RESPONSE 1225891762.887080: EAPOL: txSuppRsp 1225891762.887084: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.887124: EAPOL: SUPP_BE entering state RECEIVE 1225891762.893410: RX EAPOL from 00:1b:8f:90:74:70 1225891762.893437: EAPOL: Received EAP-Packet frame 1225891762.893443: EAPOL: SUPP_BE entering state REQUEST 1225891762.893446: EAPOL: getSuppRsp 1225891762.893451: EAP: EAP entering state RECEIVED 1225891762.893465: EAP: Received EAP-Request id=17 method=25 vendor=0 vendorMethod=0 1225891762.893470: EAP: EAP entering state METHOD 1225891762.893480: SSL: Received packet(len=1012) - Flags 0xc1 1225891762.893485: SSL: TLS Message Length: 3207 1225891762.893493: SSL: Need 2205 bytes more input data 1225891762.893498: SSL: Building ACK (type=25 id=17 ver=1) 1225891762.893503: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.893509: EAP: EAP entering state SEND_RESPONSE 1225891762.893514: EAP: EAP entering state IDLE 1225891762.893518: EAPOL: SUPP_BE entering state RESPONSE 1225891762.893521: EAPOL: txSuppRsp 1225891762.893526: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.893569: EAPOL: SUPP_BE entering state RECEIVE 1225891762.899390: RX EAPOL from 00:1b:8f:90:74:70 1225891762.899414: EAPOL: Received EAP-Packet frame 1225891762.899419: EAPOL: SUPP_BE entering state REQUEST 1225891762.899422: EAPOL: getSuppRsp 1225891762.899426: EAP: EAP entering state RECEIVED 1225891762.899439: EAP: Received EAP-Request id=18 method=25 vendor=0 vendorMethod=0 1225891762.899445: EAP: EAP entering state METHOD 1225891762.899454: SSL: Received packet(len=1008) - Flags 0x41 1225891762.899463: SSL: Need 1203 bytes more input data 1225891762.899468: SSL: Building ACK (type=25 id=18 ver=1) 1225891762.899473: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.899479: EAP: EAP entering state SEND_RESPONSE 1225891762.899483: EAP: EAP entering state IDLE 1225891762.899487: EAPOL: SUPP_BE entering state RESPONSE 1225891762.899490: EAPOL: txSuppRsp 1225891762.899495: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.899532: EAPOL: SUPP_BE entering state RECEIVE 1225891762.904985: RX EAPOL from 00:1b:8f:90:74:70 1225891762.905011: EAPOL: Received EAP-Packet frame 1225891762.905016: EAPOL: SUPP_BE entering state REQUEST 1225891762.905019: EAPOL: getSuppRsp 1225891762.905023: EAP: EAP entering state RECEIVED 1225891762.905036: EAP: Received EAP-Request id=19 method=25 vendor=0 vendorMethod=0 1225891762.905042: EAP: EAP entering state METHOD 1225891762.905051: SSL: Received packet(len=1008) - Flags 0x41 1225891762.905060: SSL: Need 201 bytes more input data 1225891762.905065: SSL: Building ACK (type=25 id=19 ver=1) 1225891762.905070: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.905075: EAP: EAP entering state SEND_RESPONSE 1225891762.905079: EAP: EAP entering state IDLE 1225891762.905083: EAPOL: SUPP_BE entering state RESPONSE 1225891762.905086: EAPOL: txSuppRsp 1225891762.905091: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.905134: EAPOL: SUPP_BE entering state RECEIVE 1225891762.910014: RX EAPOL from 00:1b:8f:90:74:70 1225891762.910027: EAPOL: Received EAP-Packet frame 1225891762.910030: EAPOL: SUPP_BE entering state REQUEST 1225891762.910033: EAPOL: getSuppRsp 1225891762.910037: EAP: EAP entering state RECEIVED 1225891762.910044: EAP: Received EAP-Request id=20 method=25 vendor=0 vendorMethod=0 1225891762.910050: EAP: EAP entering state METHOD 1225891762.910056: SSL: Received packet(len=207) - Flags 0x01 1225891762.910161: SSL: (where=0x1001 ret=0x1) 1225891762.910168: SSL: SSL_connect:SSLv3 read server hello A 1225891762.910778: SSL: (where=0x1001 ret=0x1) 1225891762.910785: SSL: SSL_connect:SSLv3 read server certificate A 1225891762.910797: SSL: (where=0x1001 ret=0x1) 1225891762.910801: SSL: SSL_connect:SSLv3 read server done A 1225891762.911951: SSL: (where=0x1001 ret=0x1) 1225891762.911957: SSL: SSL_connect:SSLv3 write client key exchange A 1225891762.912074: SSL: (where=0x1001 ret=0x1) 1225891762.912078: SSL: SSL_connect:SSLv3 write change cipher spec A 1225891762.912134: SSL: (where=0x1001 ret=0x1) 1225891762.912139: SSL: SSL_connect:SSLv3 write finished A 1225891762.912147: SSL: (where=0x1001 ret=0x1) 1225891762.912151: SSL: SSL_connect:SSLv3 flush data 1225891762.912252: SSL: (where=0x1002 ret=0xffffffff) 1225891762.912257: SSL: SSL_connect:error in SSLv3 read finished A 1225891762.912263: SSL: SSL_connect - want more data 1225891762.912267: SSL: 326 bytes pending from ssl_out 1225891762.912273: SSL: 326 bytes left to be sent out (of total 326 bytes) 1225891762.912280: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.912285: EAP: EAP entering state SEND_RESPONSE 1225891762.912290: EAP: EAP entering state IDLE 1225891762.912294: EAPOL: SUPP_BE entering state RESPONSE 1225891762.912297: EAPOL: txSuppRsp 1225891762.912301: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.912334: EAPOL: SUPP_BE entering state RECEIVE 1225891762.980850: RX EAPOL from 00:1b:8f:90:74:70 1225891762.980874: EAPOL: Received EAP-Packet frame 1225891762.980880: EAPOL: SUPP_BE entering state REQUEST 1225891762.980883: EAPOL: getSuppRsp 1225891762.980887: EAP: EAP entering state RECEIVED 1225891762.980895: EAP: Received EAP-Request id=21 method=25 vendor=0 vendorMethod=0 1225891762.980901: EAP: EAP entering state METHOD 1225891762.980911: SSL: Received packet(len=69) - Flags 0x81 1225891762.980915: SSL: TLS Message Length: 59 1225891762.981027: SSL: (where=0x1001 ret=0x1) 1225891762.981034: SSL: SSL_connect:SSLv3 read finished A 1225891762.981053: SSL: (where=0x20 ret=0x1) 1225891762.981058: SSL: (where=0x1002 ret=0x1) 1225891762.981062: SSL: 0 bytes pending from ssl_out 1225891762.981094: OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) 1225891762.981102: SSL: No data to be sent out 1225891762.981105: EAP-PEAP: TLS done, proceed to Phase 2 1225891762.981109: EAP-PEAP: using label 'client EAP encryption' in key derivation 1225891762.981184: EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] 1225891762.981190: SSL: Building ACK (type=25 id=21 ver=1) 1225891762.981195: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.981201: EAP: EAP entering state SEND_RESPONSE 1225891762.981206: EAP: EAP entering state IDLE 1225891762.981211: EAPOL: SUPP_BE entering state RESPONSE 1225891762.981214: EAPOL: txSuppRsp 1225891762.981219: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.981267: EAPOL: SUPP_BE entering state RECEIVE 1225891762.985899: RX EAPOL from 00:1b:8f:90:74:70 1225891762.985921: EAPOL: Received EAP-Packet frame 1225891762.985926: EAPOL: SUPP_BE entering state REQUEST 1225891762.985929: EAPOL: getSuppRsp 1225891762.985934: EAP: EAP entering state RECEIVED 1225891762.985942: EAP: Received EAP-Request id=22 method=25 vendor=0 vendorMethod=0 1225891762.985948: EAP: EAP entering state METHOD 1225891762.985957: SSL: Received packet(len=59) - Flags 0x01 1225891762.985963: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891762.986015: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 11 00 13 01 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891762.986032: EAP-PEAP: received Phase 2: code=1 identifier=17 length=19 1225891762.986037: EAP-PEAP: Phase 2 Request: type=1 1225891762.986042: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891762.986054: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=8): [REMOVED] 1225891762.986089: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891762.986096: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.986102: EAP: EAP entering state SEND_RESPONSE 1225891762.986106: EAP: EAP entering state IDLE 1225891762.986111: EAPOL: SUPP_BE entering state RESPONSE 1225891762.986114: EAPOL: txSuppRsp 1225891762.986119: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.986188: EAPOL: SUPP_BE entering state RECEIVE 1225891762.991235: RX EAPOL from 00:1b:8f:90:74:70 1225891762.991260: EAPOL: Received EAP-Packet frame 1225891762.991265: EAPOL: SUPP_BE entering state REQUEST 1225891762.991269: EAPOL: getSuppRsp 1225891762.991273: EAP: EAP entering state RECEIVED 1225891762.991282: EAP: Received EAP-Request id=23 method=25 vendor=0 vendorMethod=0 1225891762.991390: EAP: EAP entering state METHOD 1225891762.991402: SSL: Received packet(len=59) - Flags 0x01 1225891762.991408: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891762.991459: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 12 00 13 06 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891762.991476: EAP-PEAP: received Phase 2: code=1 identifier=18 length=19 1225891762.991482: EAP-PEAP: Phase 2 Request: type=6 1225891762.991486: TLS: Phase 2 Request: Nak type=6 1225891762.991489: TLS: Allowed Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891762.991499: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] 1225891762.991533: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891762.991540: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891762.991546: EAP: EAP entering state SEND_RESPONSE 1225891762.991573: EAP: EAP entering state IDLE 1225891762.991578: EAPOL: SUPP_BE entering state RESPONSE 1225891762.991581: EAPOL: txSuppRsp 1225891762.991586: TX EAPOL: dst=00:1b:8f:90:74:70 1225891762.991636: EAPOL: SUPP_BE entering state RECEIVE 1225891762.996516: RX EAPOL from 00:1b:8f:90:74:70 1225891762.996537: EAPOL: Received EAP-Packet frame 1225891762.996542: EAPOL: SUPP_BE entering state REQUEST 1225891762.996545: EAPOL: getSuppRsp 1225891762.996550: EAP: EAP entering state RECEIVED 1225891762.996557: EAP: Received EAP-Failure 1225891762.996561: EAP: EAP entering state FAILURE 1225891762.996571: CTRL-EVENT-EAP-FAILURE EAP authentication failed 1225891762.996577: EAPOL: SUPP_PAE entering state HELD 1225891762.996580: EAPOL: SUPP_BE entering state RECEIVE 1225891762.996584: EAPOL: SUPP_BE entering state FAIL 1225891762.996587: EAPOL: SUPP_BE entering state IDLE 1225891762.996590: EAPOL authentication completed unsuccessfully 1225891762.996814: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891762.996828: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891762.996835: Wireless event: cmd=0x8b15 len=20 1225891762.996840: Wireless event: new AP: 00:00:00:00:00:00 1225891762.996851: Setting scan request: 0 sec 100000 usec 1225891762.996858: BSSID 00:1b:8f:90:74:70 blacklist count incremented to 2 1225891762.996866: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891762.996870: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891762.996889: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891762.996897: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891762.996904: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891762.996911: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891762.996919: State: ASSOCIATED -> DISCONNECTED 1225891762.996924: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891762.996929: WEXT: Operstate: linkmode=-1, operstate=5 1225891762.996943: EAPOL: External notification - portEnabled=0 1225891762.996948: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891762.996951: EAPOL: SUPP_BE entering state INITIALIZE 1225891762.996957: EAP: EAP entering state DISABLED 1225891762.996961: EAPOL: External notification - portValid=0 1225891763.099659: State: DISCONNECTED -> SCANNING 1225891763.099677: Starting AP scan (broadcast SSID) 1225891763.099702: Scan requested (ret=0) - scan timeout 30 seconds 1225891763.860232: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891763.860253: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891764.001698: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891764.001760: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891764.001766: Wireless event: cmd=0x8c02 len=219 1225891764.001779: Association info event 1225891764.001783: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891764.001816: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891764.001895: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891764.001920: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891764.001925: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891764.001930: Wireless event: cmd=0x8b15 len=20 1225891764.001934: Wireless event: new AP: 00:1b:8f:90:74:70 1225891764.001940: State: SCANNING -> ASSOCIATED 1225891764.001945: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891764.001950: WEXT: Operstate: linkmode=-1, operstate=5 1225891764.003300: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891764.003307: No keys have been configured - skip key clearing 1225891764.003314: Associated with 00:1b:8f:90:74:70 1225891764.003317: WPA: Association event - clear replay counter 1225891764.003321: WPA: Clear old PTK 1225891764.003325: EAPOL: External notification - portEnabled=0 1225891764.003331: EAPOL: External notification - portValid=0 1225891764.003335: EAPOL: External notification - portEnabled=1 1225891764.003339: EAPOL: SUPP_PAE entering state CONNECTING 1225891764.003342: EAPOL: SUPP_BE entering state IDLE 1225891764.003346: EAP: EAP entering state INITIALIZE 1225891764.003351: EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE 1225891764.003470: ENGINE: engine deinit 1225891764.003475: EAP: EAP entering state IDLE 1225891764.003484: Setting authentication timeout: 10 sec 0 usec 1225891764.003492: Cancelling scan request 1225891764.003500: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891764.003506: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891764.003525: RX EAPOL from 00:1b:8f:90:74:70 1225891764.003533: Setting authentication timeout: 70 sec 0 usec 1225891764.003541: EAPOL: Received EAP-Packet frame 1225891764.003544: EAPOL: SUPP_PAE entering state RESTART 1225891764.003547: EAP: EAP entering state INITIALIZE 1225891764.003569: EAP: EAP entering state IDLE 1225891764.003572: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891764.003576: EAPOL: SUPP_BE entering state REQUEST 1225891764.003578: EAPOL: getSuppRsp 1225891764.003581: EAP: EAP entering state RECEIVED 1225891764.003589: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891764.003594: EAP: EAP entering state IDENTITY 1225891764.003599: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891764.003603: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891764.003643: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891764.003655: EAP: EAP entering state SEND_RESPONSE 1225891764.003659: EAP: EAP entering state IDLE 1225891764.003663: EAPOL: SUPP_BE entering state RESPONSE 1225891764.003666: EAPOL: txSuppRsp 1225891764.003670: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.003699: EAPOL: SUPP_BE entering state RECEIVE 1225891764.009405: RX EAPOL from 00:1b:8f:90:74:70 1225891764.009422: EAPOL: Received EAP-Packet frame 1225891764.009427: EAPOL: SUPP_BE entering state REQUEST 1225891764.009430: EAPOL: getSuppRsp 1225891764.009435: EAP: EAP entering state RECEIVED 1225891764.009442: EAP: Received EAP-Request id=18 method=25 vendor=0 vendorMethod=0 1225891764.009447: EAP: EAP entering state GET_METHOD 1225891764.009452: EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) 1225891764.009464: TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891764.009511: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected 1225891764.009516: EAP: EAP entering state METHOD 1225891764.009521: SSL: Received packet(len=6) - Flags 0x21 1225891764.009525: EAP-PEAP: Start (server ver=1, own ver=1) 1225891764.009613: EAP-PEAP: Using PEAP version 1 1225891764.009643: SSL: (where=0x10 ret=0x1) 1225891764.009663: SSL: (where=0x1001 ret=0x1) 1225891764.009668: SSL: SSL_connect:before/connect initialization 1225891764.009697: SSL: (where=0x1001 ret=0x1) 1225891764.009702: SSL: SSL_connect:SSLv3 write client hello A 1225891764.009710: SSL: (where=0x1002 ret=0xffffffff) 1225891764.009715: SSL: SSL_connect:error in SSLv3 read server hello A 1225891764.009721: SSL: SSL_connect - want more data 1225891764.009724: SSL: 93 bytes pending from ssl_out 1225891764.009730: SSL: 93 bytes left to be sent out (of total 93 bytes) 1225891764.009736: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.009741: EAP: EAP entering state SEND_RESPONSE 1225891764.009746: EAP: EAP entering state IDLE 1225891764.009750: EAPOL: SUPP_BE entering state RESPONSE 1225891764.009753: EAPOL: txSuppRsp 1225891764.009758: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.009796: EAPOL: SUPP_BE entering state RECEIVE 1225891764.016073: RX EAPOL from 00:1b:8f:90:74:70 1225891764.016098: EAPOL: Received EAP-Packet frame 1225891764.016103: EAPOL: SUPP_BE entering state REQUEST 1225891764.016106: EAPOL: getSuppRsp 1225891764.016110: EAP: EAP entering state RECEIVED 1225891764.016124: EAP: Received EAP-Request id=19 method=25 vendor=0 vendorMethod=0 1225891764.016129: EAP: EAP entering state METHOD 1225891764.016138: SSL: Received packet(len=1012) - Flags 0xc1 1225891764.016143: SSL: TLS Message Length: 3207 1225891764.016151: SSL: Need 2205 bytes more input data 1225891764.016156: SSL: Building ACK (type=25 id=19 ver=1) 1225891764.016161: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.016167: EAP: EAP entering state SEND_RESPONSE 1225891764.016172: EAP: EAP entering state IDLE 1225891764.016176: EAPOL: SUPP_BE entering state RESPONSE 1225891764.016179: EAPOL: txSuppRsp 1225891764.016184: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.016224: EAPOL: SUPP_BE entering state RECEIVE 1225891764.021644: RX EAPOL from 00:1b:8f:90:74:70 1225891764.021656: EAPOL: Received EAP-Packet frame 1225891764.021659: EAPOL: SUPP_BE entering state REQUEST 1225891764.021662: EAPOL: getSuppRsp 1225891764.021666: EAP: EAP entering state RECEIVED 1225891764.021676: EAP: Received EAP-Request id=20 method=25 vendor=0 vendorMethod=0 1225891764.021681: EAP: EAP entering state METHOD 1225891764.021686: SSL: Received packet(len=1008) - Flags 0x41 1225891764.021695: SSL: Need 1203 bytes more input data 1225891764.021699: SSL: Building ACK (type=25 id=20 ver=1) 1225891764.021704: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.021708: EAP: EAP entering state SEND_RESPONSE 1225891764.021713: EAP: EAP entering state IDLE 1225891764.021717: EAPOL: SUPP_BE entering state RESPONSE 1225891764.021720: EAPOL: txSuppRsp 1225891764.021724: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.021748: EAPOL: SUPP_BE entering state RECEIVE 1225891764.027917: RX EAPOL from 00:1b:8f:90:74:70 1225891764.027943: EAPOL: Received EAP-Packet frame 1225891764.027949: EAPOL: SUPP_BE entering state REQUEST 1225891764.027952: EAPOL: getSuppRsp 1225891764.027956: EAP: EAP entering state RECEIVED 1225891764.027970: EAP: Received EAP-Request id=21 method=25 vendor=0 vendorMethod=0 1225891764.027976: EAP: EAP entering state METHOD 1225891764.027985: SSL: Received packet(len=1008) - Flags 0x41 1225891764.027994: SSL: Need 201 bytes more input data 1225891764.027999: SSL: Building ACK (type=25 id=21 ver=1) 1225891764.028003: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.028009: EAP: EAP entering state SEND_RESPONSE 1225891764.028014: EAP: EAP entering state IDLE 1225891764.028017: EAPOL: SUPP_BE entering state RESPONSE 1225891764.028021: EAPOL: txSuppRsp 1225891764.028026: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.028065: EAPOL: SUPP_BE entering state RECEIVE 1225891764.032461: RX EAPOL from 00:1b:8f:90:74:70 1225891764.032484: EAPOL: Received EAP-Packet frame 1225891764.032489: EAPOL: SUPP_BE entering state REQUEST 1225891764.032601: EAPOL: getSuppRsp 1225891764.032607: EAP: EAP entering state RECEIVED 1225891764.032616: EAP: Received EAP-Request id=22 method=25 vendor=0 vendorMethod=0 1225891764.032622: EAP: EAP entering state METHOD 1225891764.032632: SSL: Received packet(len=207) - Flags 0x01 1225891764.032739: SSL: (where=0x1001 ret=0x1) 1225891764.032746: SSL: SSL_connect:SSLv3 read server hello A 1225891764.033361: SSL: (where=0x1001 ret=0x1) 1225891764.033368: SSL: SSL_connect:SSLv3 read server certificate A 1225891764.033380: SSL: (where=0x1001 ret=0x1) 1225891764.033384: SSL: SSL_connect:SSLv3 read server done A 1225891764.034518: SSL: (where=0x1001 ret=0x1) 1225891764.034524: SSL: SSL_connect:SSLv3 write client key exchange A 1225891764.034641: SSL: (where=0x1001 ret=0x1) 1225891764.034646: SSL: SSL_connect:SSLv3 write change cipher spec A 1225891764.034722: SSL: (where=0x1001 ret=0x1) 1225891764.034727: SSL: SSL_connect:SSLv3 write finished A 1225891764.034736: SSL: (where=0x1001 ret=0x1) 1225891764.034740: SSL: SSL_connect:SSLv3 flush data 1225891764.034745: SSL: (where=0x1002 ret=0xffffffff) 1225891764.034749: SSL: SSL_connect:error in SSLv3 read finished A 1225891764.034755: SSL: SSL_connect - want more data 1225891764.034759: SSL: 326 bytes pending from ssl_out 1225891764.034764: SSL: 326 bytes left to be sent out (of total 326 bytes) 1225891764.034771: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.034777: EAP: EAP entering state SEND_RESPONSE 1225891764.034782: EAP: EAP entering state IDLE 1225891764.034786: EAPOL: SUPP_BE entering state RESPONSE 1225891764.034790: EAPOL: txSuppRsp 1225891764.034795: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.034840: EAPOL: SUPP_BE entering state RECEIVE 1225891764.103805: RX EAPOL from 00:1b:8f:90:74:70 1225891764.103824: EAPOL: Received EAP-Packet frame 1225891764.103830: EAPOL: SUPP_BE entering state REQUEST 1225891764.103833: EAPOL: getSuppRsp 1225891764.103837: EAP: EAP entering state RECEIVED 1225891764.103845: EAP: Received EAP-Request id=23 method=25 vendor=0 vendorMethod=0 1225891764.103851: EAP: EAP entering state METHOD 1225891764.103860: SSL: Received packet(len=69) - Flags 0x81 1225891764.103865: SSL: TLS Message Length: 59 1225891764.103976: SSL: (where=0x1001 ret=0x1) 1225891764.103982: SSL: SSL_connect:SSLv3 read finished A 1225891764.104000: SSL: (where=0x20 ret=0x1) 1225891764.104004: SSL: (where=0x1002 ret=0x1) 1225891764.104008: SSL: 0 bytes pending from ssl_out 1225891764.104031: OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) 1225891764.104038: SSL: No data to be sent out 1225891764.104041: EAP-PEAP: TLS done, proceed to Phase 2 1225891764.104045: EAP-PEAP: using label 'client EAP encryption' in key derivation 1225891764.104117: EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] 1225891764.104123: SSL: Building ACK (type=25 id=23 ver=1) 1225891764.104127: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.104133: EAP: EAP entering state SEND_RESPONSE 1225891764.104138: EAP: EAP entering state IDLE 1225891764.104142: EAPOL: SUPP_BE entering state RESPONSE 1225891764.104145: EAPOL: txSuppRsp 1225891764.104150: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.104191: EAPOL: SUPP_BE entering state RECEIVE 1225891764.108517: RX EAPOL from 00:1b:8f:90:74:70 1225891764.108542: EAPOL: Received EAP-Packet frame 1225891764.108547: EAPOL: SUPP_BE entering state REQUEST 1225891764.108550: EAPOL: getSuppRsp 1225891764.108555: EAP: EAP entering state RECEIVED 1225891764.108563: EAP: Received EAP-Request id=24 method=25 vendor=0 vendorMethod=0 1225891764.108568: EAP: EAP entering state METHOD 1225891764.108578: SSL: Received packet(len=59) - Flags 0x01 1225891764.108584: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891764.108634: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 13 00 13 01 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891764.108652: EAP-PEAP: received Phase 2: code=1 identifier=19 length=19 1225891764.108759: EAP-PEAP: Phase 2 Request: type=1 1225891764.108765: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891764.108779: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=8): [REMOVED] 1225891764.108819: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891764.108827: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.108832: EAP: EAP entering state SEND_RESPONSE 1225891764.108836: EAP: EAP entering state IDLE 1225891764.108842: EAPOL: SUPP_BE entering state RESPONSE 1225891764.108845: EAPOL: txSuppRsp 1225891764.108850: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.108899: EAPOL: SUPP_BE entering state RECEIVE 1225891764.113650: RX EAPOL from 00:1b:8f:90:74:70 1225891764.113672: EAPOL: Received EAP-Packet frame 1225891764.113676: EAPOL: SUPP_BE entering state REQUEST 1225891764.113679: EAPOL: getSuppRsp 1225891764.113684: EAP: EAP entering state RECEIVED 1225891764.113692: EAP: Received EAP-Request id=25 method=25 vendor=0 vendorMethod=0 1225891764.113697: EAP: EAP entering state METHOD 1225891764.113707: SSL: Received packet(len=59) - Flags 0x01 1225891764.113713: EAP-PEAP: received 53 bytes encrypted data for Phase 2 1225891764.113762: EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=19): 01 14 00 13 06 61 75 74 68 65 6e 74 69 63 61 74 69 6e 67 1225891764.113779: EAP-PEAP: received Phase 2: code=1 identifier=20 length=19 1225891764.113784: EAP-PEAP: Phase 2 Request: type=6 1225891764.113788: TLS: Phase 2 Request: Nak type=6 1225891764.113791: TLS: Allowed Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 1225891764.113801: EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] 1225891764.113858: SSL: 74 bytes left to be sent out (of total 74 bytes) 1225891764.113866: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1225891764.113871: EAP: EAP entering state SEND_RESPONSE 1225891764.113876: EAP: EAP entering state IDLE 1225891764.113881: EAPOL: SUPP_BE entering state RESPONSE 1225891764.113884: EAPOL: txSuppRsp 1225891764.113888: TX EAPOL: dst=00:1b:8f:90:74:70 1225891764.113935: EAPOL: SUPP_BE entering state RECEIVE 1225891764.118457: RX EAPOL from 00:1b:8f:90:74:70 1225891764.118532: EAPOL: Received EAP-Packet frame 1225891764.118538: EAPOL: SUPP_BE entering state REQUEST 1225891764.118541: EAPOL: getSuppRsp 1225891764.118545: EAP: EAP entering state RECEIVED 1225891764.118553: EAP: Received EAP-Failure 1225891764.118557: EAP: EAP entering state FAILURE 1225891764.118567: CTRL-EVENT-EAP-FAILURE EAP authentication failed 1225891764.118572: EAPOL: SUPP_PAE entering state HELD 1225891764.118576: EAPOL: SUPP_BE entering state RECEIVE 1225891764.118579: EAPOL: SUPP_BE entering state FAIL 1225891764.118582: EAPOL: SUPP_BE entering state IDLE 1225891764.118586: EAPOL authentication completed unsuccessfully 1225891764.118799: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891764.118813: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891764.118820: Wireless event: cmd=0x8b15 len=20 1225891764.118824: Wireless event: new AP: 00:00:00:00:00:00 1225891764.118836: Setting scan request: 0 sec 100000 usec 1225891764.118844: BSSID 00:1b:8f:90:74:70 blacklist count incremented to 3 1225891764.118852: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891764.118856: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891764.118875: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891764.118883: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891764.118890: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891764.118897: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891764.118905: State: ASSOCIATED -> DISCONNECTED 1225891764.118910: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891764.118914: WEXT: Operstate: linkmode=-1, operstate=5 1225891764.118928: EAPOL: External notification - portEnabled=0 1225891764.118932: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891764.119033: EAPOL: SUPP_BE entering state INITIALIZE 1225891764.119042: EAP: EAP entering state DISABLED 1225891764.119045: EAPOL: External notification - portValid=0 1225891764.219613: State: DISCONNECTED -> SCANNING 1225891764.219630: Starting AP scan (broadcast SSID) 1225891764.219655: Scan requested (ret=0) - scan timeout 30 seconds 1225891764.865314: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891764.865334: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891765.117765: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891765.117828: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891765.117834: Wireless event: cmd=0x8c02 len=219 1225891765.117847: Association info event 1225891765.117851: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891765.117884: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891765.117907: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891765.117930: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891765.117936: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891765.117940: Wireless event: cmd=0x8b15 len=20 1225891765.117944: Wireless event: new AP: 00:1b:8f:90:74:70 1225891765.117950: State: SCANNING -> ASSOCIATED 1225891765.117955: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891765.117960: WEXT: Operstate: linkmode=-1, operstate=5 1225891765.119067: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891765.119073: No keys have been configured - skip key clearing 1225891765.119080: Associated with 00:1b:8f:90:74:70 1225891765.119085: WPA: Association event - clear replay counter 1225891765.119089: WPA: Clear old PTK 1225891765.119092: EAPOL: External notification - portEnabled=0 1225891765.119099: EAPOL: External notification - portValid=0 1225891765.119103: EAPOL: External notification - portEnabled=1 1225891765.119106: EAPOL: SUPP_PAE entering state CONNECTING 1225891765.119110: EAPOL: SUPP_BE entering state IDLE 1225891765.119114: EAP: EAP entering state INITIALIZE 1225891765.119118: EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE 1225891765.119235: ENGINE: engine deinit 1225891765.119240: EAP: EAP entering state IDLE 1225891765.119250: Setting authentication timeout: 10 sec 0 usec 1225891765.119257: Cancelling scan request 1225891765.119265: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891765.119271: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891767.726088: EAPOL: startWhen --> 0 1225891767.726106: EAPOL: SUPP_PAE entering state CONNECTING 1225891767.726110: EAPOL: txStart 1225891767.726117: TX EAPOL: dst=00:1b:8f:90:74:70 1225891767.727346: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891767.727365: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891767.727371: Wireless event: cmd=0x8b15 len=20 1225891767.727376: Wireless event: new AP: 00:00:00:00:00:00 1225891767.727390: Setting scan request: 0 sec 100000 usec 1225891767.727399: BSSID 00:1b:8f:90:74:70 blacklist count incremented to 4 1225891767.727407: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891767.727411: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891767.727430: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891767.727437: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891767.727444: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891767.727451: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891767.727460: State: ASSOCIATED -> DISCONNECTED 1225891767.727465: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891767.727470: WEXT: Operstate: linkmode=-1, operstate=5 1225891767.727484: EAPOL: External notification - portEnabled=0 1225891767.727615: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891767.727619: EAPOL: SUPP_BE entering state INITIALIZE 1225891767.727624: EAP: EAP entering state DISABLED 1225891767.727628: EAPOL: External notification - portValid=0 1225891767.731529: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891767.731544: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891767.827646: State: DISCONNECTED -> SCANNING 1225891767.827664: Starting AP scan (broadcast SSID) 1225891767.827692: Scan requested (ret=0) - scan timeout 30 seconds 1225891768.726854: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891768.726869: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891768.726934: Wireless event: cmd=0x8c02 len=219 1225891768.726946: Association info event 1225891768.726949: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891768.726983: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891768.727006: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891768.727029: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891768.727034: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891768.727039: Wireless event: cmd=0x8b15 len=20 1225891768.727043: Wireless event: new AP: 00:1b:8f:90:74:70 1225891768.727049: State: SCANNING -> ASSOCIATED 1225891768.727053: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891768.727059: WEXT: Operstate: linkmode=-1, operstate=5 1225891768.727083: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891768.727088: No keys have been configured - skip key clearing 1225891768.727094: Associated with 00:1b:8f:90:74:70 1225891768.727098: WPA: Association event - clear replay counter 1225891768.727101: WPA: Clear old PTK 1225891768.727105: EAPOL: External notification - portEnabled=0 1225891768.727109: EAPOL: External notification - portValid=0 1225891768.727113: EAPOL: External notification - portEnabled=1 1225891768.727116: EAPOL: SUPP_PAE entering state CONNECTING 1225891768.727120: EAPOL: SUPP_BE entering state IDLE 1225891768.727123: EAP: EAP entering state INITIALIZE 1225891768.727127: EAP: EAP entering state IDLE 1225891768.727134: Setting authentication timeout: 10 sec 0 usec 1225891768.727142: Cancelling scan request 1225891768.727161: RX EAPOL from 00:1b:8f:90:74:70 1225891768.727169: Setting authentication timeout: 70 sec 0 usec 1225891768.727177: EAPOL: Received EAP-Packet frame 1225891768.727180: EAPOL: SUPP_PAE entering state RESTART 1225891768.727184: EAP: EAP entering state INITIALIZE 1225891768.727187: EAP: EAP entering state IDLE 1225891768.727190: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891768.727193: EAPOL: SUPP_BE entering state REQUEST 1225891768.727196: EAPOL: getSuppRsp 1225891768.727199: EAP: EAP entering state RECEIVED 1225891768.727207: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891768.727212: EAP: EAP entering state IDENTITY 1225891768.727217: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891768.727220: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891768.727260: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891768.727272: EAP: EAP entering state SEND_RESPONSE 1225891768.727276: EAP: EAP entering state IDLE 1225891768.727279: EAPOL: SUPP_BE entering state RESPONSE 1225891768.727282: EAPOL: txSuppRsp 1225891768.727287: TX EAPOL: dst=00:1b:8f:90:74:70 1225891768.727298: EAPOL: SUPP_BE entering state RECEIVE 1225891768.728638: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891768.728648: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891771.731641: EAPOL: startWhen --> 0 1225891797.831625: Scan timeout - try to get results 1225891797.831678: Received 247 bytes of scan results (1 BSSes) 1225891797.831689: CTRL-EVENT-SCAN-RESULTS 1225891797.831695: Selecting BSS from priority group 0 1225891797.831699: Try to find WPA-enabled AP 1225891797.831703: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891797.831712: skip - blacklisted 1225891797.831715: Try to find non-WPA AP 1225891797.831719: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891797.831725: skip - blacklisted 1225891797.831728: No APs found - clear blacklist and try again 1225891797.831748: Removed BSSID 00:1b:8f:90:74:70 from blacklist (clear) 1225891797.831754: Selecting BSS from priority group 0 1225891797.831757: Try to find WPA-enabled AP 1225891797.831761: 0: 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 1225891797.831769: selected based on WPA IE 1225891797.831773: selected WPA AP 00:1b:8f:90:74:70 ssid='NEWTEC_CORP' 1225891797.831778: Try to find non-WPA AP 1225891797.831781: Already associated with the selected AP. 1225891798.718747: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891798.718766: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891798.718773: Wireless event: cmd=0x8b15 len=20 1225891798.718777: Wireless event: new AP: 00:00:00:00:00:00 1225891798.718791: Setting scan request: 0 sec 100000 usec 1225891798.718799: Added BSSID 00:1b:8f:90:74:70 into blacklist 1225891798.718807: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1225891798.718811: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891798.718827: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1225891798.718835: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1225891798.718842: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1225891798.718850: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1225891798.718857: State: ASSOCIATED -> DISCONNECTED 1225891798.718862: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891798.718867: WEXT: Operstate: linkmode=-1, operstate=5 1225891798.718879: EAPOL: External notification - portEnabled=0 1225891798.718884: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891798.718888: EAPOL: SUPP_BE entering state INITIALIZE 1225891798.718893: EAP: EAP entering state DISABLED 1225891798.718897: EAPOL: External notification - portValid=0 1225891798.720011: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891798.720020: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891798.799623: EAPOL: authWhile --> 0 1225891798.819608: State: DISCONNECTED -> SCANNING 1225891798.819621: Starting AP scan (broadcast SSID) 1225891798.819637: Scan requested (ret=0) - scan timeout 30 seconds 1225891799.717636: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1225891799.717650: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891799.717657: Wireless event: cmd=0x8c02 len=219 1225891799.717717: Association info event 1225891799.717722: req_ies - hexdump(len=56): 00 0b 4e 45 57 54 45 43 5f 43 4f 52 50 01 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 dd 07 00 50 f2 02 00 01 00 1225891799.717755: resp_ies - hexdump(len=36): 01 08 8c 12 98 24 b0 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 1225891799.717778: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 1225891799.717802: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891799.717807: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891799.717811: Wireless event: cmd=0x8b15 len=20 1225891799.717815: Wireless event: new AP: 00:1b:8f:90:74:70 1225891799.717907: State: SCANNING -> ASSOCIATED 1225891799.717913: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891799.717918: WEXT: Operstate: linkmode=-1, operstate=5 1225891799.718813: Associated to a new BSS: BSSID=00:1b:8f:90:74:70 1225891799.718820: No keys have been configured - skip key clearing 1225891799.718876: Associated with 00:1b:8f:90:74:70 1225891799.718880: WPA: Association event - clear replay counter 1225891799.718884: WPA: Clear old PTK 1225891799.718888: EAPOL: External notification - portEnabled=0 1225891799.718894: EAPOL: External notification - portValid=0 1225891799.718898: EAPOL: External notification - portEnabled=1 1225891799.718902: EAPOL: SUPP_PAE entering state CONNECTING 1225891799.718905: EAPOL: SUPP_BE entering state IDLE 1225891799.718909: EAP: EAP entering state INITIALIZE 1225891799.718913: EAP: EAP entering state IDLE 1225891799.718920: Setting authentication timeout: 10 sec 0 usec 1225891799.718927: Cancelling scan request 1225891799.718935: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1225891799.718940: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added 1225891799.719568: RX EAPOL from 00:1b:8f:90:74:70 1225891799.719579: Setting authentication timeout: 70 sec 0 usec 1225891799.719588: EAPOL: Received EAP-Packet frame 1225891799.719592: EAPOL: SUPP_PAE entering state RESTART 1225891799.719596: EAP: EAP entering state INITIALIZE 1225891799.719600: EAP: EAP entering state IDLE 1225891799.719603: EAPOL: SUPP_PAE entering state AUTHENTICATING 1225891799.719606: EAPOL: SUPP_BE entering state REQUEST 1225891799.719609: EAPOL: getSuppRsp 1225891799.719612: EAP: EAP entering state RECEIVED 1225891799.719621: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1225891799.719626: EAP: EAP entering state IDENTITY 1225891799.719631: CTRL-EVENT-EAP-STARTED EAP authentication started 1225891799.719635: EAP: EAP-Request Identity data - hexdump_ascii(len=52): 00 6e 65 74 77 6f 72 6b 69 64 3d 4e 45 57 54 45 _networkid=NEWTE 43 5f 43 4f 52 50 2c 6e 61 73 69 64 3d 6e 74 63 C_CORP,nasid=ntc 2d 62 65 73 6e 6b 2d 61 70 30 38 2c 70 6f 72 74 -besnk-ap08,port 69 64 3d 30 id=0 1225891799.719674: EAP: using real identity - hexdump_ascii(len=3): 6a 76 62 jvb 1225891799.719687: EAP: EAP entering state SEND_RESPONSE 1225891799.719691: EAP: EAP entering state IDLE 1225891799.719695: EAPOL: SUPP_BE entering state RESPONSE 1225891799.719698: EAPOL: txSuppRsp 1225891799.719702: TX EAPOL: dst=00:1b:8f:90:74:70 1225891799.719730: EAPOL: SUPP_BE entering state RECEIVE 1225891801.252483: CTRL-EVENT-TERMINATING - signal 2 received 1225891801.252497: Removing interface wlan0 1225891801.252502: State: ASSOCIATED -> DISCONNECTED 1225891801.252507: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1225891801.252512: WEXT: Operstate: linkmode=-1, operstate=5 1225891801.252534: wpa_driver_wext_deauthenticate 1225891801.252631: No keys have been configured - skip key clearing 1225891801.252638: EAPOL: External notification - portEnabled=0 1225891801.252643: EAPOL: SUPP_PAE entering state DISCONNECTED 1225891801.252646: EAPOL: SUPP_BE entering state INITIALIZE 1225891801.252652: EAP: EAP entering state DISABLED 1225891801.252656: EAPOL: External notification - portValid=0 1225891801.252660: wpa_driver_wext_set_wpa 1225891801.252666: wpa_driver_wext_set_drop_unencrypted 1225891801.252671: wpa_driver_wext_set_countermeasures 1225891801.252676: No keys have been configured - skip key clearing 1225891801.256001: Removed BSSID 00:1b:8f:90:74:70 from blacklist (clear) 1225891801.256145: Cancelling scan request 1225891801.256151: Cancelling authentication timeout 1225891801.257347: WEXT: Operstate: linkmode=0, operstate=6