[Cialug] Corp. WiFi

jrnosee at gmail.com jrnosee at gmail.com
Fri May 22 16:19:57 CDT 2009


Attached is a slightly modified for privacy screenlog.  I got wpa_supplicant
to partially work from command line (had to kill Network Manager).  It finds
the AP now and begins authentication.  SSL fails.  I believe this is a
better indication of the same error I was getting before:

1243025674.549128: TLS: Trusted root certificate(s) loaded
1243025674.549145: EAP-TTLS: Start
1243025674.549190: SSL: (where=0x10 ret=0x1)
1243025674.549257: SSL: (where=0x1001 ret=0x1)
1243025674.549268: SSL: SSL_connect:before/connect initialization
1243025674.549317: SSL: (where=0x1001 ret=0x1)
1243025674.549326: SSL: SSL_connect:SSLv3 write client hello A
1243025674.549340: SSL: (where=0x1002 ret=0xffffffff)
1243025674.549347: SSL: SSL_connect:error in SSLv3 read server hello A
1243025674.549360: SSL: SSL_connect - want more data
1243025674.549367: SSL: 93 bytes pending from ssl_out
1243025674.549378: SSL: 93 bytes left to be sent out (of total 93 bytes)
1243025674.549387: EAP: method process -> ignore=FALSE methodState=MAY_CONT
decision=FAIL
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://cialug.org/pipermail/cialug/attachments/20090522/55ecce42/attachment-0001.htm 
-------------- next part --------------
neomatrixjr at MatrixLaptop:~$ sudo wpa_supplicant -i eth1 -D wext -c ./wpa_supplicant.conf -dddt
1243025673.872677: Initializing interface 'eth1' conf './wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
1243025673.873204: Configuration file './wpa_supplicant.conf' -> '/home/neomatrixjr/./wpa_supplicant.conf'
1243025673.873469: Reading configuration file '/home/neomatrixjr/./wpa_supplicant.conf'
1243025673.873793: ctrl_interface='/var/run/wpa_supplicant'
1243025673.874026: ap_scan=2
1243025673.874259: eapol_version=2
1243025673.874448: Line: 5 - start of a new network block
1243025673.874699: ssid - hexdump_ascii(len=8):
     XX XX XX XX XX XX XX XX                           <SSID>
1243025673.875119: key_mgmt: 0x8
1243025673.875348: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
1243025673.875613: phase2 - hexdump_ascii(len=8):
     61 75 74 68 3d 50 41 50                           auth=PAP       
1243025673.876040: identity - hexdump_ascii(len=6):
     XX XX XX XX XX XX                             <USERID>
1243025673.876472: password - hexdump_ascii(len=10):
     XX XX XX XX XX XX XX XX XX XX                     <PASSWORD>
1243025673.876933: ca_cert - hexdump_ascii(len=27):
     2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 73 2f 64   /etc/ssl/certs/d     75 50 6f 6e 74 43 41 2e 70 65 6d                  uPontCA.pem    
1243025673.877441: Priority group 0
1243025673.877640:    id=0 ssid='<SSID>'
1243025673.877841: Initializing interface (2) 'eth1'
1243025673.878187: SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
1243025673.878420:   capabilities: key_mgmt 0xf enc 0xf flags 0x0
1243025673.878951: WEXT: Operstate: linkmode=1, operstate=5
1243025673.879369: Own MAC address: 00:15:00:07:e6:64
1243025673.879587: wpa_driver_wext_set_wpa
1243025673.879972: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1243025673.880963: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1243025673.881214: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1243025673.881454: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1243025673.881693: wpa_driver_wext_set_countermeasures
1243025673.881900: wpa_driver_wext_set_drop_unencrypted
1243025673.892194: RSN: flushing PMKID list in the driver
1243025673.892535: Setting scan request: 0 sec 100000 usec
1243025673.896071: EAPOL: SUPP_PAE entering state DISCONNECTED
1243025673.896185: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1243025673.896284: EAPOL: SUPP_BE entering state INITIALIZE
1243025673.896381: EAP: EAP entering state DISABLED
1243025673.896497: Using existing control interface directory.
1243025673.896628: ctrl_iface bind(PF_UNIX) failed: Address already in use
1243025673.896738: ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
1243025673.896883: Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/eth1'
1243025673.897037: Added interface eth1
1243025673.897164: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1243025673.897270: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1243025673.897373: Wireless event: cmd=0x8b06 len=8
1243025673.897477: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1243025673.897576: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1243025673.897676: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1243025673.897774: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1243025673.897870: Wireless event: cmd=0x8b15 len=20
1243025673.897962: Wireless event: new AP: 00:00:00:00:00:00
1243025673.898060: Added BSSID 00:00:00:00:00:00 into blacklist
1243025673.898191: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1243025673.898293: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1243025673.898408: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1243025673.898517: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1243025673.899021: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1243025673.899132: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1243025673.899244: State: DISCONNECTED -> DISCONNECTED
1243025673.899340: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1243025673.899441: WEXT: Operstate: linkmode=-1, operstate=5
1243025673.899548: EAPOL: External notification - portEnabled=0
1243025673.899647: EAPOL: External notification - portValid=0
1243025673.992769: State: DISCONNECTED -> SCANNING
1243025673.992826: Trying to associate with SSID 'APWLAN04'
1243025673.992836: Cancelling scan request
1243025673.992842: WPA: clearing own WPA/RSN IE
1243025673.992867: Automatic auth_alg selection: 0x1
1243025673.992879: WPA: clearing AP WPA IE
1243025673.992885: WPA: clearing AP RSN IE
1243025673.992891: WPA: clearing own WPA/RSN IE
1243025673.992898: No keys have been configured - skip key clearing
1243025673.992904: wpa_driver_wext_set_drop_unencrypted
1243025673.992912: State: SCANNING -> ASSOCIATING
1243025673.992918: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1243025673.992926: WEXT: Operstate: linkmode=-1, operstate=5
1243025673.992950: wpa_driver_wext_associate
1243025673.992967: wpa_driver_wext_set_psk
1243025673.992979: Setting authentication timeout: 60 sec 0 usec
1243025673.992989: EAPOL: External notification - portControl=Auto
1243025673.993075: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1243025673.993088: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1243025673.993097: Wireless event: cmd=0x8b06 len=8
1243025674.540322: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1243025674.540376: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1243025674.540386: Wireless event: cmd=0x8b15 len=20
1243025674.540393: Wireless event: new AP: 00:0f:24:c6:8c:80
1243025674.540414: State: ASSOCIATING -> ASSOCIATED
1243025674.540422: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1243025674.540430: WEXT: Operstate: linkmode=-1, operstate=5
1243025674.541310: Associated to a new BSS: BSSID=00:0f:24:c6:8c:80
1243025674.541328: No keys have been configured - skip key clearing
1243025674.541334: Select network based on association information
1243025674.541345: Network configuration found for the current AP
1243025674.541352: WPA: clearing AP WPA IE
1243025674.541358: WPA: clearing AP RSN IE
1243025674.541363: WPA: clearing own WPA/RSN IE
1243025674.541372: EAPOL: External notification - portControl=Auto
1243025674.541387: Associated with 00:0f:24:c6:8c:80
1243025674.541393: WPA: Association event - clear replay counter
1243025674.541399: WPA: Clear old PTK
1243025674.541405: EAPOL: External notification - portEnabled=0
1243025674.541411: EAPOL: External notification - portValid=0
1243025674.541417: EAPOL: External notification - portEnabled=1
1243025674.541423: EAPOL: SUPP_PAE entering state CONNECTING
1243025674.541430: EAPOL: SUPP_BE entering state IDLE
1243025674.541436: EAP: EAP entering state INITIALIZE
1243025674.541442: EAP: EAP entering state IDLE
1243025674.541451: Setting authentication timeout: 10 sec 0 usec
1243025674.541460: Cancelling scan request
1243025674.541473: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1243025674.541481: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
1243025674.541506: RX EAPOL from 00:0f:24:c6:8c:80
1243025674.541542: RX EAPOL - hexdump(len=58): 01 00 00 36 01 01 00 36 01 00 6e 65 74 77 6f 72 6b 69 64 3d 41 50 57 4c 41 4e 30 34 2c 6e 61 73 69 64 3d 61 70 2d 73 68 75 6c 6c 2d 33 36 2d 31 62 2c 70 6f 72 74 69 64 3d 30
1243025674.541552: Setting authentication timeout: 70 sec 0 usec
1243025674.541561: EAPOL: Received EAP-Packet frame
1243025674.541567: EAPOL: SUPP_PAE entering state RESTART
1243025674.541573: EAP: EAP entering state INITIALIZE
1243025674.541578: EAP: EAP entering state IDLE
1243025674.541584: EAPOL: SUPP_PAE entering state AUTHENTICATING
1243025674.541590: EAPOL: SUPP_BE entering state REQUEST
1243025674.541596: EAPOL: getSuppRsp
1243025674.541601: EAP: EAP entering state RECEIVED
1243025674.541637: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
1243025674.541646: EAP: EAP entering state IDENTITY
1243025674.541653: CTRL-EVENT-EAP-STARTED EAP authentication started
1243025674.541695: EAP: EAP-Request Identity data - hexdump_ascii(len=49):
     00 6e 65 74 77 6f 72 6b 69 64 3d 41 50 57 4c 41   _networkid=APWLA     4e 30 34 2c 6e 61 73 69 64 3d 61 70 2d 73 68 75   N04,nasid=ap-shu     6c 6c 2d 33 36 2d 31 62 2c 70 6f 72 74 69 64 3d   ll-36-1b,portid=     30                                                0              
1243025674.541722: EAP: using real identity - hexdump_ascii(len=6):
     6d 61 38 35 36 31                                 ma8561         
1243025674.541734: EAP: EAP entering state SEND_RESPONSE
1243025674.541740: EAP: EAP entering state IDLE
1243025674.541746: EAPOL: SUPP_BE entering state RESPONSE
1243025674.541752: EAPOL: txSuppRsp
1243025674.541759: TX EAPOL: dst=00:0f:24:c6:8c:80
1243025674.541774: TX EAPOL - hexdump(len=15): 02 00 00 0b 02 01 00 0b 01 6d 61 38 35 36 31
1243025674.541807: EAPOL: SUPP_BE entering state RECEIVE
1243025674.548578: RX EAPOL from 00:0f:24:c6:8c:80
1243025674.548619: RX EAPOL - hexdump(len=46): 01 00 00 06 01 02 00 06 15 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1243025674.548629: EAPOL: Received EAP-Packet frame
1243025674.548636: EAPOL: SUPP_BE entering state REQUEST
1243025674.548642: EAPOL: getSuppRsp
1243025674.548648: EAP: EAP entering state RECEIVED
1243025674.548657: EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0
1243025674.548665: EAP: EAP entering state GET_METHOD
1243025674.548672: EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS)
1243025674.548690: EAP-TTLS: Phase2 type: PAP
1243025674.548699: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
1243025674.548707: EAP: EAP entering state METHOD
1243025674.548734: SSL: Received packet(len=6) - Flags 0x20
1243025674.548743: EAP-TTLS: Start (server ver=0, own ver=0)
1243025674.548750: TLS: using phase1 config options
1243025674.549128: TLS: Trusted root certificate(s) loaded
1243025674.549145: EAP-TTLS: Start
1243025674.549190: SSL: (where=0x10 ret=0x1)
1243025674.549257: SSL: (where=0x1001 ret=0x1)
1243025674.549268: SSL: SSL_connect:before/connect initialization
1243025674.549317: SSL: (where=0x1001 ret=0x1)
1243025674.549326: SSL: SSL_connect:SSLv3 write client hello A
1243025674.549340: SSL: (where=0x1002 ret=0xffffffff)
1243025674.549347: SSL: SSL_connect:error in SSLv3 read server hello A
1243025674.549360: SSL: SSL_connect - want more data
1243025674.549367: SSL: 93 bytes pending from ssl_out
1243025674.549378: SSL: 93 bytes left to be sent out (of total 93 bytes)
1243025674.549387: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
1243025674.549396: EAP: EAP entering state SEND_RESPONSE
1243025674.549403: EAP: EAP entering state IDLE
1243025674.549410: EAPOL: SUPP_BE entering state RESPONSE
1243025674.549416: EAPOL: txSuppRsp
1243025674.549422: TX EAPOL: dst=00:0f:24:c6:8c:80
1243025674.549474: TX EAPOL - hexdump(len=103): 02 00 00 63 02 02 00 63 15 00 16 03 01 00 58 01 00 00 54 03 01 4a 17 11 0a 51 04 9d 2a d9 b4 e5 01 ad e1 9f c1 2c a1 c1 45 df d8 f9 88 9e d8 c0 4b c4 51 c7 18 00 00 26 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00
1243025674.549505: EAPOL: SUPP_BE entering state RECEIVE
1243025674.563050: RX EAPOL from 00:0f:24:c6:8c:80
1243025674.563488: RX EAPOL - hexdump(len=1024): 01 00 03 fc 01 03 03 fc 15 c0 00 00 06 bd 16 03 01 00 4a 02 00 00 46 03 01 4a 17 04 4b f0 9b e5 cc d9 83 44 e8 dd a0 93 58 e1 05 a5 fd 5c ca f3 eb 88 a9 4a 8d 12 02 86 ef 20 d9 01 fa e5 10 b4 85 86 3a 27 e1 93 ce 77 2b 76 0b e2 82 7b b7 55 c5 15 66 b8 be 4c a6 84 cc 72 00 16 00 16 03 01 04 c3 0b 00 04 bf 00 04 bc 00 04 b9 30 82 04 b5 30 82 04 1e a0 03 02 01 02 02 10 34 0d 1e 0a 5f 56 63 a2 fb ec 1e e3 26 13 f1 69 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 ba 31 1f 30 1d 06 03 55 04 0a 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 17 30 15 06 03 55 04 0b 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 33 30 31 06 03 55 04 0b 13 2a 56 65 72 69 53 69 67 6e 20 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 20 53 65 72 76 65 72 20 43 41 20 2d 20 43 6c 61 73 73 20 33 31 49 30 47 06 03 55 04 0b 13 40 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 43 50 53 20 49 6e 63 6f 72 70 2e 62 79 20 52 65 66 2e 20 4c 49 41 42 49 4c 49 54 59 20 4c 54 44 2e 28 63 29 39 37 20 56 65 72 69 53 69 67 6e 30 1e 17 0d 30 36 30 36 32 33 30 30 30 30 30 30 5a 17 0d 30 39 30 39 30 38 32 33 35 39 35 39 5a 30 81 c6 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0d 30 0b 06 03 55 04 08 13 04 49 6f 77 61 31 11 30 0f 06 03 55 04 07 14 08 4a 6f 68 6e 73 74 6f 6e 31 2c 30 2a 06 03 55 04 0a 14 23 50 69 6f 6e 65 65 72 20 48 69 2d 42 72 65 64 20 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 2c 20 49 6e 63 2e 31 14 30 12 06 03 55 04 0b 14 0b 54 65 63 68 20 43 65 6e 74 65 72 31 33 30 31 06 03 55 04 0b 14 2a 54 65 72 6d 73 20 6f 66 20 75 73 65 20 61 74 20 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 20 28 63 29 30 35 31 1c 30 1a 06 03 55 04 03 14 13 6f 64 79 73 73 65 79 2e 70 69 6f 6e 65 65 72 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 dd 9f 92 14 eb 05 7b 51 de 93 99 05 26 97 41 00 89 73 07 62 2a a8 15 3b 99 dd 4b 36 77 31 b3 27 13 99 8a 49 03 53 9c 79 62 15 fd 05 2d 4d b8 30 f3 ce 16 33 a0 76 35 d1 46 93 62 5c 8b 45 84 8c 21 75 05 45 cb 39 e4 4f d0 6b 38 a0 18 96 b2 10 a9 0e e8 13 a1 87 db e2 b6 e5 ca b7 58 a5 20 e8 df 8f 04 72 b3 30 39 05 ee 1f c5 80 35 62 0b 2b 31 13 3a dd a5 40 1e ea 57 4d d8 3a c3 16 00 c9 02 03 01 00 01 a3 82 01 ac 30 82 01 a8 30 09 06 03 55 1d 13 04 02 30 00 30 0b 06 03 55 1d 0f 04 04 03 02 05 a0 30 44 06 03 55 1d 20 04 3d 30 3b 30 39 06 0b 60 86 48 01 86 f8 45 01 07 17 03 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 30 3c 06 03 55 1d 1f 04 35 30 33 30 31 a0 2f a0 2d 86 2b 68 74 74 70 3a 2f 2f 53 56 52 49 6e 74 6c 2d 63 72 6c 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 53 56 52 49 6e 74 6c 2e 63 72 6c 30 28 06 03 55 1d 25 04 21 30 1f 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 06 09 60 86 48 01 86 f8 42 04 01 30 71 06 08 2b 06 01 05 05 07 01 01 04 65 30 63 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 30 3b 06 08 2b 06 01 05 05 07 30 02 86 2f 68 74 74 70 3a 2f 2f 53 56 52 49 6e
*** stack smashing detected ***: wpa_supplicant terminated
======= Backtrace: =========
/lib/tls/i686/cmov/libc.so.6(__fortify_fail+0x48)[0xb7d2dda8]
/lib/tls/i686/cmov/libc.so.6(__fortify_fail+0x0)[0xb7d2dd60]
wpa_supplicant[0x80508ad]
[0x30612038]
======= Memory map: ========
08048000-080ad000 r-xp 00000000 08:02 696369     /sbin/wpa_supplicant
080ad000-080ae000 r--p 00064000 08:02 696369     /sbin/wpa_supplicant
080ae000-080af000 rw-p 00065000 08:02 696369     /sbin/wpa_supplicant
09ea1000-09ec2000 rw-p 09ea1000 00:00 0          [heap]
b7bfb000-b7bfc000 rw-p b7bfb000 00:00 0
b7bfc000-b7c10000 r-xp 00000000 08:02 32902      /lib/libz.so.1.2.3.3
b7c10000-b7c11000 r--p 00013000 08:02 32902      /lib/libz.so.1.2.3.3
b7c11000-b7c12000 rw-p 00014000 08:02 32902      /lib/libz.so.1.2.3.3
b7c12000-b7c13000 rw-p b7c12000 00:00 0
b7c13000-b7c15000 r-xp 00000000 08:02 50141      /lib/tls/i686/cmov/Aborted
neomatrixjr at MatrixLaptop:~$


More information about the Cialug mailing list