当前位置: 首页 > news >正文

建设工程招标专业网站传奇网站模板psd

建设工程招标专业网站,传奇网站模板psd,WordPress cosy破解版,上海聚通装修公司地址该篇主要介绍了利用配置ca.cnf、server.cnf、client.cnf在certs路径下生成证书文件#xff08;非执行bootstrap脚本#xff0c;网上也有很多直接通过openssl命令方式生成的文章#xff09;#xff0c;主要参考#xff08;概括中心思想#xff09;官方手册#xff0c;以及…        该篇主要介绍了利用配置ca.cnf、server.cnf、client.cnf在certs路径下生成证书文件非执行bootstrap脚本网上也有很多直接通过openssl命令方式生成的文章主要参考概括中心思想官方手册以及本地证书的认证参考《使用FREERADIUS搭建EAP认证环境 | SVEN (lishiwen4.github.io)》。https://networkradius.com/doc/FreeRADIUS-Implementation-Ch6.pdfhttps://networkradius.com/doc/FreeRADIUS-Implementation-Ch6.pdf对于该手册有点不严谨里面多处笔误主要体现在生成服务器证书和客户端证书时提到的配置文件上具体地方由诸位私下去发现也有点遗漏链接上前面有提到EAP-TLS的例子但是文档最后都未提到。这么多年过去了官方是不是需要重新更新一下各种文档啦~FreeRADIUS 证书创建 删除测试证书文件 # rm -f *.pem *.der *.csr *.crt *.key *.p12 serial* index.txt* 清除干净后也可以将bootstrap脚本文件也删除文档建议我没删。 生成根证书 # gedit certs/ca.cnf 打开该文件并按实际需要比如加密方法、有效期、国家、城市、公司、邮箱等等进行编辑修改我按照文档修改了[certificate_authority]区域的内容input_password和output_password我未动,其他证书该部分均未修改有一点需要注意每一种证书该文件里面的commonName字段内容必须唯一否则可能会报错。 保存好配置后执行如下命令生成目标证书ca.pem. # make ca.pem 对于Windows平台可以make ca.der生成自签名证书。 生成服务器证书 # gedit server.cnf # make server.pem 生成客户端证书 # gedit client.cnf # make client.pem 如果要创建生成多个客户端证书重复以上步骤需要注意的是密码、登录用户名及commonName域需要保持唯一。 证书测试 首次体验 eap-tls.conf文件创建内容如下主要方便eapol_test程序读取应用 network{eapTLSeapol_flags0key_mgmtIEEE8021Xidentitytestingpasswordpasswordca_cert/etc/freeradius/3.0/certs/ca.pemclient_cert/etc/freeradius/3.0/certs/client.pemprivate_key/etc/freeradius/3.0/certs/client.keyprivate_key_passwdwhatever } 测试的用户名是之前配置在users文件中的testing,没用MySQL中的mike,eapol_flags必须置零该文档注释上有说明主要针对有线打开两个终端分别运行如下语句 #freeradius -X #eapol_test -c eap-tls.conf -a 127.0.0.1 -p 1812 -s testing123 -r 1 不幸的是结果返回了Failure,有提示什么“asn1....wrong tag”之类的表面描述直接原因是证书内容不对最后尝试过生成其他格式的证书还是一样的问题最后没招直接用了certs文件夹内bootstrap脚本生成的证书依然没有奇迹。 解决问题 有位网友比较细心且有耐心直接根据报错打印找到wpa_supplicant源码当中去了得出的结论是老版本的wpa_supplicant对证书的某些校验方法不支持解析不完善我当前用的wpa_supplicant版本是0.7.3(编译的openssl版本是0.9.8e),ubuntu20.04里面的openssl版本是1.1.1所以我们下一步就是升级wpa_supplicant(同样也需升级openssl)。 升级wpa_supplicant 主要参考《wpa_supplicant交叉编译_wpa_supplicant-2.8.tar.gz-CSDN博客》此篇文章下面简述下主要步骤桌面版非嵌入式版本。 准备版本wpa_supplicant-2.10.tar.gz openssl-1.1.1w.tar.gz libnl-3.9.0.tar.gz 注意项新版本wpa_supplicant依赖项需要增加libnlnetlink. 下载链接 [ Downloads ] - /source/index.html (openssl.org) --- openssl libnl-3.9.0 (linuxfromscratch.org)                          --- libnl Index of /releases (w1.fi)                                      --- wpa_supplicant 1.创建文件夹 分别创建ssl、nl文件夹用来存放安装编译后的openssl及libnl相关的头文件及库文件方便wpa_supplicant的.config文件引用。 2.1 openssl编译安装 进入openssl源码主目录依次执行如下命令注意安装路径需要写上绝对路径不然会报错。 # ./config --prefix/home/mike/work/wpa_supplicant/2.10/ssl # makemake install 2.2 libnl编译安装 进入libnl源码主目录依次执行如下命令如果提示找不到flex、bison之类的错误可以通过sudo apt-get install flex和sudo apt-get install bison解决。 # ./configure --prefix/home/mike/work/wpa_supplicant/2.10/nl # makemake install 2.3 wpa_supplicant编译安装 进入wpa_supplicant源码主目录依次执行如下命令 # cd wpa_supplicant # cp deconfig .config 打开.config文件作如下修改打开EAPOL_TEST注释让生成eapol_test文件供测试 CFLAGS -I/home/mike/work/wpa_supplicant/2.10/ssl/include LIBS -L//home/mike/work/wpa_supplicant/2.10/ssl/libCFLAGS -I/home/mike/work/wpa_supplicant/2.10/nl/include/libnl3 LIBS -L/home/mike/work/wpa_supplicant/2.10/nl/libexport PKG_CONFIG_PATH/home/mike/work/wpa_supplicant/2.10/nl/lib/pkgconfig:$PKG_CONFIG_PATHCONFIG_EAPOL_TESTy 保存好后直接执行make,但凡事都不会那么顺利这最后一步一般会报dbus相关的错误我的解决方式是注释掉DBUS相关的内容(.config)让dbus不参与编译如下 #CONFIG_CTRL_IFACE_DBUS_NEWy#CONFIG_CTRL_IFACE_DBUS_INTROy 还可参考《https://www.linuxfromscratch.org/blfs/view/svn/basicnet/wpa_supplicant.html》这篇打补丁解决如果实际需要IFACE_DBUS相关功能的话。 执行完make后wpa_supplicant、wpa_passphrase、wpa_cli均有生成但是没有eapol_test只有个eapol_test.py,单独通过如下命令生成eapol_test执行文件 # make eapol_test 至此升级工作完成。 再次测试 将之前创建的eap-tls.conf文件复制到新的wpa_supplicant路径下开启俩终端分别执行 # freeradius -X # eapol_test -c eap-tls.conf -a 127.0.0.1 -p 1812 -s testing123 -r 1 测试用的证书是bootstrap脚本生成 freeradius端部分输出如下 (1) EAP-Message 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 (1) Message-Authenticator 0x00000000000000000000000000000000 (1) State 0x6c230b426d9606dd3f72ef77da978e44 (1) Finished request Waking up in 4.9 seconds. (2) Received Access-Request Id 2 from 127.0.0.1:37016 to 127.0.0.1:1812 length 140 (2) User-Name testing (2) NAS-IP-Address 127.0.0.1 (2) Calling-Station-Id 02-00-00-00-00-01 (2) Framed-MTU 1400 (2) NAS-Port-Type Wireless-802.11 (2) Service-Type Framed-User (2) Connect-Info CONNECT 11Mbps 802.11b (2) EAP-Message 0x02b500060d00 (2) State 0x6c230b426d9606dd3f72ef77da978e44 (2) Message-Authenticator 0xb59edee3915c6dc7cc64ec2d9d00e109 (2) session-state: No cached attributes (2) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (2) authorize { (2) policy filter_username { (2) if (User-Name) { (2) if (User-Name) - TRUE (2) if (User-Name) { (2) if (User-Name ~ / /) { (2) if (User-Name ~ / /) - FALSE (2) if (User-Name ~ /[^]*/ ) { (2) if (User-Name ~ /[^]*/ ) - FALSE (2) if (User-Name ~ /\.\./ ) { (2) if (User-Name ~ /\.\./ ) - FALSE (2) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (2) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (2) if (User-Name ~ /\.$/) { (2) if (User-Name ~ /\.$/) - FALSE (2) if (User-Name ~ /\./) { (2) if (User-Name ~ /\./) - FALSE (2) } # if (User-Name) notfound (2) } # policy filter_username notfound (2) [preprocess] ok (2) [chap] noop (2) [mschap] noop (2) [digest] noop (2) suffix: Checking for suffix after (2) suffix: No in User-Name testing, looking up realm NULL (2) suffix: No such realm NULL (2) [suffix] noop (2) eap: Peer sent EAP Response (code 2) ID 181 length 6 (2) eap: No EAP Start, assuming its an on-going EAP conversation (2) [eap] updated (2) files: users: Matched entry testing at line 87 (2) [files] ok (2) [expiration] noop (2) [logintime] noop (2) pap: WARNING: Auth-Type already set. Not setting to PAP (2) [pap] noop (2) } # authorize updated (2) Found Auth-Type eap (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) authenticate { (2) eap: Expiring EAP session with state 0x6c230b426d9606dd (2) eap: Finished EAP session with state 0x6c230b426d9606dd (2) eap: Previous EAP request found for state 0x6c230b426d9606dd, released from the list (2) eap: Peer sent packet with method EAP TLS (13) (2) eap: Calling submodule eap_tls to process data (2) eap_tls: Continuing EAP-TLS (2) eap_tls: Peer ACKed our handshake fragment (2) eap_tls: [eaptls verify] request (2) eap_tls: [eaptls process] handled (2) eap: Sending EAP Request (code 1) ID 182 length 1004 (2) eap: EAP session adding reply:State 0x6c230b426e9506dd (2) [eap] handled (2) } # authenticate handled (2) Using Post-Auth-Type Challenge (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) Challenge { ... } # empty sub-section is ignored (2) Sent Access-Challenge Id 2 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (2) EAP-Message 0x01b603ec0dc000000b5cd38235a4811c3f2e4cc129e388ad6f6c6237386b5f4d7ecc8d193c2465dfe051194474b53e1ac364e4b8fdcb527d6de8ca809cbfd5eb53a47785e62eaa3f7bafbeff699f9e631a78efbd38d6270004fe308204fa308203e2a00302010202144a1dec91e0857d76d65f37d6ddaab4191176ebcb300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479301e170d3234303232313032353532355a170d3234303432313032353532355a308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d657768657265 (2) Message-Authenticator 0x00000000000000000000000000000000 (2) State 0x6c230b426e9506dd3f72ef77da978e44 (2) Finished request Waking up in 4.9 seconds. (3) Received Access-Request Id 3 from 127.0.0.1:37016 to 127.0.0.1:1812 length 140 (3) User-Name testing (3) NAS-IP-Address 127.0.0.1 (3) Calling-Station-Id 02-00-00-00-00-01 (3) Framed-MTU 1400 (3) NAS-Port-Type Wireless-802.11 (3) Service-Type Framed-User (3) Connect-Info CONNECT 11Mbps 802.11b (3) EAP-Message 0x02b600060d00 (3) State 0x6c230b426e9506dd3f72ef77da978e44 (3) Message-Authenticator 0xc5f5d8ac30024f696a340a2a89a1c0cb (3) session-state: No cached attributes (3) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (3) authorize { (3) policy filter_username { (3) if (User-Name) { (3) if (User-Name) - TRUE (3) if (User-Name) { (3) if (User-Name ~ / /) { (3) if (User-Name ~ / /) - FALSE (3) if (User-Name ~ /[^]*/ ) { (3) if (User-Name ~ /[^]*/ ) - FALSE (3) if (User-Name ~ /\.\./ ) { (3) if (User-Name ~ /\.\./ ) - FALSE (3) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (3) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (3) if (User-Name ~ /\.$/) { (3) if (User-Name ~ /\.$/) - FALSE (3) if (User-Name ~ /\./) { (3) if (User-Name ~ /\./) - FALSE (3) } # if (User-Name) notfound (3) } # policy filter_username notfound (3) [preprocess] ok (3) [chap] noop (3) [mschap] noop (3) [digest] noop (3) suffix: Checking for suffix after (3) suffix: No in User-Name testing, looking up realm NULL (3) suffix: No such realm NULL (3) [suffix] noop (3) eap: Peer sent EAP Response (code 2) ID 182 length 6 (3) eap: No EAP Start, assuming its an on-going EAP conversation (3) [eap] updated (3) files: users: Matched entry testing at line 87 (3) [files] ok (3) [expiration] noop (3) [logintime] noop (3) pap: WARNING: Auth-Type already set. Not setting to PAP (3) [pap] noop (3) } # authorize updated (3) Found Auth-Type eap (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) authenticate { (3) eap: Expiring EAP session with state 0x6c230b426e9506dd (3) eap: Finished EAP session with state 0x6c230b426e9506dd (3) eap: Previous EAP request found for state 0x6c230b426e9506dd, released from the list (3) eap: Peer sent packet with method EAP TLS (13) (3) eap: Calling submodule eap_tls to process data (3) eap_tls: Continuing EAP-TLS (3) eap_tls: Peer ACKed our handshake fragment (3) eap_tls: [eaptls verify] request (3) eap_tls: [eaptls process] handled (3) eap: Sending EAP Request (code 1) ID 183 length 930 (3) eap: EAP session adding reply:State 0x6c230b426f9406dd (3) [eap] handled (3) } # authenticate handled (3) Using Post-Auth-Type Challenge (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) Challenge { ... } # empty sub-section is ignored (3) Sent Access-Challenge Id 3 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (3) EAP-Message 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 (3) Message-Authenticator 0x00000000000000000000000000000000 (3) State 0x6c230b426f9406dd3f72ef77da978e44 (3) Finished request Waking up in 4.9 seconds. (4) Received Access-Request Id 4 from 127.0.0.1:37016 to 127.0.0.1:1812 length 1552 (4) User-Name testing (4) NAS-IP-Address 127.0.0.1 (4) Calling-Station-Id 02-00-00-00-00-01 (4) Framed-MTU 1400 (4) NAS-Port-Type Wireless-802.11 (4) Service-Type Framed-User (4) Connect-Info CONNECT 11Mbps 802.11b (4) EAP-Message 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 (4) State 0x6c230b426f9406dd3f72ef77da978e44 (4) Message-Authenticator 0x8228db5cf9000b6b8ed9b81d4a63193b (4) session-state: No cached attributes (4) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (4) authorize { (4) policy filter_username { (4) if (User-Name) { (4) if (User-Name) - TRUE (4) if (User-Name) { (4) if (User-Name ~ / /) { (4) if (User-Name ~ / /) - FALSE (4) if (User-Name ~ /[^]*/ ) { (4) if (User-Name ~ /[^]*/ ) - FALSE (4) if (User-Name ~ /\.\./ ) { (4) if (User-Name ~ /\.\./ ) - FALSE (4) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (4) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (4) if (User-Name ~ /\.$/) { (4) if (User-Name ~ /\.$/) - FALSE (4) if (User-Name ~ /\./) { (4) if (User-Name ~ /\./) - FALSE (4) } # if (User-Name) notfound (4) } # policy filter_username notfound (4) [preprocess] ok (4) [chap] noop (4) [mschap] noop (4) [digest] noop (4) suffix: Checking for suffix after (4) suffix: No in User-Name testing, looking up realm NULL (4) suffix: No such realm NULL (4) [suffix] noop (4) eap: Peer sent EAP Response (code 2) ID 183 length 1408 (4) eap: No EAP Start, assuming its an on-going EAP conversation (4) [eap] updated (4) files: users: Matched entry testing at line 87 (4) [files] ok (4) [expiration] noop (4) [logintime] noop (4) pap: WARNING: Auth-Type already set. Not setting to PAP (4) [pap] noop (4) } # authorize updated (4) Found Auth-Type eap (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) authenticate { (4) eap: Expiring EAP session with state 0x6c230b426f9406dd (4) eap: Finished EAP session with state 0x6c230b426f9406dd (4) eap: Previous EAP request found for state 0x6c230b426f9406dd, released from the list (4) eap: Peer sent packet with method EAP TLS (13) (4) eap: Calling submodule eap_tls to process data (4) eap_tls: Continuing EAP-TLS (4) eap_tls: Peer indicated complete TLS record size will be 2670 bytes (4) eap_tls: Expecting 2 TLS record fragments (4) eap_tls: Got first TLS record fragment (1398 bytes). Peer indicated more fragments to follow (4) eap_tls: [eaptls verify] first fragment (4) eap_tls: ACKing Peers TLS record fragment (4) eap_tls: [eaptls process] handled (4) eap: Sending EAP Request (code 1) ID 184 length 6 (4) eap: EAP session adding reply:State 0x6c230b42689b06dd (4) [eap] handled (4) } # authenticate handled (4) Using Post-Auth-Type Challenge (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) Challenge { ... } # empty sub-section is ignored (4) Sent Access-Challenge Id 4 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (4) EAP-Message 0x01b800060d00 (4) Message-Authenticator 0x00000000000000000000000000000000 (4) State 0x6c230b42689b06dd3f72ef77da978e44 (4) Finished request Waking up in 4.9 seconds. (5) Received Access-Request Id 5 from 127.0.0.1:37016 to 127.0.0.1:1812 length 1422 (5) User-Name testing (5) NAS-IP-Address 127.0.0.1 (5) Calling-Station-Id 02-00-00-00-00-01 (5) Framed-MTU 1400 (5) NAS-Port-Type Wireless-802.11 (5) Service-Type Framed-User (5) Connect-Info CONNECT 11Mbps 802.11b (5) EAP-Message 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 (5) State 0x6c230b42689b06dd3f72ef77da978e44 (5) Message-Authenticator 0x9e2711b54704816bd91181531d40d2ae (5) session-state: No cached attributes (5) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (5) authorize { (5) policy filter_username { (5) if (User-Name) { (5) if (User-Name) - TRUE (5) if (User-Name) { (5) if (User-Name ~ / /) { (5) if (User-Name ~ / /) - FALSE (5) if (User-Name ~ /[^]*/ ) { (5) if (User-Name ~ /[^]*/ ) - FALSE (5) if (User-Name ~ /\.\./ ) { (5) if (User-Name ~ /\.\./ ) - FALSE (5) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (5) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (5) if (User-Name ~ /\.$/) { (5) if (User-Name ~ /\.$/) - FALSE (5) if (User-Name ~ /\./) { (5) if (User-Name ~ /\./) - FALSE (5) } # if (User-Name) notfound (5) } # policy filter_username notfound (5) [preprocess] ok (5) [chap] noop (5) [mschap] noop (5) [digest] noop (5) suffix: Checking for suffix after (5) suffix: No in User-Name testing, looking up realm NULL (5) suffix: No such realm NULL (5) [suffix] noop (5) eap: Peer sent EAP Response (code 2) ID 184 length 1278 (5) eap: No EAP Start, assuming its an on-going EAP conversation (5) [eap] updated (5) files: users: Matched entry testing at line 87 (5) [files] ok (5) [expiration] noop (5) [logintime] noop (5) pap: WARNING: Auth-Type already set. Not setting to PAP (5) [pap] noop (5) } # authorize updated (5) Found Auth-Type eap (5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (5) authenticate { (5) eap: Expiring EAP session with state 0x6c230b42689b06dd (5) eap: Finished EAP session with state 0x6c230b42689b06dd (5) eap: Previous EAP request found for state 0x6c230b42689b06dd, released from the list (5) eap: Peer sent packet with method EAP TLS (13) (5) eap: Calling submodule eap_tls to process data (5) eap_tls: Continuing EAP-TLS (5) eap_tls: Got final TLS record fragment (1272 bytes) (5) eap_tls: [eaptls verify] ok (5) eap_tls: Done initial handshake (5) eap_tls: TLS_accept: SSLv3/TLS write server done (5) eap_tls: recv TLS 1.2 [length 08de] (5) eap_tls: TLS - Creating attributes from certificate OIDs (5) eap_tls: TLS-Cert-Serial : 4a1dec91e0857d76d65f37d6ddaab4191176ebcb (5) eap_tls: TLS-Cert-Expiration : 240421025525Z (5) eap_tls: TLS-Cert-Subject : /CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority (5) eap_tls: TLS-Cert-Issuer : /CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority (5) eap_tls: TLS-Cert-Common-Name : Example Certificate Authority (5) eap_tls: TLS - Creating attributes from certificate OIDs (5) eap_tls: TLS-Client-Cert-Serial : 02 (5) eap_tls: TLS-Client-Cert-Expiration : 240421025525Z (5) eap_tls: TLS-Client-Cert-Subject : /CFR/STRadius/OExample Inc./CNuserexample.org/emailAddressuserexample.org (5) eap_tls: TLS-Client-Cert-Issuer : /CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority (5) eap_tls: TLS-Client-Cert-Common-Name : userexample.org (5) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage TLS Web Client Authentication (5) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage-OID 1.3.6.1.5.5.7.3.2 (5) eap_tls: TLS_accept: SSLv3/TLS read client certificate (5) eap_tls: recv TLS 1.2 [length 0046] (5) eap_tls: TLS_accept: SSLv3/TLS read client key exchange (5) eap_tls: recv TLS 1.2 [length 0108] (5) eap_tls: TLS_accept: SSLv3/TLS read certificate verify (5) eap_tls: TLS_accept: SSLv3/TLS read change cipher spec (5) eap_tls: recv TLS 1.2 [length 0010] (5) eap_tls: TLS_accept: SSLv3/TLS read finished (5) eap_tls: send TLS 1.2 [length 0001] (5) eap_tls: TLS_accept: SSLv3/TLS write change cipher spec (5) eap_tls: send TLS 1.2 [length 0010] (5) eap_tls: TLS_accept: SSLv3/TLS write finished (5) eap_tls: (other): SSL negotiation finished successfully (5) eap_tls: TLS - Connection Established (5) eap_tls: TLS-Session-Cipher-Suite ECDHE-RSA-AES256-GCM-SHA384 (5) eap_tls: TLS-Session-Version TLS 1.2 (5) eap_tls: TLS - got 51 bytes of data (5) eap_tls: [eaptls process] handled (5) eap: Sending EAP Request (code 1) ID 185 length 61 (5) eap: EAP session adding reply:State 0x6c230b42699a06dd (5) [eap] handled (5) } # authenticate handled (5) Using Post-Auth-Type Challenge (5) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (5) Challenge { ... } # empty sub-section is ignored (5) session-state: Saving cached attributes (5) TLS-Session-Cipher-Suite ECDHE-RSA-AES256-GCM-SHA384 (5) TLS-Session-Version TLS 1.2 (5) Sent Access-Challenge Id 5 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (5) EAP-Message 0x01b9003d0d80000000331403030001011603030028dc53bb3b9e6835a8a8c0d2fbd020917f5be216dd2e27079dbcfa8fb4ed08494bfd8bd80050b4c025 (5) Message-Authenticator 0x00000000000000000000000000000000 (5) State 0x6c230b42699a06dd3f72ef77da978e44 (5) Finished request Waking up in 4.9 seconds. (6) Received Access-Request Id 6 from 127.0.0.1:37016 to 127.0.0.1:1812 length 140 (6) User-Name testing (6) NAS-IP-Address 127.0.0.1 (6) Calling-Station-Id 02-00-00-00-00-01 (6) Framed-MTU 1400 (6) NAS-Port-Type Wireless-802.11 (6) Service-Type Framed-User (6) Connect-Info CONNECT 11Mbps 802.11b (6) EAP-Message 0x02b900060d00 (6) State 0x6c230b42699a06dd3f72ef77da978e44 (6) Message-Authenticator 0xd60ee5f5d4e73503749e17011d6c7964 (6) Restoring session-state (6) session-state:TLS-Session-Cipher-Suite ECDHE-RSA-AES256-GCM-SHA384 (6) session-state:TLS-Session-Version TLS 1.2 (6) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (6) authorize { (6) policy filter_username { (6) if (User-Name) { (6) if (User-Name) - TRUE (6) if (User-Name) { (6) if (User-Name ~ / /) { (6) if (User-Name ~ / /) - FALSE (6) if (User-Name ~ /[^]*/ ) { (6) if (User-Name ~ /[^]*/ ) - FALSE (6) if (User-Name ~ /\.\./ ) { (6) if (User-Name ~ /\.\./ ) - FALSE (6) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (6) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (6) if (User-Name ~ /\.$/) { (6) if (User-Name ~ /\.$/) - FALSE (6) if (User-Name ~ /\./) { (6) if (User-Name ~ /\./) - FALSE (6) } # if (User-Name) notfound (6) } # policy filter_username notfound (6) [preprocess] ok (6) [chap] noop (6) [mschap] noop (6) [digest] noop (6) suffix: Checking for suffix after (6) suffix: No in User-Name testing, looking up realm NULL (6) suffix: No such realm NULL (6) [suffix] noop (6) eap: Peer sent EAP Response (code 2) ID 185 length 6 (6) eap: No EAP Start, assuming its an on-going EAP conversation (6) [eap] updated (6) files: users: Matched entry testing at line 87 (6) [files] ok (6) [expiration] noop (6) [logintime] noop (6) pap: WARNING: Auth-Type already set. Not setting to PAP (6) [pap] noop (6) } # authorize updated (6) Found Auth-Type eap (6) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (6) authenticate { (6) eap: Expiring EAP session with state 0x6c230b42699a06dd (6) eap: Finished EAP session with state 0x6c230b42699a06dd (6) eap: Previous EAP request found for state 0x6c230b42699a06dd, released from the list (6) eap: Peer sent packet with method EAP TLS (13) (6) eap: Calling submodule eap_tls to process data (6) eap_tls: Continuing EAP-TLS (6) eap_tls: Peer ACKed our handshake fragment. handshake is finished (6) eap_tls: [eaptls verify] success (6) eap_tls: [eaptls process] success (6) eap: Sending EAP Success (code 3) ID 185 length 4 (6) eap: Freeing handler (6) [eap] ok (6) } # authenticate ok (6) # Executing section post-auth from file /etc/freeradius/3.0/sites-enabled/default (6) post-auth { (6) if (session-state:User-Name reply:User-Name request:User-Name (reply:User-Name request:User-Name)) { (6) if (session-state:User-Name reply:User-Name request:User-Name (reply:User-Name request:User-Name)) - FALSE (6) update { (6) reply::TLS-Session-Cipher-Suite session-state:TLS-Session-Cipher-Suite[*] - ECDHE-RSA-AES256-GCM-SHA384 (6) reply::TLS-Session-Version session-state:TLS-Session-Version[*] - TLS 1.2 (6) } # update noop (6) [exec] noop (6) policy remove_reply_message_if_eap { (6) if (reply:EAP-Message reply:Reply-Message) { (6) if (reply:EAP-Message reply:Reply-Message) - FALSE (6) else { (6) [noop] noop (6) } # else noop (6) } # policy remove_reply_message_if_eap noop (6) } # post-auth noop (6) Sent Access-Accept Id 6 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (6) MS-MPPE-Recv-Key 0xd27cad7f33ed9c410cc93eca5a5446ca011de90bd79a519d1ce1e48be7f843da (6) MS-MPPE-Send-Key 0x60876a7943b0c5ea972e79747049c2033c1f557f0b5e68d1897f4ab3b2fccd10 (6) EAP-Message 0x03b90004 (6) Message-Authenticator 0x00000000000000000000000000000000 (6) User-Name testing (6) Finished request Waking up in 4.9 seconds. (7) Received Access-Request Id 7 from 127.0.0.1:37016 to 127.0.0.1:1812 length 128 (7) User-Name testing (7) NAS-IP-Address 127.0.0.1 (7) Calling-Station-Id 02-00-00-00-00-01 (7) Framed-MTU 1400 (7) NAS-Port-Type Wireless-802.11 (7) Service-Type Framed-User (7) Connect-Info CONNECT 11Mbps 802.11b (7) EAP-Message 0x02ab000c0174657374696e67 (7) Message-Authenticator 0x0a71043021b8182be018447a91ae3247 (7) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (7) authorize { (7) policy filter_username { (7) if (User-Name) { (7) if (User-Name) - TRUE (7) if (User-Name) { (7) if (User-Name ~ / /) { (7) if (User-Name ~ / /) - FALSE (7) if (User-Name ~ /[^]*/ ) { (7) if (User-Name ~ /[^]*/ ) - FALSE (7) if (User-Name ~ /\.\./ ) { (7) if (User-Name ~ /\.\./ ) - FALSE (7) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (7) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (7) if (User-Name ~ /\.$/) { (7) if (User-Name ~ /\.$/) - FALSE (7) if (User-Name ~ /\./) { (7) if (User-Name ~ /\./) - FALSE (7) } # if (User-Name) notfound (7) } # policy filter_username notfound (7) [preprocess] ok (7) [chap] noop (7) [mschap] noop (7) [digest] noop (7) suffix: Checking for suffix after (7) suffix: No in User-Name testing, looking up realm NULL (7) suffix: No such realm NULL (7) [suffix] noop (7) eap: Peer sent EAP Response (code 2) ID 171 length 12 (7) eap: EAP-Identity reply, returning ok so we can short-circuit the rest of authorize (7) [eap] ok (7) } # authorize ok (7) Found Auth-Type eap (7) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (7) authenticate { (7) eap: Peer sent packet with method EAP Identity (1) (7) eap: Calling submodule eap_tls to process data (7) eap_tls: Initiating new TLS session (7) eap_tls: Setting verify mode to require certificate from client (7) eap_tls: [eaptls start] request (7) eap: Sending EAP Request (code 1) ID 172 length 6 (7) eap: EAP session adding reply:State 0xfb1c2c65fbb0217d (7) [eap] handled (7) } # authenticate handled (7) Using Post-Auth-Type Challenge (7) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (7) Challenge { ... } # empty sub-section is ignored (7) Sent Access-Challenge Id 7 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (7) EAP-Message 0x01ac00060d20 (7) Message-Authenticator 0x00000000000000000000000000000000 (7) State 0xfb1c2c65fbb0217da229744af77aa30f (7) Finished request Waking up in 4.8 seconds. (8) Received Access-Request Id 8 from 127.0.0.1:37016 to 127.0.0.1:1812 length 324 (8) User-Name testing (8) NAS-IP-Address 127.0.0.1 (8) Calling-Station-Id 02-00-00-00-00-01 (8) Framed-MTU 1400 (8) NAS-Port-Type Wireless-802.11 (8) Service-Type Framed-User (8) Connect-Info CONNECT 11Mbps 802.11b (8) EAP-Message 0x02ac00be0d0016030100b3010000af03039dafb8191c05970d0fc3a0a66a19b33e516cbd830a9cf0d7df324390c3af4a30000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 (8) State 0xfb1c2c65fbb0217da229744af77aa30f (8) Message-Authenticator 0xd9bf7e70fd9068540f30a0b63f123be0 (8) session-state: No cached attributes (8) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (8) authorize { (8) policy filter_username { (8) if (User-Name) { (8) if (User-Name) - TRUE (8) if (User-Name) { (8) if (User-Name ~ / /) { (8) if (User-Name ~ / /) - FALSE (8) if (User-Name ~ /[^]*/ ) { (8) if (User-Name ~ /[^]*/ ) - FALSE (8) if (User-Name ~ /\.\./ ) { (8) if (User-Name ~ /\.\./ ) - FALSE (8) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (8) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (8) if (User-Name ~ /\.$/) { (8) if (User-Name ~ /\.$/) - FALSE (8) if (User-Name ~ /\./) { (8) if (User-Name ~ /\./) - FALSE (8) } # if (User-Name) notfound (8) } # policy filter_username notfound (8) [preprocess] ok (8) [chap] noop (8) [mschap] noop (8) [digest] noop (8) suffix: Checking for suffix after (8) suffix: No in User-Name testing, looking up realm NULL (8) suffix: No such realm NULL (8) [suffix] noop (8) eap: Peer sent EAP Response (code 2) ID 172 length 190 (8) eap: No EAP Start, assuming its an on-going EAP conversation (8) [eap] updated (8) files: users: Matched entry testing at line 87 (8) [files] ok (8) [expiration] noop (8) [logintime] noop (8) pap: WARNING: Auth-Type already set. Not setting to PAP (8) [pap] noop (8) } # authorize updated (8) Found Auth-Type eap (8) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (8) authenticate { (8) eap: Expiring EAP session with state 0xfb1c2c65fbb0217d (8) eap: Finished EAP session with state 0xfb1c2c65fbb0217d (8) eap: Previous EAP request found for state 0xfb1c2c65fbb0217d, released from the list (8) eap: Peer sent packet with method EAP TLS (13) (8) eap: Calling submodule eap_tls to process data (8) eap_tls: Continuing EAP-TLS (8) eap_tls: Got final TLS record fragment (184 bytes) (8) eap_tls: WARNING: Total received TLS record fragments (184 bytes), does not equal indicated TLS record length (0 bytes) (8) eap_tls: [eaptls verify] ok (8) eap_tls: Done initial handshake (8) eap_tls: (other): before SSL initialization (8) eap_tls: TLS_accept: before SSL initialization (8) eap_tls: TLS_accept: before SSL initialization (8) eap_tls: recv TLS 1.3 [length 00b3] (8) eap_tls: TLS_accept: SSLv3/TLS read client hello (8) eap_tls: send TLS 1.2 [length 003d] (8) eap_tls: TLS_accept: SSLv3/TLS write server hello (8) eap_tls: send TLS 1.2 [length 08e9] (8) eap_tls: TLS_accept: SSLv3/TLS write certificate (8) eap_tls: send TLS 1.2 [length 014d] (8) eap_tls: TLS_accept: SSLv3/TLS write key exchange (8) eap_tls: send TLS 1.2 [length 00cc] (8) eap_tls: TLS_accept: SSLv3/TLS write certificate request (8) eap_tls: send TLS 1.2 [length 0004] (8) eap_tls: TLS_accept: SSLv3/TLS write server done (8) eap_tls: TLS_accept: Need to read more data: SSLv3/TLS write server done (8) eap_tls: TLS - In Handshake Phase (8) eap_tls: TLS - got 2908 bytes of data (8) eap_tls: [eaptls process] handled (8) eap: Sending EAP Request (code 1) ID 173 length 1004 (8) eap: EAP session adding reply:State 0xfb1c2c65fab1217d (8) [eap] handled (8) } # authenticate handled (8) Using Post-Auth-Type Challenge (8) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (8) Challenge { ... } # empty sub-section is ignored (8) Sent Access-Challenge Id 8 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (8) EAP-Message 0x01ad03ec0dc000000b5c160303003d0200003903034292638f3837c75352d28e65b5fe48f830b19c085747f176374c9014f0c9f31e00c030000011ff01000100000b0004030001020017000016030308e90b0008e50008e20003de308203da308202c2a003020102020101300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f72697479301e170d3234303232313032353532355a170d3234303432313032353532355a307c310b3009060355040613024652310f300d06035504080c0652616469757331153013060355040a0c0c4578616d706c6520496e632e3123302106035504030c1a4578616d70 (8) Message-Authenticator 0x00000000000000000000000000000000 (8) State 0xfb1c2c65fab1217da229744af77aa30f (8) Finished request Waking up in 4.8 seconds. (9) Received Access-Request Id 9 from 127.0.0.1:37016 to 127.0.0.1:1812 length 140 (9) User-Name testing (9) NAS-IP-Address 127.0.0.1 (9) Calling-Station-Id 02-00-00-00-00-01 (9) Framed-MTU 1400 (9) NAS-Port-Type Wireless-802.11 (9) Service-Type Framed-User (9) Connect-Info CONNECT 11Mbps 802.11b (9) EAP-Message 0x02ad00060d00 (9) State 0xfb1c2c65fab1217da229744af77aa30f (9) Message-Authenticator 0xa01251081874341f20265ae787acbd1e (9) session-state: No cached attributes (9) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (9) authorize { (9) policy filter_username { (9) if (User-Name) { (9) if (User-Name) - TRUE (9) if (User-Name) { (9) if (User-Name ~ / /) { (9) if (User-Name ~ / /) - FALSE (9) if (User-Name ~ /[^]*/ ) { (9) if (User-Name ~ /[^]*/ ) - FALSE (9) if (User-Name ~ /\.\./ ) { (9) if (User-Name ~ /\.\./ ) - FALSE (9) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (9) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (9) if (User-Name ~ /\.$/) { (9) if (User-Name ~ /\.$/) - FALSE (9) if (User-Name ~ /\./) { (9) if (User-Name ~ /\./) - FALSE (9) } # if (User-Name) notfound (9) } # policy filter_username notfound (9) [preprocess] ok (9) [chap] noop (9) [mschap] noop (9) [digest] noop (9) suffix: Checking for suffix after (9) suffix: No in User-Name testing, looking up realm NULL (9) suffix: No such realm NULL (9) [suffix] noop (9) eap: Peer sent EAP Response (code 2) ID 173 length 6 (9) eap: No EAP Start, assuming its an on-going EAP conversation (9) [eap] updated (9) files: users: Matched entry testing at line 87 (9) [files] ok (9) [expiration] noop (9) [logintime] noop (9) pap: WARNING: Auth-Type already set. Not setting to PAP (9) [pap] noop (9) } # authorize updated (9) Found Auth-Type eap (9) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (9) authenticate { (9) eap: Expiring EAP session with state 0xfb1c2c65fab1217d (9) eap: Finished EAP session with state 0xfb1c2c65fab1217d (9) eap: Previous EAP request found for state 0xfb1c2c65fab1217d, released from the list (9) eap: Peer sent packet with method EAP TLS (13) (9) eap: Calling submodule eap_tls to process data (9) eap_tls: Continuing EAP-TLS (9) eap_tls: Peer ACKed our handshake fragment (9) eap_tls: [eaptls verify] request (9) eap_tls: [eaptls process] handled (9) eap: Sending EAP Request (code 1) ID 174 length 1004 (9) eap: EAP session adding reply:State 0xfb1c2c65f9b2217d (9) [eap] handled (9) } # authenticate handled (9) Using Post-Auth-Type Challenge (9) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (9) Challenge { ... } # empty sub-section is ignored (9) Sent Access-Challenge Id 9 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (9) EAP-Message 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 (9) Message-Authenticator 0x00000000000000000000000000000000 (9) State 0xfb1c2c65f9b2217da229744af77aa30f (9) Finished request Waking up in 4.8 seconds. (10) Received Access-Request Id 10 from 127.0.0.1:37016 to 127.0.0.1:1812 length 140 (10) User-Name testing (10) NAS-IP-Address 127.0.0.1 (10) Calling-Station-Id 02-00-00-00-00-01 (10) Framed-MTU 1400 (10) NAS-Port-Type Wireless-802.11 (10) Service-Type Framed-User (10) Connect-Info CONNECT 11Mbps 802.11b (10) EAP-Message 0x02ae00060d00 (10) State 0xfb1c2c65f9b2217da229744af77aa30f (10) Message-Authenticator 0x1c2532f478e413662af2678f7059a2fd (10) session-state: No cached attributes (10) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (10) authorize { (10) policy filter_username { (10) if (User-Name) { (10) if (User-Name) - TRUE (10) if (User-Name) { (10) if (User-Name ~ / /) { (10) if (User-Name ~ / /) - FALSE (10) if (User-Name ~ /[^]*/ ) { (10) if (User-Name ~ /[^]*/ ) - FALSE (10) if (User-Name ~ /\.\./ ) { (10) if (User-Name ~ /\.\./ ) - FALSE (10) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (10) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (10) if (User-Name ~ /\.$/) { (10) if (User-Name ~ /\.$/) - FALSE (10) if (User-Name ~ /\./) { (10) if (User-Name ~ /\./) - FALSE (10) } # if (User-Name) notfound (10) } # policy filter_username notfound (10) [preprocess] ok (10) [chap] noop (10) [mschap] noop (10) [digest] noop (10) suffix: Checking for suffix after (10) suffix: No in User-Name testing, looking up realm NULL (10) suffix: No such realm NULL (10) [suffix] noop (10) eap: Peer sent EAP Response (code 2) ID 174 length 6 (10) eap: No EAP Start, assuming its an on-going EAP conversation (10) [eap] updated (10) files: users: Matched entry testing at line 87 (10) [files] ok (10) [expiration] noop (10) [logintime] noop (10) pap: WARNING: Auth-Type already set. Not setting to PAP (10) [pap] noop (10) } # authorize updated (10) Found Auth-Type eap (10) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (10) authenticate { (10) eap: Expiring EAP session with state 0xfb1c2c65f9b2217d (10) eap: Finished EAP session with state 0xfb1c2c65f9b2217d (10) eap: Previous EAP request found for state 0xfb1c2c65f9b2217d, released from the list (10) eap: Peer sent packet with method EAP TLS (13) (10) eap: Calling submodule eap_tls to process data (10) eap_tls: Continuing EAP-TLS (10) eap_tls: Peer ACKed our handshake fragment (10) eap_tls: [eaptls verify] request (10) eap_tls: [eaptls process] handled (10) eap: Sending EAP Request (code 1) ID 175 length 930 (10) eap: EAP session adding reply:State 0xfb1c2c65f8b3217d (10) [eap] handled (10) } # authenticate handled (10) Using Post-Auth-Type Challenge (10) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (10) Challenge { ... } # empty sub-section is ignored (10) Sent Access-Challenge Id 10 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (10) EAP-Message 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 (10) Message-Authenticator 0x00000000000000000000000000000000 (10) State 0xfb1c2c65f8b3217da229744af77aa30f (10) Finished request Waking up in 4.8 seconds. (11) Received Access-Request Id 11 from 127.0.0.1:37016 to 127.0.0.1:1812 length 1552 (11) User-Name testing (11) NAS-IP-Address 127.0.0.1 (11) Calling-Station-Id 02-00-00-00-00-01 (11) Framed-MTU 1400 (11) NAS-Port-Type Wireless-802.11 (11) Service-Type Framed-User (11) Connect-Info CONNECT 11Mbps 802.11b (11) EAP-Message 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 (11) State 0xfb1c2c65f8b3217da229744af77aa30f (11) Message-Authenticator 0x1fd16a3aa49b0dc01535f283156a1807 (11) session-state: No cached attributes (11) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (11) authorize { (11) policy filter_username { (11) if (User-Name) { (11) if (User-Name) - TRUE (11) if (User-Name) { (11) if (User-Name ~ / /) { (11) if (User-Name ~ / /) - FALSE (11) if (User-Name ~ /[^]*/ ) { (11) if (User-Name ~ /[^]*/ ) - FALSE (11) if (User-Name ~ /\.\./ ) { (11) if (User-Name ~ /\.\./ ) - FALSE (11) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (11) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (11) if (User-Name ~ /\.$/) { (11) if (User-Name ~ /\.$/) - FALSE (11) if (User-Name ~ /\./) { (11) if (User-Name ~ /\./) - FALSE (11) } # if (User-Name) notfound (11) } # policy filter_username notfound (11) [preprocess] ok (11) [chap] noop (11) [mschap] noop (11) [digest] noop (11) suffix: Checking for suffix after (11) suffix: No in User-Name testing, looking up realm NULL (11) suffix: No such realm NULL (11) [suffix] noop (11) eap: Peer sent EAP Response (code 2) ID 175 length 1408 (11) eap: No EAP Start, assuming its an on-going EAP conversation (11) [eap] updated (11) files: users: Matched entry testing at line 87 (11) [files] ok (11) [expiration] noop (11) [logintime] noop (11) pap: WARNING: Auth-Type already set. Not setting to PAP (11) [pap] noop (11) } # authorize updated (11) Found Auth-Type eap (11) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (11) authenticate { (11) eap: Expiring EAP session with state 0xfb1c2c65f8b3217d (11) eap: Finished EAP session with state 0xfb1c2c65f8b3217d (11) eap: Previous EAP request found for state 0xfb1c2c65f8b3217d, released from the list (11) eap: Peer sent packet with method EAP TLS (13) (11) eap: Calling submodule eap_tls to process data (11) eap_tls: Continuing EAP-TLS (11) eap_tls: Peer indicated complete TLS record size will be 2670 bytes (11) eap_tls: Expecting 2 TLS record fragments (11) eap_tls: Got first TLS record fragment (1398 bytes). Peer indicated more fragments to follow (11) eap_tls: [eaptls verify] first fragment (11) eap_tls: ACKing Peers TLS record fragment (11) eap_tls: [eaptls process] handled (11) eap: Sending EAP Request (code 1) ID 176 length 6 (11) eap: EAP session adding reply:State 0xfb1c2c65ffac217d (11) [eap] handled (11) } # authenticate handled (11) Using Post-Auth-Type Challenge (11) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (11) Challenge { ... } # empty sub-section is ignored (11) Sent Access-Challenge Id 11 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (11) EAP-Message 0x01b000060d00 (11) Message-Authenticator 0x00000000000000000000000000000000 (11) State 0xfb1c2c65ffac217da229744af77aa30f (11) Finished request Waking up in 4.8 seconds. (12) Received Access-Request Id 12 from 127.0.0.1:37016 to 127.0.0.1:1812 length 1422 (12) User-Name testing (12) NAS-IP-Address 127.0.0.1 (12) Calling-Station-Id 02-00-00-00-00-01 (12) Framed-MTU 1400 (12) NAS-Port-Type Wireless-802.11 (12) Service-Type Framed-User (12) Connect-Info CONNECT 11Mbps 802.11b (12) EAP-Message 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 (12) State 0xfb1c2c65ffac217da229744af77aa30f (12) Message-Authenticator 0x0d1f87fc26c15c46ab2a694795fef902 (12) session-state: No cached attributes (12) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (12) authorize { (12) policy filter_username { (12) if (User-Name) { (12) if (User-Name) - TRUE (12) if (User-Name) { (12) if (User-Name ~ / /) { (12) if (User-Name ~ / /) - FALSE (12) if (User-Name ~ /[^]*/ ) { (12) if (User-Name ~ /[^]*/ ) - FALSE (12) if (User-Name ~ /\.\./ ) { (12) if (User-Name ~ /\.\./ ) - FALSE (12) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (12) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (12) if (User-Name ~ /\.$/) { (12) if (User-Name ~ /\.$/) - FALSE (12) if (User-Name ~ /\./) { (12) if (User-Name ~ /\./) - FALSE (12) } # if (User-Name) notfound (12) } # policy filter_username notfound (12) [preprocess] ok (12) [chap] noop (12) [mschap] noop (12) [digest] noop (12) suffix: Checking for suffix after (12) suffix: No in User-Name testing, looking up realm NULL (12) suffix: No such realm NULL (12) [suffix] noop (12) eap: Peer sent EAP Response (code 2) ID 176 length 1278 (12) eap: No EAP Start, assuming its an on-going EAP conversation (12) [eap] updated (12) files: users: Matched entry testing at line 87 (12) [files] ok (12) [expiration] noop (12) [logintime] noop (12) pap: WARNING: Auth-Type already set. Not setting to PAP (12) [pap] noop (12) } # authorize updated (12) Found Auth-Type eap (12) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (12) authenticate { (12) eap: Expiring EAP session with state 0xfb1c2c65ffac217d (12) eap: Finished EAP session with state 0xfb1c2c65ffac217d (12) eap: Previous EAP request found for state 0xfb1c2c65ffac217d, released from the list (12) eap: Peer sent packet with method EAP TLS (13) (12) eap: Calling submodule eap_tls to process data (12) eap_tls: Continuing EAP-TLS (12) eap_tls: Got final TLS record fragment (1272 bytes) (12) eap_tls: [eaptls verify] ok (12) eap_tls: Done initial handshake (12) eap_tls: TLS_accept: SSLv3/TLS write server done (12) eap_tls: recv TLS 1.2 [length 08de] (12) eap_tls: TLS - Creating attributes from certificate OIDs (12) eap_tls: TLS-Cert-Serial : 4a1dec91e0857d76d65f37d6ddaab4191176ebcb (12) eap_tls: TLS-Cert-Expiration : 240421025525Z (12) eap_tls: TLS-Cert-Subject : /CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority (12) eap_tls: TLS-Cert-Issuer : /CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority (12) eap_tls: TLS-Cert-Common-Name : Example Certificate Authority (12) eap_tls: TLS - Creating attributes from certificate OIDs (12) eap_tls: TLS-Client-Cert-Serial : 02 (12) eap_tls: TLS-Client-Cert-Expiration : 240421025525Z (12) eap_tls: TLS-Client-Cert-Subject : /CFR/STRadius/OExample Inc./CNuserexample.org/emailAddressuserexample.org (12) eap_tls: TLS-Client-Cert-Issuer : /CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority (12) eap_tls: TLS-Client-Cert-Common-Name : userexample.org (12) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage TLS Web Client Authentication (12) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage-OID 1.3.6.1.5.5.7.3.2 (12) eap_tls: TLS_accept: SSLv3/TLS read client certificate (12) eap_tls: recv TLS 1.2 [length 0046] (12) eap_tls: TLS_accept: SSLv3/TLS read client key exchange (12) eap_tls: recv TLS 1.2 [length 0108] (12) eap_tls: TLS_accept: SSLv3/TLS read certificate verify (12) eap_tls: TLS_accept: SSLv3/TLS read change cipher spec (12) eap_tls: recv TLS 1.2 [length 0010] (12) eap_tls: TLS_accept: SSLv3/TLS read finished (12) eap_tls: send TLS 1.2 [length 0001] (12) eap_tls: TLS_accept: SSLv3/TLS write change cipher spec (12) eap_tls: send TLS 1.2 [length 0010] (12) eap_tls: TLS_accept: SSLv3/TLS write finished (12) eap_tls: (other): SSL negotiation finished successfully (12) eap_tls: TLS - Connection Established (12) eap_tls: TLS-Session-Cipher-Suite ECDHE-RSA-AES256-GCM-SHA384 (12) eap_tls: TLS-Session-Version TLS 1.2 (12) eap_tls: TLS - got 51 bytes of data (12) eap_tls: [eaptls process] handled (12) eap: Sending EAP Request (code 1) ID 177 length 61 (12) eap: EAP session adding reply:State 0xfb1c2c65fead217d (12) [eap] handled (12) } # authenticate handled (12) Using Post-Auth-Type Challenge (12) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (12) Challenge { ... } # empty sub-section is ignored (12) session-state: Saving cached attributes (12) TLS-Session-Cipher-Suite ECDHE-RSA-AES256-GCM-SHA384 (12) TLS-Session-Version TLS 1.2 (12) Sent Access-Challenge Id 12 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (12) EAP-Message 0x01b1003d0d80000000331403030001011603030028e6d41ca2aa87391a58eb70f47b2cb52c809102c061d01056c64fafec1b7192f45a219dafde4a6548 (12) Message-Authenticator 0x00000000000000000000000000000000 (12) State 0xfb1c2c65fead217da229744af77aa30f (12) Finished request Waking up in 4.8 seconds. (13) Received Access-Request Id 13 from 127.0.0.1:37016 to 127.0.0.1:1812 length 140 (13) User-Name testing (13) NAS-IP-Address 127.0.0.1 (13) Calling-Station-Id 02-00-00-00-00-01 (13) Framed-MTU 1400 (13) NAS-Port-Type Wireless-802.11 (13) Service-Type Framed-User (13) Connect-Info CONNECT 11Mbps 802.11b (13) EAP-Message 0x02b100060d00 (13) State 0xfb1c2c65fead217da229744af77aa30f (13) Message-Authenticator 0x3ae623aad6afd92f4daf0f414aec7d4d (13) Restoring session-state (13) session-state:TLS-Session-Cipher-Suite ECDHE-RSA-AES256-GCM-SHA384 (13) session-state:TLS-Session-Version TLS 1.2 (13) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (13) authorize { (13) policy filter_username { (13) if (User-Name) { (13) if (User-Name) - TRUE (13) if (User-Name) { (13) if (User-Name ~ / /) { (13) if (User-Name ~ / /) - FALSE (13) if (User-Name ~ /[^]*/ ) { (13) if (User-Name ~ /[^]*/ ) - FALSE (13) if (User-Name ~ /\.\./ ) { (13) if (User-Name ~ /\.\./ ) - FALSE (13) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) { (13) if ((User-Name ~ //) (User-Name !~ /(.)\.(.)$/)) - FALSE (13) if (User-Name ~ /\.$/) { (13) if (User-Name ~ /\.$/) - FALSE (13) if (User-Name ~ /\./) { (13) if (User-Name ~ /\./) - FALSE (13) } # if (User-Name) notfound (13) } # policy filter_username notfound (13) [preprocess] ok (13) [chap] noop (13) [mschap] noop (13) [digest] noop (13) suffix: Checking for suffix after (13) suffix: No in User-Name testing, looking up realm NULL (13) suffix: No such realm NULL (13) [suffix] noop (13) eap: Peer sent EAP Response (code 2) ID 177 length 6 (13) eap: No EAP Start, assuming its an on-going EAP conversation (13) [eap] updated (13) files: users: Matched entry testing at line 87 (13) [files] ok (13) [expiration] noop (13) [logintime] noop (13) pap: WARNING: Auth-Type already set. Not setting to PAP (13) [pap] noop (13) } # authorize updated (13) Found Auth-Type eap (13) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (13) authenticate { (13) eap: Expiring EAP session with state 0xfb1c2c65fead217d (13) eap: Finished EAP session with state 0xfb1c2c65fead217d (13) eap: Previous EAP request found for state 0xfb1c2c65fead217d, released from the list (13) eap: Peer sent packet with method EAP TLS (13) (13) eap: Calling submodule eap_tls to process data (13) eap_tls: Continuing EAP-TLS (13) eap_tls: Peer ACKed our handshake fragment. handshake is finished (13) eap_tls: [eaptls verify] success (13) eap_tls: [eaptls process] success (13) eap: Sending EAP Success (code 3) ID 177 length 4 (13) eap: Freeing handler (13) [eap] ok (13) } # authenticate ok (13) # Executing section post-auth from file /etc/freeradius/3.0/sites-enabled/default (13) post-auth { (13) if (session-state:User-Name reply:User-Name request:User-Name (reply:User-Name request:User-Name)) { (13) if (session-state:User-Name reply:User-Name request:User-Name (reply:User-Name request:User-Name)) - FALSE (13) update { (13) reply::TLS-Session-Cipher-Suite session-state:TLS-Session-Cipher-Suite[*] - ECDHE-RSA-AES256-GCM-SHA384 (13) reply::TLS-Session-Version session-state:TLS-Session-Version[*] - TLS 1.2 (13) } # update noop (13) [exec] noop (13) policy remove_reply_message_if_eap { (13) if (reply:EAP-Message reply:Reply-Message) { (13) if (reply:EAP-Message reply:Reply-Message) - FALSE (13) else { (13) [noop] noop (13) } # else noop (13) } # policy remove_reply_message_if_eap noop (13) } # post-auth noop (13) Sent Access-Accept Id 13 from 127.0.0.1:1812 to 127.0.0.1:37016 length 0 (13) MS-MPPE-Recv-Key 0xd7bcddf7af6224b50c992f45d54c1c132df258c925dfdddf8a027fc184b15204 (13) MS-MPPE-Send-Key 0x4fd8b558db5e3260847feff053527cb4117d5a697c28f3aedd818614742ba5ee (13) EAP-Message 0x03b10004 (13) Message-Authenticator 0x00000000000000000000000000000000 (13) User-Name testing (13) Finished request Waking up in 4.8 seconds. (0) Cleaning up request packet ID 0 with timestamp 17 (1) Cleaning up request packet ID 1 with timestamp 17 (2) Cleaning up request packet ID 2 with timestamp 17 (3) Cleaning up request packet ID 3 with timestamp 17 (4) Cleaning up request packet ID 4 with timestamp 17 (5) Cleaning up request packet ID 5 with timestamp 17 (6) Cleaning up request packet ID 6 with timestamp 17 (7) Cleaning up request packet ID 7 with timestamp 17 (8) Cleaning up request packet ID 8 with timestamp 17 (9) Cleaning up request packet ID 9 with timestamp 17 (10) Cleaning up request packet ID 10 with timestamp 17 (11) Cleaning up request packet ID 11 with timestamp 17 (12) Cleaning up request packet ID 12 with timestamp 17 (13) Cleaning up request packet ID 13 with timestamp 17 Ready to process requestseapol_test端输出如下 Reading configuration file eap-tls.conf Line: 1 - start of a new network block eap methods - hexdump(len16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 eapol_flags0 (0x0) key_mgmt: 0x8 identity - hexdump_ascii(len7):74 65 73 74 69 6e 67 testing password - hexdump_ascii(len8):70 61 73 73 77 6f 72 64 password ca_cert - hexdump_ascii(len32):2f 65 74 63 2f 66 72 65 65 72 61 64 69 75 73 2f /etc/freeradius/33 2e 30 2f 63 65 72 74 73 2f 63 61 2e 70 65 6d 3.0/certs/ca.pem client_cert - hexdump_ascii(len36):2f 65 74 63 2f 66 72 65 65 72 61 64 69 75 73 2f /etc/freeradius/33 2e 30 2f 63 65 72 74 73 2f 63 6c 69 65 6e 74 3.0/certs/client2e 70 65 6d .pem private_key - hexdump_ascii(len36):2f 65 74 63 2f 66 72 65 65 72 61 64 69 75 73 2f /etc/freeradius/33 2e 30 2f 63 65 72 74 73 2f 63 6c 69 65 6e 74 3.0/certs/client2e 6b 65 79 .key private_key_passwd - hexdump_ascii(len8):77 68 61 74 65 76 65 72 whatever Priority group 0id0 ssid Authentication server 127.0.0.1:1812 RADIUS local address: 127.0.0.1:37016 ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid0 EAPOL: External notification - portEnabled1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id179 method1 vendor0 vendorMethod0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param) EAP: EAP-Request Identity data - hexdump_ascii(len0): EAP: using real identity - hexdump_ascii(len7):74 65 73 74 69 6e 67 testing EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len12) TX EAP - RADIUS - hexdump(len12): 02 b3 00 0c 01 74 65 73 74 69 6e 67 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len7): 74 65 73 74 69 6e 67 Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier0 length128Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length14Value: 02b3000c0174657374696e67Attribute 80 (Message-Authenticator) length18Value: 8156437e4fb3d643ab0c0f9bbc2b5f07 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier0 length64Attribute 79 (EAP-Message) length8Value: 01b400060d20Attribute 80 (Message-Authenticator) length18Value: 6abcc84aa4d8854b512e51a7052b9192Attribute 24 (State) length18Value: 6c230b426c9706dd3f72ef77da978e44 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id180 len6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id180 method13 vendor0 vendorMethod0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor0 method13 EAP: Status notification: accept proposed method (paramTLS) EAP: Initialize selected EAP method: vendor 0 method 13 (TLS) TLS: using phase1 config options TLS: Trusted root certificate(s) loaded OpenSSL: SSL_use_certificate_chain_file -- OK OpenSSL: tls_use_private_key_file (PEM) -- loaded SSL: Private key loaded successfully CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected EAP: EAP entering state METHOD SSL: Received packet(len6) - Flags 0x20 EAP-TLS: Start SSL: (where0x10 ret0x1) SSL: (where0x1001 ret0x1) SSL: SSL_connect:before SSL initialization OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 01 00 b3 OpenSSL: TX ver0x303 content_type22 (handshake/client hello) OpenSSL: Message - hexdump(len179): 01 00 00 af 03 03 7e 68 ad 1c 85 d2 20 ab f7 73 85 46 c7 5a 38 5b f6 4d c6 b4 d4 b0 9f ca 12 e9 ba bd eb d5 98 cc 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 4e 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 2a 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client hello SSL: (where0x1002 ret0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write client hello SSL: SSL_connect - want more data SSL: 184 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 184 bytes left to be sent out (of total 184 bytes) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3be820 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len190) TX EAP - RADIUS - hexdump(len190): 02 b4 00 be 0d 00 16 03 01 00 b3 01 00 00 af 03 03 7e 68 ad 1c 85 d2 20 ab f7 73 85 46 c7 5a 38 5b f6 4d c6 b4 d4 b0 9f ca 12 e9 ba bd eb d5 98 cc 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 4e 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 2a 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier1 length324Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length192Value: 02b400be0d0016030100b3010000af03037e68ad1c85d220abf7738546c75a385bf64dc6b4d4b09fca12e9babdebd598cc000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602Attribute 24 (State) length18Value: 6c230b426c9706dd3f72ef77da978e44Attribute 80 (Message-Authenticator) length18Value: b00bca82686b95588c82b16531aaf1a2 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier1 length1068Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length247Value: 2d302ba029a0278625687474703a2f2f7777772e6578616d706c652e636f6d2f6578616d706c655f63612e63726c300d06092a864886f70d01010b05000382010100bd49899734116830715ab1b59f5748c02d47b925228a7c180cba3966d09c61d906ee2cc792065be7f44ea25da7837bd142d3b280178fbce6eda7abd9031f01f0cbbf17607d4543f9c649656f331584f56273933afd58fd4de6c40b9dff9dc2c4b7bcf09a713fcdf81a07ad00a73d099cbef6f1e81474d5fda07a975248861de4116171a7db5360e650bee856f75c838d51ae3bb1841f05e9f39166ff132a23e81cff02855b53cf09f7d54070be0c5107f64ab5Attribute 80 (Message-Authenticator) length18Value: b50afbc7936f06e5f3cb15bcd2cbb0e3Attribute 24 (State) length18Value: 6c230b426d9606dd3f72ef77da978e44 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id181 len1004) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id181 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len1004) - Flags 0xc0 SSL: TLS Message Length: 2908 SSL: Need 1914 bytes more input data SSL: Building ACK (type13 id181 ver0) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3a75a0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len6) TX EAP - RADIUS - hexdump(len6): 02 b5 00 06 0d 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier2 length140Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length8Value: 02b500060d00Attribute 24 (State) length18Value: 6c230b426d9606dd3f72ef77da978e44Attribute 80 (Message-Authenticator) length18Value: b59edee3915c6dc7cc64ec2d9d00e109 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier2 length1068Attribute 79 (EAP-Message) length255Value: 01b603ec0dc000000b5cd38235a4811c3f2e4cc129e388ad6f6c6237386b5f4d7ecc8d193c2465dfe051194474b53e1ac364e4b8fdcb527d6de8ca809cbfd5eb53a47785e62eaa3f7bafbeff699f9e631a78efbd38d6270004fe308204fa308203e2a00302010202144a1dec91e0857d76d65f37d6ddaab4191176ebcb300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f7267312630Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length247Value: 783f0203010001a38201423082013e301d0603551d0e0416041401571d779e50f5b591d6dad496f89ac3bc91cf273081d30603551d230481cb3081c8801401571d779e50f5b591d6dad496f89ac3bc91cf27a18199a48196308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747982144a1dec91e0Attribute 80 (Message-Authenticator) length18Value: 00b5705651e74dc6fe4c19414be35aaeAttribute 24 (State) length18Value: 6c230b426e9506dd3f72ef77da978e44 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id182 len1004) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id182 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len1004) - Flags 0xc0 SSL: TLS Message Length: 2908 SSL: Need 920 bytes more input data SSL: Building ACK (type13 id182 ver0) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3a75a0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len6) TX EAP - RADIUS - hexdump(len6): 02 b6 00 06 0d 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier3 length140Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length8Value: 02b600060d00Attribute 24 (State) length18Value: 6c230b426e9506dd3f72ef77da978e44Attribute 80 (Message-Authenticator) length18Value: c5f5d8ac30024f696a340a2a89a1c0cb Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 994 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier3 length994Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length173Value: 030204020502060200980096308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747916030300040e000000Attribute 80 (Message-Authenticator) length18Value: 537cc966c9a9ead8369128815c3e6e1eAttribute 24 (State) length18Value: 6c230b426f9406dd3f72ef77da978e44 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id183 len930) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id183 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len930) - Flags 0x80 SSL: TLS Message Length: 2908 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 3d SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client hello OpenSSL: RX ver0x303 content_type22 (handshake/server hello) OpenSSL: Message - hexdump(len61): 02 00 00 39 03 03 11 ea c7 5f 3f 74 8e 3d fc f6 e1 de 94 d5 d4 83 28 00 32 22 21 b5 f4 9e fc b8 ce 4a 0b a8 c0 ad 00 c0 30 00 00 11 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 17 00 00 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 08 e9 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server hello OpenSSL: RX ver0x303 content_type22 (handshake/certificate) OpenSSL: Message - hexdump(len2281): 0b 00 08 e5 00 08 e2 00 03 de 30 82 03 da 30 82 02 c2 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 0c 1a 45 78 61 6d 70 6c 65 20 53 65 72 76 65 72 20 43 65 72 74 69 66 69 63 61 74 65 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d1 c0 ab ff d4 6f 4b 53 69 d6 d0 04 16 36 4a b0 ad ef 9c b6 e6 65 0d 29 52 12 99 d8 ad 89 3b f2 18 f0 93 4d 0b 97 01 8b 2d ca 90 3b 2b c3 dc 35 14 4d be be 52 e7 20 21 d2 63 a2 13 82 31 49 2b a3 a6 aa df 64 0b cd ab c4 04 33 c2 2d 6d 53 ce 4f b3 84 c2 57 6c c9 32 6d ae 0b ef aa ad 84 20 74 85 b0 37 51 40 10 51 d1 3e 1e 17 5a 15 92 6d 4b d9 dd ab dc 4b c3 27 fd 88 eb a4 b0 1d 6e 4e 61 c5 4b 3a 36 b8 c3 15 0d 6b 44 69 90 45 e2 65 04 0c 85 d6 7f 18 1b d5 1e 23 6f 43 7e 03 b0 75 54 18 b6 d7 c5 70 f2 2c 52 16 de fb 52 dc 25 e1 db d6 43 8f 26 2d fa 04 f6 73 f1 fd 32 5a ba d4 e9 d0 5c d1 aa 66 25 8a 27 d5 d1 74 e6 c2 d4 c3 ec d7 56 b1 c9 d2 80 6c 8f d7 99 8d 76 5e 3b c8 09 11 01 fb a7 cc ad bb 33 f9 25 60 d6 fb a6 47 c3 03 d2 13 66 45 0a df d6 c2 96 d8 29 c6 93 87 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 bd 49 89 97 34 11 68 30 71 5a b1 b5 9f 57 48 c0 2d 47 b9 25 22 8a 7c 18 0c ba 39 66 d0 9c 61 d9 06 ee 2c c7 92 06 5b e7 f4 4e a2 5d a7 83 7b d1 42 d3 b2 80 17 8f bc e6 ed a7 ab d9 03 1f 01 f0 cb bf 17 60 7d 45 43 f9 c6 49 65 6f 33 15 84 f5 62 73 93 3a fd 58 fd 4d e6 c4 0b 9d ff 9d c2 c4 b7 bc f0 9a 71 3f cd f8 1a 07 ad 00 a7 3d 09 9c be f6 f1 e8 14 74 d5 fd a0 7a 97 52 48 86 1d e4 11 61 71 a7 db 53 60 e6 50 be e8 56 f7 5c 83 8d 51 ae 3b b1 84 1f 05 e9 f3 91 66 ff 13 2a 23 e8 1c ff 02 85 5b 53 cf 09 f7 d5 40 70 be 0c 51 07 f6 4a b5 d3 82 35 a4 81 1c 3f 2e 4c c1 29 e3 88 ad 6f 6c 62 37 38 6b 5f 4d 7e cc 8d 19 3c 24 65 df e0 51 19 44 74 b5 3e 1a c3 64 e4 b8 fd cb 52 7d 6d e8 ca 80 9c bf d5 eb 53 a4 77 85 e6 2e aa 3f 7b af be ff 69 9f 9e 63 1a 78 ef bd 38 d6 27 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d7 ab 97 ba 11 f9 01 e2 bc be 70 3c 7b 5a 46 8f ea 2a 40 2b d2 7b 36 1c 81 59 26 d7 d1 f5 7f c3 3a 40 04 83 d8 0c 8a 3f bc eb 16 bc a8 25 98 1c da 2e c7 33 0b 40 78 00 f1 7d cf f7 76 18 b2 f6 a4 a7 a9 22 16 ef 2c a4 20 0e 5b e3 5a 17 a0 f2 a1 5b f8 b4 33 12 c6 62 90 72 9a ea b2 c5 ba 23 7e c9 4e 9a 1f 52 57 48 3e ee de 76 62 6d 67 7f 0d d9 1e e8 92 02 fc 8d ae 4e 3c 01 5f b9 8a 4f 07 50 aa 0e 7e d1 bd 5c 3a 6b 86 23 63 8d 87 6f 4d ab 25 69 0b e8 7e 09 6d 7e 88 75 29 07 2b d3 ee de a0 bf f0 65 fd 9b 79 91 4e 0e 7b 74 0f 23 6f 20 37 2b 3b 0a d1 e9 ac ec 52 b3 75 41 ce a0 af 33 72 9d ae 3e 4a 63 22 e8 6b 44 a1 59 c6 df 35 79 0b 0b 6a 26 fc 94 28 a8 f3 23 e3 51 98 64 8b 7b 50 93 50 f3 dd 72 92 9a b5 f2 97 0f 5d d4 ef 27 15 75 f3 66 5b 69 b5 bd 94 76 8b 84 78 3f 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 5a 51 d3 79 e5 b5 6b 81 6e 7a 7b d9 ea 45 4a 1a 68 62 30 c6 0c 53 f1 7c a7 0b 7f 71 6c 0c 0d a2 eb af ba ac f1 61 5d ac 12 1f 23 e4 b9 f8 3b 66 70 0c 2d bf 93 5a 16 e9 ad 93 6f b6 c6 08 f9 f1 2c bd 45 02 7e 08 89 e6 b5 9c 78 cc 47 f4 07 ea 36 e3 2b dd 38 ae 9a 5b f3 90 9b f6 8c 03 28 e3 be f6 77 fe c2 d9 87 31 b1 bd 09 45 68 32 b2 11 c8 65 74 12 1e 3f 2e 8d e7 56 02 b0 f5 eb 97 4f 3a 4d e2 6a 81 54 97 22 77 94 51 a9 47 d6 9b 5d c9 f7 b3 88 e2 19 74 d5 ed 35 18 b7 04 d9 51 a1 ed a7 30 1d 00 94 93 e3 fc 40 7e bb ae 92 4d f0 16 90 3a 69 ad c3 79 09 ec df 37 22 eb 1b 96 46 33 fc cd 6e ef d8 f9 4c cc e6 10 8c e3 e8 4b 1d 4d 6e 8a 25 7b 20 e0 ba bd c5 3c d8 b2 40 e9 ca 84 40 bd 97 7a 4d b8 11 81 41 64 a7 89 0a bb 48 d0 64 2a 83 d2 3a 90 1c 60 54 65 ff ee ea c2 41 OpenSSL: Peer certificate - depth 1 Certificate:Data:Version: 3 (0x2)Serial Number:4a:1d:ec:91:e0:85:7d:76:d6:5f:37:d6:dd:aa:b4:19:11:76:eb:cbSignature Algorithm: sha256WithRSAEncryptionIssuer: CFR, STRadius, LSomewhere, OExample Inc./emailAddressadminexample.org, CNExample Certificate AuthorityValidityNot Before: Feb 21 02:55:25 2024 GMTNot After : Apr 21 02:55:25 2024 GMTSubject: CFR, STRadius, LSomewhere, OExample Inc./emailAddressadminexample.org, CNExample Certificate AuthoritySubject Public Key Info:Public Key Algorithm: rsaEncryptionRSA Public-Key: (2048 bit)Modulus:00:d7:ab:97:ba:11:f9:01:e2:bc:be:70:3c:7b:5a:46:8f:ea:2a:40:2b:d2:7b:36:1c:81:59:26:d7:d1:f5:7f:c3:3a:40:04:83:d8:0c:8a:3f:bc:eb:16:bc:a8:25:98:1c:da:2e:c7:33:0b:40:78:00:f1:7d:cf:f7:76:18:b2:f6:a4:a7:a9:22:16:ef:2c:a4:20:0e:5b:e3:5a:17:a0:f2:a1:5b:f8:b4:33:12:c6:62:90:72:9a:ea:b2:c5:ba:23:7e:c9:4e:9a:1f:52:57:48:3e:ee:de:76:62:6d:67:7f:0d:d9:1e:e8:92:02:fc:8d:ae:4e:3c:01:5f:b9:8a:4f:07:50:aa:0e:7e:d1:bd:5c:3a:6b:86:23:63:8d:87:6f:4d:ab:25:69:0b:e8:7e:09:6d:7e:88:75:29:07:2b:d3:ee:de:a0:bf:f0:65:fd:9b:79:91:4e:0e:7b:74:0f:23:6f:20:37:2b:3b:0a:d1:e9:ac:ec:52:b3:75:41:ce:a0:af:33:72:9d:ae:3e:4a:63:22:e8:6b:44:a1:59:c6:df:35:79:0b:0b:6a:26:fc:94:28:a8:f3:23:e3:51:98:64:8b:7b:50:93:50:f3:dd:72:92:9a:b5:f2:97:0f:5d:d4:ef:27:15:75:f3:66:5b:69:b5:bd:94:76:8b:84:78:3fExponent: 65537 (0x10001)X509v3 extensions:X509v3 Subject Key Identifier: 01:57:1D:77:9E:50:F5:B5:91:D6:DA:D4:96:F8:9A:C3:BC:91:CF:27X509v3 Authority Key Identifier: keyid:01:57:1D:77:9E:50:F5:B5:91:D6:DA:D4:96:F8:9A:C3:BC:91:CF:27DirName:/CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authorityserial:4A:1D:EC:91:E0:85:7D:76:D6:5F:37:D6:DD:AA:B4:19:11:76:EB:CBX509v3 Basic Constraints: criticalCA:TRUEX509v3 CRL Distribution Points: Full Name:URI:http://www.example.org/example_ca.crlSignature Algorithm: sha256WithRSAEncryption5a:51:d3:79:e5:b5:6b:81:6e:7a:7b:d9:ea:45:4a:1a:68:62:30:c6:0c:53:f1:7c:a7:0b:7f:71:6c:0c:0d:a2:eb:af:ba:ac:f1:61:5d:ac:12:1f:23:e4:b9:f8:3b:66:70:0c:2d:bf:93:5a:16:e9:ad:93:6f:b6:c6:08:f9:f1:2c:bd:45:02:7e:08:89:e6:b5:9c:78:cc:47:f4:07:ea:36:e3:2b:dd:38:ae:9a:5b:f3:90:9b:f6:8c:03:28:e3:be:f6:77:fe:c2:d9:87:31:b1:bd:09:45:68:32:b2:11:c8:65:74:12:1e:3f:2e:8d:e7:56:02:b0:f5:eb:97:4f:3a:4d:e2:6a:81:54:97:22:77:94:51:a9:47:d6:9b:5d:c9:f7:b3:88:e2:19:74:d5:ed:35:18:b7:04:d9:51:a1:ed:a7:30:1d:00:94:93:e3:fc:40:7e:bb:ae:92:4d:f0:16:90:3a:69:ad:c3:79:09:ec:df:37:22:eb:1b:96:46:33:fc:cd:6e:ef:d8:f9:4c:cc:e6:10:8c:e3:e8:4b:1d:4d:6e:8a:25:7b:20:e0:ba:bd:c5:3c:d8:b2:40:e9:ca:84:40:bd:97:7a:4d:b8:11:81:41:64:a7:89:0a:bb:48:d0:64:2a:83:d2:3a:90:1c:60:54:65:ff:ee:ea:c2:41CTRL-EVENT-EAP-PEER-CERT depth1 subject/CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority hash5a7df6ac8a17be4f95d70e75e60d255c20228efd5de61400b72207dfbc976477 TLS: tls_verify_cb - preverify_ok1 err0 (ok) ca_cert_verify1 depth1 buf/CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority OpenSSL: Peer certificate - depth 0 Certificate:Data:Version: 3 (0x2)Serial Number: 1 (0x1)Signature Algorithm: sha256WithRSAEncryptionIssuer: CFR, STRadius, LSomewhere, OExample Inc./emailAddressadminexample.org, CNExample Certificate AuthorityValidityNot Before: Feb 21 02:55:25 2024 GMTNot After : Apr 21 02:55:25 2024 GMTSubject: CFR, STRadius, OExample Inc., CNExample Server Certificate/emailAddressadminexample.orgSubject Public Key Info:Public Key Algorithm: rsaEncryptionRSA Public-Key: (2048 bit)Modulus:00:d1:c0:ab:ff:d4:6f:4b:53:69:d6:d0:04:16:36:4a:b0:ad:ef:9c:b6:e6:65:0d:29:52:12:99:d8:ad:89:3b:f2:18:f0:93:4d:0b:97:01:8b:2d:ca:90:3b:2b:c3:dc:35:14:4d:be:be:52:e7:20:21:d2:63:a2:13:82:31:49:2b:a3:a6:aa:df:64:0b:cd:ab:c4:04:33:c2:2d:6d:53:ce:4f:b3:84:c2:57:6c:c9:32:6d:ae:0b:ef:aa:ad:84:20:74:85:b0:37:51:40:10:51:d1:3e:1e:17:5a:15:92:6d:4b:d9:dd:ab:dc:4b:c3:27:fd:88:eb:a4:b0:1d:6e:4e:61:c5:4b:3a:36:b8:c3:15:0d:6b:44:69:90:45:e2:65:04:0c:85:d6:7f:18:1b:d5:1e:23:6f:43:7e:03:b0:75:54:18:b6:d7:c5:70:f2:2c:52:16:de:fb:52:dc:25:e1:db:d6:43:8f:26:2d:fa:04:f6:73:f1:fd:32:5a:ba:d4:e9:d0:5c:d1:aa:66:25:8a:27:d5:d1:74:e6:c2:d4:c3:ec:d7:56:b1:c9:d2:80:6c:8f:d7:99:8d:76:5e:3b:c8:09:11:01:fb:a7:cc:ad:bb:33:f9:25:60:d6:fb:a6:47:c3:03:d2:13:66:45:0a:df:d6:c2:96:d8:29:c6:93:87Exponent: 65537 (0x10001)X509v3 extensions:X509v3 Extended Key Usage: TLS Web Server AuthenticationX509v3 CRL Distribution Points: Full Name:URI:http://www.example.com/example_ca.crlSignature Algorithm: sha256WithRSAEncryptionbd:49:89:97:34:11:68:30:71:5a:b1:b5:9f:57:48:c0:2d:47:b9:25:22:8a:7c:18:0c:ba:39:66:d0:9c:61:d9:06:ee:2c:c7:92:06:5b:e7:f4:4e:a2:5d:a7:83:7b:d1:42:d3:b2:80:17:8f:bc:e6:ed:a7:ab:d9:03:1f:01:f0:cb:bf:17:60:7d:45:43:f9:c6:49:65:6f:33:15:84:f5:62:73:93:3a:fd:58:fd:4d:e6:c4:0b:9d:ff:9d:c2:c4:b7:bc:f0:9a:71:3f:cd:f8:1a:07:ad:00:a7:3d:09:9c:be:f6:f1:e8:14:74:d5:fd:a0:7a:97:52:48:86:1d:e4:11:61:71:a7:db:53:60:e6:50:be:e8:56:f7:5c:83:8d:51:ae:3b:b1:84:1f:05:e9:f3:91:66:ff:13:2a:23:e8:1c:ff:02:85:5b:53:cf:09:f7:d5:40:70:be:0c:51:07:f6:4a:b5:d3:82:35:a4:81:1c:3f:2e:4c:c1:29:e3:88:ad:6f:6c:62:37:38:6b:5f:4d:7e:cc:8d:19:3c:24:65:df:e0:51:19:44:74:b5:3e:1a:c3:64:e4:b8:fd:cb:52:7d:6d:e8:ca:80:9c:bf:d5:eb:53:a4:77:85:e6:2e:aa:3f:7b:af:be:ff:69:9f:9e:63:1a:78:ef:bd:38:d6:27CTRL-EVENT-EAP-PEER-CERT depth0 subject/CFR/STRadius/OExample Inc./CNExample Server Certificate/emailAddressadminexample.org hash442c76845b6912ab534b2e2ea69570c8c86cd0e6098e66239bfd6bcc0a40d9fc TLS: tls_verify_cb - preverify_ok1 err0 (ok) ca_cert_verify1 depth0 buf/CFR/STRadius/OExample Inc./CNExample Server Certificate/emailAddressadminexample.org EAP: Status notification: remote certificate verification (paramsuccess) OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 01 4d SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server certificate OpenSSL: RX ver0x303 content_type22 (handshake/server key exchange) OpenSSL: Message - hexdump(len333): 0c 00 01 49 03 00 17 41 04 4f c4 be 17 93 f5 2f c8 ae a5 44 cf b4 77 c2 83 21 a0 79 db c5 30 af 7f 2e 22 2e 77 06 97 0a 47 24 6f a3 fc 49 e0 65 2d 96 14 eb b7 1a a1 24 b8 10 6b e5 1e fb f6 5c c7 96 e2 ae d0 d5 af 0d f7 08 04 01 00 2b 89 cd 21 ad a9 d5 7e b5 78 1a 33 ee 62 fc 14 9c 35 44 6b f8 56 ea 9f 6f 92 cc dd e9 00 a2 d0 22 24 1c b6 30 70 79 4e b2 4e d6 f7 55 f3 9a 35 66 1b 87 c6 c2 d7 d4 cd a5 f6 5d 24 6e 38 93 91 c1 d1 d6 e7 0b 3d 2d 97 62 c4 c0 91 b8 9f be a7 95 5d 98 2d 6b d1 1a 8e 5c a9 3b 55 3e 91 75 71 d8 9a 35 95 ef ec c2 5d 05 c6 c8 e2 06 40 0f bd 92 10 7c 67 76 e4 3f 59 e7 30 79 6e ab eb e5 41 0c f2 8d d9 78 3d 52 3d 95 6d c3 84 a6 6f bd 92 26 0e 3f e2 22 9a bd 5b b7 80 99 be 5f 12 0f 7d ae d1 6f 20 5c 74 d8 8f 45 cb 16 46 66 a7 92 b3 7e 17 e8 d1 b1 d9 0c 5f 71 df 16 7b ee 75 88 fb ea e1 c1 dd 60 fd 88 2c 28 c9 db ef 58 bc 9d 23 dc 6d 40 9c 6c 60 67 ca 49 a2 84 b0 ab bb 4c 8b 5f 89 60 59 64 3e 36 96 5e bb c1 2b 74 15 81 81 3b 43 74 34 a5 b7 3e 56 aa fb c2 d4 bd c7 da c6 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 cc SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server key exchange OpenSSL: RX ver0x303 content_type22 (handshake/certificate request) OpenSSL: Message - hexdump(len204): 0d 00 00 c8 03 01 02 40 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 00 98 00 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 04 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server certificate request OpenSSL: RX ver0x303 content_type22 (handshake/server hello done) OpenSSL: Message - hexdump(len4): 0e 00 00 00 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server done OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 08 de OpenSSL: TX ver0x303 content_type22 (handshake/certificate) OpenSSL: Message - hexdump(len2270): 0b 00 08 da 00 08 d7 00 03 d3 30 82 03 cf 30 82 02 b7 a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 19 30 17 06 03 55 04 03 0c 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ac 64 f9 52 38 ec f6 6d 2e 16 5e 9e 5b 33 10 ca 9d b0 b8 2d c7 98 21 6e 76 49 c9 e7 73 48 82 90 a6 fd 40 85 2f 7a 6f a8 50 7f a8 8a 81 33 e1 b6 51 75 40 17 ea 49 bb 27 d3 f7 55 ee c4 47 0b 82 4e 29 3e 7d e0 b0 6e 6c aa 88 55 99 3e 21 a1 5e 22 35 22 01 71 2d 04 87 82 25 39 0a 26 d5 44 b2 8f eb 4d e3 29 46 a7 83 de e5 01 d5 81 e4 2c ed bf fe 7f 57 70 df 52 f0 64 77 e9 8f ff 30 43 19 8e 08 28 76 99 99 89 6f 8e a1 d4 e6 5e 34 6f 04 67 30 b9 b3 a1 94 53 3c 9f c6 e7 71 3e ad 2a 11 ff 38 33 24 35 3f 76 ee 91 cf da 03 51 56 3d 4a 12 7d 05 0c 73 8b 88 f4 d0 38 27 b3 e8 09 3c 8d ff 67 cc 2d 1f ce 02 c1 d8 34 62 2b 42 5a 33 19 ae cd 30 4a 89 54 74 6b b2 28 59 f7 65 7c 72 29 04 3d e1 fc 31 c8 c9 ad 8a 1c 10 17 4a 71 88 99 aa 44 28 f7 3d 18 d3 8f 9f 17 3e ca 71 56 bd 67 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 02 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 7f 6a 16 6b 0b 48 1b c5 b6 2f 4f e2 49 42 fe 84 16 f4 46 c3 f5 dd ea 61 2b e4 e9 91 ed 8f 00 c3 15 bc 58 ba c2 9a da 2b d6 c9 2f c1 a9 10 b3 fb 15 10 0c 2b 8f 3f 82 67 73 05 f2 69 45 46 26 8c a9 76 6c 07 67 af 42 a1 7d a8 5b 4a 1c c5 59 33 8e 7d c8 d4 e5 4b 93 7a 31 cf aa be 2e 9c 65 29 73 c7 02 3b b7 c1 49 a2 f5 54 ca 73 de b0 12 b4 55 03 44 34 aa cb 81 0e 11 4f a0 13 a7 d8 63 f3 3d 70 86 48 e7 88 ee 56 5c eb 83 04 c4 77 a7 e7 8d da 95 a6 1c b4 86 0c 48 51 b1 8a c6 b8 52 44 b8 3b 55 59 78 60 e9 94 42 c7 a1 28 4b 1d c7 95 fc 0e 5a 3f 63 56 2b 4c 9a 0e c6 2d 41 61 ad 1c e5 86 3b f3 71 14 1f e9 03 82 c6 41 3d 9d f7 88 77 d0 55 a0 dc cc d9 c3 1f 68 40 5f 07 a4 18 8d cf cc dd 11 13 bd 59 79 c7 f7 2c f1 2e 97 f7 63 47 28 92 c1 91 04 91 6e db e9 44 2f d8 c5 4a be 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d7 ab 97 ba 11 f9 01 e2 bc be 70 3c 7b 5a 46 8f ea 2a 40 2b d2 7b 36 1c 81 59 26 d7 d1 f5 7f c3 3a 40 04 83 d8 0c 8a 3f bc eb 16 bc a8 25 98 1c da 2e c7 33 0b 40 78 00 f1 7d cf f7 76 18 b2 f6 a4 a7 a9 22 16 ef 2c a4 20 0e 5b e3 5a 17 a0 f2 a1 5b f8 b4 33 12 c6 62 90 72 9a ea b2 c5 ba 23 7e c9 4e 9a 1f 52 57 48 3e ee de 76 62 6d 67 7f 0d d9 1e e8 92 02 fc 8d ae 4e 3c 01 5f b9 8a 4f 07 50 aa 0e 7e d1 bd 5c 3a 6b 86 23 63 8d 87 6f 4d ab 25 69 0b e8 7e 09 6d 7e 88 75 29 07 2b d3 ee de a0 bf f0 65 fd 9b 79 91 4e 0e 7b 74 0f 23 6f 20 37 2b 3b 0a d1 e9 ac ec 52 b3 75 41 ce a0 af 33 72 9d ae 3e 4a 63 22 e8 6b 44 a1 59 c6 df 35 79 0b 0b 6a 26 fc 94 28 a8 f3 23 e3 51 98 64 8b 7b 50 93 50 f3 dd 72 92 9a b5 f2 97 0f 5d d4 ef 27 15 75 f3 66 5b 69 b5 bd 94 76 8b 84 78 3f 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 5a 51 d3 79 e5 b5 6b 81 6e 7a 7b d9 ea 45 4a 1a 68 62 30 c6 0c 53 f1 7c a7 0b 7f 71 6c 0c 0d a2 eb af ba ac f1 61 5d ac 12 1f 23 e4 b9 f8 3b 66 70 0c 2d bf 93 5a 16 e9 ad 93 6f b6 c6 08 f9 f1 2c bd 45 02 7e 08 89 e6 b5 9c 78 cc 47 f4 07 ea 36 e3 2b dd 38 ae 9a 5b f3 90 9b f6 8c 03 28 e3 be f6 77 fe c2 d9 87 31 b1 bd 09 45 68 32 b2 11 c8 65 74 12 1e 3f 2e 8d e7 56 02 b0 f5 eb 97 4f 3a 4d e2 6a 81 54 97 22 77 94 51 a9 47 d6 9b 5d c9 f7 b3 88 e2 19 74 d5 ed 35 18 b7 04 d9 51 a1 ed a7 30 1d 00 94 93 e3 fc 40 7e bb ae 92 4d f0 16 90 3a 69 ad c3 79 09 ec df 37 22 eb 1b 96 46 33 fc cd 6e ef d8 f9 4c cc e6 10 8c e3 e8 4b 1d 4d 6e 8a 25 7b 20 e0 ba bd c5 3c d8 b2 40 e9 ca 84 40 bd 97 7a 4d b8 11 81 41 64 a7 89 0a bb 48 d0 64 2a 83 d2 3a 90 1c 60 54 65 ff ee ea c2 41 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client certificate OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 46 OpenSSL: TX ver0x303 content_type22 (handshake/client key exchange) OpenSSL: Message - hexdump(len70): 10 00 00 42 41 04 00 76 b7 24 8a c2 72 34 69 ff dd 85 1e a2 3e f6 df a9 5e ba 2a 57 7c 49 a0 bc 8d 52 12 42 b4 9f f7 ce c9 98 e5 e1 24 2a f9 bb a5 8b d0 e3 8f e7 4c fb a6 77 4b f9 48 c9 ce 65 26 6c 28 64 82 9b SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client key exchange OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 01 08 OpenSSL: TX ver0x303 content_type22 (handshake/certificate verify) OpenSSL: Message - hexdump(len264): 0f 00 01 04 08 04 01 00 35 c6 e4 96 6e 51 08 e5 20 1f e6 2c 5b d2 f6 25 d1 18 97 ff 20 17 ab bc 55 8a fb 63 d7 8c 96 08 26 cd 4d ae a2 b0 a0 73 5e 1d d6 f8 3c 9e f0 71 2e c9 ed 68 de 45 58 cd 2b 6e 4e 72 43 79 b9 23 e5 ca 86 4e 56 33 a6 c1 ec 9e b6 50 c2 a7 ed 81 26 3d b9 59 1b 8a 08 f2 3d 30 94 e1 0b 3a 0d 29 95 de d5 45 33 f1 1f 6d 4d 68 65 b4 94 97 a9 07 4f 5a 18 a2 f1 8d 43 16 34 76 21 fe 53 7b df 41 64 fc 51 19 0d 43 5c 7f 15 46 7c 74 1e bf a4 6c 85 5d ef a7 4d 07 c5 19 7d c2 ad 9b 82 91 ad 2c f6 af 83 19 8e bb 7f 27 35 7f 9d f5 e0 de 36 d1 b5 de 02 b2 1e b7 c5 1e 1b 50 db 9d 3f ea ec 39 4e e1 8f ff f7 fc 44 ac fc 16 12 8c 34 11 b2 f6 bb 31 15 63 6e 6f fc a7 24 7c 8c ce 11 5e dc 36 3d a4 3d 77 cd 3a d0 1e b0 87 e7 65 90 4a 87 6b c8 9d 3a c9 ba ad 34 05 fd d6 71 8f ac 3b f2 c8 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write certificate verify OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 14 03 03 00 01 OpenSSL: TX ver0x303 content_type20 (change cipher spec/) OpenSSL: Message - hexdump(len1): 01 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write change cipher spec OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 28 OpenSSL: TX ver0x303 content_type22 (handshake/finished) OpenSSL: Message - hexdump(len16): 14 00 00 0c df 27 77 5d d2 f1 cb 0f 5a 0b ef f0 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write finished SSL: (where0x1002 ret0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write finished SSL: SSL_connect - want more data SSL: 2670 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 2670 bytes left to be sent out (of total 2670 bytes) SSL: sending 1398 bytes, more fragments will follow EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3cade0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len1408) TX EAP - RADIUS - hexdump(len1408): 02 b7 05 80 0d c0 00 00 0a 6e 16 03 03 08 de 0b 00 08 da 00 08 d7 00 03 d3 30 82 03 cf 30 82 02 b7 a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 19 30 17 06 03 55 04 03 0c 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ac 64 f9 52 38 ec f6 6d 2e 16 5e 9e 5b 33 10 ca 9d b0 b8 2d c7 98 21 6e 76 49 c9 e7 73 48 82 90 a6 fd 40 85 2f 7a 6f a8 50 7f a8 8a 81 33 e1 b6 51 75 40 17 ea 49 bb 27 d3 f7 55 ee c4 47 0b 82 4e 29 3e 7d e0 b0 6e 6c aa 88 55 99 3e 21 a1 5e 22 35 22 01 71 2d 04 87 82 25 39 0a 26 d5 44 b2 8f eb 4d e3 29 46 a7 83 de e5 01 d5 81 e4 2c ed bf fe 7f 57 70 df 52 f0 64 77 e9 8f ff 30 43 19 8e 08 28 76 99 99 89 6f 8e a1 d4 e6 5e 34 6f 04 67 30 b9 b3 a1 94 53 3c 9f c6 e7 71 3e ad 2a 11 ff 38 33 24 35 3f 76 ee 91 cf da 03 51 56 3d 4a 12 7d 05 0c 73 8b 88 f4 d0 38 27 b3 e8 09 3c 8d ff 67 cc 2d 1f ce 02 c1 d8 34 62 2b 42 5a 33 19 ae cd 30 4a 89 54 74 6b b2 28 59 f7 65 7c 72 29 04 3d e1 fc 31 c8 c9 ad 8a 1c 10 17 4a 71 88 99 aa 44 28 f7 3d 18 d3 8f 9f 17 3e ca 71 56 bd 67 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 02 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 7f 6a 16 6b 0b 48 1b c5 b6 2f 4f e2 49 42 fe 84 16 f4 46 c3 f5 dd ea 61 2b e4 e9 91 ed 8f 00 c3 15 bc 58 ba c2 9a da 2b d6 c9 2f c1 a9 10 b3 fb 15 10 0c 2b 8f 3f 82 67 73 05 f2 69 45 46 26 8c a9 76 6c 07 67 af 42 a1 7d a8 5b 4a 1c c5 59 33 8e 7d c8 d4 e5 4b 93 7a 31 cf aa be 2e 9c 65 29 73 c7 02 3b b7 c1 49 a2 f5 54 ca 73 de b0 12 b4 55 03 44 34 aa cb 81 0e 11 4f a0 13 a7 d8 63 f3 3d 70 86 48 e7 88 ee 56 5c eb 83 04 c4 77 a7 e7 8d da 95 a6 1c b4 86 0c 48 51 b1 8a c6 b8 52 44 b8 3b 55 59 78 60 e9 94 42 c7 a1 28 4b 1d c7 95 fc 0e 5a 3f 63 56 2b 4c 9a 0e c6 2d 41 61 ad 1c e5 86 3b f3 71 14 1f e9 03 82 c6 41 3d 9d f7 88 77 d0 55 a0 dc cc d9 c3 1f 68 40 5f 07 a4 18 8d cf cc dd 11 13 bd 59 79 c7 f7 2c f1 2e 97 f7 63 47 28 92 c1 91 04 91 6e db e9 44 2f d8 c5 4a be 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier4 length1552Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 6477e98fff3043198e0828769999896f8ea1d4e65e346f046730b9b3a194533c9fc6e7713ead2a11ff383324353f76ee91cfda0351563d4a127d050c738b88f4d03827b3e8093c8dff67cc2d1fce02c1d834622b425a3319aecd304a8954746bb22859f7657c7229043de1fc31c8c9ad8a1c10174a718899aa4428f73d18d38f9f173eca7156bd670203010001a34f304d30130603551d25040c300a06082b0601050507030230360603551d1f042f302d302ba029a0278625687474703a2f2f7777772e6578616d706c652e636f6d2f6578616d706c655f63612e63726c300d06092a864886f70d01010b050003820101007f6a166b0b481bc5b62f4fAttribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length145Value: 065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d0101010500Attribute 24 (State) length18Value: 6c230b426f9406dd3f72ef77da978e44Attribute 80 (Message-Authenticator) length18Value: 8228db5cf9000b6b8ed9b81d4a63193b Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier4 length64Attribute 79 (EAP-Message) length8Value: 01b800060d00Attribute 80 (Message-Authenticator) length18Value: 59d4660db4b29806d55a0478b9a4c9a2Attribute 24 (State) length18Value: 6c230b42689b06dd3f72ef77da978e44 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id184 len6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id184 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len6) - Flags 0x00 SSL: 1272 bytes left to be sent out (of total 2670 bytes) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3cade0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len1278) TX EAP - RADIUS - hexdump(len1278): 02 b8 04 fe 0d 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d7 ab 97 ba 11 f9 01 e2 bc be 70 3c 7b 5a 46 8f ea 2a 40 2b d2 7b 36 1c 81 59 26 d7 d1 f5 7f c3 3a 40 04 83 d8 0c 8a 3f bc eb 16 bc a8 25 98 1c da 2e c7 33 0b 40 78 00 f1 7d cf f7 76 18 b2 f6 a4 a7 a9 22 16 ef 2c a4 20 0e 5b e3 5a 17 a0 f2 a1 5b f8 b4 33 12 c6 62 90 72 9a ea b2 c5 ba 23 7e c9 4e 9a 1f 52 57 48 3e ee de 76 62 6d 67 7f 0d d9 1e e8 92 02 fc 8d ae 4e 3c 01 5f b9 8a 4f 07 50 aa 0e 7e d1 bd 5c 3a 6b 86 23 63 8d 87 6f 4d ab 25 69 0b e8 7e 09 6d 7e 88 75 29 07 2b d3 ee de a0 bf f0 65 fd 9b 79 91 4e 0e 7b 74 0f 23 6f 20 37 2b 3b 0a d1 e9 ac ec 52 b3 75 41 ce a0 af 33 72 9d ae 3e 4a 63 22 e8 6b 44 a1 59 c6 df 35 79 0b 0b 6a 26 fc 94 28 a8 f3 23 e3 51 98 64 8b 7b 50 93 50 f3 dd 72 92 9a b5 f2 97 0f 5d d4 ef 27 15 75 f3 66 5b 69 b5 bd 94 76 8b 84 78 3f 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 5a 51 d3 79 e5 b5 6b 81 6e 7a 7b d9 ea 45 4a 1a 68 62 30 c6 0c 53 f1 7c a7 0b 7f 71 6c 0c 0d a2 eb af ba ac f1 61 5d ac 12 1f 23 e4 b9 f8 3b 66 70 0c 2d bf 93 5a 16 e9 ad 93 6f b6 c6 08 f9 f1 2c bd 45 02 7e 08 89 e6 b5 9c 78 cc 47 f4 07 ea 36 e3 2b dd 38 ae 9a 5b f3 90 9b f6 8c 03 28 e3 be f6 77 fe c2 d9 87 31 b1 bd 09 45 68 32 b2 11 c8 65 74 12 1e 3f 2e 8d e7 56 02 b0 f5 eb 97 4f 3a 4d e2 6a 81 54 97 22 77 94 51 a9 47 d6 9b 5d c9 f7 b3 88 e2 19 74 d5 ed 35 18 b7 04 d9 51 a1 ed a7 30 1d 00 94 93 e3 fc 40 7e bb ae 92 4d f0 16 90 3a 69 ad c3 79 09 ec df 37 22 eb 1b 96 46 33 fc cd 6e ef d8 f9 4c cc e6 10 8c e3 e8 4b 1d 4d 6e 8a 25 7b 20 e0 ba bd c5 3c d8 b2 40 e9 ca 84 40 bd 97 7a 4d b8 11 81 41 64 a7 89 0a bb 48 d0 64 2a 83 d2 3a 90 1c 60 54 65 ff ee ea c2 41 16 03 03 00 46 10 00 00 42 41 04 00 76 b7 24 8a c2 72 34 69 ff dd 85 1e a2 3e f6 df a9 5e ba 2a 57 7c 49 a0 bc 8d 52 12 42 b4 9f f7 ce c9 98 e5 e1 24 2a f9 bb a5 8b d0 e3 8f e7 4c fb a6 77 4b f9 48 c9 ce 65 26 6c 28 64 82 9b 16 03 03 01 08 0f 00 01 04 08 04 01 00 35 c6 e4 96 6e 51 08 e5 20 1f e6 2c 5b d2 f6 25 d1 18 97 ff 20 17 ab bc 55 8a fb 63 d7 8c 96 08 26 cd 4d ae a2 b0 a0 73 5e 1d d6 f8 3c 9e f0 71 2e c9 ed 68 de 45 58 cd 2b 6e 4e 72 43 79 b9 23 e5 ca 86 4e 56 33 a6 c1 ec 9e b6 50 c2 a7 ed 81 26 3d b9 59 1b 8a 08 f2 3d 30 94 e1 0b 3a 0d 29 95 de d5 45 33 f1 1f 6d 4d 68 65 b4 94 97 a9 07 4f 5a 18 a2 f1 8d 43 16 34 76 21 fe 53 7b df 41 64 fc 51 19 0d 43 5c 7f 15 46 7c 74 1e bf a4 6c 85 5d ef a7 4d 07 c5 19 7d c2 ad 9b 82 91 ad 2c f6 af 83 19 8e bb 7f 27 35 7f 9d f5 e0 de 36 d1 b5 de 02 b2 1e b7 c5 1e 1b 50 db 9d 3f ea ec 39 4e e1 8f ff f7 fc 44 ac fc 16 12 8c 34 11 b2 f6 bb 31 15 63 6e 6f fc a7 24 7c 8c ce 11 5e dc 36 3d a4 3d 77 cd 3a d0 1e b0 87 e7 65 90 4a 87 6b c8 9d 3a c9 ba ad 34 05 fd d6 71 8f ac 3b f2 c8 14 03 03 00 01 01 16 03 03 00 28 fb 60 0b d3 9c cb e7 d7 dd 29 d9 e5 5f c9 aa 28 5b 50 af 61 f3 e0 c9 c6 d0 e3 44 d8 e2 54 7e af cc 5a 6a d0 b7 57 63 eb Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier5 length1422Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 1dd6f83c9ef0712ec9ed68de4558cd2b6e4e724379b923e5ca864e5633a6c1ec9eb650c2a7ed81263db9591b8a08f23d3094e10b3a0d2995ded54533f11f6d4d6865b49497a9074f5a18a2f18d4316347621fe537bdf4164fc51190d435c7f15467c741ebfa46c855defa74d07c5197dc2ad9b8291ad2cf6af83198ebb7f27357f9df5e0de36d1b5de02b21eb7c51e1b50db9d3feaec394ee18ffff7fc44acfc16128c3411b2f6bb3115636e6ffca7247c8cce115edc363da43d77cd3ad01eb087e765904a876bc89d3ac9baad3405fdd6718fac3bf2c81403030001011603030028fb600bd39ccbe7d7dd29d9e55fc9aa285b50af61f3e0c9c6d0e344Attribute 79 (EAP-Message) length15Value: d8e2547eafcc5a6ad0b75763ebAttribute 24 (State) length18Value: 6c230b42689b06dd3f72ef77da978e44Attribute 80 (Message-Authenticator) length18Value: 9e2711b54704816bd91181531d40d2ae Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 119 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier5 length119Attribute 79 (EAP-Message) length63Value: 01b9003d0d80000000331403030001011603030028dc53bb3b9e6835a8a8c0d2fbd020917f5be216dd2e27079dbcfa8fb4ed08494bfd8bd80050b4c025Attribute 80 (Message-Authenticator) length18Value: d4e716bd5bb080da3b4c34ba4be986c0Attribute 24 (State) length18Value: 6c230b42699a06dd3f72ef77da978e44 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id185 len61) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id185 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len61) - Flags 0x80 SSL: TLS Message Length: 51 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 14 03 03 00 01 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write finished OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 28 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read change cipher spec OpenSSL: RX ver0x303 content_type22 (handshake/finished) OpenSSL: Message - hexdump(len16): 14 00 00 0c bd f4 c5 5b 76 2c 1d ce d3 3d ab 9f SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read finished SSL: (where0x20 ret0x1) SSL: (where0x1002 ret0x1) SSL: 0 bytes pending from ssl_out OpenSSL: Handshake finished - resumed0 SSL: No Application Data included SSL: Using TLS version TLSv1.2 SSL: No data to be sent out EAP-TLS: Done EAP-TLS: Derived key - hexdump(len64): d2 7c ad 7f 33 ed 9c 41 0c c9 3e ca 5a 54 46 ca 01 1d e9 0b d7 9a 51 9d 1c e1 e4 8b e7 f8 43 da 60 87 6a 79 43 b0 c5 ea 97 2e 79 74 70 49 c2 03 3c 1f 55 7f 0b 5e 68 d1 89 7f 4a b3 b2 fc cd 10 EAP-TLS: Derived EMSK - hexdump(len64): 9c cd 14 96 df 3d 8c 9a 85 3b c0 f1 80 c8 a9 9f 88 81 65 c4 57 b0 66 c0 27 6c 1d 88 89 2d 0c d2 16 e7 fb 31 64 79 ae 20 3d 01 26 02 84 26 b4 5f a1 3a 0c ec cf 25 fe 6e e7 1f e1 b3 a1 b2 bf a4 EAP-TLS: Derived Session-Id - hexdump(len65): 0d 7e 68 ad 1c 85 d2 20 ab f7 73 85 46 c7 5a 38 5b f6 4d c6 b4 d4 b0 9f ca 12 e9 ba bd eb d5 98 cc 11 ea c7 5f 3f 74 8e 3d fc f6 e1 de 94 d5 d4 83 28 00 32 22 21 b5 f4 9e fc b8 ce 4a 0b a8 c0 ad SSL: Building ACK (type13 id185 ver0) EAP: method process - ignoreFALSE methodStateDONE decisionUNCOND_SUCC eapRespData0x55f53f3c67f0 EAP: Session-Id - hexdump(len65): 0d 7e 68 ad 1c 85 d2 20 ab f7 73 85 46 c7 5a 38 5b f6 4d c6 b4 d4 b0 9f ca 12 e9 ba bd eb d5 98 cc 11 ea c7 5f 3f 74 8e 3d fc f6 e1 de 94 d5 d4 83 28 00 32 22 21 b5 f4 9e fc b8 ce 4a 0b a8 c0 ad EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len6) TX EAP - RADIUS - hexdump(len6): 02 b9 00 06 0d 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier6 length140Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length8Value: 02b900060d00Attribute 24 (State) length18Value: 6c230b42699a06dd3f72ef77da978e44Attribute 80 (Message-Authenticator) length18Value: d60ee5f5d4e73503749e17011d6c7964 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 169 bytes from RADIUS server Received RADIUS message RADIUS message: code2 (Access-Accept) identifier6 length169Attribute 26 (Vendor-Specific) length58Value: 000001371134835db3b61fa4a812390f35c1a0ee360d96bb6fadaa4de889d183aef6b4b6d97172080c42372979498be0d9365ad08f1e172dAttribute 26 (Vendor-Specific) length58Value: 0000013710348d35cf1bd49049e67b4a9dd51b3ad6094bf9a398722357d43683d9ba37f7db421553a6585e3c4e6bcf6d452dc05927015226Attribute 79 (EAP-Message) length6Value: 03b90004Attribute 80 (Message-Authenticator) length18Value: f5b5b912328634514791bfab1a66e1d9Attribute 1 (User-Name) length9Value: testing STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station MS-MPPE-Send-Key (sign) - hexdump(len32): 60 87 6a 79 43 b0 c5 ea 97 2e 79 74 70 49 c2 03 3c 1f 55 7f 0b 5e 68 d1 89 7f 4a b3 b2 fc cd 10 MS-MPPE-Recv-Key (crypt) - hexdump(len32): d2 7c ad 7f 33 ed 9c 41 0c c9 3e ca 5a 54 46 ca 01 1d e9 0b d7 9a 51 9d 1c e1 e4 8b e7 f8 43 da decapsulated EAP packet (code3 id185 len4) from RADIUS server: EAP Success EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (paramsuccess) EAP: EAP entering state SUCCESS CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required WPA: EAPOL processing complete Cancelling authentication timeout State: DISCONNECTED - COMPLETED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE eapol_sm_cb: result1 EAPOL: Successfully fetched key (len32) PMK from EAPOL - hexdump(len32): d2 7c ad 7f 33 ed 9c 41 0c c9 3e ca 5a 54 46 ca 01 1d e9 0b d7 9a 51 9d 1c e1 e4 8b e7 f8 43 da No EAP-Key-Name received from servereapol_test: Triggering EAP reauthenticationSending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: maintaining EAP method data for fast reauthentication EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id171 method1 vendor0 vendorMethod0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param) EAP: EAP-Request Identity data - hexdump_ascii(len0): EAP: using real identity - hexdump_ascii(len7):74 65 73 74 69 6e 67 testing EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len12) TX EAP - RADIUS - hexdump(len12): 02 ab 00 0c 01 74 65 73 74 69 6e 67 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len7): 74 65 73 74 69 6e 67 Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier7 length128Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length14Value: 02ab000c0174657374696e67Attribute 80 (Message-Authenticator) length18Value: 0a71043021b8182be018447a91ae3247 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier7 length64Attribute 79 (EAP-Message) length8Value: 01ac00060d20Attribute 80 (Message-Authenticator) length18Value: f7bc2d8b354b24b7d22e741701a20abeAttribute 24 (State) length18Value: fb1c2c65fbb0217da229744af77aa30f STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id172 len6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id172 method13 vendor0 vendorMethod0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor0 method13 EAP: Status notification: accept proposed method (paramTLS) EAP: Using previous method data for fast re-authentication EAP: Initialize selected EAP method: vendor 0 method 13 (TLS) CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected EAP: EAP entering state METHOD SSL: Received packet(len6) - Flags 0x20 EAP-TLS: Start SSL: (where0x10 ret0x1) SSL: (where0x1001 ret0x1) SSL: SSL_connect:before SSL initialization OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 01 00 b3 OpenSSL: TX ver0x303 content_type22 (handshake/client hello) OpenSSL: Message - hexdump(len179): 01 00 00 af 03 03 9d af b8 19 1c 05 97 0d 0f c3 a0 a6 6a 19 b3 3e 51 6c bd 83 0a 9c f0 d7 df 32 43 90 c3 af 4a 30 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 4e 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 2a 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client hello SSL: (where0x1002 ret0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write client hello SSL: SSL_connect - want more data SSL: 184 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 184 bytes left to be sent out (of total 184 bytes) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3be910 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len190) TX EAP - RADIUS - hexdump(len190): 02 ac 00 be 0d 00 16 03 01 00 b3 01 00 00 af 03 03 9d af b8 19 1c 05 97 0d 0f c3 a0 a6 6a 19 b3 3e 51 6c bd 83 0a 9c f0 d7 df 32 43 90 c3 af 4a 30 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 4e 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 2a 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier8 length324Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length192Value: 02ac00be0d0016030100b3010000af03039dafb8191c05970d0fc3a0a66a19b33e516cbd830a9cf0d7df324390c3af4a30000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602Attribute 24 (State) length18Value: fb1c2c65fbb0217da229744af77aa30fAttribute 80 (Message-Authenticator) length18Value: d9bf7e70fd9068540f30a0b63f123be0 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier8 length1068Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length247Value: 2d302ba029a0278625687474703a2f2f7777772e6578616d706c652e636f6d2f6578616d706c655f63612e63726c300d06092a864886f70d01010b05000382010100bd49899734116830715ab1b59f5748c02d47b925228a7c180cba3966d09c61d906ee2cc792065be7f44ea25da7837bd142d3b280178fbce6eda7abd9031f01f0cbbf17607d4543f9c649656f331584f56273933afd58fd4de6c40b9dff9dc2c4b7bcf09a713fcdf81a07ad00a73d099cbef6f1e81474d5fda07a975248861de4116171a7db5360e650bee856f75c838d51ae3bb1841f05e9f39166ff132a23e81cff02855b53cf09f7d54070be0c5107f64ab5Attribute 80 (Message-Authenticator) length18Value: 9b2ef2325b6c1f5345205355e04ea925Attribute 24 (State) length18Value: fb1c2c65fab1217da229744af77aa30f STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id173 len1004) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id173 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len1004) - Flags 0xc0 SSL: TLS Message Length: 2908 SSL: Need 1914 bytes more input data SSL: Building ACK (type13 id173 ver0) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3ac990 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len6) TX EAP - RADIUS - hexdump(len6): 02 ad 00 06 0d 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier9 length140Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length8Value: 02ad00060d00Attribute 24 (State) length18Value: fb1c2c65fab1217da229744af77aa30fAttribute 80 (Message-Authenticator) length18Value: a01251081874341f20265ae787acbd1e Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier9 length1068Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length247Value: 783f0203010001a38201423082013e301d0603551d0e0416041401571d779e50f5b591d6dad496f89ac3bc91cf273081d30603551d230481cb3081c8801401571d779e50f5b591d6dad496f89ac3bc91cf27a18199a48196308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747982144a1dec91e0Attribute 80 (Message-Authenticator) length18Value: 749a0511c21bbe85e2f98544f4b04083Attribute 24 (State) length18Value: fb1c2c65f9b2217da229744af77aa30f STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id174 len1004) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id174 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len1004) - Flags 0xc0 SSL: TLS Message Length: 2908 SSL: Need 920 bytes more input data SSL: Building ACK (type13 id174 ver0) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3c64f0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len6) TX EAP - RADIUS - hexdump(len6): 02 ae 00 06 0d 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier10 length140Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length8Value: 02ae00060d00Attribute 24 (State) length18Value: fb1c2c65f9b2217da229744af77aa30fAttribute 80 (Message-Authenticator) length18Value: 1c2532f478e413662af2678f7059a2fd Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 994 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier10 length994Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length173Value: 030204020502060200980096308193310b3009060355040613024652310f300d06035504080c065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747916030300040e000000Attribute 80 (Message-Authenticator) length18Value: c9d14b72281d494785bf27e0f0234e51Attribute 24 (State) length18Value: fb1c2c65f8b3217da229744af77aa30f STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id175 len930) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id175 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len930) - Flags 0x80 SSL: TLS Message Length: 2908 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 3d SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client hello OpenSSL: RX ver0x303 content_type22 (handshake/server hello) OpenSSL: Message - hexdump(len61): 02 00 00 39 03 03 42 92 63 8f 38 37 c7 53 52 d2 8e 65 b5 fe 48 f8 30 b1 9c 08 57 47 f1 76 37 4c 90 14 f0 c9 f3 1e 00 c0 30 00 00 11 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 17 00 00 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 08 e9 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server hello OpenSSL: RX ver0x303 content_type22 (handshake/certificate) OpenSSL: Message - hexdump(len2281): 0b 00 08 e5 00 08 e2 00 03 de 30 82 03 da 30 82 02 c2 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 0c 1a 45 78 61 6d 70 6c 65 20 53 65 72 76 65 72 20 43 65 72 74 69 66 69 63 61 74 65 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d1 c0 ab ff d4 6f 4b 53 69 d6 d0 04 16 36 4a b0 ad ef 9c b6 e6 65 0d 29 52 12 99 d8 ad 89 3b f2 18 f0 93 4d 0b 97 01 8b 2d ca 90 3b 2b c3 dc 35 14 4d be be 52 e7 20 21 d2 63 a2 13 82 31 49 2b a3 a6 aa df 64 0b cd ab c4 04 33 c2 2d 6d 53 ce 4f b3 84 c2 57 6c c9 32 6d ae 0b ef aa ad 84 20 74 85 b0 37 51 40 10 51 d1 3e 1e 17 5a 15 92 6d 4b d9 dd ab dc 4b c3 27 fd 88 eb a4 b0 1d 6e 4e 61 c5 4b 3a 36 b8 c3 15 0d 6b 44 69 90 45 e2 65 04 0c 85 d6 7f 18 1b d5 1e 23 6f 43 7e 03 b0 75 54 18 b6 d7 c5 70 f2 2c 52 16 de fb 52 dc 25 e1 db d6 43 8f 26 2d fa 04 f6 73 f1 fd 32 5a ba d4 e9 d0 5c d1 aa 66 25 8a 27 d5 d1 74 e6 c2 d4 c3 ec d7 56 b1 c9 d2 80 6c 8f d7 99 8d 76 5e 3b c8 09 11 01 fb a7 cc ad bb 33 f9 25 60 d6 fb a6 47 c3 03 d2 13 66 45 0a df d6 c2 96 d8 29 c6 93 87 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 bd 49 89 97 34 11 68 30 71 5a b1 b5 9f 57 48 c0 2d 47 b9 25 22 8a 7c 18 0c ba 39 66 d0 9c 61 d9 06 ee 2c c7 92 06 5b e7 f4 4e a2 5d a7 83 7b d1 42 d3 b2 80 17 8f bc e6 ed a7 ab d9 03 1f 01 f0 cb bf 17 60 7d 45 43 f9 c6 49 65 6f 33 15 84 f5 62 73 93 3a fd 58 fd 4d e6 c4 0b 9d ff 9d c2 c4 b7 bc f0 9a 71 3f cd f8 1a 07 ad 00 a7 3d 09 9c be f6 f1 e8 14 74 d5 fd a0 7a 97 52 48 86 1d e4 11 61 71 a7 db 53 60 e6 50 be e8 56 f7 5c 83 8d 51 ae 3b b1 84 1f 05 e9 f3 91 66 ff 13 2a 23 e8 1c ff 02 85 5b 53 cf 09 f7 d5 40 70 be 0c 51 07 f6 4a b5 d3 82 35 a4 81 1c 3f 2e 4c c1 29 e3 88 ad 6f 6c 62 37 38 6b 5f 4d 7e cc 8d 19 3c 24 65 df e0 51 19 44 74 b5 3e 1a c3 64 e4 b8 fd cb 52 7d 6d e8 ca 80 9c bf d5 eb 53 a4 77 85 e6 2e aa 3f 7b af be ff 69 9f 9e 63 1a 78 ef bd 38 d6 27 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d7 ab 97 ba 11 f9 01 e2 bc be 70 3c 7b 5a 46 8f ea 2a 40 2b d2 7b 36 1c 81 59 26 d7 d1 f5 7f c3 3a 40 04 83 d8 0c 8a 3f bc eb 16 bc a8 25 98 1c da 2e c7 33 0b 40 78 00 f1 7d cf f7 76 18 b2 f6 a4 a7 a9 22 16 ef 2c a4 20 0e 5b e3 5a 17 a0 f2 a1 5b f8 b4 33 12 c6 62 90 72 9a ea b2 c5 ba 23 7e c9 4e 9a 1f 52 57 48 3e ee de 76 62 6d 67 7f 0d d9 1e e8 92 02 fc 8d ae 4e 3c 01 5f b9 8a 4f 07 50 aa 0e 7e d1 bd 5c 3a 6b 86 23 63 8d 87 6f 4d ab 25 69 0b e8 7e 09 6d 7e 88 75 29 07 2b d3 ee de a0 bf f0 65 fd 9b 79 91 4e 0e 7b 74 0f 23 6f 20 37 2b 3b 0a d1 e9 ac ec 52 b3 75 41 ce a0 af 33 72 9d ae 3e 4a 63 22 e8 6b 44 a1 59 c6 df 35 79 0b 0b 6a 26 fc 94 28 a8 f3 23 e3 51 98 64 8b 7b 50 93 50 f3 dd 72 92 9a b5 f2 97 0f 5d d4 ef 27 15 75 f3 66 5b 69 b5 bd 94 76 8b 84 78 3f 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 5a 51 d3 79 e5 b5 6b 81 6e 7a 7b d9 ea 45 4a 1a 68 62 30 c6 0c 53 f1 7c a7 0b 7f 71 6c 0c 0d a2 eb af ba ac f1 61 5d ac 12 1f 23 e4 b9 f8 3b 66 70 0c 2d bf 93 5a 16 e9 ad 93 6f b6 c6 08 f9 f1 2c bd 45 02 7e 08 89 e6 b5 9c 78 cc 47 f4 07 ea 36 e3 2b dd 38 ae 9a 5b f3 90 9b f6 8c 03 28 e3 be f6 77 fe c2 d9 87 31 b1 bd 09 45 68 32 b2 11 c8 65 74 12 1e 3f 2e 8d e7 56 02 b0 f5 eb 97 4f 3a 4d e2 6a 81 54 97 22 77 94 51 a9 47 d6 9b 5d c9 f7 b3 88 e2 19 74 d5 ed 35 18 b7 04 d9 51 a1 ed a7 30 1d 00 94 93 e3 fc 40 7e bb ae 92 4d f0 16 90 3a 69 ad c3 79 09 ec df 37 22 eb 1b 96 46 33 fc cd 6e ef d8 f9 4c cc e6 10 8c e3 e8 4b 1d 4d 6e 8a 25 7b 20 e0 ba bd c5 3c d8 b2 40 e9 ca 84 40 bd 97 7a 4d b8 11 81 41 64 a7 89 0a bb 48 d0 64 2a 83 d2 3a 90 1c 60 54 65 ff ee ea c2 41 OpenSSL: Peer certificate - depth 1 Certificate:Data:Version: 3 (0x2)Serial Number:4a:1d:ec:91:e0:85:7d:76:d6:5f:37:d6:dd:aa:b4:19:11:76:eb:cbSignature Algorithm: sha256WithRSAEncryptionIssuer: CFR, STRadius, LSomewhere, OExample Inc./emailAddressadminexample.org, CNExample Certificate AuthorityValidityNot Before: Feb 21 02:55:25 2024 GMTNot After : Apr 21 02:55:25 2024 GMTSubject: CFR, STRadius, LSomewhere, OExample Inc./emailAddressadminexample.org, CNExample Certificate AuthoritySubject Public Key Info:Public Key Algorithm: rsaEncryptionRSA Public-Key: (2048 bit)Modulus:00:d7:ab:97:ba:11:f9:01:e2:bc:be:70:3c:7b:5a:46:8f:ea:2a:40:2b:d2:7b:36:1c:81:59:26:d7:d1:f5:7f:c3:3a:40:04:83:d8:0c:8a:3f:bc:eb:16:bc:a8:25:98:1c:da:2e:c7:33:0b:40:78:00:f1:7d:cf:f7:76:18:b2:f6:a4:a7:a9:22:16:ef:2c:a4:20:0e:5b:e3:5a:17:a0:f2:a1:5b:f8:b4:33:12:c6:62:90:72:9a:ea:b2:c5:ba:23:7e:c9:4e:9a:1f:52:57:48:3e:ee:de:76:62:6d:67:7f:0d:d9:1e:e8:92:02:fc:8d:ae:4e:3c:01:5f:b9:8a:4f:07:50:aa:0e:7e:d1:bd:5c:3a:6b:86:23:63:8d:87:6f:4d:ab:25:69:0b:e8:7e:09:6d:7e:88:75:29:07:2b:d3:ee:de:a0:bf:f0:65:fd:9b:79:91:4e:0e:7b:74:0f:23:6f:20:37:2b:3b:0a:d1:e9:ac:ec:52:b3:75:41:ce:a0:af:33:72:9d:ae:3e:4a:63:22:e8:6b:44:a1:59:c6:df:35:79:0b:0b:6a:26:fc:94:28:a8:f3:23:e3:51:98:64:8b:7b:50:93:50:f3:dd:72:92:9a:b5:f2:97:0f:5d:d4:ef:27:15:75:f3:66:5b:69:b5:bd:94:76:8b:84:78:3fExponent: 65537 (0x10001)X509v3 extensions:X509v3 Subject Key Identifier: 01:57:1D:77:9E:50:F5:B5:91:D6:DA:D4:96:F8:9A:C3:BC:91:CF:27X509v3 Authority Key Identifier: keyid:01:57:1D:77:9E:50:F5:B5:91:D6:DA:D4:96:F8:9A:C3:BC:91:CF:27DirName:/CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authorityserial:4A:1D:EC:91:E0:85:7D:76:D6:5F:37:D6:DD:AA:B4:19:11:76:EB:CBX509v3 Basic Constraints: criticalCA:TRUEX509v3 CRL Distribution Points: Full Name:URI:http://www.example.org/example_ca.crlSignature Algorithm: sha256WithRSAEncryption5a:51:d3:79:e5:b5:6b:81:6e:7a:7b:d9:ea:45:4a:1a:68:62:30:c6:0c:53:f1:7c:a7:0b:7f:71:6c:0c:0d:a2:eb:af:ba:ac:f1:61:5d:ac:12:1f:23:e4:b9:f8:3b:66:70:0c:2d:bf:93:5a:16:e9:ad:93:6f:b6:c6:08:f9:f1:2c:bd:45:02:7e:08:89:e6:b5:9c:78:cc:47:f4:07:ea:36:e3:2b:dd:38:ae:9a:5b:f3:90:9b:f6:8c:03:28:e3:be:f6:77:fe:c2:d9:87:31:b1:bd:09:45:68:32:b2:11:c8:65:74:12:1e:3f:2e:8d:e7:56:02:b0:f5:eb:97:4f:3a:4d:e2:6a:81:54:97:22:77:94:51:a9:47:d6:9b:5d:c9:f7:b3:88:e2:19:74:d5:ed:35:18:b7:04:d9:51:a1:ed:a7:30:1d:00:94:93:e3:fc:40:7e:bb:ae:92:4d:f0:16:90:3a:69:ad:c3:79:09:ec:df:37:22:eb:1b:96:46:33:fc:cd:6e:ef:d8:f9:4c:cc:e6:10:8c:e3:e8:4b:1d:4d:6e:8a:25:7b:20:e0:ba:bd:c5:3c:d8:b2:40:e9:ca:84:40:bd:97:7a:4d:b8:11:81:41:64:a7:89:0a:bb:48:d0:64:2a:83:d2:3a:90:1c:60:54:65:ff:ee:ea:c2:41CTRL-EVENT-EAP-PEER-CERT depth1 subject/CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority hash5a7df6ac8a17be4f95d70e75e60d255c20228efd5de61400b72207dfbc976477 TLS: tls_verify_cb - preverify_ok1 err0 (ok) ca_cert_verify1 depth1 buf/CFR/STRadius/LSomewhere/OExample Inc./emailAddressadminexample.org/CNExample Certificate Authority OpenSSL: Peer certificate - depth 0 Certificate:Data:Version: 3 (0x2)Serial Number: 1 (0x1)Signature Algorithm: sha256WithRSAEncryptionIssuer: CFR, STRadius, LSomewhere, OExample Inc./emailAddressadminexample.org, CNExample Certificate AuthorityValidityNot Before: Feb 21 02:55:25 2024 GMTNot After : Apr 21 02:55:25 2024 GMTSubject: CFR, STRadius, OExample Inc., CNExample Server Certificate/emailAddressadminexample.orgSubject Public Key Info:Public Key Algorithm: rsaEncryptionRSA Public-Key: (2048 bit)Modulus:00:d1:c0:ab:ff:d4:6f:4b:53:69:d6:d0:04:16:36:4a:b0:ad:ef:9c:b6:e6:65:0d:29:52:12:99:d8:ad:89:3b:f2:18:f0:93:4d:0b:97:01:8b:2d:ca:90:3b:2b:c3:dc:35:14:4d:be:be:52:e7:20:21:d2:63:a2:13:82:31:49:2b:a3:a6:aa:df:64:0b:cd:ab:c4:04:33:c2:2d:6d:53:ce:4f:b3:84:c2:57:6c:c9:32:6d:ae:0b:ef:aa:ad:84:20:74:85:b0:37:51:40:10:51:d1:3e:1e:17:5a:15:92:6d:4b:d9:dd:ab:dc:4b:c3:27:fd:88:eb:a4:b0:1d:6e:4e:61:c5:4b:3a:36:b8:c3:15:0d:6b:44:69:90:45:e2:65:04:0c:85:d6:7f:18:1b:d5:1e:23:6f:43:7e:03:b0:75:54:18:b6:d7:c5:70:f2:2c:52:16:de:fb:52:dc:25:e1:db:d6:43:8f:26:2d:fa:04:f6:73:f1:fd:32:5a:ba:d4:e9:d0:5c:d1:aa:66:25:8a:27:d5:d1:74:e6:c2:d4:c3:ec:d7:56:b1:c9:d2:80:6c:8f:d7:99:8d:76:5e:3b:c8:09:11:01:fb:a7:cc:ad:bb:33:f9:25:60:d6:fb:a6:47:c3:03:d2:13:66:45:0a:df:d6:c2:96:d8:29:c6:93:87Exponent: 65537 (0x10001)X509v3 extensions:X509v3 Extended Key Usage: TLS Web Server AuthenticationX509v3 CRL Distribution Points: Full Name:URI:http://www.example.com/example_ca.crlSignature Algorithm: sha256WithRSAEncryptionbd:49:89:97:34:11:68:30:71:5a:b1:b5:9f:57:48:c0:2d:47:b9:25:22:8a:7c:18:0c:ba:39:66:d0:9c:61:d9:06:ee:2c:c7:92:06:5b:e7:f4:4e:a2:5d:a7:83:7b:d1:42:d3:b2:80:17:8f:bc:e6:ed:a7:ab:d9:03:1f:01:f0:cb:bf:17:60:7d:45:43:f9:c6:49:65:6f:33:15:84:f5:62:73:93:3a:fd:58:fd:4d:e6:c4:0b:9d:ff:9d:c2:c4:b7:bc:f0:9a:71:3f:cd:f8:1a:07:ad:00:a7:3d:09:9c:be:f6:f1:e8:14:74:d5:fd:a0:7a:97:52:48:86:1d:e4:11:61:71:a7:db:53:60:e6:50:be:e8:56:f7:5c:83:8d:51:ae:3b:b1:84:1f:05:e9:f3:91:66:ff:13:2a:23:e8:1c:ff:02:85:5b:53:cf:09:f7:d5:40:70:be:0c:51:07:f6:4a:b5:d3:82:35:a4:81:1c:3f:2e:4c:c1:29:e3:88:ad:6f:6c:62:37:38:6b:5f:4d:7e:cc:8d:19:3c:24:65:df:e0:51:19:44:74:b5:3e:1a:c3:64:e4:b8:fd:cb:52:7d:6d:e8:ca:80:9c:bf:d5:eb:53:a4:77:85:e6:2e:aa:3f:7b:af:be:ff:69:9f:9e:63:1a:78:ef:bd:38:d6:27CTRL-EVENT-EAP-PEER-CERT depth0 subject/CFR/STRadius/OExample Inc./CNExample Server Certificate/emailAddressadminexample.org hash442c76845b6912ab534b2e2ea69570c8c86cd0e6098e66239bfd6bcc0a40d9fc TLS: tls_verify_cb - preverify_ok1 err0 (ok) ca_cert_verify1 depth0 buf/CFR/STRadius/OExample Inc./CNExample Server Certificate/emailAddressadminexample.org EAP: Status notification: remote certificate verification (paramsuccess) OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 01 4d SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server certificate OpenSSL: RX ver0x303 content_type22 (handshake/server key exchange) OpenSSL: Message - hexdump(len333): 0c 00 01 49 03 00 17 41 04 e4 92 af 51 bf 9d c7 95 61 0d c8 00 b3 07 75 56 2a 27 8b de 32 43 86 06 00 87 84 8f ba dc 72 37 0d 86 a3 72 47 70 d6 a9 66 5d 4a b2 20 f4 ce 98 c0 e1 cb 83 d2 40 ba 6e 37 58 34 e5 22 58 ef 53 08 04 01 00 7c 46 43 9b 0e 11 00 f5 1d d5 68 6c 67 db 4e 90 f6 11 7f 92 29 4b 13 14 e7 16 60 8d 93 a9 ac b0 21 47 cd 80 d3 b0 5a 9c 01 d5 53 8e fc 7f 2c b6 42 94 76 12 b2 81 1a 2c 87 1c 3d 43 ad ba 2c 30 79 43 e7 2c ca 48 01 dc 14 43 74 a9 a0 53 e3 4f 62 08 65 5c 3f be a8 a4 1f 7e 4c b5 ed bb f9 91 42 75 0f 2b 91 93 11 47 d9 08 0e 93 25 1b 6e cd cc 35 1e 4d f7 e2 13 a0 3b 00 b1 83 e1 d0 66 b6 a2 9e f7 1a 16 53 38 3f c4 ff b4 87 8e b7 99 91 a6 14 66 a9 78 dc 76 51 13 3e 00 4e 9a ce 96 f5 61 e4 3f a1 14 8b 7b c1 62 33 5b 2e 3f 38 78 28 fd ce 50 75 e5 b7 8c b3 b3 d7 78 e6 8e 88 25 2d 23 63 ff d2 78 9e ce af 79 c2 f9 32 46 57 a0 22 28 00 f2 e9 e3 ae f8 f1 9b 7b 64 e8 40 d9 34 99 84 e9 73 94 e5 45 45 b1 35 1d 74 b4 0c 26 11 c4 fc cc 20 e2 ff 15 ae 39 db 1e 4d 31 fc 0f 14 12 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 cc SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server key exchange OpenSSL: RX ver0x303 content_type22 (handshake/certificate request) OpenSSL: Message - hexdump(len204): 0d 00 00 c8 03 01 02 40 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 00 98 00 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 04 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server certificate request OpenSSL: RX ver0x303 content_type22 (handshake/server hello done) OpenSSL: Message - hexdump(len4): 0e 00 00 00 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read server done OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 08 de OpenSSL: TX ver0x303 content_type22 (handshake/certificate) OpenSSL: Message - hexdump(len2270): 0b 00 08 da 00 08 d7 00 03 d3 30 82 03 cf 30 82 02 b7 a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 19 30 17 06 03 55 04 03 0c 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ac 64 f9 52 38 ec f6 6d 2e 16 5e 9e 5b 33 10 ca 9d b0 b8 2d c7 98 21 6e 76 49 c9 e7 73 48 82 90 a6 fd 40 85 2f 7a 6f a8 50 7f a8 8a 81 33 e1 b6 51 75 40 17 ea 49 bb 27 d3 f7 55 ee c4 47 0b 82 4e 29 3e 7d e0 b0 6e 6c aa 88 55 99 3e 21 a1 5e 22 35 22 01 71 2d 04 87 82 25 39 0a 26 d5 44 b2 8f eb 4d e3 29 46 a7 83 de e5 01 d5 81 e4 2c ed bf fe 7f 57 70 df 52 f0 64 77 e9 8f ff 30 43 19 8e 08 28 76 99 99 89 6f 8e a1 d4 e6 5e 34 6f 04 67 30 b9 b3 a1 94 53 3c 9f c6 e7 71 3e ad 2a 11 ff 38 33 24 35 3f 76 ee 91 cf da 03 51 56 3d 4a 12 7d 05 0c 73 8b 88 f4 d0 38 27 b3 e8 09 3c 8d ff 67 cc 2d 1f ce 02 c1 d8 34 62 2b 42 5a 33 19 ae cd 30 4a 89 54 74 6b b2 28 59 f7 65 7c 72 29 04 3d e1 fc 31 c8 c9 ad 8a 1c 10 17 4a 71 88 99 aa 44 28 f7 3d 18 d3 8f 9f 17 3e ca 71 56 bd 67 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 02 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 7f 6a 16 6b 0b 48 1b c5 b6 2f 4f e2 49 42 fe 84 16 f4 46 c3 f5 dd ea 61 2b e4 e9 91 ed 8f 00 c3 15 bc 58 ba c2 9a da 2b d6 c9 2f c1 a9 10 b3 fb 15 10 0c 2b 8f 3f 82 67 73 05 f2 69 45 46 26 8c a9 76 6c 07 67 af 42 a1 7d a8 5b 4a 1c c5 59 33 8e 7d c8 d4 e5 4b 93 7a 31 cf aa be 2e 9c 65 29 73 c7 02 3b b7 c1 49 a2 f5 54 ca 73 de b0 12 b4 55 03 44 34 aa cb 81 0e 11 4f a0 13 a7 d8 63 f3 3d 70 86 48 e7 88 ee 56 5c eb 83 04 c4 77 a7 e7 8d da 95 a6 1c b4 86 0c 48 51 b1 8a c6 b8 52 44 b8 3b 55 59 78 60 e9 94 42 c7 a1 28 4b 1d c7 95 fc 0e 5a 3f 63 56 2b 4c 9a 0e c6 2d 41 61 ad 1c e5 86 3b f3 71 14 1f e9 03 82 c6 41 3d 9d f7 88 77 d0 55 a0 dc cc d9 c3 1f 68 40 5f 07 a4 18 8d cf cc dd 11 13 bd 59 79 c7 f7 2c f1 2e 97 f7 63 47 28 92 c1 91 04 91 6e db e9 44 2f d8 c5 4a be 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d7 ab 97 ba 11 f9 01 e2 bc be 70 3c 7b 5a 46 8f ea 2a 40 2b d2 7b 36 1c 81 59 26 d7 d1 f5 7f c3 3a 40 04 83 d8 0c 8a 3f bc eb 16 bc a8 25 98 1c da 2e c7 33 0b 40 78 00 f1 7d cf f7 76 18 b2 f6 a4 a7 a9 22 16 ef 2c a4 20 0e 5b e3 5a 17 a0 f2 a1 5b f8 b4 33 12 c6 62 90 72 9a ea b2 c5 ba 23 7e c9 4e 9a 1f 52 57 48 3e ee de 76 62 6d 67 7f 0d d9 1e e8 92 02 fc 8d ae 4e 3c 01 5f b9 8a 4f 07 50 aa 0e 7e d1 bd 5c 3a 6b 86 23 63 8d 87 6f 4d ab 25 69 0b e8 7e 09 6d 7e 88 75 29 07 2b d3 ee de a0 bf f0 65 fd 9b 79 91 4e 0e 7b 74 0f 23 6f 20 37 2b 3b 0a d1 e9 ac ec 52 b3 75 41 ce a0 af 33 72 9d ae 3e 4a 63 22 e8 6b 44 a1 59 c6 df 35 79 0b 0b 6a 26 fc 94 28 a8 f3 23 e3 51 98 64 8b 7b 50 93 50 f3 dd 72 92 9a b5 f2 97 0f 5d d4 ef 27 15 75 f3 66 5b 69 b5 bd 94 76 8b 84 78 3f 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 5a 51 d3 79 e5 b5 6b 81 6e 7a 7b d9 ea 45 4a 1a 68 62 30 c6 0c 53 f1 7c a7 0b 7f 71 6c 0c 0d a2 eb af ba ac f1 61 5d ac 12 1f 23 e4 b9 f8 3b 66 70 0c 2d bf 93 5a 16 e9 ad 93 6f b6 c6 08 f9 f1 2c bd 45 02 7e 08 89 e6 b5 9c 78 cc 47 f4 07 ea 36 e3 2b dd 38 ae 9a 5b f3 90 9b f6 8c 03 28 e3 be f6 77 fe c2 d9 87 31 b1 bd 09 45 68 32 b2 11 c8 65 74 12 1e 3f 2e 8d e7 56 02 b0 f5 eb 97 4f 3a 4d e2 6a 81 54 97 22 77 94 51 a9 47 d6 9b 5d c9 f7 b3 88 e2 19 74 d5 ed 35 18 b7 04 d9 51 a1 ed a7 30 1d 00 94 93 e3 fc 40 7e bb ae 92 4d f0 16 90 3a 69 ad c3 79 09 ec df 37 22 eb 1b 96 46 33 fc cd 6e ef d8 f9 4c cc e6 10 8c e3 e8 4b 1d 4d 6e 8a 25 7b 20 e0 ba bd c5 3c d8 b2 40 e9 ca 84 40 bd 97 7a 4d b8 11 81 41 64 a7 89 0a bb 48 d0 64 2a 83 d2 3a 90 1c 60 54 65 ff ee ea c2 41 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client certificate OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 46 OpenSSL: TX ver0x303 content_type22 (handshake/client key exchange) OpenSSL: Message - hexdump(len70): 10 00 00 42 41 04 d3 c6 05 01 56 d9 2e 65 e8 0c 75 42 26 f8 9d 9e e6 58 72 36 0e af ea 5c bf 16 03 8c e6 c1 44 76 73 bf 27 85 02 02 ec 9d a3 f2 0b b2 17 de 82 a1 56 ea 3d c2 b0 83 67 ec 70 25 f2 3f 28 e2 d4 05 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write client key exchange OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 01 08 OpenSSL: TX ver0x303 content_type22 (handshake/certificate verify) OpenSSL: Message - hexdump(len264): 0f 00 01 04 08 04 01 00 7f 8e 74 99 cb 70 ee c1 f0 ff 85 a5 c9 8b bc b7 05 67 23 57 d0 ef 2b e2 2f 1e 97 29 ee ab 3c ac a5 f2 ab a3 db 42 21 3a 1b e0 12 00 a3 ef 85 bd 5d a9 96 ea f6 05 aa f6 d4 2c 77 39 91 bd e3 c8 a1 04 cd 3d 2d fc 06 bd 93 6e 20 62 fe 36 86 de 5f 00 87 41 d0 c1 7c 96 08 fd 6a ca 37 67 2e e7 68 4a 45 13 9b ec e1 f7 06 7a 49 ef 81 57 36 01 e4 bd a0 28 80 95 7a 35 ee fc bc 14 fd 1e 48 ff a6 fd 7c b9 31 6f 2b 1c 4e 45 55 ff d5 49 f9 9e 57 ad a2 4f 5b f3 67 e8 81 8b b7 7b a6 18 58 40 bf c9 21 d2 24 55 c9 89 13 b9 a3 04 c4 97 b2 26 03 84 20 c4 5d 6e 2d 1d ea b5 a6 2f ed 5c 5a 70 ba 6b 56 7d 49 8b d4 18 2c 2c af b0 fe 0e d3 c2 19 a9 2b 52 7e b2 dd 26 0c 63 52 a9 20 9f 78 22 e3 a9 45 b9 cd a0 2d 31 aa b8 74 ac 44 54 9b 01 11 5e 7f 73 66 d6 bb b8 46 54 b1 81 a1 76 4a dc SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write certificate verify OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 14 03 03 00 01 OpenSSL: TX ver0x303 content_type20 (change cipher spec/) OpenSSL: Message - hexdump(len1): 01 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write change cipher spec OpenSSL: TX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 28 OpenSSL: TX ver0x303 content_type22 (handshake/finished) OpenSSL: Message - hexdump(len16): 14 00 00 0c 72 58 7f 2c a9 84 e1 36 75 92 67 aa SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write finished SSL: (where0x1002 ret0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write finished SSL: SSL_connect - want more data SSL: 2670 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 2670 bytes left to be sent out (of total 2670 bytes) SSL: sending 1398 bytes, more fragments will follow EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3cea60 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len1408) TX EAP - RADIUS - hexdump(len1408): 02 af 05 80 0d c0 00 00 0a 6e 16 03 03 08 de 0b 00 08 da 00 08 d7 00 03 d3 30 82 03 cf 30 82 02 b7 a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 19 30 17 06 03 55 04 03 0c 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 1f 30 1d 06 09 2a 86 48 86 f7 0d 01 09 01 16 10 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ac 64 f9 52 38 ec f6 6d 2e 16 5e 9e 5b 33 10 ca 9d b0 b8 2d c7 98 21 6e 76 49 c9 e7 73 48 82 90 a6 fd 40 85 2f 7a 6f a8 50 7f a8 8a 81 33 e1 b6 51 75 40 17 ea 49 bb 27 d3 f7 55 ee c4 47 0b 82 4e 29 3e 7d e0 b0 6e 6c aa 88 55 99 3e 21 a1 5e 22 35 22 01 71 2d 04 87 82 25 39 0a 26 d5 44 b2 8f eb 4d e3 29 46 a7 83 de e5 01 d5 81 e4 2c ed bf fe 7f 57 70 df 52 f0 64 77 e9 8f ff 30 43 19 8e 08 28 76 99 99 89 6f 8e a1 d4 e6 5e 34 6f 04 67 30 b9 b3 a1 94 53 3c 9f c6 e7 71 3e ad 2a 11 ff 38 33 24 35 3f 76 ee 91 cf da 03 51 56 3d 4a 12 7d 05 0c 73 8b 88 f4 d0 38 27 b3 e8 09 3c 8d ff 67 cc 2d 1f ce 02 c1 d8 34 62 2b 42 5a 33 19 ae cd 30 4a 89 54 74 6b b2 28 59 f7 65 7c 72 29 04 3d e1 fc 31 c8 c9 ad 8a 1c 10 17 4a 71 88 99 aa 44 28 f7 3d 18 d3 8f 9f 17 3e ca 71 56 bd 67 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 02 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 7f 6a 16 6b 0b 48 1b c5 b6 2f 4f e2 49 42 fe 84 16 f4 46 c3 f5 dd ea 61 2b e4 e9 91 ed 8f 00 c3 15 bc 58 ba c2 9a da 2b d6 c9 2f c1 a9 10 b3 fb 15 10 0c 2b 8f 3f 82 67 73 05 f2 69 45 46 26 8c a9 76 6c 07 67 af 42 a1 7d a8 5b 4a 1c c5 59 33 8e 7d c8 d4 e5 4b 93 7a 31 cf aa be 2e 9c 65 29 73 c7 02 3b b7 c1 49 a2 f5 54 ca 73 de b0 12 b4 55 03 44 34 aa cb 81 0e 11 4f a0 13 a7 d8 63 f3 3d 70 86 48 e7 88 ee 56 5c eb 83 04 c4 77 a7 e7 8d da 95 a6 1c b4 86 0c 48 51 b1 8a c6 b8 52 44 b8 3b 55 59 78 60 e9 94 42 c7 a1 28 4b 1d c7 95 fc 0e 5a 3f 63 56 2b 4c 9a 0e c6 2d 41 61 ad 1c e5 86 3b f3 71 14 1f e9 03 82 c6 41 3d 9d f7 88 77 d0 55 a0 dc cc d9 c3 1f 68 40 5f 07 a4 18 8d cf cc dd 11 13 bd 59 79 c7 f7 2c f1 2e 97 f7 63 47 28 92 c1 91 04 91 6e db e9 44 2f d8 c5 4a be 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 34 30 32 32 31 30 32 35 35 32 35 5a 17 0d 32 34 30 34 32 31 30 32 35 35 32 35 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier11 length1552Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: e24942fe8416f446c3f5ddea612be4e991ed8f00c315bc58bac29ada2bd6c92fc1a910b3fb15100c2b8f3f82677305f2694546268ca9766c0767af42a17da85b4a1cc559338e7dc8d4e54b937a31cfaabe2e9c652973c7023bb7c149a2f554ca73deb012b455034434aacb810e114fa013a7d863f33d708648e788ee565ceb8304c477a7e78dda95a61cb4860c4851b18ac6b85244b83b55597860e99442c7a1284b1dc795fc0e5a3f63562b4c9a0ec62d4161ad1ce5863bf371141fe90382c6413d9df78877d055a0dcccd9c31f68405f07a4188dcfccdd1113bd5979c7f72cf12e97f763472892c19104916edbe9442fd8c54abe0004fe308204fa30Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length145Value: 065261646975733112301006035504070c09536f6d65776865726531153013060355040a0c0c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e6f72673126302406035504030c1d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d0101010500Attribute 24 (State) length18Value: fb1c2c65f8b3217da229744af77aa30fAttribute 80 (Message-Authenticator) length18Value: 1fd16a3aa49b0dc01535f283156a1807 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier11 length64Attribute 79 (EAP-Message) length8Value: 01b000060d00Attribute 80 (Message-Authenticator) length18Value: 8a8e30c8f095efd8ffcb79f3a92d7d73Attribute 24 (State) length18Value: fb1c2c65ffac217da229744af77aa30f STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id176 len6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id176 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len6) - Flags 0x00 SSL: 1272 bytes left to be sent out (of total 2670 bytes) EAP: method process - ignoreFALSE methodStateMAY_CONT decisionFAIL eapRespData0x55f53f3cdf60 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len1278) TX EAP - RADIUS - hexdump(len1278): 02 b0 04 fe 0d 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d7 ab 97 ba 11 f9 01 e2 bc be 70 3c 7b 5a 46 8f ea 2a 40 2b d2 7b 36 1c 81 59 26 d7 d1 f5 7f c3 3a 40 04 83 d8 0c 8a 3f bc eb 16 bc a8 25 98 1c da 2e c7 33 0b 40 78 00 f1 7d cf f7 76 18 b2 f6 a4 a7 a9 22 16 ef 2c a4 20 0e 5b e3 5a 17 a0 f2 a1 5b f8 b4 33 12 c6 62 90 72 9a ea b2 c5 ba 23 7e c9 4e 9a 1f 52 57 48 3e ee de 76 62 6d 67 7f 0d d9 1e e8 92 02 fc 8d ae 4e 3c 01 5f b9 8a 4f 07 50 aa 0e 7e d1 bd 5c 3a 6b 86 23 63 8d 87 6f 4d ab 25 69 0b e8 7e 09 6d 7e 88 75 29 07 2b d3 ee de a0 bf f0 65 fd 9b 79 91 4e 0e 7b 74 0f 23 6f 20 37 2b 3b 0a d1 e9 ac ec 52 b3 75 41 ce a0 af 33 72 9d ae 3e 4a 63 22 e8 6b 44 a1 59 c6 df 35 79 0b 0b 6a 26 fc 94 28 a8 f3 23 e3 51 98 64 8b 7b 50 93 50 f3 dd 72 92 9a b5 f2 97 0f 5d d4 ef 27 15 75 f3 66 5b 69 b5 bd 94 76 8b 84 78 3f 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 01 57 1d 77 9e 50 f5 b5 91 d6 da d4 96 f8 9a c3 bc 91 cf 27 a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 4a 1d ec 91 e0 85 7d 76 d6 5f 37 d6 dd aa b4 19 11 76 eb cb 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 5a 51 d3 79 e5 b5 6b 81 6e 7a 7b d9 ea 45 4a 1a 68 62 30 c6 0c 53 f1 7c a7 0b 7f 71 6c 0c 0d a2 eb af ba ac f1 61 5d ac 12 1f 23 e4 b9 f8 3b 66 70 0c 2d bf 93 5a 16 e9 ad 93 6f b6 c6 08 f9 f1 2c bd 45 02 7e 08 89 e6 b5 9c 78 cc 47 f4 07 ea 36 e3 2b dd 38 ae 9a 5b f3 90 9b f6 8c 03 28 e3 be f6 77 fe c2 d9 87 31 b1 bd 09 45 68 32 b2 11 c8 65 74 12 1e 3f 2e 8d e7 56 02 b0 f5 eb 97 4f 3a 4d e2 6a 81 54 97 22 77 94 51 a9 47 d6 9b 5d c9 f7 b3 88 e2 19 74 d5 ed 35 18 b7 04 d9 51 a1 ed a7 30 1d 00 94 93 e3 fc 40 7e bb ae 92 4d f0 16 90 3a 69 ad c3 79 09 ec df 37 22 eb 1b 96 46 33 fc cd 6e ef d8 f9 4c cc e6 10 8c e3 e8 4b 1d 4d 6e 8a 25 7b 20 e0 ba bd c5 3c d8 b2 40 e9 ca 84 40 bd 97 7a 4d b8 11 81 41 64 a7 89 0a bb 48 d0 64 2a 83 d2 3a 90 1c 60 54 65 ff ee ea c2 41 16 03 03 00 46 10 00 00 42 41 04 d3 c6 05 01 56 d9 2e 65 e8 0c 75 42 26 f8 9d 9e e6 58 72 36 0e af ea 5c bf 16 03 8c e6 c1 44 76 73 bf 27 85 02 02 ec 9d a3 f2 0b b2 17 de 82 a1 56 ea 3d c2 b0 83 67 ec 70 25 f2 3f 28 e2 d4 05 16 03 03 01 08 0f 00 01 04 08 04 01 00 7f 8e 74 99 cb 70 ee c1 f0 ff 85 a5 c9 8b bc b7 05 67 23 57 d0 ef 2b e2 2f 1e 97 29 ee ab 3c ac a5 f2 ab a3 db 42 21 3a 1b e0 12 00 a3 ef 85 bd 5d a9 96 ea f6 05 aa f6 d4 2c 77 39 91 bd e3 c8 a1 04 cd 3d 2d fc 06 bd 93 6e 20 62 fe 36 86 de 5f 00 87 41 d0 c1 7c 96 08 fd 6a ca 37 67 2e e7 68 4a 45 13 9b ec e1 f7 06 7a 49 ef 81 57 36 01 e4 bd a0 28 80 95 7a 35 ee fc bc 14 fd 1e 48 ff a6 fd 7c b9 31 6f 2b 1c 4e 45 55 ff d5 49 f9 9e 57 ad a2 4f 5b f3 67 e8 81 8b b7 7b a6 18 58 40 bf c9 21 d2 24 55 c9 89 13 b9 a3 04 c4 97 b2 26 03 84 20 c4 5d 6e 2d 1d ea b5 a6 2f ed 5c 5a 70 ba 6b 56 7d 49 8b d4 18 2c 2c af b0 fe 0e d3 c2 19 a9 2b 52 7e b2 dd 26 0c 63 52 a9 20 9f 78 22 e3 a9 45 b9 cd a0 2d 31 aa b8 74 ac 44 54 9b 01 11 5e 7f 73 66 d6 bb b8 46 54 b1 81 a1 76 4a dc 14 03 03 00 01 01 16 03 03 00 28 34 5e 20 a3 cc bc c2 fb ba a7 3c 44 c3 a7 6b 58 0a 45 45 78 ff 9d c4 69 5e 33 f1 99 4f 07 e9 24 47 f2 4d ca db 0b ca ab Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier12 length1422Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length255Value: 02b004fe0d000382010f003082010a0282010100d7ab97ba11f901e2bcbe703c7b5a468fea2a402bd27b361c815926d7d1f57fc33a400483d80c8a3fbceb16bca825981cda2ec7330b407800f17dcff77618b2f6a4a7a92216ef2ca4200e5be35a17a0f2a15bf8b43312c66290729aeab2c5ba237ec94e9a1f5257483eeede76626d677f0dd91ee89202fc8dae4e3c015fb98a4f0750aa0e7ed1bd5c3a6b8623638d876f4dab25690be87e096d7e887529072bd3eedea0bff065fd9b79914e0e7b740f236f20372b3b0ad1e9acec52b37541cea0af33729dae3e4a6322e86b44a159c6df35790b0b6a26fc9428a8f323e35198648b7b509350f3dd7292Attribute 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: 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 79 (EAP-Message) length255Value: e01200a3ef85bd5da996eaf605aaf6d42c773991bde3c8a104cd3d2dfc06bd936e2062fe3686de5f008741d0c17c9608fd6aca37672ee7684a45139bece1f7067a49ef81573601e4bda02880957a35eefcbc14fd1e48ffa6fd7cb9316f2b1c4e4555ffd549f99e57ada24f5bf367e8818bb77ba6185840bfc921d22455c98913b9a304c497b226038420c45d6e2d1deab5a62fed5c5a70ba6b567d498bd4182c2cafb0fe0ed3c219a92b527eb2dd260c6352a9209f7822e3a945b9cda02d31aab874ac44549b01115e7f7366d6bbb84654b181a1764adc1403030001011603030028345e20a3ccbcc2fbbaa73c44c3a76b580a454578ff9dc4695e33f1Attribute 79 (EAP-Message) length15Value: 994f07e92447f24dcadb0bcaabAttribute 24 (State) length18Value: fb1c2c65ffac217da229744af77aa30fAttribute 80 (Message-Authenticator) length18Value: 0d1f87fc26c15c46ab2a694795fef902 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 119 bytes from RADIUS server Received RADIUS message RADIUS message: code11 (Access-Challenge) identifier12 length119Attribute 79 (EAP-Message) length63Value: 01b1003d0d80000000331403030001011603030028e6d41ca2aa87391a58eb70f47b2cb52c809102c061d01056c64fafec1b7192f45a219dafde4a6548Attribute 80 (Message-Authenticator) length18Value: 290e515e767eab6b8dc661941ce01e8eAttribute 24 (State) length18Value: fb1c2c65fead217da229744af77aa30f STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station decapsulated EAP packet (code1 id177 len61) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id177 method13 vendor0 vendorMethod0 EAP: EAP entering state METHOD SSL: Received packet(len61) - Flags 0x80 SSL: TLS Message Length: 51 OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 14 03 03 00 01 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS write finished OpenSSL: RX ver0x0 content_type256 (TLS header info/) OpenSSL: Message - hexdump(len5): 16 03 03 00 28 SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read change cipher spec OpenSSL: RX ver0x303 content_type22 (handshake/finished) OpenSSL: Message - hexdump(len16): 14 00 00 0c d0 09 7f eb 1f 0a d4 29 4e 90 0a 2b SSL: (where0x1001 ret0x1) SSL: SSL_connect:SSLv3/TLS read finished SSL: (where0x20 ret0x1) SSL: (where0x1002 ret0x1) SSL: 0 bytes pending from ssl_out OpenSSL: Handshake finished - resumed0 SSL: No Application Data included SSL: Using TLS version TLSv1.2 SSL: No data to be sent out EAP-TLS: Done EAP-TLS: Derived key - hexdump(len64): d7 bc dd f7 af 62 24 b5 0c 99 2f 45 d5 4c 1c 13 2d f2 58 c9 25 df dd df 8a 02 7f c1 84 b1 52 04 4f d8 b5 58 db 5e 32 60 84 7f ef f0 53 52 7c b4 11 7d 5a 69 7c 28 f3 ae dd 81 86 14 74 2b a5 ee EAP-TLS: Derived EMSK - hexdump(len64): 50 26 34 0e ca fb ae 09 62 bb 75 dd 0c dd 9e 88 7e e0 bf a4 c0 29 43 ea 23 77 a3 be 2d 57 30 ab 4f 92 c1 4a 53 95 20 3d da d8 34 2b ae b4 3c bd 07 54 91 db 34 83 83 40 bd 83 cb f9 af 33 09 4e EAP-TLS: Derived Session-Id - hexdump(len65): 0d 9d af b8 19 1c 05 97 0d 0f c3 a0 a6 6a 19 b3 3e 51 6c bd 83 0a 9c f0 d7 df 32 43 90 c3 af 4a 30 42 92 63 8f 38 37 c7 53 52 d2 8e 65 b5 fe 48 f8 30 b1 9c 08 57 47 f1 76 37 4c 90 14 f0 c9 f3 1e SSL: Building ACK (type13 id177 ver0) EAP: method process - ignoreFALSE methodStateDONE decisionUNCOND_SUCC eapRespData0x55f53f3acc90 EAP: Session-Id - hexdump(len65): 0d 9d af b8 19 1c 05 97 0d 0f c3 a0 a6 6a 19 b3 3e 51 6c bd 83 0a 9c f0 d7 df 32 43 90 c3 af 4a 30 42 92 63 8f 38 37 c7 53 52 d2 8e 65 b5 fe 48 f8 30 b1 9c 08 57 47 f1 76 37 4c 90 14 f0 c9 f3 1e EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type0 len6) TX EAP - RADIUS - hexdump(len6): 02 b1 00 06 0d 00 Encapsulating EAP message into a RADIUS packetCopied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code1 (Access-Request) identifier13 length140Attribute 1 (User-Name) length9Value: testingAttribute 4 (NAS-IP-Address) length6Value: 127.0.0.1Attribute 31 (Calling-Station-Id) length19Value: 02-00-00-00-00-01Attribute 12 (Framed-MTU) length6Value: 1400Attribute 61 (NAS-Port-Type) length6Value: 19Attribute 6 (Service-Type) length6Value: 2Attribute 77 (Connect-Info) length24Value: CONNECT 11Mbps 802.11bAttribute 79 (EAP-Message) length8Value: 02b100060d00Attribute 24 (State) length18Value: fb1c2c65fead217da229744af77aa30fAttribute 80 (Message-Authenticator) length18Value: 3ae623aad6afd92f4daf0f414aec7d4d Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 169 bytes from RADIUS server Received RADIUS message RADIUS message: code2 (Access-Accept) identifier13 length169Attribute 26 (Vendor-Specific) length58Value: 00000137113493a6bc8b49385baac19dd71c87926effe39f2b79770d388c7a98d56ff1d30b6451841cdea8a813dad700fd65e04ce4faff21Attribute 26 (Vendor-Specific) length58Value: 000001371034983503d65166fc293e11efd6aaa063c72eb73400afe46d4de6aa23152c97784a560749072aec27a6b540be3d4a7f7c1ed47cAttribute 79 (EAP-Message) length6Value: 03b10004Attribute 80 (Message-Authenticator) length18Value: 3e6c4a927c53298e7dec4ea27d972819Attribute 1 (User-Name) length9Value: testing STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 secRADIUS packet matching with station MS-MPPE-Send-Key (sign) - hexdump(len32): 4f d8 b5 58 db 5e 32 60 84 7f ef f0 53 52 7c b4 11 7d 5a 69 7c 28 f3 ae dd 81 86 14 74 2b a5 ee MS-MPPE-Recv-Key (crypt) - hexdump(len32): d7 bc dd f7 af 62 24 b5 0c 99 2f 45 d5 4c 1c 13 2d f2 58 c9 25 df dd df 8a 02 7f c1 84 b1 52 04 decapsulated EAP packet (code3 id177 len4) from RADIUS server: EAP Success EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (paramsuccess) EAP: EAP entering state SUCCESS CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE eapol_sm_cb: result1 EAPOL: Successfully fetched key (len32) PMK from EAPOL - hexdump(len32): d7 bc dd f7 af 62 24 b5 0c 99 2f 45 d5 4c 1c 13 2d f2 58 c9 25 df dd df 8a 02 7f c1 84 b1 52 04 No EAP-Key-Name received from server WPA: Clear old PMK and PTK EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit ENGINE: engine deinit MPPE keys OK: 2 mismatch: 0 SUCCESS看到最后的SUCCESS说明证书认证成功。 至此本地eap-tls认证实验结束。     下篇我们可能会看到一款NAS设备的配置相关内容敬请期待。
http://www.pierceye.com/news/287308/

相关文章:

  • 泰然建设网站免费软件app下载大全正能量网站
  • 张掖市网站建设北京代理记账财务公司
  • 中铁建设集团网站网络公司手机网站
  • 站长工具是什么意思建设银行网站 开户行怎么查
  • 做简历模板的网站都有哪些wordpress是啥东西
  • 网站流量渠道湖州做网站优化
  • 汽车网站哪个好预付的网站开发费用怎么入账
  • 网站代管理哪个网站有介绍拿到家做的手工活
  • 惊艳的网站网站建设实训过程报告
  • 秦皇岛做网站公司企业网站备案需要什么
  • 做网站必须开厂吗科协网站建设建议
  • 西宁 网站建设凡科做视频网站
  • wordpress中文主题 wp-cmsseo排名赚钱
  • 优质的网站制作在线查企业信息查询平台
  • 天津网站建设学习电子商务企业网站建设实训报告
  • 怎么让网站收录在google怎么免费安装wordpress主题
  • 在windows2003上做网站浙江网
  • 宣威网站wordpress把logo变大
  • 网站设计模式有哪些商城网站营销方案
  • mvc做的网站wordpress 新建php文件
  • 西安网站seo外包个人开发者
  • 注册网站需要visa怎么办济宁万达网站建设
  • niche网站建设wordpress安装文本编辑器
  • 网站建设三种方法免费的导航页
  • 微信到wordpress杭州网站怎么做seo
  • 沙田镇仿做网站网站加速器quickq
  • 武进网站建设医药公司网站建设
  • 专业做网站建设广告设计网站素材
  • 成都建设银行保安招聘网站深圳做兼职的网站设计
  • 做网站如何找广告商湖南网站建设kaodezhu