Thank you for the reply, Stuart. The logs from the openssl flavour (with -dd):
wpa_supplicant v2.9 Successfully initialized wpa_supplicant Initializing interface 'iwx0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel' Line: 20 - start of a new network block ssid - hexdump_ascii(len=16): 4d 50 49 4c 48 4c 54 2d 56 49 53 49 54 4f 52 53 MPILHLT-VISITORS key_mgmt: 0xb eap methods - hexdump(len=32): 00 00 00 00 15 00 00 00 00 00 00 00 19 00 00 00 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 ca_cert - hexdump_ascii(len=17): 2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 2e 70 65 /etc/ssl/cert.pe 6d m identity - hexdump_ascii(len=8): 31 33 31 36 36 37 32 30 13166720 password - hexdump_ascii(len=6): [REMOVED] Line: 38 - start of a new network block ssid - hexdump_ascii(len=7): 65 64 75 72 6f 61 6d eduroam key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 ca_cert - hexdump_ascii(len=17): 2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 2e 70 65 /etc/ssl/cert.pe 6d m anonymous_identity - hexdump_ascii(len=21): 61 6e 6f 6e 79 6d 6f 75 73 40 6c 68 6c 74 2e 6d anonymous@lhlt.m 70 67 2e 64 65 pg.de identity - hexdump_ascii(len=19): 67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67 gast...@lhlt.mpg 2e 64 65 .de password - hexdump_ascii(len=12): [REMOVED] openssl_ciphers - hexdump_ascii(len=18): 44 45 46 41 55 4c 54 40 53 45 43 4c 45 56 45 4c DEFAULT@SECLEVEL 3d 30 =0 phase1 - hexdump_ascii(len=29): 61 6c 6c 6f 77 5f 75 6e 73 61 66 65 5f 72 65 6e allow_unsafe_ren 65 67 6f 74 69 61 74 69 6f 6e 73 3d 31 egotiations=1 phase2 - hexdump_ascii(len=13): 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 Priority group 0 id=0 ssid='MPILHLT-VISITORS' id=1 ssid='eduroam' Add interface iwx0 to a new radio N/A iwx0: Failed to attach pkt_type filter iwx0: Own MAC address: b0:a4:60:2d:3b:b0 iwx0: RSN: flushing PMKID list in the driver iwx0: Setting scan request: 0.100000 sec ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED ctrl_interface_group=0 (from group name 'wheel') iwx0: Added interface iwx0 iwx0: State: DISCONNECTED -> DISCONNECTED EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto iwx0: Already associated with a configured network - generating associated event iwx0: Event ASSOC (0) received iwx0: Association info event iwx0: State: DISCONNECTED -> ASSOCIATED iwx0: Associated to a new BSS: BSSID=24:f2:7f:f5:ae:11 iwx0: Select network based on association information iwx0: Network configuration found for the current AP iwx0: WPA: No WPA/RSN IE available from association info iwx0: WPA: Set cipher suites based on configuration iwx0: WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 1 proto 2 iwx0: WPA: clearing AP WPA IE iwx0: WPA: clearing AP RSN IE iwx0: WPA: AP group 0x18 network profile group 0x18; available group 0x18 iwx0: WPA: using GTK CCMP iwx0: WPA: AP pairwise 0x18 network profile pairwise 0x18; available pairwise 0x18 iwx0: WPA: using PTK CCMP iwx0: WPA: AP key_mgmt 0x1 network profile key_mgmt 0x1; available key_mgmt 0x1 iwx0: WPA: using KEY_MGMT 802.1X WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 WPA: No current PMKSA - clear PMK iwx0: Failed to get scan results EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto iwx0: Associated with 24:f2:7f:f5:ae:11 iwx0: WPA: Association event - clear replay counter iwx0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE iwx0: Setting authentication timeout: 10 sec 0 usec iwx0: Cancelling scan request EAPOL: External notification - portValid=1 iwx0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=4): 01 01 00 00 iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=46): 01 00 00 05 01 0f 00 05 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwx0: Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=15 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY iwx0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param=) EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=21): 61 6e 6f 6e 79 6d 6f 75 73 40 6c 68 6c 74 2e 6d anonymous@lhlt.m 70 67 2e 64 65 pg.de EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=30): 01 00 00 1a 02 0f 00 1a 01 61 6e 6f 6e 79 6d 6f 75 73 40 6c 68 6c 74 2e 6d 70 67 2e 64 65 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=46): 01 00 00 06 01 10 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=16 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD iwx0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded iwx0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before SSL initialization OpenSSL: TX ver=0x301 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello) OpenSSL: Message - hexdump(len=185): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client hello SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write client hello SSL: SSL_connect - want more data SSL: 190 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 190 bytes left to be sent out (of total 190 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1280ffaa00 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=204): 01 00 00 c8 02 10 00 c8 19 80 00 00 00 be 16 03 01 00 b9 01 00 00 b5 03 03 2c 81 d2 45 64 b0 b3 16 26 31 2d 50 f0 51 2f 75 c8 42 ba b7 b1 b6 ee 49 04 be a6 25 54 88 c5 cb 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 54 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 30 00 2e 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 02 03 03 01 02 01 03 02 02 02 04 02 05 02 06 02 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=1008): 01 00 03 ec 01 11 03 ec 19 c0 00 00 11 82 16 03 03 00 3d 02 00 00 39 03 03 6a 63 50 fd d5 f0 54 fd ad 05 54 48 ba 3c 15 a6 38 63 7f 39 9f 8e fc df ec c7 da 0e bb 08 1e 46 00 c0 30 00 00 11 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 17 00 00 16 03 03 0f 01 0b 00 0e fd 00 0e fa 00 09 7b 30 82 09 77 30 82 07 df a0 03 02 01 02 02 10 2b 02 3f 7f 8d 82 2f 8b ad 7e fc fe 41 50 ad fc 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 68 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 27 30 25 06 03 55 04 0a 0c 1e 44 65 75 74 73 63 68 65 20 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 20 47 6d 62 48 31 30 30 2e 06 03 55 04 03 0c 27 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 20 53 65 72 76 65 72 49 44 20 4f 56 20 43 6c 61 73 73 20 32 20 43 41 30 1e 17 0d 32 34 30 31 30 33 31 33 31 35 31 33 5a 17 0d 32 35 30 31 30 37 32 33 35 39 35 39 5a 30 81 9b 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 16 30 14 06 03 55 04 08 13 0d 4e 69 65 64 65 72 73 61 63 68 73 65 6e 31 13 30 11 06 03 55 04 07 13 0a 47 6f 65 74 74 69 6e 67 65 6e 31 45 30 43 06 03 55 04 0a 13 3c 47 65 73 65 6c 6c 73 63 68 61 66 74 20 66 2e 20 77 69 73 73 65 6e 73 63 68 2e 20 44 61 74 65 6e 76 65 72 61 72 62 65 69 74 75 6e 67 20 6d 62 48 2c 20 47 6f 65 74 74 69 6e 67 65 6e 31 18 30 16 06 03 55 04 03 13 0f 65 64 75 72 6f 61 6d 2e 67 77 64 67 2e 64 65 30 82 02 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 02 0f 00 30 82 02 0a 02 82 02 01 00 eb 11 87 76 17 1a 1c 50 12 7c bc c0 d5 ee b6 67 17 a7 c2 d1 87 8f 49 79 96 de df 22 81 c6 78 f8 11 cc e8 d5 5e 06 64 e9 13 92 29 52 b6 67 03 83 4d 9c a6 32 fe e9 cd 35 8f 8b ca 6f 6c 56 59 3c 31 c7 17 83 7d ab eb 4d fd 4c 69 54 8d 7e 65 38 3d b0 3f 13 25 58 b2 5f d9 a8 03 69 e1 16 90 27 da 48 ce 2f f2 fa 72 7d e6 a2 0b 3c 6f 92 2f 67 8b 97 17 84 a0 2d eb 32 ee 63 e4 10 57 e1 c4 89 06 39 fd b5 b2 59 52 81 3b c1 b9 80 17 20 81 6a 9f 88 c5 fa 54 cf 7a f0 b3 cf 6a 8d 09 36 da 58 c3 12 fc 52 d2 2f 54 56 c1 5b 36 65 e0 d8 9b dc a2 2a 01 f4 5e 40 b1 e1 b6 ad 53 6e 74 3c dd 00 26 e5 b7 97 44 db 92 d0 e0 3c f3 8f 86 17 b0 45 ac b4 ce 84 c1 75 b8 56 98 e3 71 e2 f9 17 61 b4 75 a3 df 9f c2 39 ea c9 a9 11 69 ab e9 0a f8 8b dd 9f ed 9e c1 49 6e b1 c6 91 ec 31 ad a4 ab f2 64 7f c6 31 ad 10 e0 ed 7e ab 67 d2 aa 23 f2 d0 d2 10 2e ba cd 83 91 5f 65 47 d9 d4 b7 6c c9 d3 29 60 58 44 1b 4e f4 77 e0 66 ac 4c 85 c8 37 61 a2 ee 19 b7 58 7f af 62 d1 cf 43 da 75 39 b5 66 a3 44 64 ca 8e ee 36 bf bd 40 8d 96 96 17 66 49 19 60 63 3b 4b 96 15 ec 33 8f ef a5 5e 4e ca f8 8b e8 20 92 71 dd 2c 67 d4 37 6e d6 4a b0 27 4a 82 fc 6d 5f b4 f2 dc 18 f4 e4 d0 73 ad 94 31 fc f6 04 1f ca cf fc ed ca a5 2c 49 98 9c b5 0f 4f 2b 71 a3 1f 54 96 9f 38 da a7 dd 22 b5 99 07 e9 da c1 02 d0 0a dd 78 97 53 e6 7c ca bb 37 dc 17 db 1a 3c 2a fc d0 f3 39 55 79 de 33 4f ee 49 1d 52 a1 00 27 6e 63 12 0d 27 dc 43 36 82 c2 b5 56 70 a3 10 16 6e ee 78 5a 0e c9 75 08 31 b8 4d 78 d1 22 3f c8 87 fd 20 4f a7 37 75 2e b6 ec 06 b2 ab 6c 59 21 e8 d1 92 54 9f 03 7e fd ef 9f b0 e3 02 03 01 00 01 a3 82 04 67 30 82 04 63 30 1f 06 03 55 1d 23 04 18 30 16 80 14 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=17 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1004) - Flags 0xc0 SSL: TLS Message Length: 4482 SSL: Need 3488 bytes more input data SSL: Building ACK (type=25 id=17 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1294af5660 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=10): 01 00 00 06 02 11 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=1004): 01 00 03 e8 01 12 03 e8 19 40 1c 05 93 b1 7f a8 34 30 8c 52 e0 96 40 a0 72 a3 10 5d e0 ff 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 02 06 08 2b 06 01 05 05 07 03 01 30 1d 06 03 55 1d 0e 04 16 04 14 2c ca 7d f7 24 3b 5d e6 60 72 71 70 5d 02 93 fc 35 12 c5 8b 30 53 06 03 55 1d 20 04 4c 30 4a 30 48 06 06 67 81 0c 01 02 02 30 3e 30 3c 06 08 2b 06 01 05 05 07 02 01 16 30 68 74 74 70 3a 2f 2f 64 6f 63 73 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 63 70 73 2f 73 65 72 76 65 72 69 64 2e 68 74 6d 30 5e 06 03 55 1d 1f 04 57 30 55 30 53 a0 51 a0 4f 86 4d 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 72 6c 2f 54 65 6c 65 6b 6f 6d 5f 53 65 63 75 72 69 74 79 5f 53 65 72 76 65 72 49 44 5f 4f 56 5f 43 6c 61 73 73 5f 32 5f 43 41 2e 63 72 6c 30 81 9f 06 08 2b 06 01 05 05 07 01 01 04 81 92 30 81 8f 30 31 06 08 2b 06 01 05 05 07 30 01 86 25 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 6f 63 73 70 72 30 5a 06 08 2b 06 01 05 05 07 30 02 86 4e 68 74 74 70 3a 2f 2f 63 72 74 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 63 72 74 2f 54 65 6c 65 6b 6f 6d 5f 53 65 63 75 72 69 74 79 5f 53 65 72 76 65 72 49 44 5f 4f 56 5f 43 6c 61 73 73 5f 32 5f 43 41 2e 63 72 74 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 1a 06 03 55 1d 11 04 13 30 11 82 0f 65 64 75 72 6f 61 6d 2e 67 77 64 67 2e 64 65 30 82 02 6f 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 82 02 5f 04 82 02 5b 02 59 00 76 00 55 81 d4 c2 16 90 36 01 4a ea 0b 9b 57 3c 53 f0 c0 e4 38 78 70 25 08 17 2f a3 aa 1d 07 13 d3 0c 00 00 01 8c cf 76 be 16 00 00 04 03 00 47 30 45 02 21 00 98 5a eb 07 96 89 c7 bb 4e b3 fa fd 4c 97 e8 e7 9c 9d cb 38 9c 16 e7 b1 f5 ad e1 ed 06 a5 9a 0b 02 20 58 0f f1 0a 04 c3 54 a6 12 9c d8 cd a0 95 7b 2f fd f3 a8 c3 c1 19 b5 58 c7 4a 8c d8 c4 58 ac 72 00 77 00 cc fb 0f 6a 85 71 09 65 fe 95 9b 53 ce e9 b2 7c 22 e9 85 5c 0d 97 8d b6 a9 7e 54 c0 fe 4c 0d b0 00 00 01 8c cf 76 bd 50 00 00 04 03 00 48 30 46 02 21 00 a5 21 b4 ef fb 24 7e 61 b3 5b 20 50 d4 9a 7e 07 38 9e b0 b0 8c c1 fe d5 be 8e 6c 7b 19 e4 bf 08 02 21 00 e0 88 31 1c 0c 1e 59 e6 39 8e 28 76 01 cc 4b b3 ea aa 54 01 ba 1f eb f7 ee c9 a7 91 5e 0e d2 b1 00 76 00 28 e2 81 38 fd 83 21 45 e9 a9 d6 aa 75 37 6d 83 77 a8 85 12 b3 c0 7f 72 41 48 21 dc bd e9 8c 66 00 00 01 8c cf 76 c1 e9 00 00 04 03 00 47 30 45 02 20 6e bd ed bf a8 c1 f4 2c 09 dd 52 47 24 b6 05 9c bb 49 c3 cb 24 d2 53 48 44 bc c3 58 52 ef 2f dd 02 21 00 d3 7b 53 00 42 fc 83 fe 84 00 75 11 75 15 0a c9 63 3e 36 52 af 60 ab ff d8 1a 6c 5c 93 4c 29 38 00 75 00 cf 11 56 ee d5 2e 7c af f3 87 5b d9 69 2e 9b e9 1a 71 67 4a b0 17 ec ac 01 d2 5b 77 ce cc 3b 08 00 00 01 8c cf 76 bc de 00 00 04 03 00 46 30 44 02 20 58 63 4b b9 fa 9d 1d 1d 54 6c 23 a6 65 c8 5d 20 68 e8 de 75 20 95 c9 53 95 78 db db 8f 38 33 75 02 20 12 bd f0 7f 9d 50 fe 15 0a a9 ff 44 f0 47 bf de f9 71 25 2a dd 0a 18 eb df 2f ed d8 99 5b 0e 91 00 77 00 4e 75 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=18 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1000) - Flags 0x40 SSL: Need 2494 bytes more input data SSL: Building ACK (type=25 id=18 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1294af5690 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=10): 01 00 00 06 02 12 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=1004): 01 00 03 e8 01 13 03 e8 19 40 a3 27 5c 9a 10 c3 38 5b 6c d4 df 3f 52 eb 1d f0 e0 8e 1b 8d 69 c0 b1 fa 64 b1 62 9a 39 df 00 00 01 8c cf 76 bd 12 00 00 04 03 00 48 30 46 02 21 00 ac 91 76 d5 dc 31 72 0a 4f 01 cf 75 7f 6d da 73 08 b7 b5 fe 16 5c d4 91 19 52 ed 22 a5 e9 38 c6 02 21 00 f9 fe 3b 12 f6 54 91 fa 2a f2 b7 e6 0f 95 65 c9 a5 88 15 db f3 d5 8c 3e 06 e4 a0 75 1b fa 65 4f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 81 00 91 60 88 e9 23 97 7b 88 1b b9 8a fa 51 63 a2 c9 72 04 4a 94 aa 13 17 9a 4d e4 63 7f 89 03 d2 89 ff e0 91 a4 dc 65 5d fb 66 c2 2a 89 f6 0e 49 cb 29 58 09 1d e6 7c 30 2d d6 5a f7 d6 89 fb 2d f3 10 b2 b5 6a 2a 09 c3 2a bb e7 f7 2a 9d 9d 3a a3 62 93 fc 90 db 6c d9 c8 a3 c1 6c c2 27 a3 0d b9 45 75 da 1b 41 48 05 85 f3 db 2a 48 53 47 09 9a d0 d2 6a c4 7e 78 d8 c3 9a 76 67 2e 15 05 d0 0e 3b 11 2b 19 e9 dd 09 6d fd 9e e6 e5 95 f7 5e 92 cb 35 58 80 6f d0 81 2b d4 4a eb 74 e0 4e 1c c2 42 48 7a 8b cb 9f 90 5f 13 0e a5 ba 5c 9d e7 da ca 82 0a 57 7b a7 fd 3d fe d2 b7 be e3 51 af 6c 2e d8 42 ad f3 93 0b 11 dd f2 1b 3e 00 54 73 42 0a 99 ee f0 1a 20 66 97 c0 dd cc 1c dd 03 c6 2e 8e 95 2b 16 75 5c 46 60 7d 02 f4 c1 8a 9a 9b a4 83 87 99 0c 2c 9d c9 f3 0b 5a 54 72 96 bf 72 ae ff d7 57 20 d4 f3 5f f4 10 bb 34 4a 91 67 82 84 7c e6 c9 8c 2f ca cf ec 5a 24 78 28 8d cb ee 97 38 0b 55 f2 2b 9d 8e 36 63 b6 a0 db ac 62 1f 15 0c 6f 93 37 e0 95 a0 55 e2 cb ca b5 6b fb 64 af ec 35 d5 45 09 fc 89 4c a5 f7 90 e1 5d d2 fa db d5 a2 1c 80 f4 9c b9 c4 b3 25 96 dd 69 50 47 93 29 d2 ea 4b 79 7a aa 6a c6 46 31 51 c4 07 c1 c4 5b 90 24 66 6b c9 0c 5b 65 7b 7b 93 09 5c 83 72 00 05 79 30 82 05 75 30 82 04 5d a0 03 02 01 02 02 10 0e 5d 29 89 15 c4 04 31 a4 e1 c4 ca 48 8b 8e a3 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 82 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 2b 30 29 06 03 55 04 0a 0c 22 54 2d 53 79 73 74 65 6d 73 20 45 6e 74 65 72 70 72 69 73 65 20 53 65 72 76 69 63 65 73 20 47 6d 62 48 31 1f 30 1d 06 03 55 04 0b 0c 16 54 2d 53 79 73 74 65 6d 73 20 54 72 75 73 74 20 43 65 6e 74 65 72 31 25 30 23 06 03 55 04 03 0c 1c 54 2d 54 65 6c 65 53 65 63 20 47 6c 6f 62 61 6c 52 6f 6f 74 20 43 6c 61 73 73 20 32 30 1e 17 0d 32 32 30 38 30 32 30 39 31 36 34 34 5a 17 0d 32 37 30 38 30 32 32 33 35 39 35 39 5a 30 68 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 27 30 25 06 03 55 04 0a 0c 1e 44 65 75 74 73 63 68 65 20 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 20 47 6d 62 48 31 30 30 2e 06 03 55 04 03 0c 27 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 20 53 65 72 76 65 72 49 44 20 4f 56 20 43 6c 61 73 73 20 32 20 43 41 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 82 01 81 00 c9 23 44 69 7f 17 3a b7 4a ea b9 28 75 8e 34 28 9a 98 ae 49 fc 8d a6 61 a1 7a 5e 0d b7 70 fe d3 13 5a e9 58 f5 79 de 0f e5 ea ad 51 9a 28 b4 83 fc f9 7d fa 56 0f 1c d5 3c 59 f7 25 f6 0a 85 1e 48 ce cc 49 9d 83 6f 20 1b b6 76 f8 28 7d 6a 76 63 f6 b8 ee 78 b4 98 5b e9 64 48 4b 3a b6 ae 39 4f b1 05 81 e6 cd c6 e1 9f a7 0f 70 cd b8 65 ed 96 cc c7 3c f4 c3 34 41 50 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=19 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1000) - Flags 0x40 SSL: Need 1500 bytes more input data SSL: Building ACK (type=25 id=19 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1249040960 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=10): 01 00 00 06 02 13 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=1004): 01 00 03 e8 01 14 03 e8 19 40 46 3d f2 af 5e f0 5f 65 79 4b 3e 8a 98 7f 28 93 f1 ff a4 b2 a1 08 60 e4 b5 49 0f 79 e0 05 69 62 ec 58 5e 1a 52 49 12 3d 8e 89 45 38 95 13 ac 48 2e ad d8 20 59 5c f2 f4 27 fc 63 fc d9 6a 39 1f 9e 93 42 96 a9 61 d2 a2 99 09 72 82 3f 63 1b d5 e3 fa 8f f4 4d 7b 93 50 ea 8f 3e 84 93 b0 a7 6f 8c 40 ee a9 a4 7a de 16 60 83 3b 1c 14 50 f0 ea 0e 39 75 aa 5f 60 ae 5e d3 1c a2 13 88 64 0c 35 a4 2e 2d 55 6c b8 e6 d3 e2 72 fb 11 91 9c f4 de c7 5b dd d8 f9 a4 f0 6c 8d 16 0d a7 a8 7f 43 2b ea 3f 6a d9 9b d5 54 23 f8 03 f0 12 3e 88 bb 56 65 bd 8d 40 e9 3c 43 56 63 30 c0 62 ef 8a 4e 7b 95 c4 92 42 27 2a 2d 00 af 0a 4f ab 24 20 39 46 75 3f 4a ae a2 03 79 1e ff 31 2e d5 42 5a 55 c3 35 bc 19 ad bb 9f 7b 73 ce 7b 9e db 75 15 73 9b 50 af 83 10 40 f4 fd 13 76 be ae a1 ae 8f 7d 86 5a ae a9 4a 15 db 8b 02 03 01 00 01 a3 82 01 7e 30 82 01 7a 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 30 1d 06 03 55 1d 0e 04 16 04 14 1c 05 93 b1 7f a8 34 30 8c 52 e0 96 40 a0 72 a3 10 5d e0 ff 30 1f 06 03 55 1d 23 04 18 30 16 80 14 bf 59 20 36 00 79 a0 a0 22 6b 8c d5 f2 61 d2 b8 2c cb 82 4a 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 02 06 08 2b 06 01 05 05 07 03 01 30 50 06 03 55 1d 1f 04 49 30 47 30 45 a0 43 a0 41 86 3f 68 74 74 70 3a 2f 2f 67 72 63 6c 32 2e 63 72 6c 2e 74 65 6c 65 73 65 63 2e 64 65 2f 72 6c 2f 54 2d 54 65 6c 65 53 65 63 5f 47 6c 6f 62 61 6c 52 6f 6f 74 5f 43 6c 61 73 73 5f 32 2e 63 72 6c 30 81 8d 06 08 2b 06 01 05 05 07 01 01 04 81 80 30 7e 30 2e 06 08 2b 06 01 05 05 07 30 01 86 22 68 74 74 70 3a 2f 2f 67 72 63 6c 32 2e 6f 63 73 70 2e 74 65 6c 65 73 65 63 2e 64 65 2f 6f 63 73 70 72 30 4c 06 08 2b 06 01 05 05 07 30 02 86 40 68 74 74 70 3a 2f 2f 67 72 63 6c 32 2e 63 72 74 2e 74 65 6c 65 73 65 63 2e 64 65 2f 63 72 74 2f 54 2d 54 65 6c 65 53 65 63 5f 47 6c 6f 62 61 6c 52 6f 6f 74 5f 43 6c 61 73 73 5f 32 2e 63 72 74 30 13 06 03 55 1d 20 04 0c 30 0a 30 08 06 06 67 81 0c 01 02 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 53 2c cc 55 fa 44 ec 22 3e a4 b3 52 b7 58 e5 8c e4 cc 92 fc 80 ce 19 84 40 72 33 fd f4 3b 2a aa c6 f4 f8 a9 6f fc 38 c3 a6 a1 be 7c d8 53 a1 99 0c 20 e2 f0 14 25 4e 44 6d a8 d2 5c 77 38 b3 7c f7 25 31 b1 6b 22 f6 06 f1 9c 99 7c 58 c7 58 59 a6 e5 22 52 f8 48 65 13 ef d1 ae ba 67 a6 b4 ab 39 dd 6c 44 3a 97 19 e7 02 9e 44 dc f8 91 7e 9d cc 3a 7d ff 5f 3a 67 ce c5 b2 ce 3b f0 1b 8e 2d 4b e9 79 1c aa ce f1 c1 34 73 60 3d a8 2a c0 3f 03 2b 76 9b fc e8 da 23 cd 4f 47 80 21 e0 78 15 7f 42 1c 09 48 48 a0 97 99 e4 48 2f eb 71 bf 22 89 ea c0 c9 a6 46 0c a5 bb 57 91 10 d2 78 f4 fa 65 38 be f4 40 49 1f 57 09 d8 c8 b3 dc c6 dd 77 4c 4a 7c 23 01 f5 82 3a a6 c9 35 0e ea 1c 77 4f 3f e3 9a 4a df 8f 00 15 68 df 2c 04 14 44 5f 3c c2 7b 18 f2 78 ce 54 51 02 3f 83 7a 2f 91 66 e0 16 03 03 02 2c 0c 00 02 28 03 00 1d 20 7b b0 2f 79 5c 21 86 be 1a a7 cb 43 db a2 42 85 af 9a 9c 81 2e ac 5c 00 2e d6 97 5e 2a 08 87 10 08 04 02 00 80 61 2c 87 99 71 c5 47 8c 42 30 4f b8 26 09 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=20 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1000) - Flags 0x40 SSL: Need 506 bytes more input data SSL: Building ACK (type=25 id=20 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1294b13240 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=10): 01 00 00 06 02 14 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=516): 01 00 02 00 01 15 02 00 19 00 1a 99 de e2 24 56 56 c1 d3 71 6e f9 23 52 db 0c f6 b1 83 d6 64 ed 68 29 41 35 f5 42 24 47 14 c0 59 5b 55 46 00 4d d3 6e d2 bf 76 de aa 70 f7 d9 d7 3b ad cd 22 c9 cd 35 42 6a bc 18 4d e0 db cc 3c 4e 66 3b d9 5c a5 84 04 25 0d 9e 0a d2 4d e4 4a 35 4d 37 9e aa a5 a5 fe 99 40 7a 9f 3c ba 76 f6 e3 ba ed c4 a9 d8 36 d4 de 62 b6 59 e0 c0 20 18 c6 b0 47 8b b7 64 58 60 51 9c 71 aa af 3f 25 7c a9 d2 f6 91 a4 b7 a8 31 ed 71 40 55 79 2d 0e 01 fb 63 7f 06 fc 13 f7 05 73 6e f8 17 74 12 23 13 c8 be 08 61 24 de 33 4f 9c b6 46 c1 c1 bb 80 dc 8a 75 c3 03 ee 19 2a ea 18 46 43 bb 33 fb 0e 82 9e 68 32 c2 4b 7a f6 a9 1b 19 10 24 ef 01 c2 81 1a b4 69 d0 81 bf f1 1f 69 74 3f 65 54 00 a0 c9 6c 29 01 1c d7 93 0b 93 8c 88 3a 95 0c 19 33 82 8d ce 87 2d 81 74 5c 20 45 c4 c6 76 02 1d 96 48 28 c7 87 00 bd bc 29 ee 97 09 0b 3c c8 2e c4 15 78 a5 ec 15 55 33 62 34 9f d3 97 4f 3f 59 0d 64 72 71 e5 e5 5c fc 74 2a d6 91 26 5c f7 d8 1a f7 aa 20 6e e2 e6 2a aa ac 6a cb 61 5c 66 1f 0a 1c 65 89 ee fa ae 38 41 6a ed dc 26 db 00 88 03 fa 75 3a c6 98 e0 45 dd 06 15 df 65 bd f8 6c 80 06 da d3 20 9e ee a6 c3 eb 22 11 e6 ab 87 7a ac 6d 9c 57 ad 1c c3 b5 00 7e d7 b9 7f b9 a1 87 49 53 ed 45 3c 22 a8 5b a2 c1 88 71 31 84 e2 ba 56 9a d2 a8 90 22 a4 63 e3 84 5e d1 f6 df c1 35 a0 ca 65 ce 8f 19 e2 06 dd 66 e6 ea 75 a2 8e 38 4d 53 aa 04 eb d8 b5 11 72 16 18 e0 70 c5 2b ea 7f e5 58 6e cd e2 20 41 22 df 95 dc ad ad 49 46 60 3b af 7d f5 8d 84 e8 92 fd 28 3e 32 e8 c8 a2 1e 9c 30 b9 b7 53 16 e0 3b 28 73 7c 0e f8 ec f8 56 05 16 03 03 00 04 0e 00 00 00 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=21 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=512) - Flags 0x00 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client hello OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello) OpenSSL: Message - hexdump(len=61): [REMOVED] OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server hello OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate) OpenSSL: Message - hexdump(len=3841): [REMOVED] iwx0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 buf='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' OpenSSL: Certificate Policy 2.23.140.1.2.2 iwx0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=DE/O=Deutsche Telekom Security GmbH/CN=Telekom Security ServerID OV Class 2 CA' hash=944ace961db316beb694e01c302c46fed40dc0291729e7daf58550c3cb55e791 TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=DE/O=Deutsche Telekom Security GmbH/CN=Telekom Security ServerID OV Class 2 CA' OpenSSL: Certificate Policy 2.23.140.1.2.2 iwx0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=DE/ST=Niedersachsen/L=Goettingen/O=Gesellschaft f. wissensch. Datenverarbeitung mbH, Goettingen/CN=eduroam.gwdg.de' hash=124afd6b1b6d6f551f24f2fd7faa29d746b5049c7ad02a8c49f323a6c342f342 iwx0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:eduroam.gwdg.de TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=DE/ST=Niedersachsen/L=Goettingen/O=Gesellschaft f. wissensch. Datenverarbeitung mbH, Goettingen/CN=eduroam.gwdg.de' EAP: Status notification: remote certificate verification (param=success) OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server certificate OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange) OpenSSL: Message - hexdump(len=556): [REMOVED] OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server key exchange OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done) OpenSSL: Message - hexdump(len=4): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server done OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange) OpenSSL: Message - hexdump(len=37): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client key exchange OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/) OpenSSL: Message - hexdump(len=1): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write change cipher spec OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] OpenSSL: TX ver=0x303 content_type=22 (handshake/finished) OpenSSL: Message - hexdump(len=16): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write finished SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write finished SSL: SSL_connect - want more data SSL: 93 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 93 bytes left to be sent out (of total 93 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1294b220a0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=107): 01 00 00 67 02 15 00 67 19 80 00 00 00 5d 16 03 03 00 25 10 00 00 21 20 39 b2 98 cf 84 23 77 e0 f1 d4 f7 46 f1 b4 23 d4 a2 ef 86 9e be 0c ef 31 4b 68 18 bd 59 4c 6c 6d 14 03 03 00 01 01 16 03 03 00 28 a8 36 77 e2 f6 68 fe cb 20 52 18 70 fe 14 6d 63 a7 6c 8c 29 8c 9e 55 3a 05 89 ae ff c8 3d ef 3e a5 3a a6 1c 4e fc 7c 32 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=61): 01 00 00 39 01 16 00 39 19 00 14 03 03 00 01 01 16 03 03 00 28 aa d4 36 dc 7e 86 4e 16 71 3b e1 89 65 ee 89 e0 af bf ed 6d 8c f0 52 ce 8d 57 4b eb 00 fe 27 4d 33 10 15 37 da 9d cc 0f EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=22 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=57) - Flags 0x00 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write finished OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read change cipher spec OpenSSL: RX ver=0x303 content_type=22 (handshake/finished) OpenSSL: Message - hexdump(len=16): [REMOVED] SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read finished SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out OpenSSL: Handshake finished - resumed=0 SSL: No Application Data included SSL: Using TLS version TLSv1.2 SSL: No data to be sent out EAP-PEAP: TLS done, proceed to Phase 2 EAP-PEAP: using label 'client EAP encryption' in key derivation EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] EAP-PEAP: Derived EMSK - hexdump(len=64): [REMOVED] EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 2c 81 d2 45 64 b0 b3 16 26 31 2d 50 f0 51 2f 75 c8 42 ba b7 b1 b6 ee 49 04 be a6 25 54 88 c5 cb 6a 63 50 fd d5 f0 54 fd ad 05 54 48 ba 3c 15 a6 38 63 7f 39 9f 8e fc df ec c7 da 0e bb 08 1e 46 SSL: Building ACK (type=25 id=22 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb1294b16f90 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=10): 01 00 00 06 02 16 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=46): 01 00 00 28 01 17 00 28 19 00 17 03 03 00 1d aa d4 36 dc 7e 86 4e 17 a3 a6 06 5e da 87 bb 8b f4 4d a9 b2 85 10 1c af aa 7c 78 6c 0c 00 00 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=23 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=40) - Flags 0x00 EAP-PEAP: received 34 bytes encrypted data for Phase 2 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 17 00 05 01 EAP-PEAP: received Phase 2: code=1 identifier=23 length=5 EAP-PEAP: Phase 2 Request: type=1 EAP: using real identity - hexdump_ascii(len=19): 67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67 gast...@lhlt.mpg 2e 64 65 .de EAP-PEAP: Encrypting Phase 2 data - hexdump(len=24): [REMOVED] OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] SSL: 49 bytes left to be sent out (of total 49 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0xb124905c900 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=24:f2:7f:f5:ae:11 TX EAPOL - hexdump(len=59): 01 00 00 37 02 17 00 37 19 00 17 03 03 00 2c a8 36 77 e2 f6 68 fe cc 53 c5 88 9c 2d 06 f0 ca d2 1d c3 a6 43 4a 29 3b a8 75 23 95 65 3e 34 8d 72 65 64 19 a9 46 68 4d c2 9c c6 ac EAPOL: SUPP_BE entering state RECEIVE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=77): 01 00 00 49 01 18 00 49 19 00 17 03 03 00 3e aa d4 36 dc 7e 86 4e 18 ed 97 3e a8 db 50 da 2e 5f 38 9b 05 6e fe 31 35 a4 22 09 06 c7 a5 dc a1 25 a1 c4 2b aa ee 62 ff 70 33 b4 31 5d 77 b1 78 4f a7 a7 21 24 cc de 14 2d 57 cb b6 0b 86 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=24 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=73) - Flags 0x00 EAP-PEAP: received 67 bytes encrypted data for Phase 2 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): [REMOVED] EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=38): 1a 01 18 00 25 10 16 10 44 08 aa f5 aa f8 f6 58 70 c6 7b d1 1c af 66 72 65 65 72 61 64 69 75 73 2d 33 2e 32 2e 33 EAP-PEAP: received Phase 2: code=1 identifier=24 length=42 EAP-PEAP: Phase 2 Request: type=26 EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 EAP-MSCHAPV2: RX identifier 24 mschapv2_id 24 EAP-MSCHAPV2: Received challenge EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=16): 66 72 65 65 72 61 64 69 75 73 2d 33 2e 32 2e 33 freeradius-3.2.3 EAP-MSCHAPV2: Generating Challenge Response MSCHAPV2: Identity - hexdump_ascii(len=19): 67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67 gast...@lhlt.mpg 2e 64 65 .de MSCHAPV2: Username - hexdump_ascii(len=19): 67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67 gast...@lhlt.mpg 2e 64 65 .de MSCHAPV2: auth_challenge - hexdump(len=16): 16 10 44 08 aa f5 aa f8 f6 58 70 c6 7b d1 1c af MSCHAPV2: peer_challenge - hexdump(len=16): 5b e7 88 cb 04 42 00 ef e9 d3 b0 1e fc 4a f0 80 MSCHAPV2: username - hexdump_ascii(len=19): 67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67 gast...@lhlt.mpg 2e 64 65 .de MSCHAPV2: password - hexdump_ascii(len=12): [REMOVED] OpenSSL: EVP_DigestInit_ex failed: error:0308010C:digital envelope routines::unsupported EAP-MSCHAPV2: Failed to derive response EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x0 EAP: EAP entering state SEND_RESPONSE EAP: No eapRespData available EAP: EAP entering state IDLE iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=77): 01 00 00 49 01 18 00 49 19 00 17 03 03 00 3e aa d4 36 dc 7e 86 4e 18 ed 97 3e a8 db 50 da 2e 5f 38 9b 05 6e fe 31 35 a4 22 09 06 c7 a5 dc a1 25 a1 c4 2b aa ee 62 ff 70 33 b4 31 5d 77 b1 78 4f a7 a7 21 24 cc de 14 2d 57 cb b6 0b 86 EAPOL: Received EAP-Packet frame iwx0: RX EAPOL from 24:f2:7f:f5:ae:11 RX EAPOL - hexdump(len=77): 01 00 00 49 01 18 00 49 19 00 17 03 03 00 3e aa d4 36 dc 7e 86 4e 18 ed 97 3e a8 db 50 da 2e 5f 38 9b 05 6e fe 31 35 a4 22 09 06 c7 a5 dc a1 25 a1 c4 2b aa ee 62 ff 70 33 b4 31 5d 77 b1 78 4f a7 a7 21 24 cc de 14 2d 57 cb b6 0b 86 EAPOL: Received EAP-Packet frame iwx0: Removing interface iwx0 iwx0: Request to deauthenticate - bssid=24:f2:7f:f5:ae:11 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=ASSOCIATED iwx0: Event DEAUTH (11) received iwx0: Deauthentication notification iwx0: * reason 3 (DEAUTH_LEAVING) locally_generated=1 Deauthentication frame IE(s) - hexdump(len=0): [NULL] iwx0: CTRL-EVENT-DISCONNECTED bssid=24:f2:7f:f5:ae:11 reason=3 locally_generated=1 iwx0: Auto connect disabled: do not try to re-connect iwx0: Ignore connection failure indication since interface has been put into disconnected state iwx0: WPA: Clear old PMK and PTK iwx0: Disconnect event - remove keys iwx0: State: ASSOCIATED -> DISCONNECTED EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 iwx0: State: DISCONNECTED -> DISCONNECTED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit ENGINE: engine deinit iwx0: WPA: Clear old PMK and PTK iwx0: Cancelling scan request iwx0: Cancelling authentication timeout Remove interface iwx0 from radio Remove radio iwx0: CTRL-EVENT-TERMINATING