Reading configuration file '/home/martin/eap/arendtsen-secure.conf' Line: 4 - start of a new network block key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 anonymous_identity - hexdump_ascii(len=32): 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 6bd4a86988324e56 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 b2dcdcf053161a02 client_cert - hexdump_ascii(len=27): 2f 68 6f 6d 65 2f 6d 61 72 74 69 6e 2f 73 73 6c /home/martin/ssl 2f 64 65 62 69 61 6e 2e 63 72 74 /debian.crt private_key - hexdump_ascii(len=27): 2f 68 6f 6d 65 2f 6d 61 72 74 69 6e 2f 73 73 6c /home/martin/ssl 2f 64 65 62 69 61 6e 2e 6b 65 79 /debian.key Priority group 0 id=0 ssid='' Authentication server 192.168.254.16:1812 RADIUS local address: 10.0.2.15:51173 ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=113 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param=) EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=32): 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 6bd4a86988324e56 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 b2dcdcf053161a02 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=37) TX EAP -> RADIUS - hexdump(len=37): 02 71 00 25 01 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len=32): 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=0 length=181 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=39 Value: 02710025013662643461383639383833323465353662326463646366303533313631613032 Attribute 80 (Message-Authenticator) length=18 Value: 7f99eaa855513baeba0b08d3b9b31621 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 STA 02:00:00:00:00:01: Resending RADIUS message (id=0) Next RADIUS client retransmit in 6 seconds ^CSignal 2 received - terminating EAPOL: EAP key not available EAPOL: EAP Session-Id not available WPA: Clear old PMK and PTK MPPE keys OK: 0 mismatch: 1 FAILURE martin@debian:~$ eapol_test -c /home/martin/eap/arendtsen-secure.conf -a 192.168.254.16 -s geiHievieZ1Uwahb -e Reading configuration file '/home/martin/eap/arendtsen-secure.conf' Line: 4 - start of a new network block key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 anonymous_identity - hexdump_ascii(len=32): 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 6bd4a86988324e56 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 b2dcdcf053161a02 client_cert - hexdump_ascii(len=27): 2f 68 6f 6d 65 2f 6d 61 72 74 69 6e 2f 73 73 6c /home/martin/ssl 2f 64 65 62 69 61 6e 2e 63 72 74 /debian.crt private_key - hexdump_ascii(len=27): 2f 68 6f 6d 65 2f 6d 61 72 74 69 6e 2f 73 73 6c /home/martin/ssl 2f 64 65 62 69 61 6e 2e 6b 65 79 /debian.key Priority group 0 id=0 ssid='' Authentication server 192.168.254.16:1812 RADIUS local address: 10.0.2.15:60338 ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=20 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param=) EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=32): 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 6bd4a86988324e56 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 b2dcdcf053161a02 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=37) TX EAP -> RADIUS - hexdump(len=37): 02 14 00 25 01 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len=32): 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=0 length=181 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=39 Value: 02140025013662643461383639383833323465353662326463646366303533313631613032 Attribute 80 (Message-Authenticator) length=18 Value: 243d671419b07b069f8a8997bf64bbf7 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=0 length=64 Attribute 79 (EAP-Message) length=8 Value: 011500060d20 Attribute 80 (Message-Authenticator) length=18 Value: 00744804a42de3170870ba3c8ff9e20e Attribute 24 (State) length=18 Value: 14fba4be14eea9e8a4487bf82773588b STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=21 len=6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=21 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13 EAP: Status notification: accept proposed method (param=TLS) EAP: Initialize selected EAP method: vendor 0 method 13 (TLS) TLS: using phase1 config options OpenSSL: SSL_use_certificate_chain_file --> OK OpenSSL: tls_use_private_key_file (PEM) --> loaded SSL: Private key loaded successfully CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-TLS: Start SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before SSL initialization OpenSSL: TX ver=0x301 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 01 00 b3 OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello) OpenSSL: Message - hexdump(len=179): 01 00 00 af 03 03 c2 eb fd 63 e9 00 84 1e 02 31 56 f4 4d 79 f8 e8 08 02 4f 49 76 45 61 d3 54 2f e0 f7 af c1 f0 7f 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 4e 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 2a 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client hello SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write client hello SSL: SSL_connect - want more data SSL: 184 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 184 bytes left to be sent out (of total 184 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x564feb8a19e0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=190) TX EAP -> RADIUS - hexdump(len=190): 02 15 00 be 0d 00 16 03 01 00 b3 01 00 00 af 03 03 c2 eb fd 63 e9 00 84 1e 02 31 56 f4 4d 79 f8 e8 08 02 4f 49 76 45 61 d3 54 2f e0 f7 af c1 f0 7f 00 00 38 c0 2c c0 30 00 9f cc a9 cc a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 4e 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 2a 00 28 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 03 01 03 02 04 02 05 02 06 02 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=1 length=352 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=192 Value: 021500be0d0016030100b3010000af0303c2ebfd63e900841e023156f44d79f8e808024f49764561d3542fe0f7afc1f07f000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Attribute 24 (State) length=18 Value: 14fba4be14eea9e8a4487bf82773588b Attribute 80 (Message-Authenticator) length=18 Value: a0052c961fba7058706110644824dec9 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=1 length=1068 Attribute 79 (EAP-Message) length=255 Value: 011603ec0dc000000a38160303003d020000390303adc120f95a74ceb3f8b403d0a283ba46d823126aced0af9787b4232a33cd707800c030000011ff01000100000b0004030001020017000016030307050b0007010006fe0006fb308206f73082055fa003020102020a4fff11373021e4b7f7d0300d06092a864886f70d01010b05003052310b300906035504061302444b31123010060355040a0c094172656e647473656e312f302d06035504030c264172656e647473656e2053657276657273204973737573696e67204341203230323131303130301e170d3233303732323232313430335a170d3234303132323232313430335a306a31123010 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=247 Value: 38d4a635c836324dabccf41dc30203010001a38202b5308202b130819006082b06010505070101048183308180305706082b06010505073002864b687474703a2f2f706b692e6172656e647473656e2e646b2f646f776e6c6f61642f4172656e647473656e5f536572766572735f4973737573696e675f43415f32303231313031302e636572302506082b060105050730018619687474703a2f2f6f6373702e6172656e647473656e2e646b2f301f0603551d23041830168014368777962f6ebd89906cb41ddc039a0cbf697f84300c0603551d130101ff04023000305c0603551d1f045530533051a04fa04d864b687474703a2f Attribute 80 (Message-Authenticator) length=18 Value: edc33ce9db61745bbd0c2fe2b7174be5 Attribute 24 (State) length=18 Value: 14fba4be15eda9e8a4487bf82773588b STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=22 len=1004) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=22 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1004) - Flags 0xc0 SSL: TLS Message Length: 2616 SSL: Need 1622 bytes more input data SSL: Building ACK (type=13 id=22 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x564feb8a2040 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 16 00 06 0d 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=2 length=168 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 021600060d00 Attribute 24 (State) length=18 Value: 14fba4be15eda9e8a4487bf82773588b Attribute 80 (Message-Authenticator) length=18 Value: f991e435f200a3988a1963d4d6922f08 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 1068 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=2 length=1068 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=247 Value: 1228d5021b8a636974008920400a0000baac64913e6d7825e1d7c97257513afd04e8d35217f5865955b18244451b4128707ce36c4d25aad922d52e0665218e2323f556c06b989280bfb24a9d846ccc59b0d4d62e54279acc0b71eba3b06971204c53ff609c4888f28e959e2c2e03591376dfa146f30b7587a1814a79f716030301cd0c0001c90300174104b5aa6a1331359856bb83243a68caacd5561c499de725fd0da78c1c7cb22249764fd86a25ccfe60017fad26a0dd3f9a49732f73a165fea92e1fef380eed290df8080401807f5ad9d75739f2e8efae59b5f67f176cf8c1b7b7db0dc2d33ea4289b496210f61bda0955f3fe Attribute 80 (Message-Authenticator) length=18 Value: 1df3abf7c013415c1ee7863dec1394c0 Attribute 24 (State) length=18 Value: 14fba4be16eca9e8a4487bf82773588b STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=23 len=1004) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=23 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1004) - Flags 0xc0 SSL: TLS Message Length: 2616 SSL: Need 628 bytes more input data SSL: Building ACK (type=13 id=23 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x564feb89f900 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 17 00 06 0d 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=3 length=168 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 021700060d00 Attribute 24 (State) length=18 Value: 14fba4be16eca9e8a4487bf82773588b Attribute 80 (Message-Authenticator) length=18 Value: 9871f19b4de434a1e2288aed7e98502a Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 700 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=3 length=700 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=134 Value: 0c264172656e647473656e2044657669636573204973737573696e672043412032303231313031310051304f310b300906035504061302444b31123010060355040a0c094172656e647473656e312c302a06035504030c234172656e647473656e2055736572204973737573696e6720434120323032313130303816030300040e000000 Attribute 80 (Message-Authenticator) length=18 Value: 10f02f90645f316dc69a33763b379f15 Attribute 24 (State) length=18 Value: 14fba4be17e3a9e8a4487bf82773588b STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=24 len=638) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=24 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=638) - Flags 0x80 SSL: TLS Message Length: 2616 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 3d SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client hello OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello) OpenSSL: Message - hexdump(len=61): 02 00 00 39 03 03 ad c1 20 f9 5a 74 ce b3 f8 b4 03 d0 a2 83 ba 46 d8 23 12 6a ce d0 af 97 87 b4 23 2a 33 cd 70 78 00 c0 30 00 00 11 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 17 00 00 OpenSSL: Server selected cipher suite 0xc030 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 07 05 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server hello OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate) OpenSSL: Message - hexdump(len=1797): 0b 00 07 01 00 06 fe 00 06 fb 30 82 06 f7 30 82 05 5f a0 03 02 01 02 02 0a 4f ff 11 37 30 21 e4 b7 f7 d0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 52 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 12 30 10 06 03 55 04 0a 0c 09 41 72 65 6e 64 74 73 65 6e 31 2f 30 2d 06 03 55 04 03 0c 26 41 72 65 6e 64 74 73 65 6e 20 53 65 72 76 65 72 73 20 49 73 73 75 73 69 6e 67 20 43 41 20 32 30 32 31 31 30 31 30 30 1e 17 0d 32 33 30 37 32 32 32 32 31 34 30 33 5a 17 0d 32 34 30 31 32 32 32 32 31 34 30 33 5a 30 6a 31 12 30 10 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 02 64 6b 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 09 61 72 65 6e 64 74 73 65 6e 31 12 30 10 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 02 63 61 31 25 30 23 06 03 55 04 03 0c 1c 61 75 74 68 30 32 2e 69 6e 74 65 72 6e 61 6c 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 82 01 81 00 98 5f 65 04 e8 dc 3c 30 f7 46 06 7d 0d 63 70 bc 75 32 3f 57 93 0b 5b 2c c4 c2 60 2e a2 df de f8 dc a7 19 3d 30 87 5b 58 5b ee 26 48 d6 79 a0 ea cf 57 ba d1 92 c7 4b 34 57 d8 78 c4 82 72 e1 8e f2 b6 12 5f 45 e7 4a 7c 21 1d 2a c7 19 85 72 ba 24 40 8d 5b c9 cf c9 d3 29 47 5a ad c1 97 c9 67 59 cf 03 5d 27 0b 71 eb e5 2b 77 61 f3 77 48 41 3a d7 e2 ca d4 47 f6 76 34 2f f9 c6 c2 c2 9a de 9e 08 9d a8 5b 9f 97 89 10 21 01 46 d6 a0 b2 ae 92 7b b2 45 88 f6 de a4 3e ea b7 e5 08 11 29 11 34 38 86 de e2 42 16 ca 9b 96 8e c0 75 76 9a 89 89 87 bb e7 8e 47 62 7e 7e a9 22 f5 a1 25 bd df a7 b7 ef 17 fb 03 01 d6 63 f9 9a a4 b3 66 43 fd 91 35 b4 ec 38 91 31 00 04 a3 1e 71 59 d8 26 47 90 d9 72 41 5e 56 71 41 d1 14 ca ed 9e 8e b6 ad 67 9c 06 d1 ff 56 2e bf 3b 05 6c ac 3c 77 15 de 47 3f 7f 39 2a d1 91 5c 0c ac 8f 5b 9a a3 46 54 06 0b 0e d0 a1 04 eb f1 6c 27 30 b3 a9 88 e2 0e 8c dd bd e3 63 b0 66 94 91 c7 47 e9 59 c7 d0 39 44 60 1e a8 75 80 4a 5e b1 3d 2e 1f 1d fb 04 de 28 9d c9 2a f1 fd f4 94 8b dd 35 65 94 f9 87 2a 85 9e d9 9f 9b 93 1d 9e 1b 2b 92 18 c4 78 4c 50 de 19 bc 8e 31 bd b4 98 e1 28 12 c2 65 7b 42 d9 d1 8d 2e 38 d4 a6 35 c8 36 32 4d ab cc f4 1d c3 02 03 01 00 01 a3 82 02 b5 30 82 02 b1 30 81 90 06 08 2b 06 01 05 05 07 01 01 04 81 83 30 81 80 30 57 06 08 2b 06 01 05 05 07 30 02 86 4b 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 64 6f 77 6e 6c 6f 61 64 2f 41 72 65 6e 64 74 73 65 6e 5f 53 65 72 76 65 72 73 5f 49 73 73 75 73 69 6e 67 5f 43 41 5f 32 30 32 31 31 30 31 30 2e 63 65 72 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 30 1f 06 03 55 1d 23 04 18 30 16 80 14 36 87 77 96 2f 6e bd 89 90 6c b4 1d dc 03 9a 0c bf 69 7f 84 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 5c 06 03 55 1d 1f 04 55 30 53 30 51 a0 4f a0 4d 86 4b 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 64 6f 77 6e 6c 6f 61 64 2f 41 72 65 6e 64 74 73 65 6e 5f 53 65 72 76 65 72 73 5f 49 73 73 75 73 69 6e 67 5f 43 41 5f 32 30 32 31 31 30 31 30 2e 63 72 6c 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 03 a8 30 81 aa 06 03 55 1d 20 04 81 a2 30 81 9f 30 81 9c 06 03 2a 03 04 30 81 94 30 2c 06 08 2b 06 01 05 05 07 02 01 16 20 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 63 70 73 2e 68 74 6d 6c 30 2c 06 08 2b 06 01 05 05 07 02 01 16 20 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 63 70 73 2e 68 74 6d 6c 30 36 06 08 2b 06 01 05 05 07 02 02 30 2a 1a 28 54 68 69 73 20 69 73 20 61 20 63 6f 6d 6d 65 6e 74 20 66 6f 72 20 70 6f 6c 69 63 79 20 6f 69 64 20 31 2e 32 2e 33 2e 34 30 81 9d 06 03 55 1d 11 04 81 95 30 81 92 82 1a 61 75 74 68 2e 69 6e 74 65 72 6e 61 6c 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 82 1c 61 75 74 68 30 32 2e 69 6e 74 65 72 6e 61 6c 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 82 1c 6c 64 61 70 30 32 2e 69 6e 74 65 72 6e 61 6c 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 82 1a 6c 64 61 70 2e 69 6e 74 65 72 6e 61 6c 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 82 1c 72 61 64 69 75 73 2e 69 6e 74 65 72 6e 61 6c 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 30 1d 06 03 55 1d 0e 04 16 04 14 d8 87 db 08 7d d5 47 ee ce 65 d4 73 7d f3 e2 cd cc 59 ee bd 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 81 00 33 78 2b 5a 0d fb 1e 3f 4b 93 ba f5 3c 29 31 71 8f 5a f0 4e 7f 24 be 9c 78 42 e0 fd 98 e1 56 07 5f 67 6a cb 63 cf ce d9 b2 35 7e ca 7f 6e fb b0 38 7f 68 07 8c 55 0e 3f 40 87 98 4a a4 57 af f8 1f 5e 61 a9 32 a8 b0 7f 64 30 b8 bf cb 40 31 92 8c 8a 99 83 1a 35 29 82 ca b7 2d c9 f2 5f 40 e5 08 f6 96 2c b9 b2 19 70 c2 ac 6c 92 9d 6f c2 68 1e 36 43 7a 63 06 fa 24 34 d9 32 22 dd 1b 88 fd 97 3c f8 6f 76 ec 1d a5 f5 54 25 de 26 da 65 73 c1 a3 da 4b a9 1c 0e b6 59 6c 21 0c 95 38 7b 2a b8 c7 43 6f e8 e9 a9 d0 e6 db 44 f2 3d aa 5a 50 f9 26 1f 0c 74 da 7e 93 6c 63 88 d8 8c 61 c6 4c 15 b8 ab 9a 82 0a 99 11 38 bb 2d 4b 21 dd 02 03 cc 4d 4d de 5d 8d db 29 fe 6d 10 65 a7 c9 e9 9c 40 c3 35 96 e2 32 83 c8 0a 84 4d 79 86 e4 91 e2 53 ac 95 2f b6 5c e5 4e 48 89 cb 58 d4 69 53 89 4b 39 d7 12 28 d5 02 1b 8a 63 69 74 00 89 20 40 0a 00 00 ba ac 64 91 3e 6d 78 25 e1 d7 c9 72 57 51 3a fd 04 e8 d3 52 17 f5 86 59 55 b1 82 44 45 1b 41 28 70 7c e3 6c 4d 25 aa d9 22 d5 2e 06 65 21 8e 23 23 f5 56 c0 6b 98 92 80 bf b2 4a 9d 84 6c cc 59 b0 d4 d6 2e 54 27 9a cc 0b 71 eb a3 b0 69 71 20 4c 53 ff 60 9c 48 88 f2 8e 95 9e 2c 2e 03 59 13 76 df a1 46 f3 0b 75 87 a1 81 4a 79 f7 OpenSSL: Peer certificate - depth 0 Certificate: Data: Version: 3 (0x2) Serial Number: 4f:ff:11:37:30:21:e4:b7:f7:d0 Signature Algorithm: sha256WithRSAEncryption Issuer: C=DK, O=Arendtsen, CN=Arendtsen Servers Issusing CA 20211010 Validity Not Before: Jul 22 22:14:03 2023 GMT Not After : Jan 22 22:14:03 2024 GMT Subject: DC=dk, DC=arendtsen, DC=ca, CN=auth02.internal.arendtsen.dk Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (3072 bit) Modulus: 00:98:5f:65:04:e8:dc:3c:30:f7:46:06:7d:0d:63: 70:bc:75:32:3f:57:93:0b:5b:2c:c4:c2:60:2e:a2: df:de:f8:dc:a7:19:3d:30:87:5b:58:5b:ee:26:48: d6:79:a0:ea:cf:57:ba:d1:92:c7:4b:34:57:d8:78: c4:82:72:e1:8e:f2:b6:12:5f:45:e7:4a:7c:21:1d: 2a:c7:19:85:72:ba:24:40:8d:5b:c9:cf:c9:d3:29: 47:5a:ad:c1:97:c9:67:59:cf:03:5d:27:0b:71:eb: e5:2b:77:61:f3:77:48:41:3a:d7:e2:ca:d4:47:f6: 76:34:2f:f9:c6:c2:c2:9a:de:9e:08:9d:a8:5b:9f: 97:89:10:21:01:46:d6:a0:b2:ae:92:7b:b2:45:88: f6:de:a4:3e:ea:b7:e5:08:11:29:11:34:38:86:de: e2:42:16:ca:9b:96:8e:c0:75:76:9a:89:89:87:bb: e7:8e:47:62:7e:7e:a9:22:f5:a1:25:bd:df:a7:b7: ef:17:fb:03:01:d6:63:f9:9a:a4:b3:66:43:fd:91: 35:b4:ec:38:91:31:00:04:a3:1e:71:59:d8:26:47: 90:d9:72:41:5e:56:71:41:d1:14:ca:ed:9e:8e:b6: ad:67:9c:06:d1:ff:56:2e:bf:3b:05:6c:ac:3c:77: 15:de:47:3f:7f:39:2a:d1:91:5c:0c:ac:8f:5b:9a: a3:46:54:06:0b:0e:d0:a1:04:eb:f1:6c:27:30:b3: a9:88:e2:0e:8c:dd:bd:e3:63:b0:66:94:91:c7:47: e9:59:c7:d0:39:44:60:1e:a8:75:80:4a:5e:b1:3d: 2e:1f:1d:fb:04:de:28:9d:c9:2a:f1:fd:f4:94:8b: dd:35:65:94:f9:87:2a:85:9e:d9:9f:9b:93:1d:9e: 1b:2b:92:18:c4:78:4c:50:de:19:bc:8e:31:bd:b4: 98:e1:28:12:c2:65:7b:42:d9:d1:8d:2e:38:d4:a6: 35:c8:36:32:4d:ab:cc:f4:1d:c3 Exponent: 65537 (0x10001) X509v3 extensions: Authority Information Access: CA Issuers - URI:http://pki.arendtsen.dk/download/Arendtsen_Servers_Issusing_CA_20211010.cer OCSP - URI:http://ocsp.arendtsen.dk/ X509v3 Authority Key Identifier: 36:87:77:96:2F:6E:BD:89:90:6C:B4:1D:DC:03:9A:0C:BF:69:7F:84 X509v3 Basic Constraints: critical CA:FALSE X509v3 CRL Distribution Points: Full Name: URI:http://pki.arendtsen.dk/download/Arendtsen_Servers_Issusing_CA_20211010.crl X509v3 Extended Key Usage: TLS Web Server Authentication X509v3 Key Usage: critical Digital Signature, Key Encipherment, Key Agreement X509v3 Certificate Policies: Policy: 1.2.3.4 CPS: http://pki.arendtsen.dk/cps.html CPS: http://pki.arendtsen.dk/cps.html User Notice: Explicit Text: This is a comment for policy oid 1.2.3.4 X509v3 Subject Alternative Name: DNS:auth.internal.arendtsen.dk, DNS:auth02.internal.arendtsen.dk, DNS:ldap02.internal.arendtsen.dk, DNS:ldap.internal.arendtsen.dk, DNS:radius.internal.arendtsen.dk X509v3 Subject Key Identifier: D8:87:DB:08:7D:D5:47:EE:CE:65:D4:73:7D:F3:E2:CD:CC:59:EE:BD Signature Algorithm: sha256WithRSAEncryption Signature Value: 33:78:2b:5a:0d:fb:1e:3f:4b:93:ba:f5:3c:29:31:71:8f:5a: f0:4e:7f:24:be:9c:78:42:e0:fd:98:e1:56:07:5f:67:6a:cb: 63:cf:ce:d9:b2:35:7e:ca:7f:6e:fb:b0:38:7f:68:07:8c:55: 0e:3f:40:87:98:4a:a4:57:af:f8:1f:5e:61:a9:32:a8:b0:7f: 64:30:b8:bf:cb:40:31:92:8c:8a:99:83:1a:35:29:82:ca:b7: 2d:c9:f2:5f:40:e5:08:f6:96:2c:b9:b2:19:70:c2:ac:6c:92: 9d:6f:c2:68:1e:36:43:7a:63:06:fa:24:34:d9:32:22:dd:1b: 88:fd:97:3c:f8:6f:76:ec:1d:a5:f5:54:25:de:26:da:65:73: c1:a3:da:4b:a9:1c:0e:b6:59:6c:21:0c:95:38:7b:2a:b8:c7: 43:6f:e8:e9:a9:d0:e6:db:44:f2:3d:aa:5a:50:f9:26:1f:0c: 74:da:7e:93:6c:63:88:d8:8c:61:c6:4c:15:b8:ab:9a:82:0a: 99:11:38:bb:2d:4b:21:dd:02:03:cc:4d:4d:de:5d:8d:db:29: fe:6d:10:65:a7:c9:e9:9c:40:c3:35:96:e2:32:83:c8:0a:84: 4d:79:86:e4:91:e2:53:ac:95:2f:b6:5c:e5:4e:48:89:cb:58: d4:69:53:89:4b:39:d7:12:28:d5:02:1b:8a:63:69:74:00:89: 20:40:0a:00:00:ba:ac:64:91:3e:6d:78:25:e1:d7:c9:72:57: 51:3a:fd:04:e8:d3:52:17:f5:86:59:55:b1:82:44:45:1b:41: 28:70:7c:e3:6c:4d:25:aa:d9:22:d5:2e:06:65:21:8e:23:23: f5:56:c0:6b:98:92:80:bf:b2:4a:9d:84:6c:cc:59:b0:d4:d6: 2e:54:27:9a:cc:0b:71:eb:a3:b0:69:71:20:4c:53:ff:60:9c: 48:88:f2:8e:95:9e:2c:2e:03:59:13:76:df:a1:46:f3:0b:75: 87:a1:81:4a:79:f7 OpenSSL: Certificate Policy 1.2.3.4 CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/DC=dk/DC=arendtsen/DC=ca/CN=auth02.internal.arendtsen.dk' hash=7ca1dc2f10dc02a0fec1865370aaf9156491e868e4e6385de3d529634ad30a3a CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:auth.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:auth02.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ldap02.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ldap.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius.internal.arendtsen.dk TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/DC=dk/DC=arendtsen/DC=ca/CN=auth02.internal.arendtsen.dk' EAP: Status notification: remote certificate verification (param=success) OpenSSL: Peer certificate - depth 0 Certificate: Data: Version: 3 (0x2) Serial Number: 4f:ff:11:37:30:21:e4:b7:f7:d0 Signature Algorithm: sha256WithRSAEncryption Issuer: C=DK, O=Arendtsen, CN=Arendtsen Servers Issusing CA 20211010 Validity Not Before: Jul 22 22:14:03 2023 GMT Not After : Jan 22 22:14:03 2024 GMT Subject: DC=dk, DC=arendtsen, DC=ca, CN=auth02.internal.arendtsen.dk Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (3072 bit) Modulus: 00:98:5f:65:04:e8:dc:3c:30:f7:46:06:7d:0d:63: 70:bc:75:32:3f:57:93:0b:5b:2c:c4:c2:60:2e:a2: df:de:f8:dc:a7:19:3d:30:87:5b:58:5b:ee:26:48: d6:79:a0:ea:cf:57:ba:d1:92:c7:4b:34:57:d8:78: c4:82:72:e1:8e:f2:b6:12:5f:45:e7:4a:7c:21:1d: 2a:c7:19:85:72:ba:24:40:8d:5b:c9:cf:c9:d3:29: 47:5a:ad:c1:97:c9:67:59:cf:03:5d:27:0b:71:eb: e5:2b:77:61:f3:77:48:41:3a:d7:e2:ca:d4:47:f6: 76:34:2f:f9:c6:c2:c2:9a:de:9e:08:9d:a8:5b:9f: 97:89:10:21:01:46:d6:a0:b2:ae:92:7b:b2:45:88: f6:de:a4:3e:ea:b7:e5:08:11:29:11:34:38:86:de: e2:42:16:ca:9b:96:8e:c0:75:76:9a:89:89:87:bb: e7:8e:47:62:7e:7e:a9:22:f5:a1:25:bd:df:a7:b7: ef:17:fb:03:01:d6:63:f9:9a:a4:b3:66:43:fd:91: 35:b4:ec:38:91:31:00:04:a3:1e:71:59:d8:26:47: 90:d9:72:41:5e:56:71:41:d1:14:ca:ed:9e:8e:b6: ad:67:9c:06:d1:ff:56:2e:bf:3b:05:6c:ac:3c:77: 15:de:47:3f:7f:39:2a:d1:91:5c:0c:ac:8f:5b:9a: a3:46:54:06:0b:0e:d0:a1:04:eb:f1:6c:27:30:b3: a9:88:e2:0e:8c:dd:bd:e3:63:b0:66:94:91:c7:47: e9:59:c7:d0:39:44:60:1e:a8:75:80:4a:5e:b1:3d: 2e:1f:1d:fb:04:de:28:9d:c9:2a:f1:fd:f4:94:8b: dd:35:65:94:f9:87:2a:85:9e:d9:9f:9b:93:1d:9e: 1b:2b:92:18:c4:78:4c:50:de:19:bc:8e:31:bd:b4: 98:e1:28:12:c2:65:7b:42:d9:d1:8d:2e:38:d4:a6: 35:c8:36:32:4d:ab:cc:f4:1d:c3 Exponent: 65537 (0x10001) X509v3 extensions: Authority Information Access: CA Issuers - URI:http://pki.arendtsen.dk/download/Arendtsen_Servers_Issusing_CA_20211010.cer OCSP - URI:http://ocsp.arendtsen.dk/ X509v3 Authority Key Identifier: 36:87:77:96:2F:6E:BD:89:90:6C:B4:1D:DC:03:9A:0C:BF:69:7F:84 X509v3 Basic Constraints: critical CA:FALSE X509v3 CRL Distribution Points: Full Name: URI:http://pki.arendtsen.dk/download/Arendtsen_Servers_Issusing_CA_20211010.crl X509v3 Extended Key Usage: TLS Web Server Authentication X509v3 Key Usage: critical Digital Signature, Key Encipherment, Key Agreement X509v3 Certificate Policies: Policy: 1.2.3.4 CPS: http://pki.arendtsen.dk/cps.html CPS: http://pki.arendtsen.dk/cps.html User Notice: Explicit Text: This is a comment for policy oid 1.2.3.4 X509v3 Subject Alternative Name: DNS:auth.internal.arendtsen.dk, DNS:auth02.internal.arendtsen.dk, DNS:ldap02.internal.arendtsen.dk, DNS:ldap.internal.arendtsen.dk, DNS:radius.internal.arendtsen.dk X509v3 Subject Key Identifier: D8:87:DB:08:7D:D5:47:EE:CE:65:D4:73:7D:F3:E2:CD:CC:59:EE:BD Signature Algorithm: sha256WithRSAEncryption Signature Value: 33:78:2b:5a:0d:fb:1e:3f:4b:93:ba:f5:3c:29:31:71:8f:5a: f0:4e:7f:24:be:9c:78:42:e0:fd:98:e1:56:07:5f:67:6a:cb: 63:cf:ce:d9:b2:35:7e:ca:7f:6e:fb:b0:38:7f:68:07:8c:55: 0e:3f:40:87:98:4a:a4:57:af:f8:1f:5e:61:a9:32:a8:b0:7f: 64:30:b8:bf:cb:40:31:92:8c:8a:99:83:1a:35:29:82:ca:b7: 2d:c9:f2:5f:40:e5:08:f6:96:2c:b9:b2:19:70:c2:ac:6c:92: 9d:6f:c2:68:1e:36:43:7a:63:06:fa:24:34:d9:32:22:dd:1b: 88:fd:97:3c:f8:6f:76:ec:1d:a5:f5:54:25:de:26:da:65:73: c1:a3:da:4b:a9:1c:0e:b6:59:6c:21:0c:95:38:7b:2a:b8:c7: 43:6f:e8:e9:a9:d0:e6:db:44:f2:3d:aa:5a:50:f9:26:1f:0c: 74:da:7e:93:6c:63:88:d8:8c:61:c6:4c:15:b8:ab:9a:82:0a: 99:11:38:bb:2d:4b:21:dd:02:03:cc:4d:4d:de:5d:8d:db:29: fe:6d:10:65:a7:c9:e9:9c:40:c3:35:96:e2:32:83:c8:0a:84: 4d:79:86:e4:91:e2:53:ac:95:2f:b6:5c:e5:4e:48:89:cb:58: d4:69:53:89:4b:39:d7:12:28:d5:02:1b:8a:63:69:74:00:89: 20:40:0a:00:00:ba:ac:64:91:3e:6d:78:25:e1:d7:c9:72:57: 51:3a:fd:04:e8:d3:52:17:f5:86:59:55:b1:82:44:45:1b:41: 28:70:7c:e3:6c:4d:25:aa:d9:22:d5:2e:06:65:21:8e:23:23: f5:56:c0:6b:98:92:80:bf:b2:4a:9d:84:6c:cc:59:b0:d4:d6: 2e:54:27:9a:cc:0b:71:eb:a3:b0:69:71:20:4c:53:ff:60:9c: 48:88:f2:8e:95:9e:2c:2e:03:59:13:76:df:a1:46:f3:0b:75: 87:a1:81:4a:79:f7 OpenSSL: Certificate Policy 1.2.3.4 CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/DC=dk/DC=arendtsen/DC=ca/CN=auth02.internal.arendtsen.dk' hash=7ca1dc2f10dc02a0fec1865370aaf9156491e868e4e6385de3d529634ad30a3a CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:auth.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:auth02.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ldap02.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ldap.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius.internal.arendtsen.dk TLS: tls_verify_cb - preverify_ok=1 err=21 (unable to verify the first certificate) ca_cert_verify=0 depth=0 buf='/DC=dk/DC=arendtsen/DC=ca/CN=auth02.internal.arendtsen.dk' EAP: Status notification: remote certificate verification (param=success) OpenSSL: Peer certificate - depth 0 Certificate: Data: Version: 3 (0x2) Serial Number: 4f:ff:11:37:30:21:e4:b7:f7:d0 Signature Algorithm: sha256WithRSAEncryption Issuer: C=DK, O=Arendtsen, CN=Arendtsen Servers Issusing CA 20211010 Validity Not Before: Jul 22 22:14:03 2023 GMT Not After : Jan 22 22:14:03 2024 GMT Subject: DC=dk, DC=arendtsen, DC=ca, CN=auth02.internal.arendtsen.dk Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (3072 bit) Modulus: 00:98:5f:65:04:e8:dc:3c:30:f7:46:06:7d:0d:63: 70:bc:75:32:3f:57:93:0b:5b:2c:c4:c2:60:2e:a2: df:de:f8:dc:a7:19:3d:30:87:5b:58:5b:ee:26:48: d6:79:a0:ea:cf:57:ba:d1:92:c7:4b:34:57:d8:78: c4:82:72:e1:8e:f2:b6:12:5f:45:e7:4a:7c:21:1d: 2a:c7:19:85:72:ba:24:40:8d:5b:c9:cf:c9:d3:29: 47:5a:ad:c1:97:c9:67:59:cf:03:5d:27:0b:71:eb: e5:2b:77:61:f3:77:48:41:3a:d7:e2:ca:d4:47:f6: 76:34:2f:f9:c6:c2:c2:9a:de:9e:08:9d:a8:5b:9f: 97:89:10:21:01:46:d6:a0:b2:ae:92:7b:b2:45:88: f6:de:a4:3e:ea:b7:e5:08:11:29:11:34:38:86:de: e2:42:16:ca:9b:96:8e:c0:75:76:9a:89:89:87:bb: e7:8e:47:62:7e:7e:a9:22:f5:a1:25:bd:df:a7:b7: ef:17:fb:03:01:d6:63:f9:9a:a4:b3:66:43:fd:91: 35:b4:ec:38:91:31:00:04:a3:1e:71:59:d8:26:47: 90:d9:72:41:5e:56:71:41:d1:14:ca:ed:9e:8e:b6: ad:67:9c:06:d1:ff:56:2e:bf:3b:05:6c:ac:3c:77: 15:de:47:3f:7f:39:2a:d1:91:5c:0c:ac:8f:5b:9a: a3:46:54:06:0b:0e:d0:a1:04:eb:f1:6c:27:30:b3: a9:88:e2:0e:8c:dd:bd:e3:63:b0:66:94:91:c7:47: e9:59:c7:d0:39:44:60:1e:a8:75:80:4a:5e:b1:3d: 2e:1f:1d:fb:04:de:28:9d:c9:2a:f1:fd:f4:94:8b: dd:35:65:94:f9:87:2a:85:9e:d9:9f:9b:93:1d:9e: 1b:2b:92:18:c4:78:4c:50:de:19:bc:8e:31:bd:b4: 98:e1:28:12:c2:65:7b:42:d9:d1:8d:2e:38:d4:a6: 35:c8:36:32:4d:ab:cc:f4:1d:c3 Exponent: 65537 (0x10001) X509v3 extensions: Authority Information Access: CA Issuers - URI:http://pki.arendtsen.dk/download/Arendtsen_Servers_Issusing_CA_20211010.cer OCSP - URI:http://ocsp.arendtsen.dk/ X509v3 Authority Key Identifier: 36:87:77:96:2F:6E:BD:89:90:6C:B4:1D:DC:03:9A:0C:BF:69:7F:84 X509v3 Basic Constraints: critical CA:FALSE X509v3 CRL Distribution Points: Full Name: URI:http://pki.arendtsen.dk/download/Arendtsen_Servers_Issusing_CA_20211010.crl X509v3 Extended Key Usage: TLS Web Server Authentication X509v3 Key Usage: critical Digital Signature, Key Encipherment, Key Agreement X509v3 Certificate Policies: Policy: 1.2.3.4 CPS: http://pki.arendtsen.dk/cps.html CPS: http://pki.arendtsen.dk/cps.html User Notice: Explicit Text: This is a comment for policy oid 1.2.3.4 X509v3 Subject Alternative Name: DNS:auth.internal.arendtsen.dk, DNS:auth02.internal.arendtsen.dk, DNS:ldap02.internal.arendtsen.dk, DNS:ldap.internal.arendtsen.dk, DNS:radius.internal.arendtsen.dk X509v3 Subject Key Identifier: D8:87:DB:08:7D:D5:47:EE:CE:65:D4:73:7D:F3:E2:CD:CC:59:EE:BD Signature Algorithm: sha256WithRSAEncryption Signature Value: 33:78:2b:5a:0d:fb:1e:3f:4b:93:ba:f5:3c:29:31:71:8f:5a: f0:4e:7f:24:be:9c:78:42:e0:fd:98:e1:56:07:5f:67:6a:cb: 63:cf:ce:d9:b2:35:7e:ca:7f:6e:fb:b0:38:7f:68:07:8c:55: 0e:3f:40:87:98:4a:a4:57:af:f8:1f:5e:61:a9:32:a8:b0:7f: 64:30:b8:bf:cb:40:31:92:8c:8a:99:83:1a:35:29:82:ca:b7: 2d:c9:f2:5f:40:e5:08:f6:96:2c:b9:b2:19:70:c2:ac:6c:92: 9d:6f:c2:68:1e:36:43:7a:63:06:fa:24:34:d9:32:22:dd:1b: 88:fd:97:3c:f8:6f:76:ec:1d:a5:f5:54:25:de:26:da:65:73: c1:a3:da:4b:a9:1c:0e:b6:59:6c:21:0c:95:38:7b:2a:b8:c7: 43:6f:e8:e9:a9:d0:e6:db:44:f2:3d:aa:5a:50:f9:26:1f:0c: 74:da:7e:93:6c:63:88:d8:8c:61:c6:4c:15:b8:ab:9a:82:0a: 99:11:38:bb:2d:4b:21:dd:02:03:cc:4d:4d:de:5d:8d:db:29: fe:6d:10:65:a7:c9:e9:9c:40:c3:35:96:e2:32:83:c8:0a:84: 4d:79:86:e4:91:e2:53:ac:95:2f:b6:5c:e5:4e:48:89:cb:58: d4:69:53:89:4b:39:d7:12:28:d5:02:1b:8a:63:69:74:00:89: 20:40:0a:00:00:ba:ac:64:91:3e:6d:78:25:e1:d7:c9:72:57: 51:3a:fd:04:e8:d3:52:17:f5:86:59:55:b1:82:44:45:1b:41: 28:70:7c:e3:6c:4d:25:aa:d9:22:d5:2e:06:65:21:8e:23:23: f5:56:c0:6b:98:92:80:bf:b2:4a:9d:84:6c:cc:59:b0:d4:d6: 2e:54:27:9a:cc:0b:71:eb:a3:b0:69:71:20:4c:53:ff:60:9c: 48:88:f2:8e:95:9e:2c:2e:03:59:13:76:df:a1:46:f3:0b:75: 87:a1:81:4a:79:f7 OpenSSL: Certificate Policy 1.2.3.4 CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/DC=dk/DC=arendtsen/DC=ca/CN=auth02.internal.arendtsen.dk' hash=7ca1dc2f10dc02a0fec1865370aaf9156491e868e4e6385de3d529634ad30a3a CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:auth.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:auth02.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ldap02.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:ldap.internal.arendtsen.dk CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius.internal.arendtsen.dk TLS: tls_verify_cb - preverify_ok=1 err=21 (unable to verify the first certificate) ca_cert_verify=0 depth=0 buf='/DC=dk/DC=arendtsen/DC=ca/CN=auth02.internal.arendtsen.dk' EAP: Status notification: remote certificate verification (param=success) OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 01 cd SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server certificate OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange) OpenSSL: Message - hexdump(len=461): 0c 00 01 c9 03 00 17 41 04 b5 aa 6a 13 31 35 98 56 bb 83 24 3a 68 ca ac d5 56 1c 49 9d e7 25 fd 0d a7 8c 1c 7c b2 22 49 76 4f d8 6a 25 cc fe 60 01 7f ad 26 a0 dd 3f 9a 49 73 2f 73 a1 65 fe a9 2e 1f ef 38 0e ed 29 0d f8 08 04 01 80 7f 5a d9 d7 57 39 f2 e8 ef ae 59 b5 f6 7f 17 6c f8 c1 b7 b7 db 0d c2 d3 3e a4 28 9b 49 62 10 f6 1b da 09 55 f3 fe 10 77 52 97 8f 2a 72 4e ad 48 a9 7e 82 6e b9 f0 9e aa ee 7f d6 3d 70 da 10 c1 1f 0f 58 17 30 3c 6f 02 69 37 8e fc fd 0b 25 0e 2b 27 78 d4 15 45 8d de b8 1c 5f 32 30 ee 58 ab fd 54 fb ed 63 1d f2 67 37 84 02 ef ba a6 ac 8b c3 f7 46 83 d1 ae 79 b5 e1 9a 45 69 d9 22 55 43 32 9a 12 96 0a ca 52 76 d4 7c 2f 9e 8b 1c 3b 35 2a 30 b3 1d ad 78 c9 7c 91 80 18 19 a7 e4 4a 6e f9 58 88 39 eb f3 f6 5e b2 6b ae b2 3f 60 54 50 10 14 6f c3 98 88 f7 f3 1d 80 c1 87 b4 d3 61 0d 4c 75 2a 30 a9 93 d3 4c 85 58 9c dd ac c9 52 f3 04 7d ea c6 b2 58 b6 22 5a e6 6b bc c5 91 22 fb 38 10 17 e4 9a 4d 0b 96 7b a8 dd 75 3c 3b 7a 11 e7 96 6e 7a 65 b1 e3 37 6d c2 20 b7 77 5b 80 2c a8 5a 1e 57 33 73 d7 d9 3b c5 5c 6d d9 34 cd 07 cd a5 8f 0d 38 9a 77 b5 10 ad 99 d2 a2 f6 e4 71 0c be 8e 2d 40 c0 eb a7 fb ea 05 0f 70 8d 87 9d de dc d0 53 79 2d 7e 5f 3d 3b 5c 0a 15 ca 4b 45 6c 70 bf 27 fc e1 61 e0 88 76 32 5a 22 96 7d 74 9f d1 82 ba 0d 4e 46 a3 eb 9e ff ab 03 31 1e 3d b7 cc 8b e5 f2 cc 18 a5 8c 45 3f 96 f1 79 1c 28 bf c2 16 06 db 4d 23 52 b6 84 66 64 be b4 95 86 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 01 0c SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server key exchange OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate request) OpenSSL: Message - hexdump(len=268): 0d 00 01 08 03 01 02 40 00 2e 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 02 03 03 01 02 01 03 02 02 02 04 02 05 02 06 02 00 d2 00 27 30 25 31 23 30 21 06 03 55 04 03 0c 1a 41 72 65 6e 64 74 73 65 6e 20 52 6f 6f 74 20 43 41 20 32 30 32 31 30 38 32 33 00 54 30 52 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 12 30 10 06 03 55 04 0a 0c 09 41 72 65 6e 64 74 73 65 6e 31 2f 30 2d 06 03 55 04 03 0c 26 41 72 65 6e 64 74 73 65 6e 20 44 65 76 69 63 65 73 20 49 73 73 75 73 69 6e 67 20 43 41 20 32 30 32 31 31 30 31 31 00 51 30 4f 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 12 30 10 06 03 55 04 0a 0c 09 41 72 65 6e 64 74 73 65 6e 31 2c 30 2a 06 03 55 04 03 0c 23 41 72 65 6e 64 74 73 65 6e 20 55 73 65 72 20 49 73 73 75 73 69 6e 67 20 43 41 20 32 30 32 31 31 30 30 38 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 04 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server certificate request OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done) OpenSSL: Message - hexdump(len=4): 0e 00 00 00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read server done OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 06 81 OpenSSL: TX ver=0x303 content_type=22 (handshake/certificate) OpenSSL: Message - hexdump(len=1665): 0b 00 06 7d 00 06 7a 00 06 77 30 82 06 73 30 82 04 db a0 03 02 01 02 02 0a 72 ff 95 dc f4 0c d6 88 3c 85 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 52 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 12 30 10 06 03 55 04 0a 0c 09 41 72 65 6e 64 74 73 65 6e 31 2f 30 2d 06 03 55 04 03 0c 26 41 72 65 6e 64 74 73 65 6e 20 44 65 76 69 63 65 73 20 49 73 73 75 73 69 6e 67 20 43 41 20 32 30 32 31 31 30 31 31 30 1e 17 0d 32 33 30 38 31 36 32 31 31 39 35 30 5a 17 0d 32 34 30 38 31 36 32 31 31 39 35 30 5a 30 81 85 31 12 30 10 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 02 64 6b 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 09 61 72 65 6e 64 74 73 65 6e 31 17 30 15 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 07 64 65 76 69 63 65 73 31 10 30 0e 06 03 55 04 0b 0c 07 64 65 76 69 63 65 73 31 29 30 27 06 03 55 04 03 0c 20 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 82 01 81 00 9e 1b 1c 7a 2c 83 bb 36 17 94 d3 8e b3 09 c0 77 f5 25 6f 55 aa 56 1a 13 45 85 85 03 88 81 50 44 fd 48 32 3c f2 7a 10 00 98 d4 dd d5 c8 02 40 8b 81 ab a5 31 90 51 02 56 d8 fe a4 c8 36 51 2f 84 1b af 6b bd cb b6 7c be 59 18 9b 44 93 ab 5a 1f 8b 3d c6 d3 68 96 87 0d 18 f3 a2 c2 06 00 8f ba 48 5b 2e 57 3d 4c 8b fb fb d7 a6 e9 38 dc 3e 2f 02 77 88 f4 84 11 52 0e 19 56 4c 7a 48 24 91 2c a1 8a c2 cb eb bd 92 df fe 6f d8 2d fc 5a 7a 81 fd 6c 9e 06 70 db 36 50 40 5c 5f f8 89 d3 e2 b1 3a 5a bf f6 b9 78 78 9c 6f 62 64 97 e0 69 1f 18 07 3a df 54 e0 29 28 ab 5e 2b ec d6 5c 9b b4 49 b3 83 9e d2 cc 08 df 96 14 9c 59 ca f6 e3 c0 29 61 01 a8 6f 3d 0c d7 7c 6a bc 66 33 21 a8 b9 96 12 03 3a 47 07 d7 2b 82 6f b7 cc b4 7d 56 95 ee e0 2a fb fe dc c5 15 42 4a c0 c5 63 90 88 4a 72 66 8b 81 6e 0d 54 26 c7 7d ea fa bf 0d 38 c2 12 39 ec 39 4c 79 d7 3c f2 fd 2f 10 11 81 fc 0b e6 56 89 52 46 53 ab 62 6c 87 5b 53 62 cc 75 50 ef 96 a4 88 9c e6 d9 c6 44 86 cf a0 0e a6 a1 ba 85 d8 84 69 35 8c a4 92 2a 3a 8a 3a 63 3d 9d 64 36 24 ad 7d 16 e9 d6 f6 66 1d fa 2b 34 f4 6b 1d e0 c6 d3 7c 26 2f c1 4c 07 e5 be 94 db 53 9f 33 49 ae 5e 95 68 9f e0 57 7a f4 18 d8 13 d4 ca d0 09 02 03 01 00 01 a3 82 02 15 30 82 02 11 30 81 90 06 08 2b 06 01 05 05 07 01 01 04 81 83 30 81 80 30 57 06 08 2b 06 01 05 05 07 30 02 86 4b 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 64 6f 77 6e 6c 6f 61 64 2f 41 72 65 6e 64 74 73 65 6e 5f 44 65 76 69 63 65 73 5f 49 73 73 75 73 69 6e 67 5f 43 41 5f 32 30 32 31 31 30 31 31 2e 63 65 72 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 30 1f 06 03 55 1d 23 04 18 30 16 80 14 10 1c a7 8c d7 17 69 61 c6 0b f3 8f b2 d4 7e ec 0d 11 82 27 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 5c 06 03 55 1d 1f 04 55 30 53 30 51 a0 4f a0 4d 86 4b 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 64 6f 77 6e 6c 6f 61 64 2f 41 72 65 6e 64 74 73 65 6e 5f 44 65 76 69 63 65 73 5f 49 73 73 75 73 69 6e 67 5f 43 41 5f 32 30 32 31 31 30 31 31 2e 63 72 6c 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 07 80 30 81 aa 06 03 55 1d 20 04 81 a2 30 81 9f 30 81 9c 06 03 2a 03 04 30 81 94 30 2c 06 08 2b 06 01 05 05 07 02 01 16 20 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 63 70 73 2e 68 74 6d 6c 30 2c 06 08 2b 06 01 05 05 07 02 01 16 20 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 63 70 73 2e 68 74 6d 6c 30 36 06 08 2b 06 01 05 05 07 02 02 30 2a 1a 28 54 68 69 73 20 69 73 20 61 20 63 6f 6d 6d 65 6e 74 20 66 6f 72 20 70 6f 6c 69 63 79 20 6f 69 64 20 31 2e 32 2e 33 2e 34 30 1d 06 03 55 1d 0e 04 16 04 14 ae 82 62 6f ea a4 ff be d0 36 fe ad c8 6c 4c ae 4a d1 e6 ce 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 81 00 9f 51 f4 e9 bc c4 90 73 f4 a2 48 67 42 5a 42 19 69 c5 dd 1d ec eb 04 b6 c1 1f 41 7b fe a3 95 81 2a a5 d3 6e 59 31 29 25 02 79 35 72 10 96 c0 02 b8 ee 2f a4 52 27 3c 75 33 6f 78 c2 56 da 5a 25 f9 e6 8c 3c 3b d7 ca 04 fc 08 6d a9 d5 22 58 9d 29 a0 30 b3 a8 6a 88 83 23 cd b2 6f 6b 26 9d 6d 69 d6 89 b8 c4 64 e7 f0 1c de b0 8a a0 51 71 27 3e a1 52 1a 30 18 be c7 59 74 a6 ae 20 db 06 b5 32 b8 6f 4e 44 2a 04 52 f8 e8 db 48 c4 5c 9b e8 69 5b cf b4 2e fd e7 71 6b b2 1f 5a 51 bd 15 e7 16 92 15 ba c1 90 d8 61 a3 f1 2d 83 7e 67 80 15 33 8c dc af 2e a5 b8 09 56 e3 28 2a 76 5a 2c 61 42 d3 16 8a 02 55 cd 99 e9 10 c7 91 15 3b 09 4f 13 25 2c 4f 67 17 91 4e a1 df 86 35 b4 df f0 34 a7 e1 a3 ca 04 4c b6 d9 8b 0a 7a d1 16 dd 9d 9f 15 ee 4f 45 e5 c0 bc 99 9d 8a 99 26 23 11 84 49 f2 95 11 da 7f ee 4f 57 8c 07 0c 32 19 8f 57 92 de 48 09 cd 4a d2 81 b3 ec 50 3f 5d 12 fc 51 7b 7a d1 a6 c2 30 b9 3c 4e 98 1c 7a 5e 24 a5 8b 74 cc dc 0d 57 fc 9e e8 53 5d 61 35 2a 9e ef b7 ac 93 e5 43 42 50 da a8 41 52 66 af 1c ad 38 88 4c b2 16 8c 0d 51 f9 c1 ac aa 5a ab 98 96 50 fc f5 77 a5 90 e1 32 3a cc 51 6a 71 15 fb f3 06 7f 1a 06 13 d2 b7 11 9d f3 cb 41 69 3e 51 b1 a1 ea 07 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client certificate OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 46 OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange) OpenSSL: Message - hexdump(len=70): 10 00 00 42 41 04 c0 bb 13 0c a2 54 51 49 c4 a7 23 06 99 e2 dd 03 af e2 9e 55 05 00 39 8a c0 ab 7d ee 0e 3d 92 e0 b0 c7 c5 36 d9 30 8b 0e ce 1f b5 2e c2 49 83 62 cc f6 20 e3 c2 cd 44 b7 cc 2d 05 7e 69 34 9b f7 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write client key exchange OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 01 88 OpenSSL: TX ver=0x303 content_type=22 (handshake/certificate verify) OpenSSL: Message - hexdump(len=392): 0f 00 01 84 08 04 01 80 0c 5c 07 49 d1 1f 1b c4 ca 92 05 5d 36 be cc 7d f1 c9 a4 c6 30 07 42 4f f4 62 e7 bd ad ae 6d 24 f3 b8 80 aa a0 ca 41 ae 34 35 35 9d d8 32 2e c8 89 d5 90 e8 17 be 34 f9 3b 5b 06 a4 8b 32 b9 a8 69 f1 1d 5e 50 27 13 69 a1 3e b6 2c 41 a7 e2 33 30 c0 5b df 4b fa f8 56 8f 79 7d 3d bb 71 d1 0a 72 42 a1 24 f6 e1 52 5c 48 78 cf 05 a4 89 36 24 e7 a5 be d0 a7 77 53 80 22 47 02 fc ea 7a 57 a1 aa f8 e2 13 83 84 47 08 a7 88 f8 64 1a 03 99 39 4e c5 6c 62 eb 3a 80 f2 d3 24 4c 85 75 25 c6 ba 24 ab 45 a7 5f 0d 73 77 05 29 f0 d6 60 fe d8 42 91 8f dd 54 93 2e 8b a0 b5 3b ef 9d a0 89 f2 56 e3 1b dc b9 73 a6 f5 09 3f 8f 16 50 5d a2 5d 41 14 0b 17 3f d6 f3 cb 09 d2 66 39 79 ec 64 fe c3 c3 e5 08 4a 3c 16 ce 36 47 f3 f7 68 bb 93 be 9a fc 2d c3 02 9f c2 63 47 97 0b b3 cd 68 4a 58 c4 f4 2c 45 00 d9 d0 93 06 5f a5 07 6a 7f ea c8 18 59 cd 4d a7 d6 ea 97 3f a8 90 da e9 46 21 9d c3 b0 9b 5e 4a 14 72 38 57 7a 5d 81 95 42 fc 33 bb 28 60 8d fd 72 88 3d 2b 87 c2 dd 00 9f 6d 11 ba f9 b3 ed c1 25 55 ab 5d 06 a6 97 d7 0b 33 a0 65 06 7e 89 86 8f d0 54 93 d0 1b 8e 2c d9 9a c6 ba 40 76 38 aa 2b a8 f2 79 2b 42 6c d0 0c f0 b7 4b f3 10 71 06 73 8c 05 55 33 5a ed f2 61 74 07 8b SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write certificate verify OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 14 03 03 00 01 OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/) OpenSSL: Message - hexdump(len=1): 01 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write change cipher spec OpenSSL: TX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 28 OpenSSL: TX ver=0x303 content_type=22 (handshake/finished) OpenSSL: Message - hexdump(len=16): 14 00 00 0c 66 28 1b 4c e7 ae 82 54 50 af 94 f5 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write finished SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3/TLS write finished SSL: SSL_connect - want more data SSL: 2193 bytes pending from ssl_out SSL: Using TLS version TLSv1.2 SSL: 2193 bytes left to be sent out (of total 2193 bytes) SSL: sending 1398 bytes, more fragments will follow EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x564feb8b1dc0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=1408) TX EAP -> RADIUS - hexdump(len=1408): 02 18 05 80 0d c0 00 00 08 91 16 03 03 06 81 0b 00 06 7d 00 06 7a 00 06 77 30 82 06 73 30 82 04 db a0 03 02 01 02 02 0a 72 ff 95 dc f4 0c d6 88 3c 85 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 52 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 12 30 10 06 03 55 04 0a 0c 09 41 72 65 6e 64 74 73 65 6e 31 2f 30 2d 06 03 55 04 03 0c 26 41 72 65 6e 64 74 73 65 6e 20 44 65 76 69 63 65 73 20 49 73 73 75 73 69 6e 67 20 43 41 20 32 30 32 31 31 30 31 31 30 1e 17 0d 32 33 30 38 31 36 32 31 31 39 35 30 5a 17 0d 32 34 30 38 31 36 32 31 31 39 35 30 5a 30 81 85 31 12 30 10 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 02 64 6b 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 09 61 72 65 6e 64 74 73 65 6e 31 17 30 15 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 07 64 65 76 69 63 65 73 31 10 30 0e 06 03 55 04 0b 0c 07 64 65 76 69 63 65 73 31 29 30 27 06 03 55 04 03 0c 20 36 62 64 34 61 38 36 39 38 38 33 32 34 65 35 36 62 32 64 63 64 63 66 30 35 33 31 36 31 61 30 32 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f 00 30 82 01 8a 02 82 01 81 00 9e 1b 1c 7a 2c 83 bb 36 17 94 d3 8e b3 09 c0 77 f5 25 6f 55 aa 56 1a 13 45 85 85 03 88 81 50 44 fd 48 32 3c f2 7a 10 00 98 d4 dd d5 c8 02 40 8b 81 ab a5 31 90 51 02 56 d8 fe a4 c8 36 51 2f 84 1b af 6b bd cb b6 7c be 59 18 9b 44 93 ab 5a 1f 8b 3d c6 d3 68 96 87 0d 18 f3 a2 c2 06 00 8f ba 48 5b 2e 57 3d 4c 8b fb fb d7 a6 e9 38 dc 3e 2f 02 77 88 f4 84 11 52 0e 19 56 4c 7a 48 24 91 2c a1 8a c2 cb eb bd 92 df fe 6f d8 2d fc 5a 7a 81 fd 6c 9e 06 70 db 36 50 40 5c 5f f8 89 d3 e2 b1 3a 5a bf f6 b9 78 78 9c 6f 62 64 97 e0 69 1f 18 07 3a df 54 e0 29 28 ab 5e 2b ec d6 5c 9b b4 49 b3 83 9e d2 cc 08 df 96 14 9c 59 ca f6 e3 c0 29 61 01 a8 6f 3d 0c d7 7c 6a bc 66 33 21 a8 b9 96 12 03 3a 47 07 d7 2b 82 6f b7 cc b4 7d 56 95 ee e0 2a fb fe dc c5 15 42 4a c0 c5 63 90 88 4a 72 66 8b 81 6e 0d 54 26 c7 7d ea fa bf 0d 38 c2 12 39 ec 39 4c 79 d7 3c f2 fd 2f 10 11 81 fc 0b e6 56 89 52 46 53 ab 62 6c 87 5b 53 62 cc 75 50 ef 96 a4 88 9c e6 d9 c6 44 86 cf a0 0e a6 a1 ba 85 d8 84 69 35 8c a4 92 2a 3a 8a 3a 63 3d 9d 64 36 24 ad 7d 16 e9 d6 f6 66 1d fa 2b 34 f4 6b 1d e0 c6 d3 7c 26 2f c1 4c 07 e5 be 94 db 53 9f 33 49 ae 5e 95 68 9f e0 57 7a f4 18 d8 13 d4 ca d0 09 02 03 01 00 01 a3 82 02 15 30 82 02 11 30 81 90 06 08 2b 06 01 05 05 07 01 01 04 81 83 30 81 80 30 57 06 08 2b 06 01 05 05 07 30 02 86 4b 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 64 6f 77 6e 6c 6f 61 64 2f 41 72 65 6e 64 74 73 65 6e 5f 44 65 76 69 63 65 73 5f 49 73 73 75 73 69 6e 67 5f 43 41 5f 32 30 32 31 31 30 31 31 2e 63 65 72 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 30 1f 06 03 55 1d 23 04 18 30 16 80 14 10 1c a7 8c d7 17 69 61 c6 0b f3 8f b2 d4 7e ec 0d 11 82 27 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 5c 06 03 55 1d 1f 04 55 30 53 30 51 a0 4f a0 4d 86 4b 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 64 6f 77 6e 6c 6f 61 64 2f 41 72 65 6e 64 74 73 65 6e 5f 44 65 76 69 63 65 73 5f 49 73 73 75 73 69 6e 67 5f 43 41 5f 32 30 32 31 31 30 31 31 2e 63 72 6c 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 07 80 30 81 aa 06 03 55 1d 20 04 81 a2 30 81 9f 30 81 9c 06 03 2a 03 04 30 81 94 30 2c 06 08 2b 06 01 05 05 07 02 01 16 20 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 63 70 73 2e 68 74 6d 6c 30 2c 06 08 2b 06 01 05 05 07 02 01 16 20 68 74 74 70 3a 2f 2f 70 6b 69 2e 61 72 65 6e 64 74 73 65 6e 2e 64 6b 2f 63 70 73 2e 68 74 6d 6c 30 36 06 08 2b 06 01 05 05 07 02 02 30 2a 1a 28 54 68 69 73 20 69 73 20 61 20 63 6f 6d 6d 65 6e 74 20 66 6f 72 20 70 6f 6c 69 63 79 20 6f 69 64 20 31 2e 32 2e 33 2e 34 30 1d 06 03 55 1d 0e 04 16 04 14 ae 82 62 6f ea a4 ff be d0 36 fe ad c8 6c 4c ae 4a d1 e6 ce 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 81 00 9f 51 f4 e9 bc c4 90 73 f4 a2 48 67 42 5a 42 19 69 c5 dd 1d ec eb 04 b6 c1 1f 41 7b fe a3 95 81 2a a5 d3 6e 59 31 29 25 02 79 35 72 10 96 c0 02 b8 ee 2f a4 52 27 3c 75 33 6f 78 c2 56 da 5a 25 f9 e6 8c 3c 3b d7 ca 04 fc 08 6d a9 d5 22 58 9d 29 a0 30 b3 a8 6a 88 83 23 cd b2 6f 6b 26 9d 6d 69 d6 89 b8 c4 64 e7 f0 1c de b0 8a a0 51 71 27 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=4 length=1580 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 6365733110300e060355040b0c07646576696365733129302706035504030c203662643461383639383833323465353662326463646366303533313631613032308201a2300d06092a864886f70d01010105000382018f003082018a02820181009e1b1c7a2c83bb361794d38eb309c077f5256f55aa561a134585850388815044fd48323cf27a100098d4ddd5c802408b81aba53190510256d8fea4c836512f841baf6bbdcbb67cbe59189b4493ab5a1f8b3dc6d36896870d18f3a2c206008fba485b2e573d4c8bfbfbd7a6e938dc3e2f027788f48411520e19564c7a4824912ca18ac2cbebbd92dffe6fd82dfc5a7a81fd6c9e0670db3650405c5ff8 Attribute 79 (EAP-Message) length=255 Value: 89d3e2b13a5abff6b978789c6f626497e0691f18073adf54e02928ab5e2becd65c9bb449b3839ed2cc08df96149c59caf6e3c0296101a86f3d0cd77c6abc663321a8b99612033a4707d72b826fb7ccb47d5695eee02afbfedcc515424ac0c56390884a72668b816e0d5426c77deafabf0d38c21239ec394c79d73cf2fd2f101181fc0be65689524653ab626c875b5362cc7550ef96a4889ce6d9c64486cfa00ea6a1ba85d88469358ca4922a3a8a3a633d9d643624ad7d16e9d6f6661dfa2b34f46b1de0c6d37c262fc14c07e5be94db539f3349ae5e95689fe0577af418d813d4cad0090203010001a38202153082021130819006082b060105050701 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=145 Value: 36feadc86c4cae4ad1e6ce300d06092a864886f70d01010b050003820181009f51f4e9bcc49073f4a24867425a421969c5dd1deceb04b6c11f417bfea395812aa5d36e59312925027935721096c002b8ee2fa452273c75336f78c256da5a25f9e68c3c3bd7ca04fc086da9d522589d29a030b3a86a888323cdb26f6b269d6d69d689b8c464e7f01cdeb08aa0517127 Attribute 24 (State) length=18 Value: 14fba4be17e3a9e8a4487bf82773588b Attribute 80 (Message-Authenticator) length=18 Value: e63ca286220dbad8bd0d78723edcf1f9 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 64 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=4 length=64 Attribute 79 (EAP-Message) length=8 Value: 011900060d00 Attribute 80 (Message-Authenticator) length=18 Value: a7c6b72db5e6193f982af0fbcf481b0d Attribute 24 (State) length=18 Value: 14fba4be10e2a9e8a4487bf82773588b STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=25 len=6) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=25 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x00 SSL: 795 bytes left to be sent out (of total 2193 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x564feb8a24c0 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=801) TX EAP -> RADIUS - hexdump(len=801): 02 19 03 21 0d 00 3e a1 52 1a 30 18 be c7 59 74 a6 ae 20 db 06 b5 32 b8 6f 4e 44 2a 04 52 f8 e8 db 48 c4 5c 9b e8 69 5b cf b4 2e fd e7 71 6b b2 1f 5a 51 bd 15 e7 16 92 15 ba c1 90 d8 61 a3 f1 2d 83 7e 67 80 15 33 8c dc af 2e a5 b8 09 56 e3 28 2a 76 5a 2c 61 42 d3 16 8a 02 55 cd 99 e9 10 c7 91 15 3b 09 4f 13 25 2c 4f 67 17 91 4e a1 df 86 35 b4 df f0 34 a7 e1 a3 ca 04 4c b6 d9 8b 0a 7a d1 16 dd 9d 9f 15 ee 4f 45 e5 c0 bc 99 9d 8a 99 26 23 11 84 49 f2 95 11 da 7f ee 4f 57 8c 07 0c 32 19 8f 57 92 de 48 09 cd 4a d2 81 b3 ec 50 3f 5d 12 fc 51 7b 7a d1 a6 c2 30 b9 3c 4e 98 1c 7a 5e 24 a5 8b 74 cc dc 0d 57 fc 9e e8 53 5d 61 35 2a 9e ef b7 ac 93 e5 43 42 50 da a8 41 52 66 af 1c ad 38 88 4c b2 16 8c 0d 51 f9 c1 ac aa 5a ab 98 96 50 fc f5 77 a5 90 e1 32 3a cc 51 6a 71 15 fb f3 06 7f 1a 06 13 d2 b7 11 9d f3 cb 41 69 3e 51 b1 a1 ea 07 16 03 03 00 46 10 00 00 42 41 04 c0 bb 13 0c a2 54 51 49 c4 a7 23 06 99 e2 dd 03 af e2 9e 55 05 00 39 8a c0 ab 7d ee 0e 3d 92 e0 b0 c7 c5 36 d9 30 8b 0e ce 1f b5 2e c2 49 83 62 cc f6 20 e3 c2 cd 44 b7 cc 2d 05 7e 69 34 9b f7 16 03 03 01 88 0f 00 01 84 08 04 01 80 0c 5c 07 49 d1 1f 1b c4 ca 92 05 5d 36 be cc 7d f1 c9 a4 c6 30 07 42 4f f4 62 e7 bd ad ae 6d 24 f3 b8 80 aa a0 ca 41 ae 34 35 35 9d d8 32 2e c8 89 d5 90 e8 17 be 34 f9 3b 5b 06 a4 8b 32 b9 a8 69 f1 1d 5e 50 27 13 69 a1 3e b6 2c 41 a7 e2 33 30 c0 5b df 4b fa f8 56 8f 79 7d 3d bb 71 d1 0a 72 42 a1 24 f6 e1 52 5c 48 78 cf 05 a4 89 36 24 e7 a5 be d0 a7 77 53 80 22 47 02 fc ea 7a 57 a1 aa f8 e2 13 83 84 47 08 a7 88 f8 64 1a 03 99 39 4e c5 6c 62 eb 3a 80 f2 d3 24 4c 85 75 25 c6 ba 24 ab 45 a7 5f 0d 73 77 05 29 f0 d6 60 fe d8 42 91 8f dd 54 93 2e 8b a0 b5 3b ef 9d a0 89 f2 56 e3 1b dc b9 73 a6 f5 09 3f 8f 16 50 5d a2 5d 41 14 0b 17 3f d6 f3 cb 09 d2 66 39 79 ec 64 fe c3 c3 e5 08 4a 3c 16 ce 36 47 f3 f7 68 bb 93 be 9a fc 2d c3 02 9f c2 63 47 97 0b b3 cd 68 4a 58 c4 f4 2c 45 00 d9 d0 93 06 5f a5 07 6a 7f ea c8 18 59 cd 4d a7 d6 ea 97 3f a8 90 da e9 46 21 9d c3 b0 9b 5e 4a 14 72 38 57 7a 5d 81 95 42 fc 33 bb 28 60 8d fd 72 88 3d 2b 87 c2 dd 00 9f 6d 11 ba f9 b3 ed c1 25 55 ab 5d 06 a6 97 d7 0b 33 a0 65 06 7e 89 86 8f d0 54 93 d0 1b 8e 2c d9 9a c6 ba 40 76 38 aa 2b a8 f2 79 2b 42 6c d0 0c f0 b7 4b f3 10 71 06 73 8c 05 55 33 5a ed f2 61 74 07 8b 14 03 03 00 01 01 16 03 03 00 28 3c c9 50 ec d6 e5 30 39 8a f9 49 ab cb 0b ab 75 09 cc 5a 6e 02 0a 04 9b 65 de 54 ce 9c ed 60 55 60 0e dd aa 32 71 57 4c Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=5 length=969 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=255 Value: 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 Attribute 79 (EAP-Message) length=44 Value: 00283cc950ecd6e530398af949abcb0bab7509cc5a6e020a049b65de54ce9ced6055600eddaa3271574c Attribute 24 (State) length=18 Value: 14fba4be10e2a9e8a4487bf82773588b Attribute 80 (Message-Authenticator) length=18 Value: 8108013d7a922ef8a0ae1e1293da149f Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 119 bytes from RADIUS server Received RADIUS message RADIUS message: code=11 (Access-Challenge) identifier=5 length=119 Attribute 79 (EAP-Message) length=63 Value: 011a003d0d8000000033140303000101160303002841fec7d60128e1c2c5c6084b3752748d80cad45f1ac85ff9ed1d8010c488e57da54fc9d3783dd2ae Attribute 80 (Message-Authenticator) length=18 Value: 1be1927e950b18ed7f00d72d886c0ea1 Attribute 24 (State) length=18 Value: 14fba4be11e1a9e8a4487bf82773588b STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station decapsulated EAP packet (code=1 id=26 len=61) from RADIUS server: EAP-Request-TLS (13) EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=26 method=13 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=61) - Flags 0x80 SSL: TLS Message Length: 51 OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 14 03 03 00 01 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS write finished OpenSSL: RX ver=0x303 content_type=256 (TLS header info/) OpenSSL: Message - hexdump(len=5): 16 03 03 00 28 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read change cipher spec OpenSSL: RX ver=0x303 content_type=22 (handshake/finished) OpenSSL: Message - hexdump(len=16): 14 00 00 0c a1 5d 75 27 d7 7c 55 a1 dd 95 47 bc SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3/TLS read finished SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out OpenSSL: Handshake finished - resumed=0 SSL: No Application Data included SSL: Using TLS version TLSv1.2 SSL: No data to be sent out EAP-TLS: Done EAP-TLS: Derived key - hexdump(len=64): 78 32 00 e8 af 5c cc 9e f6 35 52 39 f4 2c 81 12 20 44 e1 72 71 df 4b 05 b1 47 c0 8c 3b de be 41 01 43 c2 f3 94 e6 8d 84 c1 a2 15 b4 84 66 69 3d f8 38 89 10 fe 6e 84 4f 25 b1 b4 22 91 70 16 1c EAP-TLS: Derived EMSK - hexdump(len=64): 3c a8 25 6f ca db 94 9e e3 84 b8 63 e4 29 45 49 42 e0 53 1d 62 88 26 70 60 15 b7 86 b2 fe cd fb a3 e0 44 29 55 b6 39 3c 3e c6 41 13 af cc e1 e1 8a 95 9c ba 63 f4 bc b4 e0 82 2e 6f 25 95 41 16 EAP-TLS: Derived Session-Id - hexdump(len=65): 0d c2 eb fd 63 e9 00 84 1e 02 31 56 f4 4d 79 f8 e8 08 02 4f 49 76 45 61 d3 54 2f e0 f7 af c1 f0 7f ad c1 20 f9 5a 74 ce b3 f8 b4 03 d0 a2 83 ba 46 d8 23 12 6a ce d0 af 97 87 b4 23 2a 33 cd 70 78 SSL: Building ACK (type=13 id=26 ver=0) EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x564feb8cf460 EAP: Session-Id - hexdump(len=65): 0d c2 eb fd 63 e9 00 84 1e 02 31 56 f4 4d 79 f8 e8 08 02 4f 49 76 45 61 d3 54 2f e0 f7 af c1 f0 7f ad c1 20 f9 5a 74 ce b3 f8 b4 03 d0 a2 83 ba 46 d8 23 12 6a ce d0 af 97 87 b4 23 2a 33 cd 70 78 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS - hexdump(len=6): 02 1a 00 06 0d 00 Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=6 length=168 Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 102 (EAP-Key-Name) length=3 Value: 00 Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=8 Value: 021a00060d00 Attribute 24 (State) length=18 Value: 14fba4be11e1a9e8a4487bf82773588b Attribute 80 (Message-Authenticator) length=18 Value: cc48fa978977bee8a4cca9f448e5a3c0 Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 267 bytes from RADIUS server Received RADIUS message RADIUS message: code=2 (Access-Accept) identifier=6 length=267 Attribute 26 (Vendor-Specific) length=58 Value: 0000013711348034888c05d5dacfd84d87e7d17ea96f0343592e7f36136e4e0177ab4c81a44cfb9192f578d29fbcac6dfb09412051ecfef7 Attribute 26 (Vendor-Specific) length=58 Value: 0000013710348e0e91db37c79324b4d35cf5615b11c88469ceeb793f9ff5e59d1c577cc3de030349eee42fa7759a7550a1fef0d31cc12735 Attribute 79 (EAP-Message) length=6 Value: 031a0004 Attribute 80 (Message-Authenticator) length=18 Value: c9c3e78885a76bed29e362e74419817c Attribute 1 (User-Name) length=34 Value: '6bd4a86988324e56b2dcdcf053161a02' Attribute 12 (Framed-MTU) length=6 Value: 994 Attribute 102 (EAP-Key-Name) length=67 Value: 0dc2ebfd63e900841e023156f44d79f8e808024f49764561d3542fe0f7afc1f07fadc120f95a74ceb3f8b403d0a283ba46d823126aced0af9787b4232a33cd7078 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station MS-MPPE-Send-Key (sign) - hexdump(len=32): 01 43 c2 f3 94 e6 8d 84 c1 a2 15 b4 84 66 69 3d f8 38 89 10 fe 6e 84 4f 25 b1 b4 22 91 70 16 1c MS-MPPE-Recv-Key (crypt) - hexdump(len=32): 78 32 00 e8 af 5c cc 9e f6 35 52 39 f4 2c 81 12 20 44 e1 72 71 df 4b 05 b1 47 c0 8c 3b de be 41 decapsulated EAP packet (code=3 id=26 len=4) from RADIUS server: EAP Success EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (param=success) EAP: EAP entering state SUCCESS CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required WPA: EAPOL processing complete Cancelling authentication timeout State: DISCONNECTED -> COMPLETED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE eapol_sm_cb: result=1 EAPOL: Successfully fetched key (len=32) PMK from EAPOL - hexdump(len=32): 78 32 00 e8 af 5c cc 9e f6 35 52 39 f4 2c 81 12 20 44 e1 72 71 df 4b 05 b1 47 c0 8c 3b de be 41 Locally derived EAP Session-Id matches EAP-Key-Name from server WPA: Clear old PMK and PTK EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit ENGINE: engine deinit MPPE keys OK: 1 mismatch: 0 SUCCESS