ioctl[SIOC{ADD/DEL}MULTI]: Address already in use 1375354576.274398: wpa_supplicant v2.0 1375354576.274439: Successfully initialized wpa_supplicant 1375354576.274447: Initializing interface 'bge0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A' 1375354576.274452: Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' 1375354576.274461: Reading configuration file '/etc/wpa_supplicant.conf' 1375354576.274537: ctrl_interface='/var/run/wpa_supplicant' 1375354576.274550: ctrl_interface_group='wheel' 1375354576.274552: Line: 4 - start of a new network block 1375354576.274563: key_mgmt: 0x1 1375354576.274570: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00 1375354576.274580: identity - hexdump_ascii(len=7): 6a 70 65 64 72 6f 6e jpedron 1375354576.274587: password - hexdump_ascii(len=8): [REMOVED] 1375354576.274590: phase2 - hexdump_ascii(len=8): 61 75 74 68 3d 50 41 50 auth=PAP 1375354576.274609: Priority group 0 1375354576.274611: id=0 ssid='' 1375354576.478419: iff_up=1 1375354581.505836: wpa_driver_wired_init: Enabled allmulti mode 1375354581.506380: bge0: Own MAC address: 00:23:ae:67:33:a7 1375354581.506391: bge0: RSN: flushing PMKID list in the driver 1375354581.506402: bge0: Setting scan request: 0 sec 100000 usec 1375354581.506413: WPS: Set UUID for interface bge0 1375354581.506453: WPS: UUID based on MAC address - hexdump(len=16): f3 b5 0e 67 40 15 53 c8 a9 53 90 c6 67 f7 d5 0d 1375354581.508657: EAPOL: SUPP_PAE entering state DISCONNECTED 1375354581.508660: EAPOL: Supplicant port status: Unauthorized 1375354581.508661: EAPOL: KEY_RX entering state NO_KEY_RECEIVE 1375354581.508662: EAPOL: SUPP_BE entering state INITIALIZE 1375354581.508665: EAP: EAP entering state DISABLED 1375354581.508666: EAPOL: Supplicant port status: Unauthorized 1375354581.508667: EAPOL: Supplicant port status: Unauthorized 1375354581.508705: Using existing control interface directory. 1375354581.509848: ctrl_interface_group=0 (from group name 'wheel') 1375354581.510009: ctrl_iface bind(PF_UNIX) failed: Address already in use 1375354581.510042: ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination 1375354581.510298: Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/bge0' 1375354581.510405: bge0: Added interface bge0 1375354581.510417: bge0: State: DISCONNECTED -> DISCONNECTED 1375354581.607587: bge0: Using wired authentication - overriding ap_scan configuration 1375354581.607596: EAPOL: External notification - EAP success=0 1375354581.607598: EAPOL: Supplicant port status: Unauthorized 1375354581.607602: EAPOL: External notification - EAP fail=0 1375354581.607603: EAPOL: Supplicant port status: Unauthorized 1375354581.607604: EAPOL: External notification - portControl=Auto 1375354581.607606: EAPOL: Supplicant port status: Unauthorized 1375354581.607615: bge0: Already associated with a configured network - generating associated event 1375354581.607655: bge0: Event ASSOC (0) received 1375354581.607665: bge0: Association info event 1375354581.607668: FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): 1375354581.607677: bge0: State: DISCONNECTED -> ASSOCIATED 1375354581.607688: bge0: Associated to a new BSS: BSSID=01:80:c2:00:00:03 1375354581.607698: bge0: No keys have been configured - skip key clearing 1375354581.607707: bge0: Select network based on association information 1375354581.607716: bge0: Network configuration found for the current AP 1375354581.607725: bge0: WPA: No WPA/RSN IE available from association info 1375354581.607733: bge0: WPA: Set cipher suites based on configuration 1375354581.607741: bge0: WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 1 proto 2 1375354581.607750: bge0: WPA: clearing AP WPA IE 1375354581.607758: bge0: WPA: clearing AP RSN IE 1375354581.607766: bge0: WPA: using GTK CCMP 1375354581.607774: bge0: WPA: using PTK CCMP 1375354581.607781: bge0: WPA: using KEY_MGMT 802.1X 1375354581.607784: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 1375354581.607810: EAPOL: External notification - EAP success=0 1375354581.607811: EAPOL: Supplicant port status: Unauthorized 1375354581.607812: EAPOL: External notification - EAP fail=0 1375354581.607813: EAPOL: Supplicant port status: Unauthorized 1375354581.607814: EAPOL: External notification - portControl=Auto 1375354581.607815: EAPOL: Supplicant port status: Unauthorized 1375354581.607824: bge0: Failed to get scan results 1375354581.607834: bge0: Associated with 01:80:c2:00:00:03 1375354581.607843: bge0: WPA: Association event - clear replay counter 1375354581.607851: bge0: WPA: Clear old PTK 1375354581.607853: EAPOL: External notification - portEnabled=0 1375354581.607854: EAPOL: Supplicant port status: Unauthorized 1375354581.607855: EAPOL: External notification - portValid=0 1375354581.607856: EAPOL: Supplicant port status: Unauthorized 1375354581.607857: EAPOL: External notification - portEnabled=1 1375354581.607858: EAPOL: SUPP_PAE entering state CONNECTING 1375354581.607859: EAPOL: SUPP_BE entering state IDLE 1375354581.607860: EAP: EAP entering state INITIALIZE 1375354581.607861: EAP: EAP entering state IDLE 1375354581.607870: bge0: Cancelling scan request 1375354582.565650: EAPOL: startWhen --> 0 1375354582.565653: EAPOL: SUPP_PAE entering state CONNECTING 1375354582.565654: EAPOL: txStart 1375354582.565656: TX EAPOL: dst=01:80:c2:00:00:03 1375354582.565659: TX EAPOL - hexdump(len=4): 01 01 00 00 1375354582.566987: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375354582.566990: RX EAPOL - hexdump(len=46): 01 00 00 0f 01 06 00 0f 01 55 73 65 72 20 6e 61 6d 65 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375354582.567003: EAPOL: Received EAP-Packet frame 1375354582.567005: EAPOL: SUPP_PAE entering state RESTART 1375354582.567006: EAP: EAP entering state INITIALIZE 1375354582.567007: EAP: EAP entering state IDLE 1375354582.567008: EAPOL: SUPP_PAE entering state AUTHENTICATING 1375354582.567009: EAPOL: SUPP_BE entering state REQUEST 1375354582.567010: EAPOL: getSuppRsp 1375354582.567011: EAP: EAP entering state RECEIVED 1375354582.567033: EAP: Received EAP-Request id=6 method=1 vendor=0 vendorMethod=0 1375354582.567036: EAP: EAP entering state IDENTITY 1375354582.567045: bge0: CTRL-EVENT-EAP-STARTED EAP authentication started 1375354582.567047: EAP: EAP-Request Identity data - hexdump_ascii(len=10): 55 73 65 72 20 6e 61 6d 65 3a User name: 1375354582.567053: EAP: using real identity - hexdump_ascii(len=7): 6a 70 65 64 72 6f 6e jpedron 1375354582.567059: EAP: EAP entering state SEND_RESPONSE 1375354582.567060: EAP: EAP entering state IDLE 1375354582.567061: EAPOL: SUPP_BE entering state RESPONSE 1375354582.567062: EAPOL: txSuppRsp 1375354582.567064: TX EAPOL: dst=01:80:c2:00:00:03 1375354582.567066: TX EAPOL - hexdump(len=16): 01 00 00 0c 02 06 00 0c 01 6a 70 65 64 72 6f 6e 1375354582.567081: EAPOL: SUPP_BE entering state RECEIVE 1375354582.574140: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375354582.574143: RX EAPOL - hexdump(len=46): 01 00 00 16 01 07 00 16 04 10 3c 12 52 0e 69 36 36 91 81 61 c8 af e1 4d e3 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375354582.574155: EAPOL: Received EAP-Packet frame 1375354582.574156: EAPOL: SUPP_BE entering state REQUEST 1375354582.574157: EAPOL: getSuppRsp 1375354582.574158: EAP: EAP entering state RECEIVED 1375354582.574162: EAP: Received EAP-Request id=7 method=4 vendor=0 vendorMethod=0 1375354582.574164: EAP: EAP entering state GET_METHOD 1375354582.574166: EAP: configuration does not allow: vendor 0 method 4 1375354582.574167: EAP: vendor 0 method 4 not allowed 1375354582.574177: bge0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK 1375354582.574179: EAP: Status notification: refuse proposed method (param=MD5) 1375354582.574181: EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) 1375354582.574184: EAP: allowed methods - hexdump(len=1): 15 1375354582.574193: EAP: EAP entering state SEND_RESPONSE 1375354582.574194: EAP: EAP entering state IDLE 1375354582.574196: EAPOL: SUPP_BE entering state RESPONSE 1375354582.574196: EAPOL: txSuppRsp 1375354582.574198: TX EAPOL: dst=01:80:c2:00:00:03 1375354582.574200: TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 03 15 1375354582.574212: EAPOL: SUPP_BE entering state RECEIVE 1375354582.580804: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375354582.580883: RX EAPOL - hexdump(len=46): 01 00 00 06 01 08 00 06 15 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375354582.580897: EAPOL: Received EAP-Packet frame 1375354582.580898: EAPOL: SUPP_BE entering state REQUEST 1375354582.580899: EAPOL: getSuppRsp 1375354582.580900: EAP: EAP entering state RECEIVED 1375354582.580905: EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0 1375354582.580907: EAP: EAP entering state GET_METHOD 1375354582.580910: bge0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 1375354582.580912: EAP: Status notification: accept proposed method (param=TTLS) 1375354582.580914: EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) 1375354582.580920: EAP-TTLS: Phase2 type: PAP 1375354582.580922: TLS: using phase1 config options 1375354582.581001: bge0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected 1375354582.581003: EAP: EAP entering state METHOD 1375354582.581005: SSL: Received packet(len=6) - Flags 0x20 1375354582.581007: EAP-TTLS: Start (server ver=0, own ver=0) 1375354582.581035: SSL: (where=0x10 ret=0x1) 1375354582.581064: SSL: (where=0x1001 ret=0x1) 1375354582.581067: SSL: SSL_connect:before/connect initialization 1375354582.581112: SSL: (where=0x1001 ret=0x1) 1375354582.581115: SSL: SSL_connect:SSLv3 write client hello A 1375354582.581124: SSL: (where=0x1002 ret=0xffffffff) 1375354582.581126: SSL: SSL_connect:error in SSLv3 read server hello A 1375354582.581133: SSL: SSL_connect - want more data 1375354582.581135: SSL: 223 bytes pending from ssl_out 1375354582.581140: SSL: 223 bytes left to be sent out (of total 223 bytes) 1375354582.581143: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375354582.581145: EAP: EAP entering state SEND_RESPONSE 1375354582.581146: EAP: EAP entering state IDLE 1375354582.581148: EAPOL: SUPP_BE entering state RESPONSE 1375354582.581148: EAPOL: txSuppRsp 1375354582.581150: TX EAPOL: dst=01:80:c2:00:00:03 1375354582.581152: TX EAPOL - hexdump(len=233): 01 00 00 e5 02 08 00 e5 15 00 16 03 01 00 da 01 00 00 d6 03 01 51 fa 3e d6 c3 96 f1 87 06 e4 ee d7 ac d5 38 67 d1 37 1f c7 79 ea 33 cc 5d 95 dc b1 fb 0c 8d 59 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 1375354582.581216: EAPOL: SUPP_BE entering state RECEIVE 1375354582.598568: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375354582.598570: RX EAPOL - hexdump(len=1028): 01 00 04 00 01 09 04 00 15 c0 00 00 04 5f 16 03 01 00 3e 02 00 00 3a 03 01 51 fa 3e d6 55 b1 85 74 9c 11 fd 7b c6 67 4b 38 8c 92 bf ac e9 70 97 b8 59 ec 44 98 fe 39 98 3d 00 c0 14 00 00 12 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 0f 00 01 01 16 03 01 02 be 0b 00 02 ba 00 02 b7 00 02 b4 30 82 02 b0 30 82 01 98 02 09 00 ed 10 be c0 bb 92 7b de 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 1a 31 18 30 16 06 03 55 04 03 13 0f 6c 64 61 70 2e 79 61 6b 61 7a 2e 68 6f 6d 65 30 1e 17 0d 31 31 30 37 30 35 31 31 31 31 34 37 5a 17 0d 32 31 30 37 30 32 31 31 31 31 34 37 5a 30 1a 31 18 30 16 06 03 55 04 03 13 0f 6c 64 61 70 2e 79 61 6b 61 7a 2e 68 6f 6d 65 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d0 93 5f fe ba 43 cd 33 b7 be ef 07 bd 9c d8 80 b2 22 43 0a 75 45 5c ce e4 53 0b 35 26 ff 8e 85 9e 38 06 24 af e4 7f 87 4d 24 aa 5e f0 e7 ad 70 0f a4 d9 8b 6d 67 1c fe 30 8c 5f 67 cd f9 aa 8f f6 f9 5e 70 87 5f 37 8f 07 f4 b2 e1 e8 1d aa 92 b9 61 1c e8 64 29 4f d4 c0 5e ca 3b 31 83 d5 9a 01 57 88 c3 74 fe 0c eb bb 89 17 be 51 8b eb ac 62 da 64 c8 b6 4b bf 0d a3 d5 6c 4c e1 3f 01 cf 4d c0 8d 7f c6 39 97 2e 56 2e 76 e7 89 18 07 0e 99 e2 aa c6 1e 5e 58 c1 2d 97 f3 44 f9 4c d4 84 6c 84 58 1e 5d b3 4d a3 3b 98 17 51 98 14 69 ec e9 ab fa df aa e9 57 f4 7f 75 c4 61 ed c8 f6 0e 28 54 0f 17 4d 39 6b c0 ed 21 81 c9 08 67 be 22 e4 59 8d 33 10 51 aa 3b e0 0a 85 af da df 8b 83 01 e6 89 b4 e8 4e 89 3c 54 74 48 e7 7d db 9e 4f 86 95 a8 ec f2 b5 b2 40 ee f7 a6 86 ea 87 85 09 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 34 0e 45 ee 8e eb af b8 3d c4 54 0d a1 b1 38 99 16 2e 67 91 3d 6d 5c e5 26 b5 a0 14 fc a1 52 59 13 78 de e3 f2 ae 72 60 0d c5 4e 32 c1 71 32 21 7d cf 2c e1 14 9f 8d fb f5 eb 78 f9 44 b4 72 9a e5 b5 9c cb c0 77 39 66 6b cf 8f d9 06 16 5a 5f 33 df 4d 4b a6 9a a0 fc 9f 7d 48 4f 49 f6 47 9e 03 fe e1 4d 12 30 78 6a b9 0c b6 16 47 3b 2e 0a 84 20 59 ee 53 ea 3b aa 79 e2 8f 41 ce a8 c7 04 8b 2e 24 7f fb 48 61 e3 df 26 db 33 cb d1 1d 8f 97 c0 e8 df c1 fc 6f 26 ba 88 ee e8 d6 5a ab 0a f0 60 74 79 ea a7 85 d9 57 7f 3d 91 15 4b 60 9f b3 97 c6 48 de 7d 6b 1a 1f 4b 8e b8 ec d7 cb b6 cb ed 48 e7 5c 41 3f 15 48 f8 43 be dd 0e fd b8 72 64 b2 70 33 ff 15 4c a7 ce 0a a9 7f 10 f8 57 76 6b ed 3c 34 ae 7f 6b 3f 32 b8 96 39 72 cb ca 84 d1 05 46 b8 e9 68 30 9d be eb 1f 97 ff 63 8e 16 03 01 01 4b 0c 00 01 47 03 00 17 41 04 49 1a b4 d2 2f 10 73 fa eb 21 0a 5d b7 75 49 ef 56 35 d6 99 c6 88 e9 c7 fc 06 ac bf 88 d4 b8 67 3e 1f 67 02 83 bf 43 d9 88 b7 0f 94 ca 22 dd fa 09 3c c2 fe f2 0e 13 55 29 12 40 3f 2b d1 a5 22 01 00 99 c3 22 d9 00 91 4c e4 9e ea f8 9f 6b d6 d9 13 4b b8 cd fa f4 71 bc 4c af 4e 5d f5 16 2d 0e eb 04 4a 85 2e cb e7 b8 b0 de 38 ad 22 95 06 bd 12 fc b9 5e f6 ca 2e 42 63 c9 52 56 4d 01 84 13 2a f4 9c b3 fb dd 09 e4 5d 00 f1 57 71 4f 5c 47 ed 81 61 82 20 7a 72 2d f2 1c cd 2a a7 43 e9 c6 e2 e7 b1 65 67 8c 6e 7c 01 4d 60 8e e5 35 e7 b4 c0 ee 7c db d6 91 0a 0d 63 a6 3c 24 7e 90 55 6a eb 42 d7 52 fa a6 ae b5 5b d9 99 5b 82 f5 b9 ad ab 1e 77 f6 26 af b9 74 ef a3 3e db f2 81 eb 18 63 1375354582.598781: EAPOL: Received EAP-Packet frame 1375354582.598782: EAPOL: SUPP_BE entering state REQUEST 1375354582.598783: EAPOL: getSuppRsp 1375354582.598784: EAP: EAP entering state RECEIVED 1375354582.598790: EAP: Received EAP-Request id=9 method=21 vendor=0 vendorMethod=0 1375354582.598792: EAP: EAP entering state METHOD 1375354582.598794: SSL: Received packet(len=1024) - Flags 0xc0 1375354582.598796: SSL: TLS Message Length: 1119 1375354582.598806: SSL: Need 105 bytes more input data 1375354582.598808: SSL: Building ACK (type=21 id=9 ver=0) 1375354582.598810: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375354582.598811: EAP: EAP entering state SEND_RESPONSE 1375354582.598813: EAP: EAP entering state IDLE 1375354582.598814: EAPOL: SUPP_BE entering state RESPONSE 1375354582.598815: EAPOL: txSuppRsp 1375354582.598816: TX EAPOL: dst=01:80:c2:00:00:03 1375354582.598818: TX EAPOL - hexdump(len=10): 01 00 00 06 02 09 00 06 15 00 1375354582.598831: EAPOL: SUPP_BE entering state RECEIVE 1375354582.605728: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375354582.605731: RX EAPOL - hexdump(len=119): 01 00 00 73 01 0a 00 73 15 80 00 00 04 5f a1 4e f9 a2 69 b3 d9 e9 b9 bc 3b a1 52 08 bd 68 b9 a0 ab 8e 9c 55 67 05 4d 79 de 0c 62 32 3f 45 54 c6 3c df 93 4e 8a 93 c4 4f 59 4e f3 1a 5b 9e eb 82 33 21 6f 70 d6 09 4a 63 1e 4f a0 19 94 0c 03 f6 0f e0 73 a1 5e bb 97 58 47 d2 85 e5 3e c9 a4 b9 14 83 41 a6 9b 5d 0d e6 9e a3 bc 70 b1 33 16 03 01 00 04 0e 00 00 00 1375354582.605756: EAPOL: Received EAP-Packet frame 1375354582.605757: EAPOL: SUPP_BE entering state REQUEST 1375354582.605758: EAPOL: getSuppRsp 1375354582.605759: EAP: EAP entering state RECEIVED 1375354582.605762: EAP: Received EAP-Request id=10 method=21 vendor=0 vendorMethod=0 1375354582.605770: EAP: EAP entering state METHOD 1375354582.605772: SSL: Received packet(len=115) - Flags 0x80 1375354582.605774: SSL: TLS Message Length: 1119 1375354582.605820: SSL: (where=0x1001 ret=0x1) 1375354582.605822: SSL: SSL_connect:SSLv3 read server hello A 1375354582.606021: TLS: tls_verify_cb - preverify_ok=1 err=18 (self signed certificate) ca_cert_verify=0 depth=0 buf='/CN=ldap.yakaz.home' 1375354582.606042: bge0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=ldap.yakaz.home' 1375354582.606045: EAP: Status notification: remote certificate verification (param=success) 1375354582.606301: TLS: tls_verify_cb - preverify_ok=1 err=18 (self signed certificate) ca_cert_verify=0 depth=0 buf='/CN=ldap.yakaz.home' 1375354582.606314: bge0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=ldap.yakaz.home' 1375354582.606317: EAP: Status notification: remote certificate verification (param=success) 1375354582.606334: SSL: (where=0x1001 ret=0x1) 1375354582.606336: SSL: SSL_connect:SSLv3 read server certificate A 1375354582.606651: SSL: (where=0x1001 ret=0x1) 1375354582.606653: SSL: SSL_connect:SSLv3 read server key exchange A 1375354582.606658: SSL: (where=0x1001 ret=0x1) 1375354582.606659: SSL: SSL_connect:SSLv3 read server done A 1375354582.608630: SSL: (where=0x1001 ret=0x1) 1375354582.608633: SSL: SSL_connect:SSLv3 write client key exchange A 1375354582.608804: SSL: (where=0x1001 ret=0x1) 1375354582.608806: SSL: SSL_connect:SSLv3 write change cipher spec A 1375354582.608854: SSL: (where=0x1001 ret=0x1) 1375354582.608856: SSL: SSL_connect:SSLv3 write finished A 1375354582.608860: SSL: (where=0x1001 ret=0x1) 1375354582.608861: SSL: SSL_connect:SSLv3 flush data 1375354582.608864: SSL: (where=0x1002 ret=0xffffffff) 1375354582.608866: SSL: SSL_connect:error in SSLv3 read finished A 1375354582.608868: SSL: SSL_connect - want more data 1375354582.608869: SSL: 134 bytes pending from ssl_out 1375354582.608872: SSL: 134 bytes left to be sent out (of total 134 bytes) 1375354582.608874: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375354582.608876: EAP: EAP entering state SEND_RESPONSE 1375354582.608877: EAP: EAP entering state IDLE 1375354582.608879: EAPOL: SUPP_BE entering state RESPONSE 1375354582.608879: EAPOL: txSuppRsp 1375354582.608881: TX EAPOL: dst=01:80:c2:00:00:03 1375354582.608883: TX EAPOL - hexdump(len=144): 01 00 00 8c 02 0a 00 8c 15 00 16 03 01 00 46 10 00 00 42 41 04 1c 00 21 36 76 89 fa dc bd cd 34 51 49 d8 cc 7b 93 b9 75 03 e8 22 1a 64 66 2b 30 17 47 13 90 e4 90 22 b2 3e 69 88 46 49 5c 3e 80 f6 ac 10 30 da 8c cb f5 40 61 a4 e4 1c 2c 2f fa 55 17 55 5a 47 14 03 01 00 01 01 16 03 01 00 30 a3 38 c7 af ad 45 cc ce af c4 a0 47 9e 10 a7 79 11 b8 76 eb 36 29 8d d7 e5 7d e8 c1 b2 05 69 a7 cc a0 13 f2 59 59 f0 c5 88 ea 2c ec 34 aa 6b 9d 1375354582.608924: EAPOL: SUPP_BE entering state RECEIVE 1375354582.617859: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375354582.617862: RX EAPOL - hexdump(len=73): 01 00 00 45 01 0b 00 45 15 80 00 00 00 3b 14 03 01 00 01 01 16 03 01 00 30 53 34 5b d7 21 be 31 5d a6 46 ba 32 09 8c 5e 1e df aa 2c 87 21 8d 29 ac 47 ac 4e 13 e2 08 5a c6 76 0e db 50 7d 2b 0a d7 4c 5c d8 24 b9 43 aa 36 1375354582.617879: EAPOL: Received EAP-Packet frame 1375354582.617880: EAPOL: SUPP_BE entering state REQUEST 1375354582.617881: EAPOL: getSuppRsp 1375354582.617882: EAP: EAP entering state RECEIVED 1375354582.617885: EAP: Received EAP-Request id=11 method=21 vendor=0 vendorMethod=0 1375354582.617887: EAP: EAP entering state METHOD 1375354582.617889: SSL: Received packet(len=69) - Flags 0x80 1375354582.617891: SSL: TLS Message Length: 59 1375354582.618000: SSL: (where=0x1001 ret=0x1) 1375354582.618003: SSL: SSL_connect:SSLv3 read finished A 1375354582.618048: SSL: (where=0x20 ret=0x1) 1375354582.618050: SSL: (where=0x1002 ret=0x1) 1375354582.618051: SSL: 0 bytes pending from ssl_out 1375354582.618056: SSL: No Application Data included 1375354582.618057: SSL: No data to be sent out 1375354582.618059: EAP-TTLS: T