ioctl[SIOC{ADD/DEL}MULTI]: Address already in use 1375254813.868108: wpa_supplicant v2.0 1375254813.868151: Successfully initialized wpa_supplicant 1375254813.868160: Initializing interface 'bge0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A' 1375254813.868164: Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' 1375254813.868173: Reading configuration file '/etc/wpa_supplicant.conf' 1375254813.868247: ctrl_interface='/var/run/wpa_supplicant' 1375254813.868258: ctrl_interface_group='wheel' 1375254813.868260: Line: 4 - start of a new network block 1375254813.868271: key_mgmt: 0x1 1375254813.868279: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00 1375254813.868290: identity - hexdump_ascii(len=7): 6a 70 65 64 72 6f 6e jpedron 1375254813.868296: password - hexdump_ascii(len=8): [REMOVED] 1375254813.868299: phase2 - hexdump_ascii(len=8): 61 75 74 68 3d 50 41 50 auth=PAP 1375254813.868319: Priority group 0 1375254813.868321: id=0 ssid='' 1375254814.072328: wpa_driver_wired_init: Enabled allmulti mode 1375254814.072906: bge0: Own MAC address: 00:23:ae:67:33:a7 1375254814.072915: bge0: RSN: flushing PMKID list in the driver 1375254814.072926: bge0: Setting scan request: 0 sec 100000 usec 1375254814.072936: WPS: Set UUID for interface bge0 1375254814.072970: WPS: UUID based on MAC address - hexdump(len=16): f3 b5 0e 67 40 15 53 c8 a9 53 90 c6 67 f7 d5 0d 1375254814.074922: EAPOL: SUPP_PAE entering state DISCONNECTED 1375254814.074924: EAPOL: Supplicant port status: Unauthorized 1375254814.074925: EAPOL: KEY_RX entering state NO_KEY_RECEIVE 1375254814.074926: EAPOL: SUPP_BE entering state INITIALIZE 1375254814.074928: EAP: EAP entering state DISABLED 1375254814.074930: EAPOL: Supplicant port status: Unauthorized 1375254814.074930: EAPOL: Supplicant port status: Unauthorized 1375254814.076158: ctrl_interface_group=0 (from group name 'wheel') 1375254814.076432: bge0: Added interface bge0 1375254814.076442: bge0: State: DISCONNECTED -> DISCONNECTED 1375254814.179645: bge0: Using wired authentication - overriding ap_scan configuration 1375254814.179650: EAPOL: External notification - EAP success=0 1375254814.179652: EAPOL: Supplicant port status: Unauthorized 1375254814.179654: EAPOL: External notification - EAP fail=0 1375254814.179655: EAPOL: Supplicant port status: Unauthorized 1375254814.179656: EAPOL: External notification - portControl=Auto 1375254814.179657: EAPOL: Supplicant port status: Unauthorized 1375254814.179667: bge0: Already associated with a configured network - generating associated event 1375254814.179678: bge0: Event ASSOC (0) received 1375254814.179689: bge0: Association info event 1375254814.179692: FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): 1375254814.179702: bge0: State: DISCONNECTED -> ASSOCIATED 1375254814.179713: bge0: Associated to a new BSS: BSSID=01:80:c2:00:00:03 1375254814.179728: bge0: No keys have been configured - skip key clearing 1375254814.179735: bge0: Select network based on association information 1375254814.179743: bge0: Network configuration found for the current AP 1375254814.179751: bge0: WPA: No WPA/RSN IE available from association info 1375254814.179759: bge0: WPA: Set cipher suites based on configuration 1375254814.179766: bge0: WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 1 proto 2 1375254814.179774: bge0: WPA: clearing AP WPA IE 1375254814.179781: bge0: WPA: clearing AP RSN IE 1375254814.179788: bge0: WPA: using GTK CCMP 1375254814.179795: bge0: WPA: using PTK CCMP 1375254814.179802: bge0: WPA: using KEY_MGMT 802.1X 1375254814.179804: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 1375254814.179810: EAPOL: External notification - EAP success=0 1375254814.179811: EAPOL: Supplicant port status: Unauthorized 1375254814.179812: EAPOL: External notification - EAP fail=0 1375254814.179813: EAPOL: Supplicant port status: Unauthorized 1375254814.179814: EAPOL: External notification - portControl=Auto 1375254814.179828: EAPOL: Supplicant port status: Unauthorized 1375254814.179837: bge0: Failed to get scan results 1375254814.179845: bge0: Associated with 01:80:c2:00:00:03 1375254814.179853: bge0: WPA: Association event - clear replay counter 1375254814.179860: bge0: WPA: Clear old PTK 1375254814.179862: EAPOL: External notification - portEnabled=0 1375254814.179863: EAPOL: Supplicant port status: Unauthorized 1375254814.179863: EAPOL: External notification - portValid=0 1375254814.179864: EAPOL: Supplicant port status: Unauthorized 1375254814.179865: EAPOL: External notification - portEnabled=1 1375254814.179866: EAPOL: SUPP_PAE entering state CONNECTING 1375254814.179867: EAPOL: SUPP_BE entering state IDLE 1375254814.179868: EAP: EAP entering state INITIALIZE 1375254814.179869: EAP: EAP entering state IDLE 1375254814.179877: bge0: Cancelling scan request 1375254815.087126: EAPOL: startWhen --> 0 1375254815.087130: EAPOL: SUPP_PAE entering state CONNECTING 1375254815.087131: EAPOL: txStart 1375254815.087133: TX EAPOL: dst=01:80:c2:00:00:03 1375254815.087135: TX EAPOL - hexdump(len=4): 01 01 00 00 1375254835.439585: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375254835.439591: RX EAPOL - hexdump(len=46): 01 00 00 0f 01 05 00 0f 01 55 73 65 72 20 6e 61 6d 65 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375254835.439607: EAPOL: Received EAP-Packet frame 1375254835.439608: EAPOL: SUPP_PAE entering state RESTART 1375254835.439610: EAP: EAP entering state INITIALIZE 1375254835.439612: EAP: EAP entering state IDLE 1375254835.439613: EAPOL: SUPP_PAE entering state AUTHENTICATING 1375254835.439614: EAPOL: SUPP_BE entering state REQUEST 1375254835.439615: EAPOL: getSuppRsp 1375254835.439616: EAP: EAP entering state RECEIVED 1375254835.439639: EAP: Received EAP-Request id=5 method=1 vendor=0 vendorMethod=0 1375254835.439642: EAP: EAP entering state IDENTITY 1375254835.439652: bge0: CTRL-EVENT-EAP-STARTED EAP authentication started 1375254835.439654: EAP: EAP-Request Identity data - hexdump_ascii(len=10): 55 73 65 72 20 6e 61 6d 65 3a User name: 1375254835.439660: EAP: using real identity - hexdump_ascii(len=7): 6a 70 65 64 72 6f 6e jpedron 1375254835.439666: EAP: EAP entering state SEND_RESPONSE 1375254835.439667: EAP: EAP entering state IDLE 1375254835.439669: EAPOL: SUPP_BE entering state RESPONSE 1375254835.439670: EAPOL: txSuppRsp 1375254835.439673: TX EAPOL: dst=01:80:c2:00:00:03 1375254835.439675: TX EAPOL - hexdump(len=16): 01 00 00 0c 02 05 00 0c 01 6a 70 65 64 72 6f 6e 1375254835.439695: EAPOL: SUPP_BE entering state RECEIVE 1375254835.446439: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375254835.446442: RX EAPOL - hexdump(len=46): 01 00 00 16 01 06 00 16 04 10 99 0d 01 7e c6 04 72 9a 25 94 86 43 a9 b3 42 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375254835.446455: EAPOL: Received EAP-Packet frame 1375254835.446456: EAPOL: SUPP_BE entering state REQUEST 1375254835.446457: EAPOL: getSuppRsp 1375254835.446458: EAP: EAP entering state RECEIVED 1375254835.446462: EAP: Received EAP-Request id=6 method=4 vendor=0 vendorMethod=0 1375254835.446464: EAP: EAP entering state GET_METHOD 1375254835.446465: EAP: configuration does not allow: vendor 0 method 4 1375254835.446466: EAP: vendor 0 method 4 not allowed 1375254835.446476: bge0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK 1375254835.446478: EAP: Status notification: refuse proposed method (param=MD5) 1375254835.446480: EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) 1375254835.446484: EAP: allowed methods - hexdump(len=1): 15 1375254835.446485: EAP: EAP entering state SEND_RESPONSE 1375254835.446487: EAP: EAP entering state IDLE 1375254835.446488: EAPOL: SUPP_BE entering state RESPONSE 1375254835.446489: EAPOL: txSuppRsp 1375254835.446490: TX EAPOL: dst=01:80:c2:00:00:03 1375254835.446492: TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 03 15 1375254835.446504: EAPOL: SUPP_BE entering state RECEIVE 1375254835.453250: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375254835.453335: RX EAPOL - hexdump(len=46): 01 00 00 06 01 07 00 06 15 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375254835.453349: EAPOL: Received EAP-Packet frame 1375254835.453350: EAPOL: SUPP_BE entering state REQUEST 1375254835.453351: EAPOL: getSuppRsp 1375254835.453352: EAP: EAP entering state RECEIVED 1375254835.453357: EAP: Received EAP-Request id=7 method=21 vendor=0 vendorMethod=0 1375254835.453358: EAP: EAP entering state GET_METHOD 1375254835.453362: bge0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 1375254835.453364: EAP: Status notification: accept proposed method (param=TTLS) 1375254835.453365: EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) 1375254835.453372: EAP-TTLS: Phase2 type: PAP 1375254835.453374: TLS: using phase1 config options 1375254835.453453: bge0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected 1375254835.453455: EAP: EAP entering state METHOD 1375254835.453457: SSL: Received packet(len=6) - Flags 0x20 1375254835.453459: EAP-TTLS: Start (server ver=0, own ver=0) 1375254835.453488: SSL: (where=0x10 ret=0x1) 1375254835.453517: SSL: (where=0x1001 ret=0x1) 1375254835.453520: SSL: SSL_connect:before/connect initialization 1375254835.453566: SSL: (where=0x1001 ret=0x1) 1375254835.453569: SSL: SSL_connect:SSLv3 write client hello A 1375254835.453578: SSL: (where=0x1002 ret=0xffffffff) 1375254835.453580: SSL: SSL_connect:error in SSLv3 read server hello A 1375254835.453586: SSL: SSL_connect - want more data 1375254835.453589: SSL: 223 bytes pending from ssl_out 1375254835.453594: SSL: 223 bytes left to be sent out (of total 223 bytes) 1375254835.453597: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375254835.453599: EAP: EAP entering state SEND_RESPONSE 1375254835.453600: EAP: EAP entering state IDLE 1375254835.453602: EAPOL: SUPP_BE entering state RESPONSE 1375254835.453602: EAPOL: txSuppRsp 1375254835.453604: TX EAPOL: dst=01:80:c2:00:00:03 1375254835.453606: TX EAPOL - hexdump(len=233): 01 00 00 e5 02 07 00 e5 15 00 16 03 01 00 da 01 00 00 d6 03 01 51 f8 b9 33 c4 73 0c f5 c2 c0 fe 09 8a 02 b6 08 ab 2a 4a d0 d2 0b 40 a3 3e 66 b5 17 17 4f ae ba 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 1375254835.453669: EAPOL: SUPP_BE entering state RECEIVE 1375254835.469458: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375254835.469461: RX EAPOL - hexdump(len=1028): 01 00 04 00 01 08 04 00 15 c0 00 00 04 5f 16 03 01 00 3e 02 00 00 3a 03 01 51 f8 b9 33 d0 86 99 bf c8 4e 5e c8 66 70 4b 2b 1c c5 11 04 88 52 45 02 ef ca 15 5b 5f 4a e4 d8 00 c0 14 00 00 12 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 0f 00 01 01 16 03 01 02 be 0b 00 02 ba 00 02 b7 00 02 b4 30 82 02 b0 30 82 01 98 02 09 00 ed 10 be c0 bb 92 7b de 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 1a 31 18 30 16 06 03 55 04 03 13 0f 6c 64 61 70 2e 79 61 6b 61 7a 2e 68 6f 6d 65 30 1e 17 0d 31 31 30 37 30 35 31 31 31 31 34 37 5a 17 0d 32 31 30 37 30 32 31 31 31 31 34 37 5a 30 1a 31 18 30 16 06 03 55 04 03 13 0f 6c 64 61 70 2e 79 61 6b 61 7a 2e 68 6f 6d 65 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d0 93 5f fe ba 43 cd 33 b7 be ef 07 bd 9c d8 80 b2 22 43 0a 75 45 5c ce e4 53 0b 35 26 ff 8e 85 9e 38 06 24 af e4 7f 87 4d 24 aa 5e f0 e7 ad 70 0f a4 d9 8b 6d 67 1c fe 30 8c 5f 67 cd f9 aa 8f f6 f9 5e 70 87 5f 37 8f 07 f4 b2 e1 e8 1d aa 92 b9 61 1c e8 64 29 4f d4 c0 5e ca 3b 31 83 d5 9a 01 57 88 c3 74 fe 0c eb bb 89 17 be 51 8b eb ac 62 da 64 c8 b6 4b bf 0d a3 d5 6c 4c e1 3f 01 cf 4d c0 8d 7f c6 39 97 2e 56 2e 76 e7 89 18 07 0e 99 e2 aa c6 1e 5e 58 c1 2d 97 f3 44 f9 4c d4 84 6c 84 58 1e 5d b3 4d a3 3b 98 17 51 98 14 69 ec e9 ab fa df aa e9 57 f4 7f 75 c4 61 ed c8 f6 0e 28 54 0f 17 4d 39 6b c0 ed 21 81 c9 08 67 be 22 e4 59 8d 33 10 51 aa 3b e0 0a 85 af da df 8b 83 01 e6 89 b4 e8 4e 89 3c 54 74 48 e7 7d db 9e 4f 86 95 a8 ec f2 b5 b2 40 ee f7 a6 86 ea 87 85 09 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 34 0e 45 ee 8e eb af b8 3d c4 54 0d a1 b1 38 99 16 2e 67 91 3d 6d 5c e5 26 b5 a0 14 fc a1 52 59 13 78 de e3 f2 ae 72 60 0d c5 4e 32 c1 71 32 21 7d cf 2c e1 14 9f 8d fb f5 eb 78 f9 44 b4 72 9a e5 b5 9c cb c0 77 39 66 6b cf 8f d9 06 16 5a 5f 33 df 4d 4b a6 9a a0 fc 9f 7d 48 4f 49 f6 47 9e 03 fe e1 4d 12 30 78 6a b9 0c b6 16 47 3b 2e 0a 84 20 59 ee 53 ea 3b aa 79 e2 8f 41 ce a8 c7 04 8b 2e 24 7f fb 48 61 e3 df 26 db 33 cb d1 1d 8f 97 c0 e8 df c1 fc 6f 26 ba 88 ee e8 d6 5a ab 0a f0 60 74 79 ea a7 85 d9 57 7f 3d 91 15 4b 60 9f b3 97 c6 48 de 7d 6b 1a 1f 4b 8e b8 ec d7 cb b6 cb ed 48 e7 5c 41 3f 15 48 f8 43 be dd 0e fd b8 72 64 b2 70 33 ff 15 4c a7 ce 0a a9 7f 10 f8 57 76 6b ed 3c 34 ae 7f 6b 3f 32 b8 96 39 72 cb ca 84 d1 05 46 b8 e9 68 30 9d be eb 1f 97 ff 63 8e 16 03 01 01 4b 0c 00 01 47 03 00 17 41 04 bd 05 79 6c fb 6d 75 2b b4 cd e7 f8 9c 73 f0 95 ef ea ec 11 8b 0d 69 29 3e 46 22 35 57 11 9e af 9b 3e 6a f5 ff f7 28 d1 fe a0 92 e7 0e 36 d1 06 ae 18 84 63 dc 9c 99 4c 3d 68 2f 6b 06 6e 6f 24 01 00 2c c1 0f 7b be 26 3d d0 76 72 5e 3a ef 11 8d c9 b5 31 20 33 89 cb 54 8f ee 98 23 18 5c 1a 9f fc 98 34 cf f6 32 a5 66 86 07 f8 34 17 ed 41 b2 3d 65 a1 6f fb 7a b0 6a 9f 8d 01 cf 43 80 74 a9 16 96 6f b4 0a f1 17 ec 24 7c 5e 02 5a f7 63 a0 7a dd b8 a0 ec 85 ed f2 50 23 6b 6c c1 ba c1 f8 04 2f 53 1f f7 a3 b6 6e db 5c 2b 3d 5f 00 bf a9 c2 11 b2 c6 ec 0f f6 3a 56 8f 27 d1 a7 cc 7b 24 21 07 82 41 6e fe 23 60 72 c1 ab 07 bf ac 4b 50 90 0a 59 9e ea 0d 0f 88 a4 33 75 d6 07 ff 8c e9 2c 1375254835.469673: EAPOL: Received EAP-Packet frame 1375254835.469674: EAPOL: SUPP_BE entering state REQUEST 1375254835.469675: EAPOL: getSuppRsp 1375254835.469676: EAP: EAP entering state RECEIVED 1375254835.469682: EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0 1375254835.469684: EAP: EAP entering state METHOD 1375254835.469686: SSL: Received packet(len=1024) - Flags 0xc0 1375254835.469687: SSL: TLS Message Length: 1119 1375254835.469697: SSL: Need 105 bytes more input data 1375254835.469699: SSL: Building ACK (type=21 id=8 ver=0) 1375254835.469701: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375254835.469703: EAP: EAP entering state SEND_RESPONSE 1375254835.469704: EAP: EAP entering state IDLE 1375254835.469705: EAPOL: SUPP_BE entering state RESPONSE 1375254835.469706: EAPOL: txSuppRsp 1375254835.469707: TX EAPOL: dst=01:80:c2:00:00:03 1375254835.469709: TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 15 00 1375254835.469722: EAPOL: SUPP_BE entering state RECEIVE 1375254835.476461: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375254835.476463: RX EAPOL - hexdump(len=119): 01 00 00 73 01 09 00 73 15 80 00 00 04 5f e5 cf ca 4b 9c 7c 4c 59 88 d2 5b fe e4 f2 7d 0a f1 87 21 44 d8 b4 20 af c5 e8 f6 ab 4c ea 86 0d c2 f8 5a 68 c0 7f 79 9f c8 6a 91 2e 82 9c 50 42 3e f7 34 d7 b0 38 6d 4e 33 f5 ad 2d 27 6a 74 dc ca 0a 02 10 b7 40 c6 1a 67 4d a1 8a 42 f9 9f bf 7a f8 67 1f 52 ff 42 ae c8 f4 4c 77 1c 8a 9c a8 16 03 01 00 04 0e 00 00 00 1375254835.476489: EAPOL: Received EAP-Packet frame 1375254835.476490: EAPOL: SUPP_BE entering state REQUEST 1375254835.476491: EAPOL: getSuppRsp 1375254835.476492: EAP: EAP entering state RECEIVED 1375254835.476495: EAP: Received EAP-Request id=9 method=21 vendor=0 vendorMethod=0 1375254835.476497: EAP: EAP entering state METHOD 1375254835.476499: SSL: Received packet(len=115) - Flags 0x80 1375254835.476500: SSL: TLS Message Length: 1119 1375254835.476545: SSL: (where=0x1001 ret=0x1) 1375254835.476548: SSL: SSL_connect:SSLv3 read server hello A 1375254835.476746: TLS: tls_verify_cb - preverify_ok=1 err=18 (self signed certificate) ca_cert_verify=0 depth=0 buf='/CN=ldap.yakaz.home' 1375254835.476777: bge0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=ldap.yakaz.home' 1375254835.476780: EAP: Status notification: remote certificate verification (param=success) 1375254835.477057: TLS: tls_verify_cb - preverify_ok=1 err=18 (self signed certificate) ca_cert_verify=0 depth=0 buf='/CN=ldap.yakaz.home' 1375254835.477070: bge0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=ldap.yakaz.home' 1375254835.477073: EAP: Status notification: remote certificate verification (param=success) 1375254835.477090: SSL: (where=0x1001 ret=0x1) 1375254835.477092: SSL: SSL_connect:SSLv3 read server certificate A 1375254835.477421: SSL: (where=0x1001 ret=0x1) 1375254835.477423: SSL: SSL_connect:SSLv3 read server key exchange A 1375254835.477428: SSL: (where=0x1001 ret=0x1) 1375254835.477430: SSL: SSL_connect:SSLv3 read server done A 1375254835.479419: SSL: (where=0x1001 ret=0x1) 1375254835.479422: SSL: SSL_connect:SSLv3 write client key exchange A 1375254835.479593: SSL: (where=0x1001 ret=0x1) 1375254835.479595: SSL: SSL_connect:SSLv3 write change cipher spec A 1375254835.479643: SSL: (where=0x1001 ret=0x1) 1375254835.479645: SSL: SSL_connect:SSLv3 write finished A 1375254835.479649: SSL: (where=0x1001 ret=0x1) 1375254835.479650: SSL: SSL_connect:SSLv3 flush data 1375254835.479653: SSL: (where=0x1002 ret=0xffffffff) 1375254835.479655: SSL: SSL_connect:error in SSLv3 read finished A 1375254835.479657: SSL: SSL_connect - want more data 1375254835.479658: SSL: 134 bytes pending from ssl_out 1375254835.479661: SSL: 134 bytes left to be sent out (of total 134 bytes) 1375254835.479663: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375254835.479665: EAP: EAP entering state SEND_RESPONSE 1375254835.479666: EAP: EAP entering state IDLE 1375254835.479668: EAPOL: SUPP_BE entering state RESPONSE 1375254835.479669: EAPOL: txSuppRsp 1375254835.479670: TX EAPOL: dst=01:80:c2:00:00:03 1375254835.479672: TX EAPOL - hexdump(len=144): 01 00 00 8c 02 09 00 8c 15 00 16 03 01 00 46 10 00 00 42 41 04 3f f6 cd c4 26 90 9d eb 76 b4 ca eb 78 8c b4 3e 47 f1 9c 39 2f 64 df b7 64 4e d5 c0 b9 63 17 40 dc 8d 2e 72 83 17 6d e8 f5 c7 a2 6f 87 4a b8 70 74 90 68 14 a5 9f 71 eb 64 ca 06 2a 47 47 e5 a4 14 03 01 00 01 01 16 03 01 00 30 a9 51 e5 76 c9 15 8d 57 42 84 5d ad c7 2c 1f d3 29 c7 1e ba 22 1b 99 58 6f f4 41 7b e4 a4 44 10 8e 09 ec 12 18 54 2f b6 fa 75 44 0b fd 7c 67 e8 1375254835.479712: EAPOL: SUPP_BE entering state RECEIVE 1375254835.488645: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375254835.488648: RX EAPOL - hexdump(len=73): 01 00 00 45 01 0a 00 45 15 80 00 00 00 3b 14 03 01 00 01 01 16 03 01 00 30 fd b8 36 5a 67 0e e5 70 de 62 5c 18 1c 0d 00 68 c4 e1 d0 98 26 62 de 20 ea b3 c7 80 59 cb a6 2c 12 9d 23 c6 1e c5 50 e9 02 3e a0 49 de ae 23 30 1375254835.488665: EAPOL: Received EAP-Packet frame 1375254835.488666: EAPOL: SUPP_BE entering state REQUEST 1375254835.488667: EAPOL: getSuppRsp 1375254835.488668: EAP: EAP entering state RECEIVED 1375254835.488672: EAP: Received EAP-Request id=10 method=21 vendor=0 vendorMethod=0 1375254835.488674: EAP: EAP entering state METHOD 1375254835.488676: SSL: Received packet(len=69) - Flags 0x80 1375254835.488677: SSL: TLS Message Length: 59 1375254835.488787: SSL: (where=0x1001 ret=0x1) 1375254835.488789: SSL: SSL_connect:SSLv3 read finished A 1375254835.488834: SSL: (where=0x20 ret=0x1) 1375254835.488836: SSL: (where=0x1002 ret=0x1) 1375254835.488837: SSL: 0 bytes pending from ssl_out 1375254835.488842: SSL: No Application Data included 1375254835.488843: SSL: No data to be sent out 1375254835.488845: EAP-TTLS: TLS done, proceed to Phase 2 1375254835.488926: OpenSSL: Using internal PRF 1375254835.488928: EAP-TTLS: Derived key - hexdump(len=64): [REMOVED] 1375254835.488929: EAP-TTLS: received 0 bytes encrypted data for Phase 2 1375254835.488931: EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity 1375254835.488933: EAP-TTLS: Phase 2 PAP Request 1375254835.488935: EAP-TTLS: En