ioctl[SIOC{ADD/DEL}MULTI]: Address already in use 1375255137.858940: wpa_supplicant v2.0 1375255137.858974: Successfully initialized wpa_supplicant 1375255137.858981: Initializing interface 'bge0' conf '/etc/wpa_supplicant.conf' driver 'wired' ctrl_interface 'N/A' bridge 'N/A' 1375255137.858984: Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' 1375255137.858991: Reading configuration file '/etc/wpa_supplicant.conf' 1375255137.859050: ctrl_interface='/var/run/wpa_supplicant' 1375255137.859059: ctrl_interface_group='wheel' 1375255137.859060: Line: 4 - start of a new network block 1375255137.859069: key_mgmt: 0x1 1375255137.859075: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00 1375255137.859083: identity - hexdump_ascii(len=7): 6a 70 65 64 72 6f 6e jpedron 1375255137.859088: password - hexdump_ascii(len=8): [REMOVED] 1375255137.859095: phase2 - hexdump_ascii(len=8): 61 75 74 68 3d 50 41 50 auth=PAP 1375255137.859113: Priority group 0 1375255137.859115: id=0 ssid='' 1375255137.859303: wpa_driver_wired_init: Enabled allmulti mode 1375255137.859783: bge0: Own MAC address: 00:23:ae:67:33:a7 1375255137.859793: bge0: RSN: flushing PMKID list in the driver 1375255137.859802: bge0: Setting scan request: 0 sec 100000 usec 1375255137.859813: WPS: Set UUID for interface bge0 1375255137.859838: WPS: UUID based on MAC address - hexdump(len=16): f3 b5 0e 67 40 15 53 c8 a9 53 90 c6 67 f7 d5 0d 1375255137.861711: EAPOL: SUPP_PAE entering state DISCONNECTED 1375255137.861713: EAPOL: Supplicant port status: Unauthorized 1375255137.861715: EAPOL: KEY_RX entering state NO_KEY_RECEIVE 1375255137.861715: EAPOL: SUPP_BE entering state INITIALIZE 1375255137.861717: EAP: EAP entering state DISABLED 1375255137.861718: EAPOL: Supplicant port status: Unauthorized 1375255137.861719: EAPOL: Supplicant port status: Unauthorized 1375255137.861749: Using existing control interface directory. 1375255137.862720: ctrl_interface_group=0 (from group name 'wheel') 1375255137.862871: ctrl_iface bind(PF_UNIX) failed: Address already in use 1375255137.862898: ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination 1375255137.863116: Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/bge0' 1375255137.863209: bge0: Added interface bge0 1375255137.863219: bge0: State: DISCONNECTED -> DISCONNECTED 1375255137.966739: bge0: Using wired authentication - overriding ap_scan configuration 1375255137.966743: EAPOL: External notification - EAP success=0 1375255137.966744: EAPOL: Supplicant port status: Unauthorized 1375255137.966746: EAPOL: External notification - EAP fail=0 1375255137.966747: EAPOL: Supplicant port status: Unauthorized 1375255137.966748: EAPOL: External notification - portControl=Auto 1375255137.966749: EAPOL: Supplicant port status: Unauthorized 1375255137.966759: bge0: Already associated with a configured network - generating associated event 1375255137.966770: bge0: Event ASSOC (0) received 1375255137.966780: bge0: Association info event 1375255137.966784: FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): 1375255137.966793: bge0: State: DISCONNECTED -> ASSOCIATED 1375255137.966805: bge0: Associated to a new BSS: BSSID=01:80:c2:00:00:03 1375255137.966830: bge0: No keys have been configured - skip key clearing 1375255137.966838: bge0: Select network based on association information 1375255137.966846: bge0: Network configuration found for the current AP 1375255137.966853: bge0: WPA: No WPA/RSN IE available from association info 1375255137.966861: bge0: WPA: Set cipher suites based on configuration 1375255137.966868: bge0: WPA: Selected cipher suites: group 30 pairwise 24 key_mgmt 1 proto 2 1375255137.966875: bge0: WPA: clearing AP WPA IE 1375255137.966882: bge0: WPA: clearing AP RSN IE 1375255137.966889: bge0: WPA: using GTK CCMP 1375255137.966896: bge0: WPA: using PTK CCMP 1375255137.966903: bge0: WPA: using KEY_MGMT 802.1X 1375255137.966906: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 1375255137.966919: EAPOL: External notification - EAP success=0 1375255137.966920: EAPOL: Supplicant port status: Unauthorized 1375255137.966921: EAPOL: External notification - EAP fail=0 1375255137.966922: EAPOL: Supplicant port status: Unauthorized 1375255137.966922: EAPOL: External notification - portControl=Auto 1375255137.966923: EAPOL: Supplicant port status: Unauthorized 1375255137.966932: bge0: Failed to get scan results 1375255137.966940: bge0: Associated with 01:80:c2:00:00:03 1375255137.966948: bge0: WPA: Association event - clear replay counter 1375255137.966955: bge0: WPA: Clear old PTK 1375255137.966956: EAPOL: External notification - portEnabled=0 1375255137.966957: EAPOL: Supplicant port status: Unauthorized 1375255137.966958: EAPOL: External notification - portValid=0 1375255137.966959: EAPOL: Supplicant port status: Unauthorized 1375255137.966960: EAPOL: External notification - portEnabled=1 1375255137.966960: EAPOL: SUPP_PAE entering state CONNECTING 1375255137.966961: EAPOL: SUPP_BE entering state IDLE 1375255137.966962: EAP: EAP entering state INITIALIZE 1375255137.966963: EAP: EAP entering state IDLE 1375255137.966971: bge0: Cancelling scan request 1375255138.886118: EAPOL: startWhen --> 0 1375255138.886126: EAPOL: SUPP_PAE entering state CONNECTING 1375255138.886128: EAPOL: txStart 1375255138.886131: TX EAPOL: dst=01:80:c2:00:00:03 1375255138.886134: TX EAPOL - hexdump(len=4): 01 01 00 00 1375255138.887473: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375255138.887476: RX EAPOL - hexdump(len=46): 01 00 00 0f 01 05 00 0f 01 55 73 65 72 20 6e 61 6d 65 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375255138.887490: EAPOL: Received EAP-Packet frame 1375255138.887492: EAPOL: SUPP_PAE entering state RESTART 1375255138.887493: EAP: EAP entering state INITIALIZE 1375255138.887495: EAP: EAP entering state IDLE 1375255138.887496: EAPOL: SUPP_PAE entering state AUTHENTICATING 1375255138.887497: EAPOL: SUPP_BE entering state REQUEST 1375255138.887498: EAPOL: getSuppRsp 1375255138.887499: EAP: EAP entering state RECEIVED 1375255138.887526: EAP: Received EAP-Request id=5 method=1 vendor=0 vendorMethod=0 1375255138.887528: EAP: EAP entering state IDENTITY 1375255138.887536: bge0: CTRL-EVENT-EAP-STARTED EAP authentication started 1375255138.887538: EAP: EAP-Request Identity data - hexdump_ascii(len=10): 55 73 65 72 20 6e 61 6d 65 3a User name: 1375255138.887542: EAP: using real identity - hexdump_ascii(len=7): 6a 70 65 64 72 6f 6e jpedron 1375255138.887547: EAP: EAP entering state SEND_RESPONSE 1375255138.887548: EAP: EAP entering state IDLE 1375255138.887549: EAPOL: SUPP_BE entering state RESPONSE 1375255138.887549: EAPOL: txSuppRsp 1375255138.887551: TX EAPOL: dst=01:80:c2:00:00:03 1375255138.887552: TX EAPOL - hexdump(len=16): 01 00 00 0c 02 05 00 0c 01 6a 70 65 64 72 6f 6e 1375255138.887562: EAPOL: SUPP_BE entering state RECEIVE 1375255138.894477: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375255138.894480: RX EAPOL - hexdump(len=46): 01 00 00 16 01 06 00 16 04 10 c4 b5 f8 52 4e b2 88 9b f6 56 69 10 39 8d bd 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375255138.894494: EAPOL: Received EAP-Packet frame 1375255138.894495: EAPOL: SUPP_BE entering state REQUEST 1375255138.894496: EAPOL: getSuppRsp 1375255138.894498: EAP: EAP entering state RECEIVED 1375255138.894506: EAP: Received EAP-Request id=6 method=4 vendor=0 vendorMethod=0 1375255138.894509: EAP: EAP entering state GET_METHOD 1375255138.894510: EAP: configuration does not allow: vendor 0 method 4 1375255138.894511: EAP: vendor 0 method 4 not allowed 1375255138.894521: bge0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK 1375255138.894523: EAP: Status notification: refuse proposed method (param=MD5) 1375255138.894525: EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) 1375255138.894528: EAP: allowed methods - hexdump(len=1): 15 1375255138.894551: EAP: EAP entering state SEND_RESPONSE 1375255138.894552: EAP: EAP entering state IDLE 1375255138.894553: EAPOL: SUPP_BE entering state RESPONSE 1375255138.894554: EAPOL: txSuppRsp 1375255138.894556: TX EAPOL: dst=01:80:c2:00:00:03 1375255138.894557: TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 03 15 1375255138.894575: EAPOL: SUPP_BE entering state RECEIVE 1375255138.901478: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375255138.901564: RX EAPOL - hexdump(len=46): 01 00 00 06 01 07 00 06 15 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1375255138.901574: EAPOL: Received EAP-Packet frame 1375255138.901575: EAPOL: SUPP_BE entering state REQUEST 1375255138.901576: EAPOL: getSuppRsp 1375255138.901576: EAP: EAP entering state RECEIVED 1375255138.901580: EAP: Received EAP-Request id=7 method=21 vendor=0 vendorMethod=0 1375255138.901582: EAP: EAP entering state GET_METHOD 1375255138.901584: bge0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 1375255138.901585: EAP: Status notification: accept proposed method (param=TTLS) 1375255138.901587: EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) 1375255138.901591: EAP-TTLS: Phase2 type: PAP 1375255138.901593: TLS: using phase1 config options 1375255138.901634: bge0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected 1375255138.901636: EAP: EAP entering state METHOD 1375255138.901638: SSL: Received packet(len=6) - Flags 0x20 1375255138.901639: EAP-TTLS: Start (server ver=0, own ver=0) 1375255138.901653: SSL: (where=0x10 ret=0x1) 1375255138.901673: SSL: (where=0x1001 ret=0x1) 1375255138.901675: SSL: SSL_connect:before/connect initialization 1375255138.901703: SSL: (where=0x1001 ret=0x1) 1375255138.901705: SSL: SSL_connect:SSLv3 write client hello A 1375255138.901711: SSL: (where=0x1002 ret=0xffffffff) 1375255138.901713: SSL: SSL_connect:error in SSLv3 read server hello A 1375255138.901717: SSL: SSL_connect - want more data 1375255138.901719: SSL: 223 bytes pending from ssl_out 1375255138.901722: SSL: 223 bytes left to be sent out (of total 223 bytes) 1375255138.901724: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375255138.901726: EAP: EAP entering state SEND_RESPONSE 1375255138.901727: EAP: EAP entering state IDLE 1375255138.901728: EAPOL: SUPP_BE entering state RESPONSE 1375255138.901729: EAPOL: txSuppRsp 1375255138.901730: TX EAPOL: dst=01:80:c2:00:00:03 1375255138.901731: TX EAPOL - hexdump(len=233): 01 00 00 e5 02 07 00 e5 15 00 16 03 01 00 da 01 00 00 d6 03 01 51 f8 ba 62 34 ae 60 46 8d d7 cd 72 9f 40 96 3d 0c 99 86 76 35 12 16 d9 1f a1 f3 9f fc 1c 1a a7 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 1375255138.901779: EAPOL: SUPP_BE entering state RECEIVE 1375255138.918040: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375255138.918042: RX EAPOL - hexdump(len=1028): 01 00 04 00 01 08 04 00 15 c0 00 00 04 5f 16 03 01 00 3e 02 00 00 3a 03 01 51 f8 ba 62 5a 21 ca 6f be 53 18 47 30 ea 59 e5 04 4d 59 d3 c8 21 59 69 40 0a d1 66 73 f8 23 9e 00 c0 14 00 00 12 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 0f 00 01 01 16 03 01 02 be 0b 00 02 ba 00 02 b7 00 02 b4 30 82 02 b0 30 82 01 98 02 09 00 ed 10 be c0 bb 92 7b de 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 1a 31 18 30 16 06 03 55 04 03 13 0f 6c 64 61 70 2e 79 61 6b 61 7a 2e 68 6f 6d 65 30 1e 17 0d 31 31 30 37 30 35 31 31 31 31 34 37 5a 17 0d 32 31 30 37 30 32 31 31 31 31 34 37 5a 30 1a 31 18 30 16 06 03 55 04 03 13 0f 6c 64 61 70 2e 79 61 6b 61 7a 2e 68 6f 6d 65 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 d0 93 5f fe ba 43 cd 33 b7 be ef 07 bd 9c d8 80 b2 22 43 0a 75 45 5c ce e4 53 0b 35 26 ff 8e 85 9e 38 06 24 af e4 7f 87 4d 24 aa 5e f0 e7 ad 70 0f a4 d9 8b 6d 67 1c fe 30 8c 5f 67 cd f9 aa 8f f6 f9 5e 70 87 5f 37 8f 07 f4 b2 e1 e8 1d aa 92 b9 61 1c e8 64 29 4f d4 c0 5e ca 3b 31 83 d5 9a 01 57 88 c3 74 fe 0c eb bb 89 17 be 51 8b eb ac 62 da 64 c8 b6 4b bf 0d a3 d5 6c 4c e1 3f 01 cf 4d c0 8d 7f c6 39 97 2e 56 2e 76 e7 89 18 07 0e 99 e2 aa c6 1e 5e 58 c1 2d 97 f3 44 f9 4c d4 84 6c 84 58 1e 5d b3 4d a3 3b 98 17 51 98 14 69 ec e9 ab fa df aa e9 57 f4 7f 75 c4 61 ed c8 f6 0e 28 54 0f 17 4d 39 6b c0 ed 21 81 c9 08 67 be 22 e4 59 8d 33 10 51 aa 3b e0 0a 85 af da df 8b 83 01 e6 89 b4 e8 4e 89 3c 54 74 48 e7 7d db 9e 4f 86 95 a8 ec f2 b5 b2 40 ee f7 a6 86 ea 87 85 09 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 34 0e 45 ee 8e eb af b8 3d c4 54 0d a1 b1 38 99 16 2e 67 91 3d 6d 5c e5 26 b5 a0 14 fc a1 52 59 13 78 de e3 f2 ae 72 60 0d c5 4e 32 c1 71 32 21 7d cf 2c e1 14 9f 8d fb f5 eb 78 f9 44 b4 72 9a e5 b5 9c cb c0 77 39 66 6b cf 8f d9 06 16 5a 5f 33 df 4d 4b a6 9a a0 fc 9f 7d 48 4f 49 f6 47 9e 03 fe e1 4d 12 30 78 6a b9 0c b6 16 47 3b 2e 0a 84 20 59 ee 53 ea 3b aa 79 e2 8f 41 ce a8 c7 04 8b 2e 24 7f fb 48 61 e3 df 26 db 33 cb d1 1d 8f 97 c0 e8 df c1 fc 6f 26 ba 88 ee e8 d6 5a ab 0a f0 60 74 79 ea a7 85 d9 57 7f 3d 91 15 4b 60 9f b3 97 c6 48 de 7d 6b 1a 1f 4b 8e b8 ec d7 cb b6 cb ed 48 e7 5c 41 3f 15 48 f8 43 be dd 0e fd b8 72 64 b2 70 33 ff 15 4c a7 ce 0a a9 7f 10 f8 57 76 6b ed 3c 34 ae 7f 6b 3f 32 b8 96 39 72 cb ca 84 d1 05 46 b8 e9 68 30 9d be eb 1f 97 ff 63 8e 16 03 01 01 4b 0c 00 01 47 03 00 17 41 04 71 bc 4c 3a 90 aa 3e 11 72 da f1 ba c0 41 ff a6 91 7d b3 80 24 1a ee ab a7 63 9e 4b 4d a7 bf fb 63 19 f0 d5 91 52 02 7d 70 b5 5e f1 62 29 cd 4a 72 52 08 9f 66 94 a6 96 27 f9 c7 89 73 82 59 a2 01 00 4d b9 92 d5 14 86 d9 bb fc 64 4c 90 12 b9 5b ad b5 61 db 2f b3 d3 6a cb c6 64 f0 ab c9 fb 2d ec 36 85 5e 4d b1 14 13 5c 57 50 89 1b 41 0f 3d ea 33 5e 9e d8 ae d4 4a 07 67 23 c2 16 4e 7c ce 09 52 63 c8 be 37 73 42 6a 2e 18 fe 2f 61 5c 8d 51 ed a0 c9 af 3e 17 db 51 88 7f 34 9a 05 9d c4 7e 0c b1 1d 6d 15 ec 77 05 4d be f2 3a 90 53 f1 70 5e 6d fc fa f2 0f 45 76 42 bd 42 ea 59 76 d7 d4 b0 85 f1 9a 0d 7a 86 45 7e a5 2e eb 60 ad fc 4d cc 61 c9 67 60 c3 e1 bb 7f 4a b5 e6 94 ed 64 b6 1375255138.918228: EAPOL: Received EAP-Packet frame 1375255138.918228: EAPOL: SUPP_BE entering state REQUEST 1375255138.918229: EAPOL: getSuppRsp 1375255138.918230: EAP: EAP entering state RECEIVED 1375255138.918234: EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0 1375255138.918236: EAP: EAP entering state METHOD 1375255138.918237: SSL: Received packet(len=1024) - Flags 0xc0 1375255138.918238: SSL: TLS Message Length: 1119 1375255138.918245: SSL: Need 105 bytes more input data 1375255138.918247: SSL: Building ACK (type=21 id=8 ver=0) 1375255138.918248: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375255138.918249: EAP: EAP entering state SEND_RESPONSE 1375255138.918250: EAP: EAP entering state IDLE 1375255138.918251: EAPOL: SUPP_BE entering state RESPONSE 1375255138.918252: EAPOL: txSuppRsp 1375255138.918253: TX EAPOL: dst=01:80:c2:00:00:03 1375255138.918255: TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 15 00 1375255138.918263: EAPOL: SUPP_BE entering state RECEIVE 1375255138.925317: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375255138.925320: RX EAPOL - hexdump(len=119): 01 00 00 73 01 09 00 73 15 80 00 00 04 5f de 2d 01 29 46 e5 2e 75 f7 21 4c a8 73 76 c6 b6 4e 51 7d f2 69 8e 51 da 51 64 33 92 23 b2 02 62 ca 71 3d de 4d 04 2c 25 37 5f fa 08 cc 21 a0 58 51 fd d5 1f 84 21 98 da a1 db ba d0 03 53 bd b9 5a e3 b6 f3 bd dc 3f cd 85 cd fe 81 c1 f6 41 ab c2 7a d3 21 e6 c3 5c 1f 73 e7 dc 3c 6f 5e fd 64 16 03 01 00 04 0e 00 00 00 1375255138.925345: EAPOL: Received EAP-Packet frame 1375255138.925346: EAPOL: SUPP_BE entering state REQUEST 1375255138.925347: EAPOL: getSuppRsp 1375255138.925348: EAP: EAP entering state RECEIVED 1375255138.925352: EAP: Received EAP-Request id=9 method=21 vendor=0 vendorMethod=0 1375255138.925359: EAP: EAP entering state METHOD 1375255138.925361: SSL: Received packet(len=115) - Flags 0x80 1375255138.925362: SSL: TLS Message Length: 1119 1375255138.925414: SSL: (where=0x1001 ret=0x1) 1375255138.925417: SSL: SSL_connect:SSLv3 read server hello A 1375255138.925554: TLS: tls_verify_cb - preverify_ok=1 err=18 (self signed certificate) ca_cert_verify=0 depth=0 buf='/CN=ldap.yakaz.home' 1375255138.925571: bge0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=ldap.yakaz.home' 1375255138.925573: EAP: Status notification: remote certificate verification (param=success) 1375255138.925765: TLS: tls_verify_cb - preverify_ok=1 err=18 (self signed certificate) ca_cert_verify=0 depth=0 buf='/CN=ldap.yakaz.home' 1375255138.925775: bge0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=ldap.yakaz.home' 1375255138.925777: EAP: Status notification: remote certificate verification (param=success) 1375255138.925789: SSL: (where=0x1001 ret=0x1) 1375255138.925791: SSL: SSL_connect:SSLv3 read server certificate A 1375255138.926014: SSL: (where=0x1001 ret=0x1) 1375255138.926015: SSL: SSL_connect:SSLv3 read server key exchange A 1375255138.926019: SSL: (where=0x1001 ret=0x1) 1375255138.926020: SSL: SSL_connect:SSLv3 read server done A 1375255138.927512: SSL: (where=0x1001 ret=0x1) 1375255138.927514: SSL: SSL_connect:SSLv3 write client key exchange A 1375255138.927642: SSL: (where=0x1001 ret=0x1) 1375255138.927643: SSL: SSL_connect:SSLv3 write change cipher spec A 1375255138.927679: SSL: (where=0x1001 ret=0x1) 1375255138.927681: SSL: SSL_connect:SSLv3 write finished A 1375255138.927684: SSL: (where=0x1001 ret=0x1) 1375255138.927685: SSL: SSL_connect:SSLv3 flush data 1375255138.927687: SSL: (where=0x1002 ret=0xffffffff) 1375255138.927688: SSL: SSL_connect:error in SSLv3 read finished A 1375255138.927690: SSL: SSL_connect - want more data 1375255138.927690: SSL: 134 bytes pending from ssl_out 1375255138.927692: SSL: 134 bytes left to be sent out (of total 134 bytes) 1375255138.927694: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1375255138.927695: EAP: EAP entering state SEND_RESPONSE 1375255138.927696: EAP: EAP entering state IDLE 1375255138.927697: EAPOL: SUPP_BE entering state RESPONSE 1375255138.927698: EAPOL: txSuppRsp 1375255138.927699: TX EAPOL: dst=01:80:c2:00:00:03 1375255138.927701: TX EAPOL - hexdump(len=144): 01 00 00 8c 02 09 00 8c 15 00 16 03 01 00 46 10 00 00 42 41 04 d1 8e 0c c9 ee 61 d8 f6 43 87 c0 2d 7e 60 31 9f 2d bf c4 bd 4d 97 3b f1 e5 3b 18 51 47 14 06 ce 83 b5 82 14 8c 14 b2 f4 7b f7 ff 0e 31 25 40 48 08 8e 1b 09 d2 b5 a1 ce e2 95 86 3b b1 fa 19 2d 14 03 01 00 01 01 16 03 01 00 30 e8 1f 55 e1 41 9e 46 76 c8 1b 3a ef ee a4 44 44 20 09 89 db b0 e3 2d 59 29 74 c5 8b c8 89 b0 24 a8 d6 41 2c 40 e3 fc ff af 21 e7 74 b5 b3 f2 88 1375255138.927731: EAPOL: SUPP_BE entering state RECEIVE 1375255138.937133: bge0: RX EAPOL from 00:25:61:9c:ae:c0 1375255138.937136: RX EAPOL - hexdump(len=73): 01 00 00 45 01 0a 00 45 15 80 00 00 00 3b 14 03 01 00 01 01 16 03 01 00 30 1c 7a 0a 6a 4d 56 19 ef 93 97 94 46 2b 02 6f 24 0f 37 a6 58 7d 74 24 da db 6c d1 82 11 86 0f e9 09 fe ae 0a 9c 02 43 45 b1 14 c5 a3 08 54 49 a1 1375255138.937153: EAPOL: Received EAP-Packet frame 1375255138.937154: EAPOL: SUPP_BE entering state REQUEST 1375255138.937155: EAPOL: getSuppRsp 1375255138.937156: EAP: EAP entering state RECEIVED 1375255138.937159: EAP: Received EAP-Request id=10 method=21 vendor=0 vendorMethod=0 1375255138.937161: EAP: EAP entering state METHOD 1375255138.937163: SSL: Received packet(len=69) - Flags 0x80 1375255138.937165: SSL: TLS Message Length: 59 1375255138.937262: SSL: (where=0x1001 ret=0x1) 1375255138.937264: SSL: SSL_connect:SSLv3 read finished A 1375255138.937298: SSL: (where=0x20 ret=0x1) 1375255138.937299: SSL: (where=0x1002 ret=0x1) 1375255138.937301: SSL: 0 bytes pending from ssl_out 1375255138.937304: SSL: No Application Data included 1375255138.937305: SSL: No data to be sent out 1375255138.937306: EAP-TTLS: TLS done, proceed to Phase 2 1