Script started on 2025-07-07 15:32:58+02:00 [COMMAND="eapol_test -c test.conf -a 192.168.18.2 -s abcdefghijklm -p 1812 -r1 -t3" TERM="screen" TTY="/dev/pts/2" COLUMNS="153" LINES="54"] Reading configuration file 'test.conf' Line: 1 - start of a new network block ssid - hexdump_ascii(len=7): 65 64 75 72 6f 61 6d eduroam key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 identity - hexdump_ascii(len=21): 74 65 73 74 31 40 63 61 6d 6b 2e 62 61 72 74 79 test1@camk.barty 63 6b 61 31 38 cka18 password - hexdump_ascii(len=16): 31 31 32 32 33 33 34 34 35 35 36 36 37 37 38 38 1122334455667788 phase2 - hexdump_ascii(len=13): 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 ca_cert - hexdump_ascii(len=6): 63 61 2e 70 65 6d ca.pem Priority group 0 id=0 ssid='eduroam' Authentication server 192.168.18.2:1812 RADIUS local address: 192.168.18.3:47595 ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Sending fake EAP-Request-Identity EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=82 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: Status notification: started (param=) EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using real identity - hexdump_ascii(len=21): 74 65 73 74 31 40 63 61 6d 6b 2e 62 61 72 74 79 test1@camk.barty 63 6b 61 31 38 cka18 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp WPA: eapol_test_eapol_send(type=0 len=26) TX EAP -> RADIUS - hexdump(len=26): 02 52 00 1a 01 74 65 73 74 31 40 63 61 6d 6b 2e 62 61 72 74 79 63 6b 61 31 38 Encapsulating EAP message into a RADIUS packet Learned identity from EAP-Response-Identity - hexdump(len=21): 74 65 73 74 31 40 63 61 6d 6b 2e 62 61 72 74 79 63 6b 61 31 38 Sending RADIUS message to authentication server RADIUS message: code=1 (Access-Request) identifier=0 length=156 Attribute 80 (Message-Authenticator) length=18 Value: 1ded33f62cb9414d1d9fcc3c5b67a027 Attribute 1 (User-Name) length=23 Value: 'test1@camk.bartycka18' Attribute 4 (NAS-IP-Address) length=6 Value: 127.0.0.1 Attribute 31 (Calling-Station-Id) length=19 Value: '02-00-00-00-00-01' Attribute 12 (Framed-MTU) length=6 Value: 1400 Attribute 61 (NAS-Port-Type) length=6 Value: 19 Attribute 6 (Service-Type) length=6 Value: 2 Attribute 77 (Connect-Info) length=24 Value: 'CONNECT 11Mbps 802.11b' Attribute 79 (EAP-Message) length=28 Value: 0252001a0174657374314063616d6b2e6261727479636b613138 RADIUS: Send 156 bytes to the server Next RADIUS client retransmit in 3 seconds EAPOL: SUPP_BE entering state RECEIVE Received 38 bytes from RADIUS server Received RADIUS message RADIUS message: code=3 (Access-Reject) identifier=0 length=38 Attribute 80 (Message-Authenticator) length=18 Value: 33abda684c64e4c16b0a3a99d57f7273 STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending request, round trip time 1.00 sec RADIUS packet matching with station could not extract EAP-Message from RADIUS message EAPOL: EAP key not available EAPOL: EAP Session-Id not available WPA: Clear old PMK and PTK MPPE keys OK: 0 mismatch: 1 FAILURE Script done on 2025-07-07 15:32:59+02:00 [COMMAND_EXIT_CODE="252"]