Mar 6 14:37:15.728: DOT11 EVENT:(adding)client->key_details.encrypt_type is 20 Mar 6 14:37:15.729: dot11_mgr_disp_wlccp_auth_req_send: sending auth_req of client 0009.2dff.0510 to wlccp Mar 6 14:37:15.729: dot11_mgr_disp_wlccp_auth_request: Started dot11 Auth Req timeout 60 seconds Mar 6 14:37:15.730: dot11_auth_client_abort: Received abort request for client 0009.2dff.0510 Mar 6 14:37:15.730: dot11_auth_client_abort: No client entry to abort: 0009.2dff.0510 for application 0x1 Mar 6 14:37:15.730: dot11_auth_add_client_entry: Create new client 0009.2dff.0510 for application 0x1 Mar 6 14:37:15.731: dot11_auth_initialize_client: 0009.2dff.0510 is added to the client list for application 0x1 Mar 6 14:37:15.731: dot11_auth_add_client_entry: req->auth_type 1 Mar 6 14:37:15.731: dot11_auth_add_client_entry: auth_methods_inprocess: 1 Mar 6 14:37:15.731: dot11_auth_add_client_entry: mac list name: method_AP_Client Mar 6 14:37:15.732: dot11_run_auth_methods: Start auth method MAC Mar 6 14:37:15.732: dot11_auth_mac_start: method_list: method_AP_Client Mar 6 14:37:15.732: dot11_auth_mac_start: method_index: 0x6D000002, req: 0xCF0A04 Mar 6 14:37:15.732: dot11_auth_mac_start: client->unique_id: 0xD12 Mar 6 14:37:15.732: RADIUS/ENCODE(00000D12):Orig. component type = DOT11_AUTH Mar 6 14:37:15.758: dot11_mac_process_reply: AAA reply for 0009.2dff.0510 PASSED Mar 6 14:37:15.758: dot11_auth_server_chk_ssid: Checking for SSID in server attributes Mar 6 14:37:15.758: dot11_auth_server_vlan_number: Checking for VLAN ID in server attributes Mar 6 14:37:15.758: dot11_auth_server_get_timeout: Checking for session time out value - attribute #27 Mar 6 14:37:15.758: dot11_auth_send_msg: sending data to requestor status 2 Mar 6 14:37:15.758: dot11_auth_send_msg: resp->nsk_len 0 resp->auth_key_len 0 Mar 6 14:37:15.758: dot11_auth_send_msg: client authenticated 0009.2dff.0510, node_type 64 for application 0x1 Mar 6 14:37:15.758: dot11_auth_delete_client_entry: 0009.2dff.0510 is deleted for application 0x1 Mar 6 14:37:15.760: dot11_mgr_disp_wlccp_receive: Received DOT11_AAA_SUCCESS from Remote Authenticator Mar 6 14:37:15.760: dot11_mgr_sm_run_machine: Executing Action(BRIDGE,AUTHENTICATOR_PASS) for 0009.2dff.0510 Mar 6 14:37:15.760: dot11_mgr_disp_wlccp_ap_send_pre_reg: sending pre reg request 0009.2dff.0510, reassoc 0 Mar 6 14:37:15.760: dot11_mgr_sm_send_pre_reg_req: Sent pre_reg request 0009.2dff.0510 to authenticator Mar 6 14:37:15.762: dot11_mgr_disp_wlccp_process_pre_reg_resp: client network_id = 0 Mar 6 14:37:15.762: dot11_mgr_sm_run_machine: Executing Action(PRE_REG,PRE_REG_PASS) for 0009.2dff.0510 Mar 6 14:37:15.763: dot11_dot1x_send_ssn_eapol_key: eapol->length 95 Mar 6 14:37:15.763: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 0009.2dff.0510 Mar 6 14:37:15.763: dot11_mgr_disp_client_send_eapol: sending eapol to client 0009.2dff.0510 on BSSID 0013.19f2.7310 Mar 6 14:37:15.763: dot11_mgr_sm_send_ptk_msg1: [1] Sent PTK msg 1 to 0009.2dff.0510, no timer set Mar 6 14:37:15.764: dot11_mgr_sm_hs_callback: [1] Handshake msg to 0009.2dff.0510, timer set: timeout 100 ms Mar 6 14:37:15.772: dot11_mgr_sm_parse_client_pak: Received EAPOL packet from 0009.2dff.0510 Mar 6 14:37:15.772: EAPOL pak dump rx Mar 6 14:37:15.772: EAPOL Version: 0x1 type: 0x3 length: 0x0079 Mar 6 14:37:15.772: EAP code: 0xFE id: 0x1 length: 0x0900 type: 0x0 Mar 6 14:37:15.774: dot11_mgr_sm_parse_client_pak: eapol ver 1 type 3 posting event 0x9 to 0009.2dff.0510 Mar 6 14:37:15.774: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,RECV_EAPOL_KEY_RSP) for 0009.2dff.0510 Mar 6 14:37:15.774: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:15.774: dot11_mgr_sm_recv_ptk_msg2: got ptk msg2 Mar 6 14:37:15.774: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 0009.2dff.0510 Mar 6 14:37:15.774: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x20, act=0x0) Mar 6 14:37:15.774: dot11_dot1x_verify_ptk_handshake: Mar 6 14:37:15.774: dot11_dot1x_ssn_generate_ptk failed Mar 6 14:37:15.774: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:15.774: dot11_mgr_sm_recv_ptk_msg2: dot11_dot1x_verify_ptk_handshake failed Mar 6 14:37:15.863: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,TIMEOUT) for 0009.2dff.0510 Mar 6 14:37:15.863: dot11_dot1x_send_ssn_eapol_key: eapol->length 95 Mar 6 14:37:15.863: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 0009.2dff.0510 Mar 6 14:37:15.863: dot11_mgr_disp_client_send_eapol: sending eapol to client 0009.2dff.0510 on BSSID 0013.19f2.7310 Mar 6 14:37:15.863: dot11_mgr_sm_send_ptk_msg1: [2] Sent PTK msg 1 to 0009.2dff.0510, no timer set Mar 6 14:37:15.863: dot11_mgr_sm_hs_callback: [2] Handshake msg to 0009.2dff.0510, timer set: timeout 100 ms Mar 6 14:37:15.871: dot11_mgr_sm_parse_client_pak: Received EAPOL packet from 0009.2dff.0510 Mar 6 14:37:15.871: EAPOL pak dump rx Mar 6 14:37:15.871: EAPOL Version: 0x1 type: 0x3 length: 0x0079 Mar 6 14:37:15.871: EAP code: 0xFE id: 0x1 length: 0x0900 type: 0x0 Mar 6 14:37:15.873: dot11_mgr_sm_parse_client_pak: eapol ver 1 type 3 posting event 0x9 to 0009.2dff.0510 Mar 6 14:37:15.873: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,RECV_EAPOL_KEY_RSP) for 0009.2dff.0510 Mar 6 14:37:15.873: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:15.874: dot11_mgr_sm_recv_ptk_msg2: got ptk msg2 Mar 6 14:37:15.874: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 0009.2dff.0510 Mar 6 14:37:15.874: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x20, act=0x0) Mar 6 14:37:15.874: dot11_dot1x_verify_ptk_handshake: Mar 6 14:37:15.874: dot11_dot1x_ssn_generate_ptk failed Mar 6 14:37:15.874: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:15.874: dot11_mgr_sm_recv_ptk_msg2: dot11_dot1x_verify_ptk_handshake failed Mar 6 14:37:15.963: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,TIMEOUT) for 0009.2dff.0510 Mar 6 14:37:15.963: dot11_dot1x_send_ssn_eapol_key: eapol->length 95 Mar 6 14:37:15.963: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 0009.2dff.0510 Mar 6 14:37:15.963: dot11_mgr_disp_client_send_eapol: sending eapol to client 0009.2dff.0510 on BSSID 0013.19f2.7310 Mar 6 14:37:15.963: dot11_mgr_sm_send_ptk_msg1: [3] Sent PTK msg 1 to 0009.2dff.0510, no timer set Mar 6 14:37:15.963: dot11_mgr_sm_hs_callback: [3] Handshake msg to 0009.2dff.0510, timer set: timeout 100 ms Mar 6 14:37:15.970: dot11_mgr_sm_parse_client_pak: Received EAPOL packet from 0009.2dff.0510 Mar 6 14:37:15.970: EAPOL pak dump rx Mar 6 14:37:15.970: EAPOL Version: 0x1 type: 0x3 length: 0x0079 Mar 6 14:37:15.971: EAP code: 0xFE id: 0x1 length: 0x0900 type: 0x0 Mar 6 14:37:15.972: dot11_mgr_sm_parse_client_pak: eapol ver 1 type 3 posting event 0x9 to 0009.2dff.0510 Mar 6 14:37:15.972: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,RECV_EAPOL_KEY_RSP) for 0009.2dff.0510 Mar 6 14:37:15.973: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:15.973: dot11_mgr_sm_recv_ptk_msg2: got ptk msg2 Mar 6 14:37:15.973: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 0009.2dff.0510 Mar 6 14:37:15.973: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x20, act=0x0) Mar 6 14:37:15.973: dot11_dot1x_verify_ptk_handshake: Mar 6 14:37:15.973: dot11_dot1x_ssn_generate_ptk failed Mar 6 14:37:15.973: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:15.973: dot11_mgr_sm_recv_ptk_msg2: dot11_dot1x_verify_ptk_handshake failed Mar 6 14:37:16.063: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,TIMEOUT) for 0009.2dff.0510 Mar 6 14:37:16.063: dot11_mgr_sm_handshake_fail: Handshake failure for 0009.2dff.0510 Mar 6 14:37:16.063: %DOT11-7-AUTH_FAILED: Station 0009.2dff.0510 Authentication failed Mar 6 14:37:16.063: dot11_aaa_upd_accounting: Updating attributes for user: 0009.2dff.0510 Mar 6 14:37:16.063: dot11_aaa_upd_accounting: Updating attributes for user: 0009.2dff.0510 Mar 6 14:37:16.063: dot11_mgr_disp_auth_abort: Sending abort request for client 0009.2dff.0510 to local Authenticator Mar 6 14:37:16.063: dot11_auth_client_abort: Received abort request for client 0009.2dff.0510 Mar 6 14:37:16.063: dot11_auth_client_abort: No client entry to abort: 0009.2dff.0510 for application 0x1 Mar 6 14:37:16.079: DOT11 EVENT:(adding)client->key_details.encrypt_type is 20 Mar 6 14:37:16.081: dot11_mgr_disp_wlccp_auth_req_send: sending auth_req of client 0009.2dff.0510 to wlccp Mar 6 14:37:16.081: dot11_mgr_disp_wlccp_auth_request: Started dot11 Auth Req timeout 60 seconds Mar 6 14:37:16.081: dot11_auth_client_abort: Received abort request for client 0009.2dff.0510 Mar 6 14:37:16.081: dot11_auth_client_abort: No client entry to abort: 0009.2dff.0510 for application 0x1 Mar 6 14:37:16.082: dot11_auth_add_client_entry: Create new client 0009.2dff.0510 for application 0x1 Mar 6 14:37:16.083: dot11_auth_initialize_client: 0009.2dff.0510 is added to the client list for application 0x1 Mar 6 14:37:16.083: dot11_auth_add_client_entry: req->auth_type 1 Mar 6 14:37:16.083: dot11_auth_add_client_entry: auth_methods_inprocess: 1 Mar 6 14:37:16.083: dot11_auth_add_client_entry: mac list name: method_AP_Client Mar 6 14:37:16.083: dot11_run_auth_methods: Start auth method MAC Mar 6 14:37:16.083: dot11_auth_mac_start: method_list: method_AP_Client Mar 6 14:37:16.083: dot11_auth_mac_start: method_index: 0x6D000002, req: 0xCF0A04 Mar 6 14:37:16.083: dot11_auth_mac_start: client->unique_id: 0xD14 Mar 6 14:37:16.084: RADIUS/ENCODE(00000D14):Orig. component type = DOT11_AUTH Mar 6 14:37:16.113: dot11_mac_process_reply: AAA reply for 0009.2dff.0510 PASSED Mar 6 14:37:16.113: dot11_auth_server_chk_ssid: Checking for SSID in server attributes Mar 6 14:37:16.113: dot11_auth_server_vlan_number: Checking for VLAN ID in server attributes Mar 6 14:37:16.113: dot11_auth_server_get_timeout: Checking for session time out value - attribute #27 Mar 6 14:37:16.113: dot11_auth_send_msg: sending data to requestor status 2 Mar 6 14:37:16.113: dot11_auth_send_msg: resp->nsk_len 0 resp->auth_key_len 0 Mar 6 14:37:16.114: dot11_auth_send_msg: client authenticated 0009.2dff.0510, node_type 64 for application 0x1 Mar 6 14:37:16.114: dot11_auth_delete_client_entry: 0009.2dff.0510 is deleted for application 0x1 Mar 6 14:37:16.115: dot11_mgr_disp_wlccp_receive: Received DOT11_AAA_SUCCESS from Remote Authenticator Mar 6 14:37:16.115: dot11_mgr_sm_run_machine: Executing Action(BRIDGE,AUTHENTICATOR_PASS) for 0009.2dff.0510 Mar 6 14:37:16.115: dot11_mgr_disp_wlccp_ap_send_pre_reg: sending pre reg request 0009.2dff.0510, reassoc 0 Mar 6 14:37:16.116: dot11_mgr_sm_send_pre_reg_req: Sent pre_reg request 0009.2dff.0510 to authenticator Mar 6 14:37:16.118: dot11_mgr_disp_wlccp_process_pre_reg_resp: client network_id = 0 Mar 6 14:37:16.118: dot11_mgr_sm_run_machine: Executing Action(PRE_REG,PRE_REG_PASS) for 0009.2dff.0510 Mar 6 14:37:16.118: dot11_dot1x_send_ssn_eapol_key: eapol->length 95 Mar 6 14:37:16.118: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 0009.2dff.0510 Mar 6 14:37:16.119: dot11_mgr_disp_client_send_eapol: sending eapol to client 0009.2dff.0510 on BSSID 0013.19f2.7310 Mar 6 14:37:16.119: dot11_mgr_sm_send_ptk_msg1: [1] Sent PTK msg 1 to 0009.2dff.0510, no timer set Mar 6 14:37:16.119: dot11_mgr_sm_hs_callback: [1] Handshake msg to 0009.2dff.0510, timer set: timeout 100 ms Mar 6 14:37:16.128: dot11_mgr_sm_parse_client_pak: Received EAPOL packet from 0009.2dff.0510 Mar 6 14:37:16.128: EAPOL pak dump rx Mar 6 14:37:16.128: EAPOL Version: 0x1 type: 0x3 length: 0x0079 Mar 6 14:37:16.130: dot11_mgr_sm_parse_client_pak: eapol ver 1 type 3 posting event 0x9 to 0009.2dff.0510 Mar 6 14:37:16.130: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,RECV_EAPOL_KEY_RSP) for 0009.2dff.0510 Mar 6 14:37:16.130: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:16.131: dot11_mgr_sm_recv_ptk_msg2: got ptk msg2 Mar 6 14:37:16.131: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 0009.2dff.0510 Mar 6 14:37:16.131: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x20, act=0x0) Mar 6 14:37:16.131: dot11_dot1x_verify_ptk_handshake: Mar 6 14:37:16.131: dot11_dot1x_ssn_generate_ptk failed Mar 6 14:37:16.131: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:16.131: dot11_mgr_sm_recv_ptk_msg2: dot11_dot1x_verify_ptk_handshake failed Mar 6 14:37:16.218: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,TIMEOUT) for 0009.2dff.0510 Mar 6 14:37:16.218: dot11_dot1x_send_ssn_eapol_key: eapol->length 95 Mar 6 14:37:16.218: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 0009.2dff.0510 Mar 6 14:37:16.218: dot11_mgr_disp_client_send_eapol: sending eapol to client 0009.2dff.0510 on BSSID 0013.19f2.7310 Mar 6 14:37:16.219: dot11_mgr_sm_send_ptk_msg1: [2] Sent PTK msg 1 to 0009.2dff.0510, no timer set Mar 6 14:37:16.219: dot11_mgr_sm_hs_callback: [2] Handshake msg to 0009.2dff.0510, timer set: timeout 100 ms Mar 6 14:37:16.227: dot11_mgr_sm_parse_client_pak: Received EAPOL packet from 0009.2dff.0510 Mar 6 14:37:16.227: EAPOL pak dump rx Mar 6 14:37:16.227: EAPOL Version: 0x1 type: 0x3 length: 0x0079 Mar 6 14:37:16.229: dot11_mgr_sm_parse_client_pak: eapol ver 1 type 3 posting event 0x9 to 0009.2dff.0510 Mar 6 14:37:16.230: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,RECV_EAPOL_KEY_RSP) for 0009.2dff.0510 Mar 6 14:37:16.230: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:16.230: dot11_mgr_sm_recv_ptk_msg2: got ptk msg2 Mar 6 14:37:16.230: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 0009.2dff.0510 Mar 6 14:37:16.230: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x20, act=0x0) Mar 6 14:37:16.230: dot11_dot1x_verify_ptk_handshake: Mar 6 14:37:16.230: dot11_dot1x_ssn_generate_ptk failed Mar 6 14:37:16.230: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:16.230: dot11_mgr_sm_recv_ptk_msg2: dot11_dot1x_verify_ptk_handshake failed Mar 6 14:37:16.318: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,TIMEOUT) for 0009.2dff.0510 Mar 6 14:37:16.318: dot11_dot1x_send_ssn_eapol_key: eapol->length 95 Mar 6 14:37:16.318: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 0009.2dff.0510 Mar 6 14:37:16.318: dot11_mgr_disp_client_send_eapol: sending eapol to client 0009.2dff.0510 on BSSID 0013.19f2.7310 Mar 6 14:37:16.319: dot11_mgr_sm_send_ptk_msg1: [3] Sent PTK msg 1 to 0009.2dff.0510, no timer set Mar 6 14:37:16.319: dot11_mgr_sm_hs_callback: [3] Handshake msg to 0009.2dff.0510, timer set: timeout 100 ms Mar 6 14:37:16.326: dot11_mgr_sm_parse_client_pak: Received EAPOL packet from 0009.2dff.0510 Mar 6 14:37:16.326: EAPOL pak dump rx Mar 6 14:37:16.326: EAPOL Version: 0x1 type: 0x3 length: 0x0079 Mar 6 14:37:16.328: dot11_mgr_sm_parse_client_pak: eapol ver 1 type 3 posting event 0x9 to 0009.2dff.0510 Mar 6 14:37:16.328: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,RECV_EAPOL_KEY_RSP) for 0009.2dff.0510 Mar 6 14:37:16.328: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:16.328: dot11_mgr_sm_recv_ptk_msg2: got ptk msg2 Mar 6 14:37:16.328: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 0009.2dff.0510 Mar 6 14:37:16.328: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x20, act=0x0) Mar 6 14:37:16.329: dot11_dot1x_verify_ptk_handshake: Mar 6 14:37:16.329: dot11_dot1x_ssn_generate_ptk failed Mar 6 14:37:16.329: dot11_mgr_sm_recv_ptk_msg2: Mar 6 14:37:16.329: dot11_mgr_sm_recv_ptk_msg2: dot11_dot1x_verify_ptk_handshake failed Mar 6 14:37:16.419: dot11_mgr_sm_run_machine: Executing Action(PTK_MSG2_WAIT,TIMEOUT) for 0009.2dff.0510 Mar 6 14:37:16.419: dot11_mgr_sm_handshake_fail: Handshake failure for 0009.2dff.0510 Mar 6 14:37:16.419: dot11_aaa_upd_accounting: Updating attributes for user: 0009.2dff.0510 Mar 6 14:37:16.420: dot11_aaa_upd_accounting: Updating attributes for user: 0009.2dff.0510 Mar 6 14:37:16.420: dot11_mgr_disp_auth_abort: Sending abort request for client 0009.2dff.0510 to local Authenticator Mar 6 14:37:16.420: dot11_auth_client_abort: Received abort request for client 0009.2dff.0510 Mar 6 14:37:16.420: dot11_auth_client_abort: No client entry to abort: 0009.2dff.0510 for application 0x1 Mar 6 14:37:16.434: DOT11 EVENT:(adding)client->key_details.encrypt_type is 20 Mar 6 14:37:16.435: dot11_mgr_disp_wlccp_auth_req_send: sending auth_req of client 0009.2dff.0510 to wlccp Mar 6 14:37:16.435: dot11_mgr_disp_wlccp_auth_request: Started dot11 Auth Req timeout 60 seconds Mar 6 14:37:16.436: dot11_auth_client_abort: Received abort request for client 0009.2dff.0510 Mar 6 14:37:16.436: dot11_auth_client_abort: No client entry to abort: 0009.2dff.0510 for application 0x1