https://bugzilla.novell.com/show_bug.cgi?id=397390 Summary: wlan connection with wpa enterprise drops after some idle time Product: openSUSE 11.0 Version: RC 1 Platform: i686 OS/Version: openSUSE 11.0 Status: NEW Severity: Major Priority: P5 - None Component: Network AssignedTo: bnc-team-screening@forge.provo.novell.com ReportedBy: dipeit@gmail.com QAContact: qa@suse.de Found By: Beta-Customer and cannot be reconnected, not even manually. But when I kill wpa_supplicant it will reconnect immediately This does not happen when the system comes back from hibernation or suspend, it also does not happen if I manually blank the screen, it just happens after i leave the laptop idle for about 15 minutes and the screen blanks automatically. hwinfo --wlan 01: PCI 303.0: 0282 WLAN controller [Created at pci.310] UDI: /org/freedesktop/Hal/devices/pci_8086_4223 Unique ID: JNkJ._EY5xScnyf2 Parent ID: 6NW+.InKz0bgid89 SysFS ID: /devices/pci0000:00/0000:00:1e.0/0000:03:03.0 SysFS BusID: 0000:03:03.0 Hardware Class: network Model: "Intel PRO/Wireless 2915ABG Network Connection" Vendor: pci 0x8086 "Intel Corporation" Device: pci 0x4223 "PRO/Wireless 2915ABG Network Connection" SubVendor: pci 0x8086 "Intel Corporation" dmesg | grep ipw ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, 1.2.2kmprq ipw2200: Copyright(c) 2003-2006 Intel Corporation ipw2200: Detected Intel PRO/Wireless 2915ABG Network Connection ipw2200: Detected geography ZZA (11 802.11bg channels, 13 802.11a channels) /var/log/NetworkManager: Jun 5 01:48:34 linux-wsn3 NetworkManager: <info> Clearing nscd hosts cache. Jun 5 01:48:35 linux-wsn3 NetworkManager: <info> Policy set (eth1) as default device for routing and DNS. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): device state change: 8 -> 3 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): deactivating device. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> eth1: canceled DHCP transaction, dhclient pid 18840 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Clearing nscd hosts cache. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) starting connection 'Auto Marconi' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): device state change: 3 -> 4 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 1 of 5 (Device Prepare) scheduled... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 1 of 5 (Device Prepare) started... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 2 of 5 (Device Configure) scheduled... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 1 of 5 (Device Prepare) complete. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 7 -> 0 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 0 -> 4 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 4 -> 0 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 2 of 5 (Device Configure) starting... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): device state change: 4 -> 5 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1/wireless): access point 'Auto Marconi' has security, but secrets are required. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): device state change: 5 -> 6 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 2 of 5 (Device Configure) complete. Jun 5 02:02:23 linux-wsn3 NetworkManager: Missing eap method Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 1 of 5 (Device Prepare) scheduled... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 1 of 5 (Device Prepare) started... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): device state change: 6 -> 4 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 2 of 5 (Device Configure) scheduled... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 1 of 5 (Device Prepare) complete. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 2 of 5 (Device Configure) starting... Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): device state change: 4 -> 5 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1/wireless): connection 'Auto Marconi' has security, and secrets exist. No new secrets needed. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'ssid' value 'Marconi' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'scan_ssid' value '1' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'key_mgmt' value 'WPA-EAP' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'proto' value 'WPA RSN WPA RSN' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'pairwise' value 'TKIP CCMP TKIP CCMP' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'group' value 'WEP40 WEP104 TKIP CCMP WEP40 WEP104 TKIP CCMP' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'password' value '<omitted>' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'eap' value 'TTLS' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'fragment_size' value '1300' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'phase2' value 'auth=MSCHAPV2' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'ca_cert' value 'blob://-org-freedesktop-NetworkManagerSettings-0-ca_cert' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: added 'identity' value 'fhcrc\phsunixwifi' Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Activation (eth1) Stage 2 of 5 (Device Configure) complete. Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> Config: set interface ap_scan to 1 Jun 5 02:02:23 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 0 -> 2 Jun 5 02:02:24 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 2 -> 3 Jun 5 02:02:24 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 3 -> 4 Jun 5 02:02:46 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 4 -> 0 Jun 5 02:02:46 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 0 -> 2 Jun 5 02:02:47 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 2 -> 3 Jun 5 02:02:47 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 3 -> 4 Jun 5 02:02:48 linux-wsn3 NetworkManager: <info> Activation (eth1/wireless): association took too long. Jun 5 02:02:48 linux-wsn3 NetworkManager: <info> (eth1): device state change: 5 -> 6 Jun 5 02:02:48 linux-wsn3 NetworkManager: <info> Activation (eth1/wireless): asking for new secrets Jun 5 02:02:48 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 4 -> 0 Jun 5 02:03:00 linux-wsn3 NetworkManager: <info> (eth1): supplicant connection state change: 0 -> 2 /var/log/wpa_supplicant.log: 1212653546.949992: wpa_driver_wext_set_operstate: operstate 0->1 (UP) 1212653546.950008: WEXT: Operstate: linkmode=-1, operstate=6 1212653546.950127: Cancelling scan request 1212653546.950151: RTM_NEWLINK: operstate=1 ifi_flags=0x11003 ([UP][LOWER_UP]) 1212653546.950170: WEXT: Operstate: linkmode=-1, operstate=6 1212653546.950190: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653546.950211: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) 1212653546.950229: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653759.966698: wpa_driver_wext_disassociate 1212653759.968406: No keys have been configured - skip key clearing 1212653759.968424: State: COMPLETED -> DISCONNECTED 1212653759.968552: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) 1212653759.968576: WEXT: Operstate: linkmode=-1, operstate=5 1212653759.968722: EAPOL: External notification - portEnabled=0 1212653759.968744: EAPOL: SUPP_PAE entering state DISCONNECTED 1212653759.968759: EAPOL: SUPP_BE entering state INITIALIZE 1212653759.968776: EAPOL: External notification - portValid=0 1212653759.968922: No keys have been configured - skip key clearing 1212653759.968943: State: DISCONNECTED -> DISCONNECTED 1212653759.968994: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653759.969011: WEXT: Operstate: linkmode=-1, operstate=5 1212653759.969032: EAPOL: External notification - portEnabled=0 1212653759.969050: EAPOL: External notification - portValid=0 1212653759.969120: RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) 1212653759.969145: Wireless event: cmd=0x8b1a len=8 1212653759.969165: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1212653759.969183: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653759.969413: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653759.969439: Wireless event: cmd=0x8b15 len=20 1212653759.969455: Wireless event: new AP: 00:00:00:00:00:00 1212653759.969475: BSSID 00:00:00:00:00:00 blacklist count incremented to 3 1212653759.969502: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1212653759.969518: State: DISCONNECTED -> DISCONNECTED 1212653759.969534: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653759.969550: WEXT: Operstate: linkmode=-1, operstate=5 1212653759.984029: EAPOL: External notification - portEnabled=0 1212653759.984079: EAPOL: External notification - portValid=0 1212653759.984102: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653759.984122: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653759.984229: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653759.984252: Wireless event: cmd=0x8b2a len=8 1212653759.986448: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1212653759.986482: Wireless event: cmd=0x8b15 len=20 1212653759.986498: Wireless event: new AP: 00:16:01:d6:a6:88 1212653759.986518: State: DISCONNECTED -> ASSOCIATED 1212653759.986670: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653759.986694: WEXT: Operstate: linkmode=-1, operstate=5 1212653759.986733: Associated to a new BSS: BSSID=00:16:01:d6:a6:88 1212653759.986758: No network configuration found for the current AP 1212653759.986775: wpa_driver_wext_disassociate 1212653759.987241: No keys have been configured - skip key clearing 1212653759.987265: State: ASSOCIATED -> DISCONNECTED 1212653759.987380: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653759.987403: WEXT: Operstate: linkmode=-1, operstate=5 1212653759.987426: EAPOL: External notification - portEnabled=0 1212653759.987445: EAPOL: External notification - portValid=0 1212653759.987466: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1212653759.987486: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653759.989435: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653759.989467: Wireless event: cmd=0x8b15 len=20 1212653759.989484: Wireless event: new AP: 00:00:00:00:00:00 1212653759.989503: BSSID 00:00:00:00:00:00 blacklist count incremented to 4 1212653759.989526: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1212653759.989543: State: DISCONNECTED -> DISCONNECTED 1212653759.989559: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653759.989576: WEXT: Operstate: linkmode=-1, operstate=5 1212653759.989598: EAPOL: External notification - portEnabled=0 1212653759.989617: EAPOL: External notification - portValid=0 1212653760.103240: pairwise: 0x18 1212653760.103293: ssid - hexdump_ascii(len=7): 4d 61 72 63 6f 6e 69 Marconi 1212653760.103335: group: 0x1e 1212653760.103360: fragment_size=1300 (0x514) 1212653760.103386: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00 1212653760.103421: proto: 0x3 1212653760.103442: key_mgmt: 0x1 1212653760.103475: password - hexdump_ascii(len=8): [REMOVED] 1212653760.103498: scan_ssid=1 (0x1) 1212653760.103523: phase2 - hexdump_ascii(len=13): 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 1212653760.103629: ca_cert - hexdump_ascii(len=56): 62 6c 6f 62 3a 2f 2f 2d 6f 72 67 2d 66 72 65 65 blob://-org-free 64 65 73 6b 74 6f 70 2d 4e 65 74 77 6f 72 6b 4d desktop-NetworkM 61 6e 61 67 65 72 53 65 74 74 69 6e 67 73 2d 30 anagerSettings-0 2d 63 61 5f 63 65 72 74 -ca_cert 1212653760.103767: identity - hexdump_ascii(len=17): 66 68 63 72 63 5c 70 68 73 75 6e 69 78 77 69 66 fhcrc\phsunixwif 69 i 1212653760.104646: Setting scan request: 0 sec 0 usec 1212653760.104733: State: DISCONNECTED -> SCANNING 1212653760.104844: Starting AP scan (broadcast SSID) 1212653760.104882: Scan requested (ret=0) - scan timeout 30 seconds 1212653760.968218: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653760.968278: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653760.977927: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653760.977958: Wireless event: cmd=0x8b19 len=8 1212653760.978048: Received 1220 bytes of scan results (5 BSSes) 1212653760.978070: Scan results: 5 1212653760.978160: Selecting BSS from priority group 0 1212653760.978180: Try to find WPA-enabled AP 1212653760.978195: 0: 00:14:a4:23:e8:d0 ssid='Marconi' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 1212653760.978220: selected based on WPA IE 1212653760.978235: selected WPA AP 00:14:a4:23:e8:d0 ssid='Marconi' 1212653760.978252: Try to find non-WPA AP 1212653760.978276: Trying to associate with 00:14:a4:23:e8:d0 (SSID='Marconi' freq=2427 MHz) 1212653760.978294: Cancelling scan request 1212653760.978309: WPA: clearing own WPA/RSN IE 1212653760.978323: Automatic auth_alg selection: 0x1 1212653760.978349: WPA: using IEEE 802.11i/D3.0 1212653760.978366: WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 1 proto 1 1212653760.978383: WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 0050 f2 02 01 00 00 50 f2 01 28 00 1212653760.978416: WPA: clearing AP RSN IE 1212653760.978432: WPA: using GTK WEP104 1212653760.978448: WPA: using PTK TKIP 1212653760.978464: WPA: using KEY_MGMT 802.1X 1212653760.978480: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 0501 00 00 50 f2 02 01 00 00 50 f2 01 1212653760.978512: No keys have been configured - skip key clearing 1212653760.978527: wpa_driver_wext_set_drop_unencrypted 1212653760.978546: State: SCANNING -> ASSOCIATING 1212653760.978660: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653760.978683: WEXT: Operstate: linkmode=-1, operstate=5 1212653760.978708: wpa_driver_wext_associate 1212653760.980769: Setting authentication timeout: 15 sec 0 usec 1212653760.980798: EAPOL: External notification - portControl=Auto 1212653760.980826: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653760.980845: Wireless event: cmd=0x8b06 len=8 1212653760.980864: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653760.980881: Wireless event: cmd=0x8b04 len=12 1212653760.980899: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653760.980916: Wireless event: cmd=0x8b1a len=15 1212653760.999083: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1212653760.999111: Wireless event: cmd=0x8b15 len=20 1212653760.999128: Wireless event: new AP: 00:14:a4:23:e8:d0 1212653760.999147: State: ASSOCIATING -> ASSOCIATED 1212653760.999274: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653760.999297: WEXT: Operstate: linkmode=-1, operstate=5 1212653760.999332: Associated to a new BSS: BSSID=00:14:a4:23:e8:d0 1212653760.999350: No keys have been configured - skip key clearing 1212653760.999369: Associated with 00:14:a4:23:e8:d0 1212653760.999384: WPA: Association event - clear replay counter 1212653760.999399: EAPOL: External notification - portEnabled=0 1212653760.999415: EAPOL: External notification - portValid=0 1212653760.999431: EAPOL: External notification - portEnabled=1 1212653760.999446: EAPOL: SUPP_PAE entering state CONNECTING 1212653760.999460: EAPOL: SUPP_BE entering state IDLE 1212653760.999475: EAP: EAP entering state INITIALIZE 1212653760.999491: EAP: maintaining EAP method data for fast reauthentication 1212653760.999506: EAP: EAP entering state IDLE 1212653760.999525: Setting authentication timeout: 10 sec 0 usec 1212653760.999545: Cancelling scan request 1212653760.999612: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 1212653760.999631: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653761.002057: RX EAPOL from 00:14:a4:23:e8:d0 1212653761.002084: RX EAPOL - hexdump(len=57): 01 00 00 35 01 01 00 35 01 00 6e 65 74 77 6f 72 6b 69 64 3d 4d 61 72 63 6f 6e 69 2c 6e 61 73 69 64 3d 70 65 74 65 72 73 65 6e 2d 76 70 6e 68 77 2c 70 6f 72 74 69 64 3d 30 1212653761.002138: Setting authentication timeout: 70 sec 0 usec 1212653761.002156: EAPOL: Received EAP-Packet frame 1212653761.002172: EAPOL: SUPP_PAE entering state RESTART 1212653761.002186: EAP: EAP entering state INITIALIZE 1212653761.002201: EAP: maintaining EAP method data for fast reauthentication 1212653761.002216: EAP: EAP entering state IDLE 1212653761.002230: EAPOL: SUPP_PAE entering state AUTHENTICATING 1212653761.002245: EAPOL: SUPP_BE entering state REQUEST 1212653761.002258: EAPOL: getSuppRsp 1212653761.002272: EAP: EAP entering state RECEIVED 1212653761.002292: EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 1212653761.002309: EAP: EAP entering state IDENTITY 1212653761.002326: CTRL-EVENT-EAP-STARTED EAP authentication started 1212653761.002341: EAP: EAP-Request Identity data - hexdump_ascii(len=48): 00 6e 65 74 77 6f 72 6b 69 64 3d 4d 61 72 63 6f _networkid=Marco 6e 69 2c 6e 61 73 69 64 3d 70 65 74 65 72 73 65 ni,nasid=peterse 6e 2d 76 70 6e 68 77 2c 70 6f 72 74 69 64 3d 30 n-vpnhw,portid=0 1212653761.002409: EAP: using real identity - hexdump_ascii(len=17): 66 68 63 72 63 5c 70 68 73 75 6e 69 78 77 69 66 fhcrc\phsunixwif 69 i 1212653761.002453: EAP: EAP entering state SEND_RESPONSE 1212653761.002469: EAP: EAP entering state IDLE 1212653761.002484: EAPOL: SUPP_BE entering state RESPONSE 1212653761.002498: EAPOL: txSuppRsp 1212653761.002514: TX EAPOL - hexdump(len=26): 01 00 00 16 02 01 00 16 01 66 68 63 72 63 5c 70 68 73 75 6e 69 78 77 69 66 69 1212653761.002562: EAPOL: SUPP_BE entering state RECEIVE 1212653761.058745: RX EAPOL from 00:14:a4:23:e8:d0 1212653761.058771: RX EAPOL - hexdump(len=46): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1212653761.058817: EAPOL: Received EAP-Packet frame 1212653761.058833: EAPOL: SUPP_BE entering state REQUEST 1212653761.058847: EAPOL: getSuppRsp 1212653761.058861: EAP: EAP entering state RECEIVED 1212653761.058877: EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 1212653761.058894: EAP: EAP entering state GET_METHOD 1212653761.058909: EAP: configuration does not allow: vendor 0 method 25 1212653761.058924: EAP: vendor 0 method 25 not allowed 1212653761.058939: EAP: Building EAP-Nak (requested type 25 vendor=0 method=0 not allowed) 1212653761.058957: EAP: allowed methods - hexdump(len=1): 15 1212653761.058973: EAP: EAP entering state SEND_RESPONSE 1212653761.058988: EAP: EAP entering state IDLE 1212653761.059003: EAPOL: SUPP_BE entering state RESPONSE 1212653761.059017: EAPOL: txSuppRsp 1212653761.059031: TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 15 1212653761.059063: EAPOL: SUPP_BE entering state RECEIVE 1212653761.117813: RX EAPOL from 00:14:a4:23:e8:d0 1212653761.117882: RX EAPOL - hexdump(len=46): 01 00 00 06 01 03 00 06 15 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1212653761.117932: EAPOL: Received EAP-Packet frame 1212653761.117950: EAPOL: SUPP_BE entering state REQUEST 1212653761.117964: EAPOL: getSuppRsp 1212653761.117980: EAP: EAP entering state RECEIVED 1212653761.118001: EAP: Received EAP-Request id=3 method=21 vendor=0 vendorMethod=0 1212653761.118020: EAP: EAP entering state GET_METHOD 1212653761.118037: EAP: Using previous method data for fast re-authentication 1212653761.118051: EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) 1212653761.118081: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected 1212653761.118135: EAP: EAP entering state METHOD 1212653761.118159: SSL: Received packet(len=6) - Flags 0x20 1212653761.118175: EAP-TTLS: Start (server ver=0, own ver=0) 1212653761.118190: EAP-TTLS: Using TTLS version 0 1212653761.118205: EAP-TTLS: Start 1212653761.118258: SSL: (where=0x10 ret=0x1) 1212653761.118299: SSL: (where=0x1001 ret=0x1) 1212653761.118318: SSL: SSL_connect:before/connect initialization 1212653761.118362: SSL: (where=0x1001 ret=0x1) 1212653761.118381: SSL: SSL_connect:SSLv3 write client hello A 1212653761.118400: SSL: (where=0x1002 ret=0xffffffff) 1212653761.118416: SSL: SSL_connect:error in SSLv3 read server hello A 1212653761.118433: SSL: SSL_connect - want more data 1212653761.118448: SSL: 131 bytes pending from ssl_out 1212653761.118465: SSL: 131 bytes left to be sent out (of total 131 bytes) 1212653761.118483: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 1212653761.118501: EAP: EAP entering state SEND_RESPONSE 1212653761.118517: EAP: EAP entering state IDLE 1212653761.118533: EAPOL: SUPP_BE entering state RESPONSE 1212653761.118546: EAPOL: txSuppRsp 1212653761.118563: TX EAPOL - hexdump(len=141): 01 00 00 89 02 03 00 89 15 00 16 03 01 00 7e 01 00 007a 03 01 48 47 a0 c1 ca fd c1 4b fc 2f b9 16 d1 a5 42 a1 28 90 18 ed 96 7c be 2c 86 a0 98 36 fe ac aa22 20 fe 57 2b 0d 8c b4 99 ca 96 d5 26 b8 8c 16 81 56 0a 69 4f 0b 56 c5 1c 12 e6 2a dc b5 d5 be 8d 2b00 32 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 45 00 44 00 41 00 0500 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 1212653761.118686: EAPOL: SUPP_BE entering state RECEIVE 1212653761.175292: RX EAPOL from 00:14:a4:23:e8:d0 1212653761.175348: RX EAPOL - hexdump(len=152): 01 00 00 94 01 04 00 94 15 80 00 00 00 8a 16 03 01 004a 02 00 00 46 03 01 48 47 a0 72 d4 43 27 62 79 cb e0 50 91 f6 d8 22 0f 58 a3 05 f0 06 e6 ba 1a f2 7f37 85 74 cb 51 20 fe 57 2b 0d 8c b4 99 ca 96 d5 26 b8 8c 16 81 56 0a 69 4f 0b 56 c5 1c 12 e6 2a dc b5d5 be 8d 2b 00 35 00 14 03 01 00 01 01 16 03 01 00 30 b8 e0 84 a2 bc 13 e8 6f cf 3f 60 de 39 60 98 5ad0 91 bc f6 78 6c 88 94 06 ce 02 b5 ee ee 74 36 5d a7 8e a5 1c 81 ff bf d6 8a f7 6f 68 f9 e3 53 1212653761.175455: EAPOL: Received EAP-Packet frame 1212653761.175472: EAPOL: SUPP_BE entering state REQUEST 1212653761.175486: EAPOL: getSuppRsp 1212653761.175501: EAP: EAP entering state RECEIVED 1212653761.175521: EAP: Received EAP-Request id=4 method=21 vendor=0 vendorMethod=0 1212653761.175540: EAP: EAP entering state METHOD 1212653761.175562: SSL: Received packet(len=148) - Flags 0x80 1212653761.175578: SSL: TLS Message Length: 138 1212653761.175657: SSL: (where=0x1001 ret=0x1) 1212653761.175678: SSL: SSL_connect:SSLv3 read server hello A 1212653761.175923: SSL: (where=0x1001 ret=0x1) 1212653761.175944: SSL: SSL_connect:SSLv3 read finished A 1212653761.175968: SSL: (where=0x1001 ret=0x1) 1212653761.175985: SSL: SSL_connect:SSLv3 write change cipher spec A 1212653761.176060: SSL: (where=0x1001 ret=0x1) 1212653761.176079: SSL: SSL_connect:SSLv3 write finished A 1212653761.176096: SSL: (where=0x1001 ret=0x1) 1212653761.176111: SSL: SSL_connect:SSLv3 flush data 1212653761.176141: SSL: (where=0x20 ret=0x1) 1212653761.176158: SSL: (where=0x1002 ret=0x1) 1212653761.176173: SSL: 59 bytes pending from ssl_out 1212653761.176209: OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) 1212653761.176230: SSL: 59 bytes left to be sent out (of total 59 bytes) 1212653761.176248: EAP-TTLS: TLS done, proceed to Phase 2 1212653761.176262: EAP-TTLS: fast reauth - may skip Phase 2 1212653761.176362: EAP-TTLS: Derived key - hexdump(len=64): [REMOVED] 1212653761.176381: EAP-TTLS: Authentication completed successfully (EAP workaround) 1212653761.176396: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC 1212653761.176414: EAP: EAP entering state SEND_RESPONSE 1212653761.176430: EAP: EAP entering state IDLE 1212653761.176446: EAPOL: SUPP_BE entering state RESPONSE 1212653761.176460: EAPOL: txSuppRsp 1212653761.176517: TX EAPOL - hexdump(len=69): 01 00 00 41 02 04 00 41 15 00 14 03 01 00 01 01 16 03 01 00 30 2f db 9f 0c 39 8e 26 4c b1 7a 23 02 c4 9f 26 8d 4f a2 e5 ae 99 37 56 cf 83 bc 79 04 bc ab f5 9b f3 f3 bb 66 a7 55 bc e7 57 ce 15 91 1e b4 43 8a 1212653761.176595: EAPOL: SUPP_BE entering state RECEIVE 1212653761.237566: RX EAPOL from 00:14:a4:23:e8:d0 1212653761.237595: RX EAPOL - hexdump(len=46): 01 00 00 06 01 05 00 06 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1212653761.237642: EAPOL: Received EAP-Packet frame 1212653761.237657: EAPOL: SUPP_BE entering state REQUEST 1212653761.237671: EAPOL: getSuppRsp 1212653761.237685: EAP: EAP entering state RECEIVED 1212653761.237701: EAP: Received EAP-Request id=5 method=21 vendor=0 vendorMethod=0 1212653761.237719: EAP: EAP entering state METHOD 1212653761.237736: SSL: Received packet(len=6) - Flags 0x00 1212653761.237752: EAP-TTLS: received 0 bytes encrypted data for Phase 2 1212653761.237768: EAP-TTLS: Session resumption - skip phase 2 1212653761.237782: SSL: Building ACK 1212653761.237796: EAP-TTLS: Authentication completed successfully 1212653761.237810: EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC 1212653761.237827: EAP: EAP entering state SEND_RESPONSE 1212653761.237843: EAP: EAP entering state IDLE 1212653761.237858: EAPOL: SUPP_BE entering state RESPONSE 1212653761.237872: EAPOL: txSuppRsp 1212653761.237886: TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 15 00 1212653761.237919: EAPOL: SUPP_BE entering state RECEIVE 1212653763.156032: EAPOL: startWhen --> 0 1212653784.589928: RX EAPOL from 00:14:a4:23:e8:d0 1212653784.589989: RX EAPOL - hexdump(len=46): 01 00 00 04 04 05 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1212653784.590038: EAPOL: Received EAP-Packet frame 1212653784.590054: EAPOL: SUPP_BE entering state REQUEST 1212653784.590069: EAPOL: getSuppRsp 1212653784.590083: EAP: EAP entering state RECEIVED 1212653784.590103: EAP: Received EAP-Failure 1212653784.590118: EAP: EAP entering state DISCARD 1212653784.590132: EAP: EAP entering state IDLE 1212653784.590148: EAPOL: SUPP_BE entering state RECEIVE 1212653784.590860: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653784.590889: Wireless event: cmd=0x8b15 len=20 1212653784.590906: Wireless event: new AP: 00:00:00:00:00:00 1212653784.590936: Setting scan request: 0 sec 100000 usec 1212653784.590957: Added BSSID 00:14:a4:23:e8:d0 into blacklist 1212653784.590977: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1212653784.590993: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1212653784.591335: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1212653784.591367: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1212653784.591391: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1212653784.591413: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1212653784.591437: State: ASSOCIATED -> DISCONNECTED 1212653784.592667: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653784.592695: WEXT: Operstate: linkmode=-1, operstate=5 1212653784.592721: EAPOL: External notification - portEnabled=0 1212653784.592738: EAPOL: SUPP_PAE entering state DISCONNECTED 1212653784.592752: EAPOL: SUPP_BE entering state INITIALIZE 1212653784.592768: EAP: EAP entering state DISABLED 1212653784.592783: EAPOL: External notification - portValid=0 1212653784.592803: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653784.592822: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added 1212653784.592841: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653784.592858: Wireless event: cmd=0x8b15 len=20 1212653784.592873: Wireless event: new AP: 00:00:00:00:00:00 1212653784.592891: BSSID 00:00:00:00:00:00 blacklist count incremented to 5 1212653784.592913: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys 1212653784.592929: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1212653784.592996: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 1212653784.593019: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 1212653784.593041: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 1212653784.593062: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 1212653784.593084: State: DISCONNECTED -> DISCONNECTED 1212653784.593101: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653784.593116: WEXT: Operstate: linkmode=-1, operstate=5 1212653784.593136: EAPOL: External notification - portEnabled=0 1212653784.593153: EAPOL: External notification - portValid=0 1212653784.692020: State: DISCONNECTED -> SCANNING 1212653784.692168: Starting AP scan (specific SSID) 1212653784.692189: Scan SSID - hexdump_ascii(len=7): 4d 61 72 63 6f 6e 69 Marconi 1212653784.692228: Scan requested (ret=0) - scan timeout 30 seconds 1212653785.101738: No keys have been configured - skip key clearing 1212653785.101772: State: SCANNING -> DISCONNECTED 1212653785.101887: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653785.101910: WEXT: Operstate: linkmode=-1, operstate=5 1212653785.101940: EAPOL: External notification - portEnabled=0 1212653785.101960: EAPOL: External notification - portValid=0 1212653785.102293: No keys have been configured - skip key clearing 1212653785.102316: State: DISCONNECTED -> DISCONNECTED 1212653785.102332: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) 1212653785.102348: WEXT: Operstate: linkmode=-1, operstate=5 1212653785.102369: EAPOL: External notification - portEnabled=0 1212653785.102386: EAPOL: External notification - portValid=0 1212653785.581421: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653785.581478: Wireless event: cmd=0x8b19 len=8 1212653785.581578: Received 2147 bytes of scan results (9 BSSes) 1212653785.581599: Scan results: 9 1212653790.912102: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653790.912143: Wireless event: cmd=0x8b19 len=8 1212653790.912245: Received 2369 bytes of scan results (10 BSSes) 1212653790.912266: Scan results: 10 1212653794.913116: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653794.913176: Wireless event: cmd=0x8b19 len=8 1212653794.913279: Received 2598 bytes of scan results (11 BSSes) 1212653794.913300: Scan results: 11 1212653799.912110: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653799.912171: Wireless event: cmd=0x8b19 len=8 1212653799.912280: Received 2602 bytes of scan results (11 BSSes) 1212653799.912301: Scan results: 11 1212653804.912180: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) 1212653804.912238: Wireless event: cmd=0x8b19 len=8 1212653804.912352: Received 2601 bytes of scan results (11 BSSes) 1212653804.912373: Scan results: 11 -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.