EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=0): EAP: using anonymous identity - hexdump_ascii(len=17): 6c 6f 67 69 6e 40 66 72 65 73 68 74 65 6c 2e 72 login@freshtel.r 75 u EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS) EAP-TTLS: Phase2 type: MSCHAPV2 CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-TTLS: Start (server ver=0, own ver=0) TLS: using phase1 config options TLS: Include TLS Message Length in unfragmented packets EAP-TTLS: Start SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 210 bytes pending from ssl_out SSL: 210 bytes left to be sent out (of total 210 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=522) - Flags 0xc0 SSL: TLS Message Length: 3206 SSL: Need 2694 bytes more input data SSL: Building ACK (type=21 id=3 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 2182 bytes more input data SSL: Building ACK (type=21 id=4 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=5 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 1670 bytes more input data SSL: Building ACK (type=21 id=5 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 1158 bytes more input data SSL: Building ACK (type=21 id=6 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 646 bytes more input data SSL: Building ACK (type=21 id=7 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=518) - Flags 0x40 SSL: Need 134 bytes more input data SSL: Building ACK (type=21 id=8 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=140) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/CN=WiMAX Forum(R) Server Root-CA/O=WiMAX Forum(R)/C=US' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/O=Intel Corporation/CN=Intel WiMAX Server Sub CA' CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Intel Corporation/CN=Intel WiMAX Server Sub CA' TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='/O=INTERPROJECT Ltd/OU=000032/CN=aaamsk.fresh-tel.ru' CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/O=INTERPROJECT Ltd/OU=000032/CN=aaamsk.fresh-tel.ru' SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 134 bytes pending from ssl_out SSL: 134 bytes left to be sent out (of total 134 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=10 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=69) - Flags 0x80 SSL: TLS Message Length: 59 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out SSL: No Application Data included SSL: No data to be sent out EAP-TTLS: TLS done, proceed to Phase 2 EAP-TTLS: Derived key - hexdump(len=64): [REMOVED] EAP-TTLS: received 0 bytes encrypted data for Phase 2 EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity EAP-TTLS: Phase 2 MSCHAPV2 Request MSCHAPV2: Identity - hexdump_ascii(len=21): 77 6d 31 30 30 32 33 37 31 40 66 72 65 73 68 74 wm1002371@fresht 65 6c 2e 72 75 el.ru MSCHAPV2: Username - hexdump_ascii(len=21): 77 6d 31 30 30 32 33 37 31 40 66 72 65 73 68 74 wm1002371@fresht 65 6c 2e 72 75 el.ru MSCHAPV2: auth_challenge - hexdump(len=16): eb 1d 3c a6 df d7 4d a5 4b 2a 93 fc e6 52 4c ba MSCHAPV2: peer_challenge - hexdump(len=16): 00 00 00 11 00 00 00 10 ec 06 0a 00 00 00 00 00 MSCHAPV2: username - hexdump_ascii(len=21): 77 6d 31 30 30 32 33 37 31 40 66 72 65 73 68 74 wm1002371@fresht 65 6c 2e 72 75 el.ru MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] MSCHAPV2: NT Response - hexdump(len=24): 00 25 c6 a7 ce 59 aa e4 79 e7 92 9a ec 42 14 8e 1c 51 69 5e 65 4f 48 17 MSCHAPV2: Auth Response - hexdump(len=20): 3c df fd 9c ca 48 b5 21 07 58 a2 6a ef 5b e0 a8 d6 34 38 46 MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] EAP-TTLS: Encrypting Phase 2 data - hexdump(len=124): [REMOVED] SSL: 202 bytes left to be sent out (of total 202 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit *** glibc detected *** /opt/wimax/wimax: double free or corruption (!prev): 0x0a06a040 *** ======= Backtrace: ========= /lib/libc.so.6(+0x6b661)[0xb7765661] /lib/libc.so.6(+0x6cf7b)[0xb7766f7b] /lib/libc.so.6(cfree+0x6d)[0xb776a11d] /usr/lib/libeap.so.0(wpabuf_free+0x31)[0xb7859b01] /opt/wimax/wimax[0x804ca4d] /opt/wimax/wimax[0x804b2ea] /opt/wimax/wimax[0x80497a4] /usr/lib/libusb-1.0.so.0(+0x4a7e)[0xb784aa7e] /usr/lib/libusb-1.0.so.0(+0x9368)[0xb784f368] /usr/lib/libusb-1.0.so.0(+0x4873)[0xb784a873] /usr/lib/libusb-1.0.so.0(libusb_handle_events_timeout+0x69)[0xb784b2f9] /opt/wimax/wimax[0x8049d9a] /opt/wimax/wimax[0x8049f9d] /opt/wimax/wimax[0x804ac9b] /lib/libc.so.6(__libc_start_main+0xe6)[0xb7710db6] /opt/wimax/wimax[0x8049681] ======= Memory map: ======== 08048000-0804e000 r-xp 00000000 08:12 3360 /opt/wimax/wimax 0804e000-0804f000 rw-p 00006000 08:12 3360 /opt/wimax/wimax 0804f000-08053000 rw-p 00000000 00:00 0 0a04c000-0a08e000 rw-p 00000000 00:00 0 [heap] b7300000-b7321000 rw-p 00000000 00:00 0 b7321000-b7400000 ---p 00000000 00:00 0 b74f0000-b74f2000 rw-p 00000000 00:00 0 b74f2000-b7506000 r-xp 00000000 08:12 18417 /usr/lib/libz.so.1.2.5 b7506000-b7507000 rw-p 00013000 08:12 18417 /usr/lib/libz.so.1.2.5 b7507000-b7509000 r-xp 00000000 08:12 239 /lib/libdl-2.13.so b7509000-b750a000 r--p 00001000 08:12 239 /lib/libdl-2.13.so b750a000-b750b000 rw-p 00002000 08:12 239 /lib/libdl-2.13.so b750b000-b7520000 r-xp 00000000 08:12 256 /lib/libpthread-2.13.so b7520000-b7521000 ---p 00015000 08:12 256 /lib/libpthread-2.13.so b7521000-b7522000 r--p 00015000 08:12 256 /lib/libpthread-2.13.so b7522000-b7523000 rw-p 00016000 08:12 256 /lib/libpthread-2.13.so b7523000-b7525000 rw-p 00000000 00:00 0 b7525000-b752c000 r-xp 00000000 08:12 322 /lib/librt-2.13.so b752c000-b752d000 r--p 00006000 08:12 322 /lib/librt-2.13.so b752d000-b752e000 rw-p 00007000 08:12 322 /lib/librt-2.13.so b752e000-b7691000 r-xp 00000000 08:12 12603 /usr/lib/libcrypto.so.1.0.0 b7691000-b76a5000 rw-p 00162000 08:12 12603 /usr/lib/libcrypto.so.1.0.0 b76a5000-b76a9000 rw-p 00000000 00:00 0 b76a9000-b76f6000 r-xp 00000000 08:12 13099 /usr/lib/libssl.so.1.0.0 b76f6000-b76fa000 rw-p 0004d000 08:12 13099 /usr/lib/libssl.so.1.0.0 b76fa000-b783f000 r-xp 00000000 08:12 258 /lib/libc-2.13.so b783f000-b7840000 ---p 00145000 08:12 258 /lib/libc-2.13.so b7840000-b7842000 r--p 00145000 08:12 258 /lib/libc-2.13.so b7842000-b7843000 rw-p 00147000 08:12 258 /lib/libc-2.13.so b7843000-b7846000 rw-p 00000000 00:00 0 b7846000-b7851000 r-xp 00000000 08:12 1399 /usr/lib/libusb-1.0.so.0.0.0 b7851000-b7852000 rw-p 0000a000 08:12 1399 /usr/lib/libusb-1.0.so.0.0.0 b7852000-b787b000 r-xp 00000000 08:12 3225 /usr/lib/libeap.so.0.0.0 b787b000-b787c000 rw-p 00028000 08:12 3225 /usr/lib/libeap.so.0.0.0 b788c000-b78a7000 r-xp 00000000 08:12 27208 /usr/lib/libgcc_s.so.1 b78a7000-b78a8000 rw-p 0001a000 08:12 27208 /usr/lib/libgcc_s.so.1 b78a8000-b78ab000 rw-p 00000000 00:00 0 b78ab000-b78ac000 r-xp 00000000 00:00 0 [vdso] b78ac000-b78c8000 r-xp 00000000 08:12 277 /lib/ld-2.13.so b78c8000-b78c9000 r--p 0001b000 08:12 277 /lib/ld-2.13.so b78c9000-b78ca000 rw-p 0001c000 08:12 277 /lib/ld-2.13.so bfb40000-bfb61000 rw-p 00000000 00:00 0 [stack] ./wimax-start.sh: line 4: 20008 Аварийный останов $WIMAX_ROOT/wimax -vv --login=wm1002371@freshtel.ru --pass=aFUMrTzJ --nai=login@freshtel.ru --event-script=$WIMAX_ROOT/event.sh --log-file=$WIMAX_ROOT/wimax.log