Behave Test Report

Features: failed: 1

Scenarios: skipped: 14, failed: 1

Steps: skipped: 211, passed: 21, failed: 1

Finished in 58.6 seconds

Feature: nmcli - procedures in documentation

features/scenarios/doc_procedures.feature:325 @rhelver+=8.6, @radius, @8021x_doc_procedure, @attach_wpa_supplicant_log, @permissive, @8021x_hostapd_freeradius_doc_procedure

Scenario: nmcli - docs - set up 802.1x using FreeRadius and hostapd

  1. Before scenario (7.897s)
    Status Before Scenario
    Memory use Before Scenario
    Commands
  2. * Add " bridge " connection named " br0 " for device " br0 " with options (0.069s)
    Commands
    con-name br0
    group-forward-mask 8 connection.autoconnect-slaves 1
    ipv4.method disabled ipv6.method disabled
  3. * Add " ethernet " connection named " br0-uplink " for device " eth4 " with options " master br0 " (0.040s)
    Commands
  4. * Execute " ip l add test1 type veth peer name test1b " (0.009s)
    Commands
  5. * Execute " ip l set dev test1b up " (0.005s)
    Commands
  6. * Execute " ip l set dev test1 up " (0.004s)
    Commands
  7. * Add " ethernet " connection named " br0-client-port " for device " test1b " with options " master br0 " (0.031s)
    Commands
  8. * Bring " up " connection " br0 " (0.066s)
    Commands
  9. * Execute " cp contrib/8021x/doc_procedures/hostapd.conf /etc/hostapd/hostapd.conf " (0.007s)
    Commands
  10. Then Execute " systemctl start hostapd " (0.026s)
    Commands
  11. * Execute " systemctl status hostapd " (0.012s)
    Commands
  12. * Execute " cp -f contrib/8021x/doc_procedures/wpa_supplicant-TTLS.conf /etc/wpa_supplicant/wpa_supplicant-TTLS.conf " (0.004s)
    Commands
  13. Then Note the output of " eapol_test -c /etc/wpa_supplicant/wpa_supplicant-TTLS.conf -s client_password " (0.020s)
  14. And Noted value contains " EAP: Status notification: remote certificate verification \(param=success\) " (0.000s)
  15. And Noted value contains " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " (0.000s)
  16. And Noted value contains " SUCCESS " (0.000s)
  17. * Run tcpdump labeled " wpas-ttls " with arguments " -i br0 ether proto 0x888e " (0.022s)
    Commands
  18. Then " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " is visible with command " wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant-TTLS.conf -D wired -i test1 -d -t " (32.059s)
    Commands
  19. * Stop tcpdump labeled " wpas-ttls " (0.008s)
    Commands
  20. * Run tcpdump labeled " nm-ttls " with arguments " -i br0 ether proto 0x888e " (0.021s)
    Commands
  21. * Add " ethernet " connection named " test1-ttls " for device " test1 " with options (0.031s)
    Commands
    autoconnect no 802-1x.eap ttls 802-1x.phase2-auth pap
    802-1x.identity example_user 802-1x.password user_password
    802-1x.ca-cert /etc/pki/tls/certs/8021x-ca.pem
  22. * Execute " sleep 1 " (1.003s)
    Commands
  23. When Bring up connection " test1-ttls " (25.207s)
    Error Message
    Commands
    --------------------------------------------------
    'pexpect:</usr/bin/nmcli connection up test1-ttls>' returned 1024
    STDOUT:
    Secrets are required to access the wired network 'test1-ttls'
    Warning: password for '802-1x.identity' not given in 'passwd-file' and nmcli cannot ask without '--ask' option.
    Error: Connection activation failed: Secrets were required, but not provided
    Hint: use 'journalctl -xe NM_CONNECTION=e33aaf03-6541-479c-b022-fbeb18b43507 + NM_DEVICE=test1' to get more details.
    
    

  24. After scenario (1.376s)
    Memory use After Scenario
    WPA_SUP
    ~~~~~~~~~~~~~~~~~~~~~~~~~~ WPA_SUPPLICANT LOG ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    -- Logs begin at Thu 2022-05-12 06:56:35 EDT, end at Thu 2022-05-12 07:12:20 EDT. --
    1652353915.454427 wpa_supplicant[54103]: dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}]
    1652353915.454432 wpa_supplicant[54103]: wpa_dbus_dict_open_read: start reading a dict entry
    1652353915.454436 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: Driver
    1652353915.454439 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652353915.454442 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: string value: wired
    1652353915.454449 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: Ifname
    1652353915.454452 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652353915.454455 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: string value: test1
    1652353915.454471 wpa_supplicant[54103]: Initializing interface 'test1' conf 'N/A' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
    1652353915.454541 wpa_supplicant[54103]: driver_wired_init_common: Added multicast membership with packet socket
    1652353915.454544 wpa_supplicant[54103]: Add interface test1 to a new radio N/A
    1652353915.461655 wpa_supplicant[54103]: test1: Own MAC address: fa:1b:ec:52:0c:b9
    1652353915.461662 wpa_supplicant[54103]: test1: RSN: flushing PMKID list in the driver
    1652353915.461667 wpa_supplicant[54103]: test1: State: DISCONNECTED -> INACTIVE
    1652353915.461728 wpa_supplicant[54103]: test1: WPS: UUID based on MAC address: 6a7046c2-9f8c-5a23-971b-e9c29317eb23
    1652353915.463144 wpa_supplicant[54103]: ENGINE: Loading builtin engines
    1652353915.463380 wpa_supplicant[54103]: ENGINE: Loading builtin engines
    1652353915.463459 wpa_supplicant[54103]: EAPOL: SUPP_PAE entering state DISCONNECTED
    1652353915.463463 wpa_supplicant[54103]: EAPOL: Supplicant port status: Unauthorized
    1652353915.463466 wpa_supplicant[54103]: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    1652353915.463468 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state INITIALIZE
    1652353915.463477 wpa_supplicant[54103]: EAP: EAP entering state DISABLED
    1652353915.463489 wpa_supplicant[54103]: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/0'
    1652353915.463706 wpa_supplicant[54103]: test1: Added interface test1
    1652353915.463716 wpa_supplicant[54103]: test1: State: INACTIVE -> DISCONNECTED
    1652353915.464997 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/0) [ssv]
    1652353915.465010 wpa_supplicant[54103]: properties_get_or_set: Set(BSSExpireAge)
    1652353915.465015 wpa_supplicant[54103]: test1: Setting bss expiration age: 250 sec
    1652353915.465030 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/0) [ssv]
    1652353915.465033 wpa_supplicant[54103]: properties_get_or_set: Set(BSSExpireCount)
    1652353915.465037 wpa_supplicant[54103]: test1: Setting bss expiration scan count: 2
    1652353915.465047 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/0) [ssv]
    1652353915.465051 wpa_supplicant[54103]: properties_get_or_set: Set(Pmf)
    1652353915.465057 wpa_supplicant[54103]: pmf=1
    1652353915.465067 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/0) [s]
    1652353915.465268 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/0) [s]
    1652353915.465284 wpa_supplicant[54103]: dbus: fill_dict_with_properties dbus_interface=fi.w1.wpa_supplicant1.Interface.P2PDevice dbus_property=P2PDeviceConfig getter failed
    1652353915.466480 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/0) [ssv]
    1652353915.466485 wpa_supplicant[54103]: properties_get_or_set: Set(ApScan)
    1652353915.466564 wpa_supplicant[54103]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/0) [ssv]
    1652353915.466570 wpa_supplicant[54103]: properties_get_or_set: Set(ApIsolate)
    1652353915.466576 wpa_supplicant[54103]: ap_isolate=0
    1652353915.467167 wpa_supplicant[54103]: dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/0) [a{sv}]
    1652353915.467185 wpa_supplicant[54103]: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/0/Networks/0'
    1652353915.467266 wpa_supplicant[54103]: wpa_dbus_dict_open_read: start reading a dict entry
    1652353915.467269 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: ca_cert
    1652353915.467272 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652353915.467275 wpa_supplicant[54103]: _wpa_dbus_dict_entry_get_array: array_type y
    1652353915.467283 wpa_supplicant[54103]: dbus: byte array contents - hexdump(len=31): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2d 63 61 2e 70 65 6d
    1652353915.467293 wpa_supplicant[54103]: ca_cert - hexdump(len=31): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2d 63 61 2e 70 65 6d
    1652353915.467297 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: key_mgmt
    1652353915.467299 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652353915.467302 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: string value: IEEE8021X
    1652353915.467305 wpa_supplicant[54103]: key_mgmt: 0x8
    1652353915.467309 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: eap
    1652353915.467311 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652353915.467314 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: string value: TTLS
    1652353915.467319 wpa_supplicant[54103]: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
    1652353915.467322 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: eapol_flags
    1652353915.467325 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: i
    1652353915.467339 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: int32 value: 0
    1652353915.467352 wpa_supplicant[54103]: eapol_flags=0 (0x0)
    1652353915.467356 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: phase2
    1652353915.467359 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652353915.467362 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: string value: auth=PAP
    1652353915.467367 wpa_supplicant[54103]: phase2 - hexdump(len=8): 61 75 74 68 3d 50 41 50
    1652353915.467370 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: password
    1652353915.467373 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652353915.467376 wpa_supplicant[54103]: _wpa_dbus_dict_entry_get_array: array_type y
    1652353915.467381 wpa_supplicant[54103]: dbus: byte array contents - hexdump(len=13): 75 73 65 72 5f 70 61 73 73 77 6f 72 64
    1652353915.467386 wpa_supplicant[54103]: password - hexdump(len=13): 75 73 65 72 5f 70 61 73 73 77 6f 72 64
    1652353915.467390 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: identity
    1652353915.467392 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652353915.467395 wpa_supplicant[54103]: _wpa_dbus_dict_entry_get_array: array_type y
    1652353915.467400 wpa_supplicant[54103]: dbus: byte array contents - hexdump(len=12): 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353915.467405 wpa_supplicant[54103]: identity - hexdump(len=12): 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353915.467408 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry key: fragment_size
    1652353915.467410 wpa_supplicant[54103]: wpa_dbus_dict_get_entry: dict entry variant content type: i
    1652353915.467413 wpa_supplicant[54103]: _wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
    1652353915.467418 wpa_supplicant[54103]: fragment_size=1266 (0x4f2)
    1652353915.467950 wpa_supplicant[54103]: dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/0) [o]
    1652353915.467962 wpa_supplicant[54103]: test1: Setting scan request: 0.000000 sec
    1652353915.468015 wpa_supplicant[54103]: EAPOL: External notification - EAP success=0
    1652353915.468019 wpa_supplicant[54103]: EAPOL: External notification - EAP fail=0
    1652353915.468021 wpa_supplicant[54103]: EAPOL: External notification - portControl=Auto
    1652353915.468026 wpa_supplicant[54103]: test1: Already associated with a configured network - generating associated event
    1652353915.468029 wpa_supplicant[54103]: test1: Event ASSOC (0) received
    1652353915.468032 wpa_supplicant[54103]: test1: Association info event
    1652353915.468036 wpa_supplicant[54103]: test1: State: DISCONNECTED -> ASSOCIATED
    1652353915.468043 wpa_supplicant[54103]: test1: Associated to a new BSS: BSSID=01:80:c2:00:00:03
    1652353915.468046 wpa_supplicant[54103]: Add randomness: count=1 entropy=0
    1652353915.468060 wpa_supplicant[54103]: random pool - hexdump(len=128): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    1652353915.468064 wpa_supplicant[54103]: random_mix_pool - hexdump(len=16): 7b eb 7c 62 00 00 00 00 4f 24 07 00 00 00 00 00
    1652353915.468069 wpa_supplicant[54103]: random_mix_pool - hexdump(len=6): 01 80 c2 00 00 03
    1652353915.468080 wpa_supplicant[54103]: random pool - hexdump(len=128): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 ef e4 c9 81 62 8c f3 c3 9b 70 f3 71 81 d5 e6 d4 ba 8d ee 42 41 de e7 ed 78 35 08 39 a4 b8 9d f6 07 4c 49 1d c5 da 21 d9 ad e8 e4 0d 6a 8c 1b a3 54 98 39 03 95 a8 75 ef 52 1d 32 6e f0 29 06 70 83 4f 31 c1 1d 0d 51 cb e4 fb e5 5a 3f 1b 62 52 f6 bb a9 57 61 b2 4d
    1652353915.468084 wpa_supplicant[54103]: test1: Select network based on association information
    1652353915.468087 wpa_supplicant[54103]: test1: Network configuration found for the current AP
    1652353915.468091 wpa_supplicant[54103]: test1: WPA: clearing AP WPA IE
    1652353915.468093 wpa_supplicant[54103]: test1: WPA: clearing AP RSN IE
    1652353915.468096 wpa_supplicant[54103]: test1: WPA: clearing AP RSNXE
    1652353915.468099 wpa_supplicant[54103]: test1: WPA: clearing own WPA/RSN IE
    1652353915.468101 wpa_supplicant[54103]: test1: RSN: clearing own RSNXE
    1652353915.468105 wpa_supplicant[54103]: test1: Failed to get scan results
    1652353915.468108 wpa_supplicant[54103]: EAPOL: External notification - EAP success=0
    1652353915.468110 wpa_supplicant[54103]: EAPOL: External notification - EAP fail=0
    1652353915.468113 wpa_supplicant[54103]: EAPOL: External notification - portControl=Auto
    1652353915.468117 wpa_supplicant[54103]: test1: Associated with 01:80:c2:00:00:03
    1652353915.468120 wpa_supplicant[54103]: test1: WPA: Association event - clear replay counter
    1652353915.468123 wpa_supplicant[54103]: test1: WPA: Clear old PTK
    1652353915.468126 wpa_supplicant[54103]: EAPOL: External notification - portEnabled=0
    1652353915.468129 wpa_supplicant[54103]: EAPOL: External notification - portValid=0
    1652353915.468132 wpa_supplicant[54103]: EAPOL: External notification - portEnabled=1
    1652353915.468134 wpa_supplicant[54103]: EAPOL: SUPP_PAE entering state CONNECTING
    1652353915.468137 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state IDLE
    1652353915.468140 wpa_supplicant[54103]: EAP: EAP entering state INITIALIZE
    1652353915.468142 wpa_supplicant[54103]: EAP: EAP entering state IDLE
    1652353915.468146 wpa_supplicant[54103]: test1: Cancelling scan request
    1652353915.468149 wpa_supplicant[54103]: test1: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    1652353915.473144 wpa_supplicant[54103]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
    1652353916.971729 wpa_supplicant[54103]: l2_packet_receive: src=52:54:00:0f:c7:e2 len=9
    1652353916.971745 wpa_supplicant[54103]: test1: RX EAPOL from 52:54:00:0f:c7:e2
    1652353916.971751 wpa_supplicant[54103]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 d5 00 05 01
    1652353916.971755 wpa_supplicant[54103]: EAPOL: Received EAP-Packet frame
    1652353916.971758 wpa_supplicant[54103]: EAPOL: SUPP_PAE entering state RESTART
    1652353916.971763 wpa_supplicant[54103]: EAP: EAP entering state INITIALIZE
    1652353916.971766 wpa_supplicant[54103]: EAP: EAP entering state IDLE
    1652353916.971769 wpa_supplicant[54103]: EAPOL: SUPP_PAE entering state AUTHENTICATING
    1652353916.971772 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state REQUEST
    1652353916.971775 wpa_supplicant[54103]: EAPOL: getSuppRsp
    1652353916.971778 wpa_supplicant[54103]: EAP: EAP entering state RECEIVED
    1652353916.971789 wpa_supplicant[54103]: EAP: Received EAP-Request id=213 method=1 vendor=0 vendorMethod=0
    1652353916.971792 wpa_supplicant[54103]: EAP: EAP entering state IDENTITY
    1652353916.971795 wpa_supplicant[54103]: test1: CTRL-EVENT-EAP-STARTED EAP authentication started
    1652353916.971798 wpa_supplicant[54103]: EAP: Status notification: started (param=)
    1652353916.971839 wpa_supplicant[54103]: EAP: EAP-Request Identity data - hexdump(len=0):
    1652353916.971845 wpa_supplicant[54103]: EAP: using real identity - hexdump(len=12): 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353916.971848 wpa_supplicant[54103]: EAP: EAP entering state SEND_RESPONSE
    1652353916.971851 wpa_supplicant[54103]: EAP: EAP entering state IDLE
    1652353916.971854 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RESPONSE
    1652353916.971857 wpa_supplicant[54103]: EAPOL: txSuppRsp
    1652353916.971861 wpa_supplicant[54103]: TX EAPOL: dst=01:80:c2:00:00:03
    1652353916.971865 wpa_supplicant[54103]: TX EAPOL - hexdump(len=21): 01 00 00 11 02 d5 00 11 01 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353916.971899 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RECEIVE
    1652353917.464225 wpa_supplicant[54103]: EAPOL: startWhen --> 0
    1652353919.974682 wpa_supplicant[54103]: l2_packet_receive: src=52:54:00:0f:c7:e2 len=9
    1652353919.974719 wpa_supplicant[54103]: test1: RX EAPOL from 52:54:00:0f:c7:e2
    1652353919.974723 wpa_supplicant[54103]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 d5 00 05 01
    1652353919.974738 wpa_supplicant[54103]: EAPOL: Received EAP-Packet frame
    1652353919.974741 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state REQUEST
    1652353919.974744 wpa_supplicant[54103]: EAPOL: getSuppRsp
    1652353919.974747 wpa_supplicant[54103]: EAP: EAP entering state RECEIVED
    1652353919.974758 wpa_supplicant[54103]: EAP: Received EAP-Request id=213 method=1 vendor=0 vendorMethod=0
    1652353919.974760 wpa_supplicant[54103]: EAP: EAP entering state RETRANSMIT
    1652353919.974763 wpa_supplicant[54103]: EAP: EAP entering state SEND_RESPONSE
    1652353919.974766 wpa_supplicant[54103]: EAP: EAP entering state IDLE
    1652353919.974769 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RESPONSE
    1652353919.974771 wpa_supplicant[54103]: EAPOL: txSuppRsp
    1652353919.974787 wpa_supplicant[54103]: TX EAPOL: dst=01:80:c2:00:00:03
    1652353919.974792 wpa_supplicant[54103]: TX EAPOL - hexdump(len=21): 01 00 00 11 02 d5 00 11 01 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353919.974833 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RECEIVE
    1652353925.979997 wpa_supplicant[54103]: l2_packet_receive: src=52:54:00:0f:c7:e2 len=9
    1652353925.980021 wpa_supplicant[54103]: test1: RX EAPOL from 52:54:00:0f:c7:e2
    1652353925.980026 wpa_supplicant[54103]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 d5 00 05 01
    1652353925.980030 wpa_supplicant[54103]: EAPOL: Received EAP-Packet frame
    1652353925.980033 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state REQUEST
    1652353925.980037 wpa_supplicant[54103]: EAPOL: getSuppRsp
    1652353925.980040 wpa_supplicant[54103]: EAP: EAP entering state RECEIVED
    1652353925.980050 wpa_supplicant[54103]: EAP: Received EAP-Request id=213 method=1 vendor=0 vendorMethod=0
    1652353925.980053 wpa_supplicant[54103]: EAP: EAP entering state RETRANSMIT
    1652353925.980056 wpa_supplicant[54103]: EAP: EAP entering state SEND_RESPONSE
    1652353925.980059 wpa_supplicant[54103]: EAP: EAP entering state IDLE
    1652353925.980062 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RESPONSE
    1652353925.980064 wpa_supplicant[54103]: EAPOL: txSuppRsp
    1652353925.980068 wpa_supplicant[54103]: TX EAPOL: dst=01:80:c2:00:00:03
    1652353925.980073 wpa_supplicant[54103]: TX EAPOL - hexdump(len=21): 01 00 00 11 02 d5 00 11 01 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353925.980108 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RECEIVE
    1652353937.991322 wpa_supplicant[54103]: l2_packet_receive: src=52:54:00:0f:c7:e2 len=9
    1652353937.991357 wpa_supplicant[54103]: test1: RX EAPOL from 52:54:00:0f:c7:e2
    1652353937.991362 wpa_supplicant[54103]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 d5 00 05 01
    1652353937.991367 wpa_supplicant[54103]: EAPOL: Received EAP-Packet frame
    1652353937.991369 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state REQUEST
    1652353937.991373 wpa_supplicant[54103]: EAPOL: getSuppRsp
    1652353937.991376 wpa_supplicant[54103]: EAP: EAP entering state RECEIVED
    1652353937.991386 wpa_supplicant[54103]: EAP: Received EAP-Request id=213 method=1 vendor=0 vendorMethod=0
    1652353937.991389 wpa_supplicant[54103]: EAP: EAP entering state RETRANSMIT
    1652353937.991392 wpa_supplicant[54103]: EAP: EAP entering state SEND_RESPONSE
    1652353937.991395 wpa_supplicant[54103]: EAP: EAP entering state IDLE
    1652353937.991397 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RESPONSE
    1652353937.991400 wpa_supplicant[54103]: EAPOL: txSuppRsp
    1652353937.991404 wpa_supplicant[54103]: TX EAPOL: dst=01:80:c2:00:00:03
    1652353937.991408 wpa_supplicant[54103]: TX EAPOL - hexdump(len=21): 01 00 00 11 02 d5 00 11 01 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652353937.991446 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state RECEIVE
    1652353940.620473 wpa_supplicant[54103]: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/0) []
    1652353940.620489 wpa_supplicant[54103]: test1: Cancelling scan request
    1652353940.620497 wpa_supplicant[54103]: test1: Request to deauthenticate - bssid=01:80:c2:00:00:03 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=ASSOCIATED
    1652353940.620502 wpa_supplicant[54103]: test1: Event DEAUTH (11) received
    1652353940.620505 wpa_supplicant[54103]: test1: Deauthentication notification
    1652353940.620521 wpa_supplicant[54103]: test1:  * reason 3 (DEAUTH_LEAVING) locally_generated=1
    1652353940.620525 wpa_supplicant[54103]: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    1652353940.620530 wpa_supplicant[54103]: test1: CTRL-EVENT-DISCONNECTED bssid=01:80:c2:00:00:03 reason=3 locally_generated=1
    1652353940.620534 wpa_supplicant[54103]: test1: Auto connect disabled: do not try to re-connect
    1652353940.620539 wpa_supplicant[54103]: test1: Ignore connection failure indication since interface has been put into disconnected state
    1652353940.620543 wpa_supplicant[54103]: test1: WPA: Clear old PMK and PTK
    1652353940.620591 wpa_supplicant[54103]: test1: State: ASSOCIATED -> DISCONNECTED
    1652353940.620599 wpa_supplicant[54103]: EAPOL: External notification - portEnabled=0
    1652353940.620603 wpa_supplicant[54103]: EAPOL: SUPP_PAE entering state DISCONNECTED
    1652353940.620606 wpa_supplicant[54103]: EAPOL: Supplicant port status: Unauthorized
    1652353940.620609 wpa_supplicant[54103]: EAPOL: SUPP_BE entering state INITIALIZE
    1652353940.620614 wpa_supplicant[54103]: EAP: EAP entering state DISABLED
    1652353940.620629 wpa_supplicant[54103]: EAPOL: External notification - portValid=0
    1652353940.620633 wpa_supplicant[54103]: test1: State: DISCONNECTED -> DISCONNECTED
    1652353940.620637 wpa_supplicant[54103]: EAPOL: External notification - portEnabled=0
    1652353940.620639 wpa_supplicant[54103]: EAPOL: External notification - portValid=0
    1652353940.620643 wpa_supplicant[54103]: QM: Clear all active DSCP policies
    1652353940.620646 wpa_supplicant[54103]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652353940.620692 wpa_supplicant[54103]: dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/0) [o]
    1652353940.620699 wpa_supplicant[54103]: dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/0/Networks/0'
    1652353940.620724 wpa_supplicant[54103]: dbus: fi.w1.wpa_supplicant1.RemoveInterface (/fi/w1/wpa_supplicant1) [o]
    1652353940.620732 wpa_supplicant[54103]: test1: Removing interface test1
    1652353940.620738 wpa_supplicant[54103]: test1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=DISCONNECTED
    1652353940.620742 wpa_supplicant[54103]: test1: State: DISCONNECTED -> DISCONNECTED
    1652353940.620745 wpa_supplicant[54103]: EAPOL: External notification - portEnabled=0
    1652353940.620748 wpa_supplicant[54103]: EAPOL: External notification - portValid=0
    1652353940.620751 wpa_supplicant[54103]: QM: Clear all active DSCP policies
    1652353940.620754 wpa_supplicant[54103]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652353940.626619 wpa_supplicant[54103]: test1: WPA: Clear old PMK and PTK
    1652353940.626628 wpa_supplicant[54103]: test1: Cancelling scan request
    1652353940.626632 wpa_supplicant[54103]: test1: Cancelling authentication timeout
    1652353940.626638 wpa_supplicant[54103]: Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
    1652353940.626646 wpa_supplicant[54103]: Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=0 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
    1652353940.626656 wpa_supplicant[54103]: QM: Clear all active DSCP policies
    1652353940.626659 wpa_supplicant[54103]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652353940.626663 wpa_supplicant[54103]: Remove interface test1 from radio
    1652353940.626666 wpa_supplicant[54103]: Remove radio
    1652353940.633654 wpa_supplicant[54103]: dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/0'
    

    HOSTAPD
    802.1X access control
    RADIUS
    Status After Scenario
    Commands
    NM
    Status After Clean
    Memory use After Clean
    tcpdump "nm-ttls" decoded with tshark
    Running as user "root" and group "root". This could be dangerous.
        1 07:11:56.971647 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
        2 07:11:56.971881 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
        3 07:11:59.974616 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
        4 07:11:59.974805 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
        5 07:12:05.979889 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
        6 07:12:05.980087 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
        7 07:12:17.991240 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
        8 07:12:17.991422 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
    

    tcpdump "wpas-ttls" decoded with tshark
    Running as user "root" and group "root". This could be dangerous.
        1 07:11:54.061580 fa:1b:ec:52:0c:b9 → Nearest      EAPOL 18 Start
        2 07:11:54.061857 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
        3 07:11:54.062004 fa:1b:ec:52:0c:b9 → Nearest      EAP 32 Response, Identity
        4 07:11:54.062604 RealtekU_0f:c7:e2 → Nearest      EAP 24 Request, Tunneled TLS EAP (EAP-TTLS)
        5 07:11:54.062988 fa:1b:ec:52:0c:b9 → Nearest      TLSv1 250 Client Hello
        6 07:11:54.064864 RealtekU_0f:c7:e2 → Nearest      EAP 1022 Request, Tunneled TLS EAP (EAP-TTLS)
        7 07:11:54.064993 fa:1b:ec:52:0c:b9 → Nearest      EAP 24 Response, Tunneled TLS EAP (EAP-TTLS)
        8 07:11:54.065370 RealtekU_0f:c7:e2 → Nearest      EAP 1022 Request, Tunneled TLS EAP (EAP-TTLS)
        9 07:11:54.065488 fa:1b:ec:52:0c:b9 → Nearest      EAP 24 Response, Tunneled TLS EAP (EAP-TTLS)
       10 07:11:54.066044 RealtekU_0f:c7:e2 → Nearest      TLSv1.2 739 Server Hello, Certificate, Server Key Exchange, Server Hello Done
       11 07:11:54.067467 fa:1b:ec:52:0c:b9 → Nearest      TLSv1.2 150 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
       12 07:11:54.068051 RealtekU_0f:c7:e2 → Nearest      TLSv1.2 79 Change Cipher Spec, Encrypted Handshake Message
       13 07:11:54.068306 fa:1b:ec:52:0c:b9 → Nearest      TLSv1.2 97 Application Data
       14 07:11:54.068879 RealtekU_0f:c7:e2 → Nearest      EAP 22 Success
       15 07:11:56.971648 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
       16 07:11:56.971882 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
       17 07:11:59.974617 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
       18 07:11:59.974806 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
       19 07:12:05.979891 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
       20 07:12:05.980088 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity
       21 07:12:17.991241 RealtekU_0f:c7:e2 → Nearest      EAP 23 Request, Identity
       22 07:12:17.991423 fa:1b:ec:52:0c:b9 → Nearest      EAP 35 Response, Identity