Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Initializing interface 'wlan1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
- Priority group 0
- id=0 ssid='dom.ru wi-fi'
- Initializing interface (2) 'wlan1'
- Interface wlan1 set UP - waiting a second for the driver to complete initialization
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0xf flags 0x0
- WEXT: Operstate: linkmode=1, operstate=5
- Own MAC address: 00:e0:4c:04:bf:44
- wpa_driver_wext_set_wpa
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- wpa_driver_wext_set_drop_unencrypted
- RSN: flushing PMKID list in the driver
- Setting scan request: 0 sec 100000 usec
- WPS: UUID based on MAC address - hexdump(len=16): df 3f b3 de aa fe 5c b8 92 49 fa 49 86 eb 7b 33
- WPS: Build Beacon and Probe Response IEs
- WPS: * Version
- WPS: * Wi-Fi Protected Setup State (0)
- WPS: * Version
- WPS: * Wi-Fi Protected Setup State (0)
- WPS: * Response Type (2)
- WPS: * UUID-E
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Serial Number
- WPS: * Primary Device Type
- WPS: * Device Name
- WPS: * Config Methods (0)
- WPS: * RF Bands (3)
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- Added interface wlan1
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=40
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Trying to get current scan results first without requesting a new scan to speed up initial association
- Received 217 bytes of scan results (1 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No suitable AP found.
- Setting scan request: 0 sec 0 usec
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- EAPOL: disable timer tick
- Scan timeout - try to get results
- Received 482 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 1c:af:f7:8d:83:fc into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RX EAPOL from 1c:af:f7:8d:83:fc
- Not associated - Delay processing of received EAPOL frame
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 1c:af:f7:8d:83:fc
- State: DISCONNECTED -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
- No keys have been configured - skip key clearing
- Associated with 1c:af:f7:8d:83:fc
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- Process pending EAPOL frame that was received just before association notification
- RX EAPOL from 1c:af:f7:8d:83:fc
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4d
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 17 85 b7 a3 37 34 63 62 41 ee 52 11 38 22 a5 fd 32 49 bd da f2 b9 07 51 2a 52 8e ca 83 39 80 75
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=199
- EAPOL-Key type=2
- key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- key_length=16 key_data_length=104
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4d
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): b6 57 36 9b 04 d2 c9 b7 82 5e 33 cd 31 2f e8 2c
- WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
- WPA: Could not verify EAPOL-Key MIC - dropping packet
- RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=199
- EAPOL-Key type=2
- key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- key_length=16 key_data_length=104
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4d
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 22 eb fc 28 d7 ca 57 4d 8a d6 81 47 f9 ba 01 c5
- WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
- WPA: Could not verify EAPOL-Key MIC - dropping packet
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- WPA: 4-Way Handshake failed - pre-shared key may be incorrect
- Setting scan request: 0 sec 100000 usec
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: SCANNING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 3
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Authentication with 00:00:00:00:00:00 timed out.
- BSSID 00:00:00:00:00:00 blacklist count incremented to 4
- No keys have been configured - skip key clearing
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- Scan timeout - try to get results
- Received 483 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 1c:af:f7:8d:83:fc into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RX EAPOL from 1c:af:f7:8d:83:fc
- Not associated - Delay processing of received EAPOL frame
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 1c:af:f7:8d:83:fc
- State: DISCONNECTED -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
- No keys have been configured - skip key clearing
- Associated with 1c:af:f7:8d:83:fc
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- Process pending EAPOL frame that was received just before association notification
- RX EAPOL from 1c:af:f7:8d:83:fc
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4e
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 7a 21 98 65 63 11 b3 b5 40 3d d4 54 33 d6 9c ff d6 3c 20 b2 28 7d 7e cd f0 99 a9 64 ea 3a 9b c1
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- WPA: 4-Way Handshake failed - pre-shared key may be incorrect
- Setting scan request: 0 sec 100000 usec
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Scan timeout - try to get results
- Received 482 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 1c:af:f7:8d:83:fc into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 1c:af:f7:8d:83:fc
- State: DISCONNECTED -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
- No keys have been configured - skip key clearing
- Associated with 1c:af:f7:8d:83:fc
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Setting scan request: 0 sec 100000 usec
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 1c:af:f7:8d:83:fc
- State: DISCONNECTED -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
- No keys have been configured - skip key clearing
- Associated with 1c:af:f7:8d:83:fc
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RX EAPOL from 1c:af:f7:8d:83:fc
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 79
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 2b 3e 69 34 0b 8e 68 ad 89 f3 a5 79 90 01 0f e7 b2 7e 8d 8e a9 85 4f e5 1b 0b 27 64 36 62 59 2b
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7a
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7b
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7c
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7d
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7e
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7f
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 80
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 81
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 11
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 82
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 83
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 13
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 84
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 14
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 85
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- WPA: 4-Way Handshake failed - pre-shared key may be incorrect
- Setting scan request: 0 sec 100000 usec
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 3
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 1c:af:f7:8d:83:fc
- State: SCANNING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
- No keys have been configured - skip key clearing
- Associated with 1c:af:f7:8d:83:fc
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RX EAPOL from 1c:af:f7:8d:83:fc
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8a
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 9c 5c f7 b7 d1 2f bd e5 e8 28 4a ca fa d1 a3 74 5b 33 08 fe 9e 9f 7a 3f 81 d4 65 b3 e3 19 7a d8
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8b
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8c
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8d
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8e
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 92
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 93
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 94
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 95
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 11
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 96
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 97
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- WPA: 4-Way Handshake failed - pre-shared key may be incorrect
- Setting scan request: 0 sec 100000 usec
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 4
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- Scan timeout - try to get results
- Received 483 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 1c:af:f7:8d:83:fc into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 3
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Authentication with 00:00:00:00:00:00 timed out.
- BSSID 00:00:00:00:00:00 blacklist count incremented to 4
- No keys have been configured - skip key clearing
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 1c:af:f7:8d:83:fc
- State: SCANNING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
- No keys have been configured - skip key clearing
- Select network based on association information
- Network configuration found for the current AP
- WPA: Using WPA IE from AssocReq to set cipher suites
- WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
- WPA: clearing AP WPA IE
- WPA: clearing AP RSN IE
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- Associated with 1c:af:f7:8d:83:fc
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RX EAPOL from 1c:af:f7:8d:83:fc
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de a4
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 03 1c 8d 7f c7 98 59 7e 23 bc 63 b8 7c 32 44 51 19 a6 c3 7c 0e ba 1c 03 c3 60 17 87 be a4 0d 08
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de a5
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de a9
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de aa
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ab
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ac
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ad
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ae
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de af
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b0
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b1
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b2
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RX EAPOL from 1c:af:f7:8d:83:fc
- IEEE 802.1X RX: version=2 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 13
- key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b4
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- WPA: 4-Way Handshake failed - pre-shared key may be incorrect
- Setting scan request: 0 sec 100000 usec
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RX EAPOL from 1c:af:f7:8d:83:fc
- Not associated - Delay processing of received EAPOL frame
- RX EAPOL from 1c:af:f7:8d:83:fc
- Not associated - Delay processing of received EAPOL frame
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RX EAPOL from 1c:af:f7:8d:83:fc
- Not associated - Delay processing of received EAPOL frame
- RX EAPOL from 1c:af:f7:8d:83:fc
- Not associated - Delay processing of received EAPOL frame
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 5
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: SCANNING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 6
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Scan timeout - try to get results
- Received 483 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: DISCONNECTED -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 1c:af:f7:8d:83:fc into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Authentication with 00:00:00:00:00:00 timed out.
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- No keys have been configured - skip key clearing
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 3
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: SCANNING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 4
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Scan timeout - try to get results
- Received 483 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: DISCONNECTED -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 5
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Authentication with 00:00:00:00:00:00 timed out.
- BSSID 00:00:00:00:00:00 blacklist count incremented to 6
- No keys have been configured - skip key clearing
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 7
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: SCANNING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 8
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- Scan timeout - try to get results
- Received 483 bytes of scan results (2 BSSes)
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- Try to find non-WPA AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- skip - blacklisted
- 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
- Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: DISCONNECTED -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 1c:af:f7:8d:83:fc into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- CTRL-EVENT-TERMINATING - signal 2 received
- Removing interface wlan1
- No keys have been configured - skip key clearing
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- wpa_driver_wext_set_wpa
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_countermeasures
- No keys have been configured - skip key clearing
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
- Cancelling scan request
- Cancelling authentication timeout
- WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement