Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v2.4
- random: Trying to read entropy from /dev/random
- Successfully initialized wpa_supplicant
- Initializing interface 'wlp4s0' conf '/etc/wpa_supplicant/illinoisnet.conf' driver 'nl80211' ctrl_interface '/var/run/wpa_supplicant/' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant/illinoisnet.conf' -> '/etc/wpa_supplicant/illinoisnet.conf'
- Reading configuration file '/etc/wpa_supplicant/illinoisnet.conf'
- ctrl_interface='/var/run/wpa_supplicant'
- Line: 2 - start of a new network block
- ssid - hexdump_ascii(len=11):
- 49 6c 6c 69 6e 6f 69 73 4e 65 74 IllinoisNet
- proto: 0x2
- key_mgmt: 0x1
- pairwise: 0x10
- eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
- identity - hexdump_ascii(len=):
- REMOVED
- password - hexdump_ascii(len=): [REMOVED]
- Priority group 0
- id=0 ssid='IllinoisNet'
- rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
- nl80211: Supported cipher 00-0f-ac:4
- nl80211: Supported cipher 00-0f-ac:2
- nl80211: Supported cipher 00-0f-ac:1
- nl80211: Supported cipher 00-0f-ac:5
- nl80211: Supported cipher 00-0f-ac:6
- nl80211: Supported cipher 00-14-72:1
- nl80211: Using driver-based off-channel TX
- nl80211: Use separate P2P group interface (driver advertised support)
- nl80211: use P2P_DEVICE support
- nl80211: interface wlp4s0 in phy phy0
- nl80211: Set mode ifindex 4 iftype 2 (STATION)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1783890
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0505
- netlink: Operstate: ifindex=4 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
- nl80211: driver param='(null)'
- Add interface wlp4s0 to a new radio phy0
- nl80211: Regulatory information - country=00
- nl80211: 2402-2472 @ 40 MHz 20 mBm
- nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
- nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
- nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
- nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
- nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
- nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
- nl80211: 57240-63720 @ 2160 MHz 0 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- wlp4s0: Own MAC address: 60:57:18:69:6d:6f
- wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wlp4s0: RSN: flushing PMKID list in the driver
- nl80211: Flush PMKIDs
- ENGINE: Loading dynamic engine
- ENGINE: Loading dynamic engine
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- wlp4s0: Added interface wlp4s0
- wlp4s0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- random: Got 20/20 bytes from /dev/random
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- wlp4s0: Starting delayed sched scan
- wlp4s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
- wlp4s0: Setting scan request: 0.000000 sec
- wlp4s0: State: DISCONNECTED -> SCANNING
- wlp4s0: Starting AP scan for wildcard SSID
- wlp4s0: Add radio work 'scan'@0x179f9c0
- wlp4s0: First radio work item in the queue - schedule start immediately
- wlp4s0: Starting radio work 'scan'@0x179f9c0 after 0.000007 second wait
- wlp4s0: nl80211: scan request
- nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
- Scan requested (ret=0) - scan timeout 10 seconds
- nl80211: Event message available
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp4s0
- wlp4s0: nl80211: Scan trigger
- wlp4s0: Event SCAN_STARTED (47) received
- wlp4s0: Own scan request started a scan in 0.000033 seconds
- EAPOL: disable timer tick
- nl80211: Event message available
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp4s0
- wlp4s0: nl80211: New scan results available
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
- wlp4s0: Event SCAN_RESULTS (3) received
- wlp4s0: Scan completed in 3.752736 seconds
- nl80211: Received scan results (9 BSSes)
- wlp4s0: BSS: Start scan result update 1
- wlp4s0: BSS: Add new id 0 BSSID 00:0c:e6:9a:1b:81 SSID 'eduroam'
- wlp4s0: BSS: Add new id 1 BSSID 00:0c:e6:9a:26:bb SSID 'IllinoisNet'
- wlp4s0: BSS: Add new id 2 BSSID 00:0c:e6:9a:97:66 SSID 'IllinoisNet'
- wlp4s0: BSS: Add new id 3 BSSID 00:0c:e6:9a:dc:46 SSID 'eduroam'
- wlp4s0: BSS: Add new id 4 BSSID 02:1a:11:f3:bb:0b SSID 'KR'
- wlp4s0: BSS: Add new id 5 BSSID 00:0c:e6:9a:56:be SSID 'UIpublicWiFi'
- wlp4s0: BSS: Add new id 6 BSSID 00:0c:e6:9a:ac:d5 SSID 'UIUCnet'
- wlp4s0: BSS: Add new id 7 BSSID 00:0c:e6:9a:47:60 SSID 'UIUCnet'
- wlp4s0: BSS: Add new id 8 BSSID 00:0c:e6:9a:6c:32 SSID 'UIpublicWiFi'
- BSS: last_scan_res_used=9/32
- wlp4s0: New scan results available (own=1 ext=0)
- wlp4s0: Radio work 'scan'@0x179f9c0 done in 3.753820 seconds
- wlp4s0: Selecting BSS from priority group 0
- wlp4s0: 0: 00:0c:e6:9a:1b:81 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x911 level=-48
- wlp4s0: skip - SSID mismatch
- wlp4s0: 1: 00:0c:e6:9a:26:bb ssid='IllinoisNet' wpa_ie_len=0 rsn_ie_len=20 caps=0x911 level=-48
- wlp4s0: selected based on RSN IE
- wlp4s0: selected BSS 00:0c:e6:9a:26:bb ssid='IllinoisNet'
- wlp4s0: Considering connect request: reassociate: 0 selected: 00:0c:e6:9a:26:bb bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1783a40 current_ssid=(nil)
- wlp4s0: Request association with 00:0c:e6:9a:26:bb
- wlp4s0: Add radio work 'sme-connect'@0x179f9c0
- wlp4s0: First radio work item in the queue - schedule start immediately
- wlp4s0: Starting radio work 'sme-connect'@0x179f9c0 after 0.000011 second wait
- wlp4s0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 00:0c:e6:9a:26:bb
- RSN: No PMKSA cache entry found
- wlp4s0: RSN: using IEEE 802.11i/D9.0
- wlp4s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlp4s0: WPA: Selected mgmt group cipher 32
- wlp4s0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 0d 00
- wlp4s0: WPA: using GTK CCMP
- wlp4s0: WPA: using PTK CCMP
- wlp4s0: WPA: using KEY_MGMT 802.1X
- wlp4s0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- RRM: Determining whether RRM can be used - device support: 0x0
- RRM: No RRM in network
- wlp4s0: Cancelling scan request
- wlp4s0: SME: Trying to authenticate with 00:0c:e6:9a:26:bb (SSID='IllinoisNet' freq=5180 MHz)
- wlp4s0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- nl80211: Authenticate (ifindex=4)
- * bssid=00:0c:e6:9a:26:bb
- * freq=5180
- * SSID - hexdump_ascii(len=11):
- 49 6c 6c 69 6e 6f 69 73 4e 65 74 IllinoisNet
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Event message available
- nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp4s0
- nl80211: New station 00:0c:e6:9a:26:bb
- nl80211: Event message available
- nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp4s0
- nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp4s0(60:57:18:69:6d:6f) A1=60:57:18:69:6d:6f A2=00:0c:e6:9a:26:bb
- nl80211: MLME event frame - hexdump(len=30): b0 00 3c 00 60 57 18 69 6d 6f 00 0c e6 9a 26 bb 00 0c e6 9a 26 bb a0 b0 00 00 02 00 00 00
- nl80211: Authenticate event
- wlp4s0: Event AUTH (11) received
- wlp4s0: SME: Authentication response: peer=00:0c:e6:9a:26:bb auth_type=0 auth_transaction=2 status_code=0
- SME: Authentication response IEs - hexdump(len=0): [NULL]
- wlp4s0: Trying to associate with 00:0c:e6:9a:26:bb (SSID='IllinoisNet' freq=5180 MHz)
- wlp4s0: State: AUTHENTICATING -> ASSOCIATING
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=4)
- * bssid=00:0c:e6:9a:26:bb
- * freq=5180
- * SSID - hexdump_ascii(len=11):
- 49 6c 6c 69 6e 6f 69 73 4e 65 74 IllinoisNet
- * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 01 00 00 40
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac01
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp4s0
- nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp4s0(60:57:18:69:6d:6f) A1=60:57:18:69:6d:6f A2=00:0c:e6:9a:26:bb
- nl80211: MLME event frame - hexdump(len=149): 10 00 3c 00 60 57 18 69 6d 6f 00 0c e6 9a 26 bb 00 0c e6 9a 26 bb b0 b0 11 00 00 00 48 c1 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 bf 0c 32 40 82 0f ea ff 00 00 ea ff 00 00 c0 05 00 26 00 ea ff dd 18 00 50 f2 02 01 01 80 00 03 53 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- nl80211: Associate event
- wlp4s0: Event ASSOC (0) received
- wlp4s0: Association info event
- resp_ies - hexdump(len=119): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 bf 0c 32 40 82 0f ea ff 00 00 ea ff 00 00 c0 05 00 26 00 ea ff dd 18 00 50 f2 02 01 01 80 00 03 53 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlp4s0: freq=5180 MHz
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlp4s0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlp4s0: Associated to a new BSS: BSSID=00:0c:e6:9a:26:bb
- wlp4s0: Associated with 00:0c:e6:9a:26:bb
- wlp4s0: WPA: Association event - clear replay counter
- wlp4s0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- wlp4s0: Setting authentication timeout: 10 sec 0 usec
- wlp4s0: Cancelling scan request
- WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
- WMM AC: U-APSD queues=0x0
- WMM AC: Valid WMM association, WMM AC is enabled
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Event message available
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp4s0
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp4s0
- nl80211: Regulatory domain change
- * initiator=3
- * type=0
- * alpha2=US
- wlp4s0: Event CHANNEL_LIST_CHANGED (28) received
- wlp4s0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
- nl80211: Regulatory information - country=US
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 17 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=14
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=14): 01 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
- wlp4s0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlp4s0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: Status notification: started (param=)
- EAP: EAP-Request Identity data - hexdump_ascii(len=5):
- 68 65 6c 6c 6f hello
- EAP: using real identity - hexdump_ascii(len=):
- REMOVED
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=17): 01 00 00 0d 02 01 00 0d 01 7a 65 73 74 72 61 64 32
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=10
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=10): 01 00 00 06 01 02 00 06 15 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 21
- EAP: vendor 0 method 21 not allowed
- wlp4s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 -> NAK
- EAP: Status notification: refuse proposed method (param=TTLS)
- EAP: Building EAP-Nak (requested type 21 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 19
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=10
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=10): 01 00 00 06 01 03 00 06 19 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlp4s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=112): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 2e 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 33 00 00 00 00 00 00 00 31 00 00 00 00 00 00 00 35 00 00 00
- TLS: using phase1 config options
- wlp4s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-PEAP: Start (server ver=0, own ver=1)
- EAP-PEAP: Using PEAP version 0
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- OpenSSL: TX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=144): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv2/v3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv2/v3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 149 bytes pending from ssl_out
- SSL: 149 bytes left to be sent out (of total 149 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17a9da0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=163): 01 00 00 9f 02 03 00 9f 19 80 00 00 00 95 16 03 01 00 90 01 00 00 8c 03 03 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 00 00 44 00 a3 00 9f 00 6b 00 6a 00 39 00 38 00 88 00 87 00 9d 00 3d 00 35 00 84 00 a2 00 9e 00 67 00 40 00 33 00 32 00 9a 00 99 00 45 00 44 00 9c 00 3c 00 2f 00 96 00 41 00 07 00 05 00 04 00 16 00 13 00 0a 00 ff 01 00 00 1f 00 0d 00 16 00 14 06 01 06 02 05 01 05 02 04 01 04 02 03 01 03 02 02 01 02 02 00 0f 00 01 01
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=1014
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=1014): 01 00 03 f2 01 04 03 f2 19 c0 00 00 0a 79 16 03 03 00 56 02 00 00 52 03 03 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5 20 fe 61 92 9b 7c b6 83 cb ef 0d 95 d5 07 96 70 f7 6e e8 df f2 00 05 c9 01 5e cf d0 56 35 17 08 1a 00 9d 00 00 0a ff 01 00 01 00 00 0f 00 01 01 16 03 03 0a 10 0b 00 0a 0c 00 0a 09 00 05 3c 30 82 05 38 30 82 04 20 a0 03 02 01 02 02 10 00 f1 9b 77 62 f0 cd 64 c7 d7 b3 36 fc 38 05 a6 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 51 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 12 30 10 06 03 55 04 0a 13 09 49 6e 74 65 72 6e 65 74 32 31 11 30 0f 06 03 55 04 0b 13 08 49 6e 43 6f 6d 6d 6f 6e 31 1b 30 19 06 03 55 04 03 13 12 49 6e 43 6f 6d 6d 6f 6e 20 53 65 72 76 65 72 20 43 41 30 1e 17 0d 31 34 30 34 31 30 30 30 30 30 30 30 5a 17 0d 31 37 30 34 30 39 32 33 35 39 35 39 5a 30 81 9e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0e 30 0c 06 03 55 04 11 13 05 36 31 38 30 31 31 0b 30 09 06 03 55 04 08 13 02 49 4c 31 0f 30 0d 06 03 55 04 07 13 06 55 72 62 61 6e 61 31 1f 30 1d 06 03 55 04 0a 13 16 55 6e 69 76 65 72 73 69 74 79 20 6f 66 20 49 6c 6c 69 6e 6f 69 73 31 20 30 1e 06 03 55 04 0b 13 17 55 72 62 61 6e 61 2d 43 68 61 6d 70 61 69 67 6e 20 43 61 6d 70 75 73 31 1e 30 1c 06 03 55 04 03 13 15 77 69 72 65 6c 65 73 73 2e 69 6c 6c 69 6e 6f 69 73 2e 65 64 75 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 af 04 86 5c 3a dc a5 41 c5 31 2f 3d 43 11 5e 71 01 70 96 fc c8 b0 16 8b 68 16 d1 8a dc 91 d8 5d 0a 30 06 fa f9 0c 6d d2 40 41 cd 7c ea c4 d9 d3 9f ff 18 ae a1 e6 16 6e d3 08 34 98 4b f4 92 af d2 60 7e 18 c5 be b6 14 d1 3c 9d 14 5e 51 85 de dc 14 3d e7 81 82 bf ce 34 fc aa 4d 92 af 17 8d 0a 45 b5 a3 5e 93 01 7b f6 ff b8 b4 35 6e 25 fc 1b e2 67 a5 a8 b3 26 f4 c6 82 6e 1f 0d 4e 66 72 1b ba 6d 2a 1f 13 9a 4f 30 16 a9 3b 8a bf 8e 58 c1 cd c0 b6 f8 57 e4 cd bf a2 da f2 e3 24 4e 91 04 c3 f3 20 ff 3f 00 04 43 cb 5d 7b a9 42 2a 67 ae 0e e9 f8 a7 e8 db d6 22 42 77 37 66 24 d7 fd ca 4b 40 73 f8 dc 4e 5b f9 c9 dd c0 e1 22 22 02 90 dd 68 e8 c5 df 17 0d 7a a4 3a c6 0f 82 a5 f4 66 86 b6 d2 b8 38 69 88 72 2c 55 ee 5a c8 56 06 f1 48 42 2e 86 22 c8 2f 1a f8 1f e9 42 b3 10 b9 02 03 01 00 01 a3 82 01 bc 30 82 01 b8 30 1f 06 03 55 1d 23 04 18 30 16 80 14 48 4f 5a fa 2f 4a 9a 5e e0 50 f3 6b 7b 55 a5 de f5 be 34 5d 30 1d 06 03 55 1d 0e 04 16 04 14 58 41 65 ea c3 8c 99 e3 7c 68 e6 1d 3d 36 31 2c 8d 69 08 de 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 67 06 03 55 1d 20 04 60 30 5e 30 52 06 0c 2b 06 01 04 01 ae 23 01 04 03 01 01 30 42 30 40 06 08 2b 06 01 05 05 07 02 01 16 34 68 74 74 70 73 3a 2f 2f 77 77 77 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 63 65 72 74 2f 72 65 70 6f 73 69 74 6f 72 79 2f 63 70 73 5f 73 73 6c 2e 70 64 66 30 08 06 06 67 81 0c 01 02 02 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1010) - Flags 0xc0
- SSL: TLS Message Length: 2681
- SSL: Need 1681 bytes more input data
- SSL: Building ACK (type=25 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1785ff0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=1010
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=1010): 01 00 03 ee 01 05 03 ee 19 40 72 67 2f 49 6e 43 6f 6d 6d 6f 6e 53 65 72 76 65 72 43 41 2e 63 72 6c 30 6f 06 08 2b 06 01 05 05 07 01 01 04 63 30 61 30 39 06 08 2b 06 01 05 05 07 30 02 86 2d 68 74 74 70 3a 2f 2f 63 65 72 74 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 49 6e 43 6f 6d 6d 6f 6e 53 65 72 76 65 72 43 41 2e 63 72 74 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 30 20 06 03 55 1d 11 04 19 30 17 82 15 77 69 72 65 6c 65 73 73 2e 69 6c 6c 69 6e 6f 69 73 2e 65 64 75 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 02 1d 68 39 ee a5 ae 69 87 8d 93 8e f5 fb 55 69 9e bc 1b 45 2d e7 e0 ed 83 83 7a 84 fd 66 b4 89 f5 84 53 d8 f9 3e b2 51 26 ea 5a 20 84 ea fe f9 21 14 fe 1c 40 0c f8 c7 50 47 56 9d 76 16 2b 5f 13 44 42 58 75 4d 9f a7 f5 0e a7 3f f6 ad dd 2b db 54 fd 4d 0e be 43 64 62 af d9 8e a7 7f 76 77 8d ba a3 40 d3 fb ae 4a 7c 4a 18 20 61 b3 8f 06 77 a8 ae f9 78 b5 39 42 30 74 77 4f b3 27 b0 9f 97 a7 de 9e 52 bc d1 cf 41 ec 26 5f 36 7d 0b 05 4d a3 be 6c 07 60 98 fb ed 38 2d ee 87 5b 73 52 48 50 fa b5 20 79 88 4e 5c b0 61 91 0b 1f ff 8f 8e 3e dc cb e7 b8 f5 08 bf 6a 07 7a 85 fc 46 22 6b 07 d5 17 dd fd 7c b4 be 00 16 b2 a5 5a 4c 20 a5 d0 40 e2 7e fe 48 97 65 99 97 3d 1e 87 56 6c 7f 4e dd 39 8f a0 a9 45 49 fe c3 3c 4f 74 f7 79 79 c8 34 30 90 f6 b7 40 ec da 16 f5 4e 1b a5 b6 00 04 c7 30 82 04 c3 30 82 03 ab a0 03 02 01 02 02 10 7f 71 c1 d3 a2 26 b0 d2 b1 13 f3 e6 81 67 64 3e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 30 1e 17 0d 31 30 31 32 30 37 30 30 30 30 30 30 5a 17 0d 32 30 30 35 33 30 31 30 34 38 33 38 5a 30 51 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 12 30 10 06 03 55 04 0a 13 09 49 6e 74 65 72 6e 65 74 32 31 11 30 0f 06 03 55 04 0b 13 08 49 6e 43 6f 6d 6d 6f 6e 31 1b 30 19 06 03 55 04 03 13 12 49 6e 43 6f 6d 6d 6f 6e 20 53 65 72 76 65 72 20 43 41 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 97 7c c7 c8 fe b3 e9 20 6a a3 a4 4f 8e 8e 34 56 06 b3 7a 6c aa 10 9b 48 61 2b 36 90 69 e3 34 0a 47 a7 bb 7b de aa 6a fb eb 82 95 8f ca 1d 7f af 75 a6 a8 4c da 20 67 61 1a 0d 86 c1 ca c1 87 af ac 4e e4 de 62 1b 2f 9d b1 98 af c6 01 fb 17 70 db ac 14 59 ec 6f 3f 33 7f a6 98 0b e4 e2 38 af f5 7f 85 6d 0e 74 04 9d f6 27 86 c7 9b 8f e7 71 2a 08 f4 03 02 40 63 24 7d 40 57 8f 54 e0 54 7e b6 13 48 61 f1 de ce 0e bd b6 fa 4d 98 b2 d9 0d 8d 79 a6 e0 aa cd 0c 91 9a a5 df ab 73 bb ca 14 78 5c 47 29 a1 ca c5 ba 9f c7 da 60 f7 ff e7 7f f2 d9 da a1 2d 0f 49 16 a7 d3 00 92 cf 8a 47 d9 4d f8 d5 95 66 d3 74 f9 80 63 00 4f 4c 84 16 1f b3 f5 24 1f a1 4e de e8 95 d6 b2 0b 09 8b 2c 6b c7 5c 2f 8c 63 c9 99 cb 52 b1 62 7b 73 01 62 7f 63 6c d8 68
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1006) - Flags 0x40
- SSL: Need 681 bytes more input data
- SSL: Building ACK (type=25 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1784d00
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=691
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=691): 01 00 02 af 01 06 02 af 19 00 a0 ee 6a a8 8d 1f 29 f3 d0 18 ac ad 02 03 01 00 01 a3 82 01 77 30 82 01 73 30 1f 06 03 55 1d 23 04 18 30 16 80 14 ad bd 98 7a 34 b4 26 f7 fa c4 26 54 ef 03 bd e0 24 cb 54 1a 30 1d 06 03 55 1d 0e 04 16 04 14 48 4f 5a fa 2f 4a 9a 5e e0 50 f3 6b 7b 55 a5 de f5 be 34 5d 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 11 06 03 55 1d 20 04 0a 30 08 30 06 06 04 55 1d 20 00 30 44 06 03 55 1d 1f 04 3d 30 3b 30 39 a0 37 a0 35 86 33 68 74 74 70 3a 2f 2f 63 72 6c 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 63 72 6c 30 81 b3 06 08 2b 06 01 05 05 07 01 01 04 81 a6 30 81 a3 30 3f 06 08 2b 06 01 05 05 07 30 02 86 33 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 70 37 63 30 39 06 08 2b 06 01 05 05 07 30 02 86 2d 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 55 54 4e 53 47 43 43 41 2e 63 72 74 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 93 66 21 80 74 45 85 4b c2 ab ce 32 b0 29 fe dd df d6 24 5b bf 03 6a 6f 50 3e 0e 1b b3 0d 88 a3 5b ee c4 a4 12 3b 56 ef 06 7f cf 7f 21 95 56 3b 41 31 fe e1 aa 93 d2 95 f3 95 0d 3c 47 ab ca 5c 26 ad 3e f1 f9 8c 34 6e 11 be f4 67 e3 02 49 f9 a6 7c 7b 64 25 dd 17 46 f2 50 e3 e3 0a 21 3a 49 24 cd c6 84 65 68 67 68 b0 45 2d 47 99 cd 9c ab 86 29 11 72 dc d6 9c 36 43 74 f3 d4 97 9e 56 a0 fe 5f 40 58 d2 d5 d7 7e 7c c5 8e 1a b2 04 5c 92 66 0e 85 ad 2e 06 ce c8 a3 d8 eb 14 27 91 de cf 17 30 81 53 b6 66 12 ad 37 e4 f5 ef 96 5c 20 0e 36 e9 ac 62 7d 19 81 8a f5 90 61 a6 49 ab ce 3c df e6 ca 64 ee 82 65 39 45 95 16 ba 41 06 00 98 ba 0c 56 61 e4 c6 c6 86 01 cf 66 a9 22 29 02 d6 3d cf c4 2a 8d 99 de fb 09 14 9e 0e d1 d5 c6 d7 81 dd ad 24 ab ac 07 05 e2 1d 68 c3 70 66 5f d3 16 03 03 00 04 0e 00 00 00
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=687) - Flags 0x00
- OpenSSL: RX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=86): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server hello A
- OpenSSL: RX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=2576): [REMOVED]
- TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=1 buf='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA'
- wlp4s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA' hash=623727ec472644a6bb70d240565c24223fdb0f2f5ac698027e3012489c70e817
- EAP: Status notification: remote certificate verification (param=success)
- TLS: tls_verify_cb - preverify_ok=1 err=27 (certificate not trusted) ca_cert_verify=0 depth=1 buf='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA'
- wlp4s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA' hash=623727ec472644a6bb70d240565c24223fdb0f2f5ac698027e3012489c70e817
- EAP: Status notification: remote certificate verification (param=success)
- TLS: tls_verify_cb - preverify_ok=1 err=27 (certificate not trusted) ca_cert_verify=0 depth=0 buf='/C=US/postalCode=61801/ST=IL/L=Urbana/O=University of Illinois/OU=Urbana-Champaign Campus/CN=wireless.illinois.edu'
- wlp4s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=US/postalCode=61801/ST=IL/L=Urbana/O=University of Illinois/OU=Urbana-Champaign Campus/CN=wireless.illinois.edu' hash=8e7e51e42fa59c0bc0c2893b5098492b9007d189d7556ceca63df12e988f5713
- wlp4s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:wireless.illinois.edu
- EAP: Status notification: remote certificate verification (param=success)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server certificate A
- OpenSSL: RX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=4): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read server done A
- OpenSSL: TX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=262): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client key exchange A
- OpenSSL: TX ver=0x303 content_type=20
- OpenSSL: Message - hexdump(len=1): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write change cipher spec A
- OpenSSL: TX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=16): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write finished A
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 flush data
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read finished A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read finished A
- SSL: SSL_connect - want more data
- SSL: 318 bytes pending from ssl_out
- SSL: 318 bytes left to be sent out (of total 318 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17b9910
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=332): 01 00 01 48 02 06 01 48 19 80 00 00 01 3e 16 03 03 01 06 10 00 01 02 01 00 7c 49 59 4c af 25 1b d3 25 b8 b4 bc 5d 77 5c c7 78 e4 cd d0 5b 78 23 7d e1 b5 af 80 87 29 bb 23 c3 25 eb 59 19 41 52 bc 6d 0a 34 33 3f 32 88 5a 71 48 2c fe c2 ff 1f 8b 91 db 04 67 fc 57 6c ba aa 48 71 78 db 40 84 4b db 25 84 43 53 33 2b ff ea 52 ee e4 6c c8 6a 42 7f 0b 27 d3 ad 54 97 1a bb 98 53 0f 76 b9 93 f8 0d 37 bf 91 e1 11 91 ed 83 e9 92 00 49 c2 4b f0 4c 83 bd 39 ca 54 0d f2 00 06 ef b3 e8 b3 7e 27 57 02 7a df e2 71 31 9d 37 71 dc 78 0f ff a0 00 1f 16 0c 9b 17 82 91 40 57 5c 67 86 58 63 36 a4 f5 ed b0 3f 65 80 2d 3e c2 42 37 d0 13 31 21 91 b6 e3 f2 30 ed e5 18 1b 7c 21 96 66 b4 7c ca 21 6d 82 e5 a6 d1 0c 0a 36 68 6a 29 36 dd d4 58 25 2b 1e 55 bc da 7c fe e0 e9 2b 1c 81 dc 4a 6f 7d 05 b2 09 d1 cd 26 18 90 bf 25 2d 04 78 9c 62 1f e7 60 f9 a9 3d 6d a8 90 14 03 03 00 01 01 16 03 03 00 28 e5 81 fa 09 07 34 39 15 78 0d a7 7f a8 ba 64 04 77 1f fe 9c f8 2b 9c 80 1d 3d 7f 27 d0 06 1a 76 07 2d 39 ff c6 dd 0f bf
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=65
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=65): 01 00 00 3d 01 07 00 3d 19 80 00 00 00 33 14 03 03 00 01 01 16 03 03 00 28 1a 1e 51 01 64 17 70 b7 f9 29 40 19 d9 78 5c f8 75 89 3f 8d b0 24 79 9d b6 e1 1b 47 9e 42 2a 59 b7 94 8b 75 70 1b a2 51
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=61) - Flags 0x80
- SSL: TLS Message Length: 51
- OpenSSL: RX ver=0x303 content_type=20
- OpenSSL: Message - hexdump(len=1): [REMOVED]
- OpenSSL: RX ver=0x303 content_type=22
- OpenSSL: Message - hexdump(len=16): [REMOVED]
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 read finished A
- SSL: (where=0x20 ret=0x1)
- SSL: (where=0x1002 ret=0x1)
- SSL: 0 bytes pending from ssl_out
- SSL: No Application Data included
- SSL: No data to be sent out
- EAP-PEAP: TLS done, proceed to Phase 2
- EAP-PEAP: using label 'client EAP encryption' in key derivation
- OpenSSL: Using internal PRF
- EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
- EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5
- SSL: Building ACK (type=25 id=7 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1784d00
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 19 00
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=40
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=40): 01 00 00 24 01 08 00 24 19 00 17 03 03 00 19 1a 1e 51 01 64 17 70 b8 7a a2 f2 45 9c b1 53 52 82 02 4b 18 0d 5d 4e a7 b9
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=36) - Flags 0x00
- EAP-PEAP: received 30 bytes encrypted data for Phase 2
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
- EAP-PEAP: received Phase 2: code=1 identifier=8 length=5
- EAP-PEAP: Phase 2 Request: type=1
- EAP: using real identity - hexdump_ascii(len=):
- REMOVED
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=): [REMOVED]
- SSL: 38 bytes left to be sent out (of total 38 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17b6280
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=48): 01 00 00 2c 02 08 00 2c 19 00 17 03 03 00 21 e5 81 fa 09 07 34 39 16 60 a1 2e b7 62 42 65 e3 6d 66 60 10 f5 c4 19 a7 ff e3 99 84 9a 8d ae b4 11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=87
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=87): 01 00 00 53 01 09 00 53 19 00 17 03 03 00 48 1a 1e 51 01 64 17 70 b9 10 33 c8 32 e6 22 45 15 2e ce ea 93 51 cd e2 c3 09 31 db f6 49 ae 64 59 3b a9 4d 0e cd 28 a9 9c 81 b2 a3 77 9d 7b 13 de be 16 55 9a b0 8d 8c 1d 12 32 06 0e 4b 5a 27 fd fa c6 01 b3 1c b5 3f 39
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=83) - Flags 0x00
- EAP-PEAP: received 77 bytes encrypted data for Phase 2
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=48): 1a 01 09 00 2f 10 24 55 a2 65 c3 fb af aa 5e bf 86 b0 a5 00 64 fa 72 61 64 69 75 73 33 2e 63 69 74 65 73 2e 69 6c 6c 69 6e 6f 69 73 2e 65 64 75
- EAP-PEAP: received Phase 2: code=1 identifier=9 length=52
- EAP-PEAP: Phase 2 Request: type=26
- EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
- EAP-MSCHAPV2: RX identifier 9 mschapv2_id 9
- EAP-MSCHAPV2: Received challenge
- EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=26):
- 72 61 64 69 75 73 33 2e 63 69 74 65 73 2e 69 6c radius3.cites.il
- 6c 69 6e 6f 69 73 2e 65 64 75 linois.edu
- EAP-MSCHAPV2: Generating Challenge Response
- Get randomness: len=16 entropy=10
- MSCHAPV2: Identity - hexdump_ascii(len=):
- REMOVED
- MSCHAPV2: Username - hexdump_ascii(len=):
- REMOVED
- MSCHAPV2: auth_challenge - hexdump(len=16): 24 55 a2 65 c3 fb af aa 5e bf 86 b0 a5 00 64 fa
- MSCHAPV2: peer_challenge - hexdump(len=16): 80 a4 a2 d9 30 05 10 18 88 b6 a2 ca 06 aa c6 8f
- MSCHAPV2: username - hexdump_ascii(len=):
- REMOVED
- MSCHAPV2: password - hexdump_ascii(len=): [REMOVED]
- MSCHAPV2: NT Response - hexdump(len=24): 3c da 5d 6b 74 9d ad 92 ef 8b 09 82 45 40 22 74 3b 95 cf a7 3d b8 1f cd
- MSCHAPV2: Auth Response - hexdump(len=20): 94 d5 cd 01 1a 81 4e 9e 37 b7 60 1c 78 50 68 0a fb c0 44 e5
- MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
- EAP-MSCHAPV2: TX identifier 9 mschapv2_id 9 (response)
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=67): [REMOVED]
- SSL: 92 bytes left to be sent out (of total 92 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17a9f30
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=102): 01 00 00 62 02 09 00 62 19 00 17 03 03 00 57 e5 81 fa 09 07 34 39 17 de 3c 51 39 62 2b 64 93 34 6c b5 6d b9 3b a4 6e fd dd f8 63 fc ad 1f bd 59 df dc 1b 2e f0 5e ea cf 00 03 54 39 f3 e7 c2 e7 3d ed f1 70 b8 bb ac 5d 31 2e d6 b6 ea 6d 9e 34 08 96 d9 98 e0 c9 67 44 57 d9 0d 43 0d ba 43 5e 3a 15 d7 31 b9 0a
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=96
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=96): 01 00 00 5c 01 0a 00 5c 19 00 17 03 03 00 51 1a 1e 51 01 64 17 70 ba 07 5e 10 17 c4 1d 03 4c 7a e1 4b f1 56 12 b9 f7 e2 a4 68 91 93 5b 07 22 74 e0 2f b5 3f 15 36 14 38 0c 16 8c cb 75 ed 30 76 08 e7 07 94 ac 58 01 83 53 b7 82 da 9c 77 44 33 19 b6 65 08 63 25 6b 6f 33 c6 70 cf 96 80 28 63
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=92) - Flags 0x00
- EAP-PEAP: received 86 bytes encrypted data for Phase 2
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=57): 1a 03 09 00 38 53 3d 39 34 44 35 43 44 30 31 31 41 38 31 34 45 39 45 33 37 42 37 36 30 31 43 37 38 35 30 36 38 30 41 46 42 43 30 34 34 45 35 20 4d 3d 73 75 63 63 65 73 73
- EAP-PEAP: received Phase 2: code=1 identifier=10 length=61
- EAP-PEAP: Phase 2 Request: type=26
- EAP-MSCHAPV2: RX identifier 10 mschapv2_id 9
- EAP-MSCHAPV2: Received success
- EAP-MSCHAPV2: Success message - hexdump_ascii(len=9):
- 4d 3d 73 75 63 63 65 73 73 M=success
- EAP-MSCHAPV2: Authentication succeeded
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
- SSL: 31 bytes left to be sent out (of total 31 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17b9a70
- EAP: Session-Id - hexdump(len=65): 19 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=41): 01 00 00 25 02 0a 00 25 19 00 17 03 03 00 1a e5 81 fa 09 07 34 39 18 19 47 e9 24 ca 4f a0 78 dd e2 4b 7c dd 8b df 1a 50 6e
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=50
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=50): 01 00 00 2e 01 0b 00 2e 19 00 17 03 03 00 23 1a 1e 51 01 64 17 70 bb bf 13 7a 6b ce 50 77 27 1e 85 c0 b5 3a 38 3b 1b 4e b9 18 1a 5f ba 45 f3 0e b8 02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=46) - Flags 0x00
- EAP-PEAP: received 40 bytes encrypted data for Phase 2
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0b 00 0b 21 80 03 00 02 00 01
- EAP-PEAP: received Phase 2: code=1 identifier=11 length=11
- EAP-PEAP: Phase 2 Request: type=33
- EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
- EAP-TLV: Result TLV - hexdump(len=2): 00 01
- EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
- SSL: 40 bytes left to be sent out (of total 40 bytes)
- EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x17b9ac0
- EAP: Session-Id - hexdump(len=65): 19 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=00:0c:e6:9a:26:bb
- TX EAPOL - hexdump(len=50): 01 00 00 2e 02 0b 00 2e 19 00 17 03 03 00 23 e5 81 fa 09 07 34 39 19 ed f1 6a de 39 ec c0 d4 39 c2 0d db 16 68 ea 0b 31 b9 ef 7e fa 62 1a e6 26 a8 cf
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=8
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=8): 01 00 00 04 03 0b 00 04
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Success
- EAP: Status notification: completion (param=success)
- EAP: EAP entering state SUCCESS
- wlp4s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state SUCCESS
- EAPOL: SUPP_BE entering state IDLE
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=121
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 83 ab 98 88 86 8d ec 1e c9 2a d3 4b a1 81 53 66 8b 6d 0e e1 e3 de 36 bd c6 ea 1d d9 8d ee c5 bb db 31 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- wlp4s0: IEEE 802.1X RX: version=2 type=3 length=117
- WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 83 ab 98 88 86 8d ec 1e c9 2a d3 4b a1 81 53 66 8b 6d 0e e1 e3 de 36 bd c6 ea 1d d9 8d ee c5 bb db 31 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
- wlp4s0: EAPOL-Key type=2
- wlp4s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlp4s0: key_length=16 key_data_length=22
- replay_counter - hexdump(len=8): 00 00 00 00 00 83 ab 98
- key_nonce - hexdump(len=32): 88 86 8d ec 1e c9 2a d3 4b a1 81 53 66 8b 6d 0e e1 e3 de 36 bd c6 ea 1d d9 8d ee c5 bb db 31 86
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp4s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlp4s0: WPA: RX message 1 of 4-Way Handshake from 00:0c:e6:9a:26:bb (ver=2)
- RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
- WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
- RSN: PMKID from Authenticator - hexdump(len=16): 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
- wlp4s0: RSN: no matching PMKID found
- EAPOL: Successfully fetched key (len=32)
- EAPOL: Successfully fetched key (len=64)
- WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
- RSN: Added PMKSA cache entry for 00:0c:e6:9a:26:bb network_ctx=0x1783a40
- nl80211: Add PMKID for 00:0c:e6:9a:26:bb
- wlp4s0: RSN: no PMKSA entry found - trigger full EAP authentication
- wlp4s0: RSN: Do not reply to msg 1/4 - requesting full EAP authentication
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=14
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
- EAPOL: Received EAP-Packet frame
- EAPOL: startWhen --> 0
- EAPOL: authWhile --> 0
- l2_packet_receive: src=00:0c:e6:9a:26:bb len=14
- wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
- RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
- EAPOL: Received EAP-Packet frame
- nl80211: Event message available
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp4s0
- wlp4s0: nl80211: Scan trigger
- wlp4s0: Event SCAN_STARTED (47) received
- wlp4s0: External program started a scan
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Event message available
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp4s0
- wlp4s0: nl80211: New scan results available
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
- wlp4s0: Event SCAN_RESULTS (3) received
- wlp4s0: Scan completed in 4.934183 seconds
- nl80211: Associated on 5180 MHz
- nl80211: Associated with 00:0c:e6:9a:26:bb
- nl80211: Received scan results (6 BSSes)
- nl80211: Scan results indicate BSS status with 00:0c:e6:9a:26:bb as associated
- wlp4s0: BSS: Start scan result update 2
- BSS: last_scan_res_used=6/32
- wlp4s0: New scan results available (own=0 ext=1)
- wlp4s0: Do not use results from externally requested scan operation for network selection
- nl80211: Event message available
- nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp4s0
- nl80211: Delete station 00:0c:e6:9a:26:bb
- nl80211: Event message available
- nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp4s0
- nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp4s0(60:57:18:69:6d:6f) A1=00:0c:e6:9a:26:bb A2=60:57:18:69:6d:6f
- nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 0c e6 9a 26 bb 60 57 18 69 6d 6f 00 0c e6 9a 26 bb 00 00 03 00
- nl80211: Deauthenticate event
- wlp4s0: Event DEAUTH (12) received
- wlp4s0: Deauthentication notification
- wlp4s0: * reason 3 (locally generated)
- wlp4s0: * address 00:0c:e6:9a:26:bb
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlp4s0: CTRL-EVENT-DISCONNECTED bssid=00:0c:e6:9a:26:bb reason=3 locally_generated=1
- wlp4s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
- wlp4s0: Setting scan request: 0.100000 sec
- wlp4s0: Radio work 'sme-connect'@0x179f9c0 done in 37.976781 seconds
- Added BSSID 00:0c:e6:9a:26:bb into blacklist
- wlp4s0: Another BSS in this ESS has been seen; try it next
- BSSID 00:0c:e6:9a:26:bb blacklist count incremented to 2
- wlp4s0: Blacklist count 1 --> request scan in 100 ms
- wlp4s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
- wlp4s0: WPA: Clear old PMK and PTK
- wlp4s0: Disconnect event - remove keys
- wlp4s0: State: 4WAY_HANDSHAKE -> DISCONNECTED
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WMM AC: WMM AC is disabled
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 ()
- nl80211: Interface down (wlp4s0/wlp4s0)
- wlp4s0: Event INTERFACE_DISABLED (27) received
- wlp4s0: Interface was disabled
- wlp4s0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- wlp4s0: State: DISCONNECTED -> INTERFACE_DISABLED
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignore interface up event since interface wlp4s0 is down
- nl80211: Event message available
- nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp4s0
- nl80211: Ignore disconnect event when using userspace SME
- l2_packet_receive - recvfrom: Network is down
- nl80211: Event message available
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp4s0
- nl80211: Regulatory domain change
- * initiator=0
- * type=1
- wlp4s0: Ignore event CHANNEL_LIST_CHANGED (28) while interface is disabled
- RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Interface up
- wlp4s0: Event INTERFACE_ENABLED (26) received
- wlp4s0: Interface was enabled
- wlp4s0: State: INTERFACE_DISABLED -> DISCONNECTED
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlp4s0: Rescheduling scan request: 0.000000 sec
- wlp4s0: State: DISCONNECTED -> SCANNING
- wlp4s0: Starting AP scan for wildcard SSID
- wlp4s0: Optimize scan based on previously generated frequency list
- wlp4s0: Add radio work 'scan'@0x179f9c0
- wlp4s0: First radio work item in the queue - schedule start immediately
- wlp4s0: Control interface command 'TERMINATE'
- wlp4s0: Removing interface wlp4s0
- wlp4s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
- wlp4s0: State: SCANNING -> DISCONNECTED
- nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- RSN: Flush PMKSA cache entry for 00:0c:e6:9a:26:bb
- nl80211: Delete PMKID for 00:0c:e6:9a:26:bb
- wlp4s0: RSN: PMKSA cache entry free_cb: 00:0c:e6:9a:26:bb reason=0
- EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
- ENGINE: engine deinit
- wlp4s0: WPA: Clear old PMK and PTK
- Removed BSSID 00:0c:e6:9a:26:bb from blacklist (clear)
- wlp4s0: BSS: Remove id 0 BSSID 00:0c:e6:9a:1b:81 SSID 'eduroam' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 5 BSSID 00:0c:e6:9a:56:be SSID 'UIpublicWiFi' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 6 BSSID 00:0c:e6:9a:ac:d5 SSID 'UIUCnet' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 1 BSSID 00:0c:e6:9a:26:bb SSID 'IllinoisNet' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 2 BSSID 00:0c:e6:9a:97:66 SSID 'IllinoisNet' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 3 BSSID 00:0c:e6:9a:dc:46 SSID 'eduroam' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 4 BSSID 02:1a:11:f3:bb:0b SSID 'KR' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 8 BSSID 00:0c:e6:9a:6c:32 SSID 'UIpublicWiFi' due to wpa_bss_flush
- wlp4s0: BSS: Remove id 7 BSSID 00:0c:e6:9a:47:60 SSID 'UIUCnet' due to wpa_bss_flush
- wlp4s0: Cancelling delayed sched scan
- wlp4s0: Cancelling scan request
- wlp4s0: Cancelling authentication timeout
- Remove interface wlp4s0 from radio phy0
- wlp4s0: Remove radio work 'scan'@0x179f9c0
- Remove radio phy0
- nl80211: deinit ifname=wlp4s0 disabled_11b_rates=0
- nl80211: Remove monitor interface: refcount=0
- netlink: Operstate: ifindex=4 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
- nl80211: Set mode ifindex 4 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x8888888889f0b019 (mode change)
- wlp4s0: CTRL-EVENT-TERMINATING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement