Advertisement
Guest User

wpa_supplicant debug output

a guest
Apr 30th, 2015
208
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 52.68 KB | None | 0 0
  1. wpa_supplicant v2.4
  2. random: Trying to read entropy from /dev/random
  3. Successfully initialized wpa_supplicant
  4. Initializing interface 'wlp4s0' conf '/etc/wpa_supplicant/illinoisnet.conf' driver 'nl80211' ctrl_interface '/var/run/wpa_supplicant/' bridge 'N/A'
  5. Configuration file '/etc/wpa_supplicant/illinoisnet.conf' -> '/etc/wpa_supplicant/illinoisnet.conf'
  6. Reading configuration file '/etc/wpa_supplicant/illinoisnet.conf'
  7. ctrl_interface='/var/run/wpa_supplicant'
  8. Line: 2 - start of a new network block
  9. ssid - hexdump_ascii(len=11):
  10. 49 6c 6c 69 6e 6f 69 73 4e 65 74 IllinoisNet
  11. proto: 0x2
  12. key_mgmt: 0x1
  13. pairwise: 0x10
  14. eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
  15. identity - hexdump_ascii(len=):
  16. REMOVED
  17. password - hexdump_ascii(len=): [REMOVED]
  18. Priority group 0
  19. id=0 ssid='IllinoisNet'
  20. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  21. nl80211: Supported cipher 00-0f-ac:4
  22. nl80211: Supported cipher 00-0f-ac:2
  23. nl80211: Supported cipher 00-0f-ac:1
  24. nl80211: Supported cipher 00-0f-ac:5
  25. nl80211: Supported cipher 00-0f-ac:6
  26. nl80211: Supported cipher 00-14-72:1
  27. nl80211: Using driver-based off-channel TX
  28. nl80211: Use separate P2P group interface (driver advertised support)
  29. nl80211: use P2P_DEVICE support
  30. nl80211: interface wlp4s0 in phy phy0
  31. nl80211: Set mode ifindex 4 iftype 2 (STATION)
  32. nl80211: Subscribe to mgmt frames with non-AP handle 0x1783890
  33. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0104
  34. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040a
  35. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040b
  36. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040c
  37. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=040d
  38. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090a
  39. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090b
  40. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090c
  41. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=090d
  42. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0801
  43. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=06
  44. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0a07
  45. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0a11
  46. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0a1a
  47. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=1101
  48. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=1102
  49. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1783890 match=0505
  50. netlink: Operstate: ifindex=4 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
  51. nl80211: driver param='(null)'
  52. Add interface wlp4s0 to a new radio phy0
  53. nl80211: Regulatory information - country=00
  54. nl80211: 2402-2472 @ 40 MHz 20 mBm
  55. nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
  56. nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
  57. nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
  58. nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
  59. nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
  60. nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
  61. nl80211: 57240-63720 @ 2160 MHz 0 mBm
  62. nl80211: Added 802.11b mode based on 802.11g information
  63. wlp4s0: Own MAC address: 60:57:18:69:6d:6f
  64. wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  65. wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  66. wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  67. wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  68. wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  69. wpa_driver_nl80211_set_key: ifindex=4 (wlp4s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  70. wlp4s0: RSN: flushing PMKID list in the driver
  71. nl80211: Flush PMKIDs
  72. ENGINE: Loading dynamic engine
  73. ENGINE: Loading dynamic engine
  74. EAPOL: SUPP_PAE entering state DISCONNECTED
  75. EAPOL: Supplicant port status: Unauthorized
  76. nl80211: Skip set_supp_port(unauthorized) while not associated
  77. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  78. EAPOL: SUPP_BE entering state INITIALIZE
  79. EAP: EAP entering state DISABLED
  80. wlp4s0: Added interface wlp4s0
  81. wlp4s0: State: DISCONNECTED -> DISCONNECTED
  82. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  83. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  84. random: Got 20/20 bytes from /dev/random
  85. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
  86. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  87. wlp4s0: Starting delayed sched scan
  88. wlp4s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
  89. wlp4s0: Setting scan request: 0.000000 sec
  90. wlp4s0: State: DISCONNECTED -> SCANNING
  91. wlp4s0: Starting AP scan for wildcard SSID
  92. wlp4s0: Add radio work 'scan'@0x179f9c0
  93. wlp4s0: First radio work item in the queue - schedule start immediately
  94. wlp4s0: Starting radio work 'scan'@0x179f9c0 after 0.000007 second wait
  95. wlp4s0: nl80211: scan request
  96. nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
  97. Scan requested (ret=0) - scan timeout 10 seconds
  98. nl80211: Event message available
  99. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp4s0
  100. wlp4s0: nl80211: Scan trigger
  101. wlp4s0: Event SCAN_STARTED (47) received
  102. wlp4s0: Own scan request started a scan in 0.000033 seconds
  103. EAPOL: disable timer tick
  104. nl80211: Event message available
  105. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp4s0
  106. wlp4s0: nl80211: New scan results available
  107. nl80211: Scan probed for SSID ''
  108. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
  109. wlp4s0: Event SCAN_RESULTS (3) received
  110. wlp4s0: Scan completed in 3.752736 seconds
  111. nl80211: Received scan results (9 BSSes)
  112. wlp4s0: BSS: Start scan result update 1
  113. wlp4s0: BSS: Add new id 0 BSSID 00:0c:e6:9a:1b:81 SSID 'eduroam'
  114. wlp4s0: BSS: Add new id 1 BSSID 00:0c:e6:9a:26:bb SSID 'IllinoisNet'
  115. wlp4s0: BSS: Add new id 2 BSSID 00:0c:e6:9a:97:66 SSID 'IllinoisNet'
  116. wlp4s0: BSS: Add new id 3 BSSID 00:0c:e6:9a:dc:46 SSID 'eduroam'
  117. wlp4s0: BSS: Add new id 4 BSSID 02:1a:11:f3:bb:0b SSID 'KR'
  118. wlp4s0: BSS: Add new id 5 BSSID 00:0c:e6:9a:56:be SSID 'UIpublicWiFi'
  119. wlp4s0: BSS: Add new id 6 BSSID 00:0c:e6:9a:ac:d5 SSID 'UIUCnet'
  120. wlp4s0: BSS: Add new id 7 BSSID 00:0c:e6:9a:47:60 SSID 'UIUCnet'
  121. wlp4s0: BSS: Add new id 8 BSSID 00:0c:e6:9a:6c:32 SSID 'UIpublicWiFi'
  122. BSS: last_scan_res_used=9/32
  123. wlp4s0: New scan results available (own=1 ext=0)
  124. wlp4s0: Radio work 'scan'@0x179f9c0 done in 3.753820 seconds
  125. wlp4s0: Selecting BSS from priority group 0
  126. wlp4s0: 0: 00:0c:e6:9a:1b:81 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x911 level=-48
  127. wlp4s0: skip - SSID mismatch
  128. wlp4s0: 1: 00:0c:e6:9a:26:bb ssid='IllinoisNet' wpa_ie_len=0 rsn_ie_len=20 caps=0x911 level=-48
  129. wlp4s0: selected based on RSN IE
  130. wlp4s0: selected BSS 00:0c:e6:9a:26:bb ssid='IllinoisNet'
  131. wlp4s0: Considering connect request: reassociate: 0 selected: 00:0c:e6:9a:26:bb bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1783a40 current_ssid=(nil)
  132. wlp4s0: Request association with 00:0c:e6:9a:26:bb
  133. wlp4s0: Add radio work 'sme-connect'@0x179f9c0
  134. wlp4s0: First radio work item in the queue - schedule start immediately
  135. wlp4s0: Starting radio work 'sme-connect'@0x179f9c0 after 0.000011 second wait
  136. wlp4s0: Automatic auth_alg selection: 0x1
  137. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  138. RSN: Search for BSSID 00:0c:e6:9a:26:bb
  139. RSN: No PMKSA cache entry found
  140. wlp4s0: RSN: using IEEE 802.11i/D9.0
  141. wlp4s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  142. wlp4s0: WPA: Selected mgmt group cipher 32
  143. wlp4s0: WPA: clearing AP WPA IE
  144. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 0d 00
  145. wlp4s0: WPA: using GTK CCMP
  146. wlp4s0: WPA: using PTK CCMP
  147. wlp4s0: WPA: using KEY_MGMT 802.1X
  148. wlp4s0: WPA: not using MGMT group cipher
  149. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  150. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  151. RRM: Determining whether RRM can be used - device support: 0x0
  152. RRM: No RRM in network
  153. wlp4s0: Cancelling scan request
  154. wlp4s0: SME: Trying to authenticate with 00:0c:e6:9a:26:bb (SSID='IllinoisNet' freq=5180 MHz)
  155. wlp4s0: State: SCANNING -> AUTHENTICATING
  156. EAPOL: External notification - EAP success=0
  157. EAPOL: External notification - EAP fail=0
  158. EAPOL: External notification - portControl=Auto
  159. nl80211: Authenticate (ifindex=4)
  160. * bssid=00:0c:e6:9a:26:bb
  161. * freq=5180
  162. * SSID - hexdump_ascii(len=11):
  163. 49 6c 6c 69 6e 6f 69 73 4e 65 74 IllinoisNet
  164. * IEs - hexdump(len=0): [NULL]
  165. * Auth Type 0
  166. nl80211: Authentication request send successfully
  167. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  168. nl80211: Event message available
  169. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp4s0
  170. nl80211: New station 00:0c:e6:9a:26:bb
  171. nl80211: Event message available
  172. nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp4s0
  173. nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp4s0(60:57:18:69:6d:6f) A1=60:57:18:69:6d:6f A2=00:0c:e6:9a:26:bb
  174. nl80211: MLME event frame - hexdump(len=30): b0 00 3c 00 60 57 18 69 6d 6f 00 0c e6 9a 26 bb 00 0c e6 9a 26 bb a0 b0 00 00 02 00 00 00
  175. nl80211: Authenticate event
  176. wlp4s0: Event AUTH (11) received
  177. wlp4s0: SME: Authentication response: peer=00:0c:e6:9a:26:bb auth_type=0 auth_transaction=2 status_code=0
  178. SME: Authentication response IEs - hexdump(len=0): [NULL]
  179. wlp4s0: Trying to associate with 00:0c:e6:9a:26:bb (SSID='IllinoisNet' freq=5180 MHz)
  180. wlp4s0: State: AUTHENTICATING -> ASSOCIATING
  181. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  182. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  183. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  184. nl80211: Associate (ifindex=4)
  185. * bssid=00:0c:e6:9a:26:bb
  186. * freq=5180
  187. * SSID - hexdump_ascii(len=11):
  188. 49 6c 6c 69 6e 6f 69 73 4e 65 74 IllinoisNet
  189. * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 01 00 00 40
  190. * WPA Versions 0x2
  191. * pairwise=0xfac04
  192. * group=0xfac04
  193. * akm=0xfac01
  194. nl80211: Association request send successfully
  195. nl80211: Event message available
  196. nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp4s0
  197. nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp4s0(60:57:18:69:6d:6f) A1=60:57:18:69:6d:6f A2=00:0c:e6:9a:26:bb
  198. nl80211: MLME event frame - hexdump(len=149): 10 00 3c 00 60 57 18 69 6d 6f 00 0c e6 9a 26 bb 00 0c e6 9a 26 bb b0 b0 11 00 00 00 48 c1 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 bf 0c 32 40 82 0f ea ff 00 00 ea ff 00 00 c0 05 00 26 00 ea ff dd 18 00 50 f2 02 01 01 80 00 03 53 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  199. nl80211: Associate event
  200. wlp4s0: Event ASSOC (0) received
  201. wlp4s0: Association info event
  202. resp_ies - hexdump(len=119): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6f 00 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 24 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 bf 0c 32 40 82 0f ea ff 00 00 ea ff 00 00 c0 05 00 26 00 ea ff dd 18 00 50 f2 02 01 01 80 00 03 53 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  203. wlp4s0: freq=5180 MHz
  204. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  205. wlp4s0: State: ASSOCIATING -> ASSOCIATED
  206. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  207. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  208. wlp4s0: Associated to a new BSS: BSSID=00:0c:e6:9a:26:bb
  209. wlp4s0: Associated with 00:0c:e6:9a:26:bb
  210. wlp4s0: WPA: Association event - clear replay counter
  211. wlp4s0: WPA: Clear old PTK
  212. EAPOL: External notification - portEnabled=0
  213. EAPOL: External notification - portValid=0
  214. EAPOL: External notification - portEnabled=1
  215. EAPOL: SUPP_PAE entering state CONNECTING
  216. EAPOL: enable timer tick
  217. EAPOL: SUPP_BE entering state IDLE
  218. EAP: EAP entering state INITIALIZE
  219. EAP: EAP entering state IDLE
  220. wlp4s0: Setting authentication timeout: 10 sec 0 usec
  221. wlp4s0: Cancelling scan request
  222. WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
  223. WMM AC: U-APSD queues=0x0
  224. WMM AC: Valid WMM association, WMM AC is enabled
  225. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  226. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  227. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  228. nl80211: Event message available
  229. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp4s0
  230. nl80211: Ignore connect event (cmd=46) when using userspace SME
  231. nl80211: Event message available
  232. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp4s0
  233. nl80211: Regulatory domain change
  234. * initiator=3
  235. * type=0
  236. * alpha2=US
  237. wlp4s0: Event CHANNEL_LIST_CHANGED (28) received
  238. wlp4s0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
  239. nl80211: Regulatory information - country=US
  240. nl80211: 2402-2472 @ 40 MHz 30 mBm
  241. nl80211: 5170-5250 @ 80 MHz 17 mBm
  242. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  243. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  244. nl80211: 5735-5835 @ 80 MHz 30 mBm
  245. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  246. nl80211: Added 802.11b mode based on 802.11g information
  247. l2_packet_receive: src=00:0c:e6:9a:26:bb len=14
  248. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  249. RX EAPOL - hexdump(len=14): 01 00 00 0a 01 01 00 0a 01 68 65 6c 6c 6f
  250. wlp4s0: Setting authentication timeout: 70 sec 0 usec
  251. EAPOL: Received EAP-Packet frame
  252. EAPOL: SUPP_PAE entering state RESTART
  253. EAP: EAP entering state INITIALIZE
  254. EAP: EAP entering state IDLE
  255. EAPOL: SUPP_PAE entering state AUTHENTICATING
  256. EAPOL: SUPP_BE entering state REQUEST
  257. EAPOL: getSuppRsp
  258. EAP: EAP entering state RECEIVED
  259. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  260. EAP: EAP entering state IDENTITY
  261. wlp4s0: CTRL-EVENT-EAP-STARTED EAP authentication started
  262. EAP: Status notification: started (param=)
  263. EAP: EAP-Request Identity data - hexdump_ascii(len=5):
  264. 68 65 6c 6c 6f hello
  265. EAP: using real identity - hexdump_ascii(len=):
  266. REMOVED
  267. EAP: EAP entering state SEND_RESPONSE
  268. EAP: EAP entering state IDLE
  269. EAPOL: SUPP_BE entering state RESPONSE
  270. EAPOL: txSuppRsp
  271. TX EAPOL: dst=00:0c:e6:9a:26:bb
  272. TX EAPOL - hexdump(len=17): 01 00 00 0d 02 01 00 0d 01 7a 65 73 74 72 61 64 32
  273. EAPOL: SUPP_BE entering state RECEIVE
  274. l2_packet_receive: src=00:0c:e6:9a:26:bb len=10
  275. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  276. RX EAPOL - hexdump(len=10): 01 00 00 06 01 02 00 06 15 20
  277. EAPOL: Received EAP-Packet frame
  278. EAPOL: SUPP_BE entering state REQUEST
  279. EAPOL: getSuppRsp
  280. EAP: EAP entering state RECEIVED
  281. EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0
  282. EAP: EAP entering state GET_METHOD
  283. EAP: configuration does not allow: vendor 0 method 21
  284. EAP: vendor 0 method 21 not allowed
  285. wlp4s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 -> NAK
  286. EAP: Status notification: refuse proposed method (param=TTLS)
  287. EAP: Building EAP-Nak (requested type 21 vendor=0 method=0 not allowed)
  288. EAP: allowed methods - hexdump(len=1): 19
  289. EAP: EAP entering state SEND_RESPONSE
  290. EAP: EAP entering state IDLE
  291. EAPOL: SUPP_BE entering state RESPONSE
  292. EAPOL: txSuppRsp
  293. TX EAPOL: dst=00:0c:e6:9a:26:bb
  294. TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19
  295. EAPOL: SUPP_BE entering state RECEIVE
  296. l2_packet_receive: src=00:0c:e6:9a:26:bb len=10
  297. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  298. RX EAPOL - hexdump(len=10): 01 00 00 06 01 03 00 06 19 20
  299. EAPOL: Received EAP-Packet frame
  300. EAPOL: SUPP_BE entering state REQUEST
  301. EAPOL: getSuppRsp
  302. EAP: EAP entering state RECEIVED
  303. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  304. EAP: EAP entering state GET_METHOD
  305. wlp4s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  306. EAP: Status notification: accept proposed method (param=PEAP)
  307. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  308. TLS: Phase2 EAP types - hexdump(len=112): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 2f 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 2e 00 00 00 00 00 00 00 30 00 00 00 00 00 00 00 33 00 00 00 00 00 00 00 31 00 00 00 00 00 00 00 35 00 00 00
  309. TLS: using phase1 config options
  310. wlp4s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  311. EAP: EAP entering state METHOD
  312. SSL: Received packet(len=6) - Flags 0x20
  313. EAP-PEAP: Start (server ver=0, own ver=1)
  314. EAP-PEAP: Using PEAP version 0
  315. SSL: (where=0x10 ret=0x1)
  316. SSL: (where=0x1001 ret=0x1)
  317. SSL: SSL_connect:before/connect initialization
  318. OpenSSL: TX ver=0x303 content_type=22
  319. OpenSSL: Message - hexdump(len=144): [REMOVED]
  320. SSL: (where=0x1001 ret=0x1)
  321. SSL: SSL_connect:SSLv2/v3 write client hello A
  322. SSL: (where=0x1002 ret=0xffffffff)
  323. SSL: SSL_connect:error in SSLv2/v3 read server hello A
  324. SSL: SSL_connect - want more data
  325. SSL: 149 bytes pending from ssl_out
  326. SSL: 149 bytes left to be sent out (of total 149 bytes)
  327. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17a9da0
  328. EAP: EAP entering state SEND_RESPONSE
  329. EAP: EAP entering state IDLE
  330. EAPOL: SUPP_BE entering state RESPONSE
  331. EAPOL: txSuppRsp
  332. TX EAPOL: dst=00:0c:e6:9a:26:bb
  333. TX EAPOL - hexdump(len=163): 01 00 00 9f 02 03 00 9f 19 80 00 00 00 95 16 03 01 00 90 01 00 00 8c 03 03 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 00 00 44 00 a3 00 9f 00 6b 00 6a 00 39 00 38 00 88 00 87 00 9d 00 3d 00 35 00 84 00 a2 00 9e 00 67 00 40 00 33 00 32 00 9a 00 99 00 45 00 44 00 9c 00 3c 00 2f 00 96 00 41 00 07 00 05 00 04 00 16 00 13 00 0a 00 ff 01 00 00 1f 00 0d 00 16 00 14 06 01 06 02 05 01 05 02 04 01 04 02 03 01 03 02 02 01 02 02 00 0f 00 01 01
  334. EAPOL: SUPP_BE entering state RECEIVE
  335. l2_packet_receive: src=00:0c:e6:9a:26:bb len=1014
  336. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  337. RX EAPOL - hexdump(len=1014): 01 00 03 f2 01 04 03 f2 19 c0 00 00 0a 79 16 03 03 00 56 02 00 00 52 03 03 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5 20 fe 61 92 9b 7c b6 83 cb ef 0d 95 d5 07 96 70 f7 6e e8 df f2 00 05 c9 01 5e cf d0 56 35 17 08 1a 00 9d 00 00 0a ff 01 00 01 00 00 0f 00 01 01 16 03 03 0a 10 0b 00 0a 0c 00 0a 09 00 05 3c 30 82 05 38 30 82 04 20 a0 03 02 01 02 02 10 00 f1 9b 77 62 f0 cd 64 c7 d7 b3 36 fc 38 05 a6 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 51 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 12 30 10 06 03 55 04 0a 13 09 49 6e 74 65 72 6e 65 74 32 31 11 30 0f 06 03 55 04 0b 13 08 49 6e 43 6f 6d 6d 6f 6e 31 1b 30 19 06 03 55 04 03 13 12 49 6e 43 6f 6d 6d 6f 6e 20 53 65 72 76 65 72 20 43 41 30 1e 17 0d 31 34 30 34 31 30 30 30 30 30 30 30 5a 17 0d 31 37 30 34 30 39 32 33 35 39 35 39 5a 30 81 9e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0e 30 0c 06 03 55 04 11 13 05 36 31 38 30 31 31 0b 30 09 06 03 55 04 08 13 02 49 4c 31 0f 30 0d 06 03 55 04 07 13 06 55 72 62 61 6e 61 31 1f 30 1d 06 03 55 04 0a 13 16 55 6e 69 76 65 72 73 69 74 79 20 6f 66 20 49 6c 6c 69 6e 6f 69 73 31 20 30 1e 06 03 55 04 0b 13 17 55 72 62 61 6e 61 2d 43 68 61 6d 70 61 69 67 6e 20 43 61 6d 70 75 73 31 1e 30 1c 06 03 55 04 03 13 15 77 69 72 65 6c 65 73 73 2e 69 6c 6c 69 6e 6f 69 73 2e 65 64 75 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 af 04 86 5c 3a dc a5 41 c5 31 2f 3d 43 11 5e 71 01 70 96 fc c8 b0 16 8b 68 16 d1 8a dc 91 d8 5d 0a 30 06 fa f9 0c 6d d2 40 41 cd 7c ea c4 d9 d3 9f ff 18 ae a1 e6 16 6e d3 08 34 98 4b f4 92 af d2 60 7e 18 c5 be b6 14 d1 3c 9d 14 5e 51 85 de dc 14 3d e7 81 82 bf ce 34 fc aa 4d 92 af 17 8d 0a 45 b5 a3 5e 93 01 7b f6 ff b8 b4 35 6e 25 fc 1b e2 67 a5 a8 b3 26 f4 c6 82 6e 1f 0d 4e 66 72 1b ba 6d 2a 1f 13 9a 4f 30 16 a9 3b 8a bf 8e 58 c1 cd c0 b6 f8 57 e4 cd bf a2 da f2 e3 24 4e 91 04 c3 f3 20 ff 3f 00 04 43 cb 5d 7b a9 42 2a 67 ae 0e e9 f8 a7 e8 db d6 22 42 77 37 66 24 d7 fd ca 4b 40 73 f8 dc 4e 5b f9 c9 dd c0 e1 22 22 02 90 dd 68 e8 c5 df 17 0d 7a a4 3a c6 0f 82 a5 f4 66 86 b6 d2 b8 38 69 88 72 2c 55 ee 5a c8 56 06 f1 48 42 2e 86 22 c8 2f 1a f8 1f e9 42 b3 10 b9 02 03 01 00 01 a3 82 01 bc 30 82 01 b8 30 1f 06 03 55 1d 23 04 18 30 16 80 14 48 4f 5a fa 2f 4a 9a 5e e0 50 f3 6b 7b 55 a5 de f5 be 34 5d 30 1d 06 03 55 1d 0e 04 16 04 14 58 41 65 ea c3 8c 99 e3 7c 68 e6 1d 3d 36 31 2c 8d 69 08 de 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 67 06 03 55 1d 20 04 60 30 5e 30 52 06 0c 2b 06 01 04 01 ae 23 01 04 03 01 01 30 42 30 40 06 08 2b 06 01 05 05 07 02 01 16 34 68 74 74 70 73 3a 2f 2f 77 77 77 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 63 65 72 74 2f 72 65 70 6f 73 69 74 6f 72 79 2f 63 70 73 5f 73 73 6c 2e 70 64 66 30 08 06 06 67 81 0c 01 02 02 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f
  338. EAPOL: Received EAP-Packet frame
  339. EAPOL: SUPP_BE entering state REQUEST
  340. EAPOL: getSuppRsp
  341. EAP: EAP entering state RECEIVED
  342. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  343. EAP: EAP entering state METHOD
  344. SSL: Received packet(len=1010) - Flags 0xc0
  345. SSL: TLS Message Length: 2681
  346. SSL: Need 1681 bytes more input data
  347. SSL: Building ACK (type=25 id=4 ver=0)
  348. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1785ff0
  349. EAP: EAP entering state SEND_RESPONSE
  350. EAP: EAP entering state IDLE
  351. EAPOL: SUPP_BE entering state RESPONSE
  352. EAPOL: txSuppRsp
  353. TX EAPOL: dst=00:0c:e6:9a:26:bb
  354. TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
  355. EAPOL: SUPP_BE entering state RECEIVE
  356. l2_packet_receive: src=00:0c:e6:9a:26:bb len=1010
  357. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  358. RX EAPOL - hexdump(len=1010): 01 00 03 ee 01 05 03 ee 19 40 72 67 2f 49 6e 43 6f 6d 6d 6f 6e 53 65 72 76 65 72 43 41 2e 63 72 6c 30 6f 06 08 2b 06 01 05 05 07 01 01 04 63 30 61 30 39 06 08 2b 06 01 05 05 07 30 02 86 2d 68 74 74 70 3a 2f 2f 63 65 72 74 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 2f 49 6e 43 6f 6d 6d 6f 6e 53 65 72 76 65 72 43 41 2e 63 72 74 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 69 6e 63 6f 6d 6d 6f 6e 2e 6f 72 67 30 20 06 03 55 1d 11 04 19 30 17 82 15 77 69 72 65 6c 65 73 73 2e 69 6c 6c 69 6e 6f 69 73 2e 65 64 75 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 02 1d 68 39 ee a5 ae 69 87 8d 93 8e f5 fb 55 69 9e bc 1b 45 2d e7 e0 ed 83 83 7a 84 fd 66 b4 89 f5 84 53 d8 f9 3e b2 51 26 ea 5a 20 84 ea fe f9 21 14 fe 1c 40 0c f8 c7 50 47 56 9d 76 16 2b 5f 13 44 42 58 75 4d 9f a7 f5 0e a7 3f f6 ad dd 2b db 54 fd 4d 0e be 43 64 62 af d9 8e a7 7f 76 77 8d ba a3 40 d3 fb ae 4a 7c 4a 18 20 61 b3 8f 06 77 a8 ae f9 78 b5 39 42 30 74 77 4f b3 27 b0 9f 97 a7 de 9e 52 bc d1 cf 41 ec 26 5f 36 7d 0b 05 4d a3 be 6c 07 60 98 fb ed 38 2d ee 87 5b 73 52 48 50 fa b5 20 79 88 4e 5c b0 61 91 0b 1f ff 8f 8e 3e dc cb e7 b8 f5 08 bf 6a 07 7a 85 fc 46 22 6b 07 d5 17 dd fd 7c b4 be 00 16 b2 a5 5a 4c 20 a5 d0 40 e2 7e fe 48 97 65 99 97 3d 1e 87 56 6c 7f 4e dd 39 8f a0 a9 45 49 fe c3 3c 4f 74 f7 79 79 c8 34 30 90 f6 b7 40 ec da 16 f5 4e 1b a5 b6 00 04 c7 30 82 04 c3 30 82 03 ab a0 03 02 01 02 02 10 7f 71 c1 d3 a2 26 b0 d2 b1 13 f3 e6 81 67 64 3e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 30 1e 17 0d 31 30 31 32 30 37 30 30 30 30 30 30 5a 17 0d 32 30 30 35 33 30 31 30 34 38 33 38 5a 30 51 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 12 30 10 06 03 55 04 0a 13 09 49 6e 74 65 72 6e 65 74 32 31 11 30 0f 06 03 55 04 0b 13 08 49 6e 43 6f 6d 6d 6f 6e 31 1b 30 19 06 03 55 04 03 13 12 49 6e 43 6f 6d 6d 6f 6e 20 53 65 72 76 65 72 20 43 41 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 97 7c c7 c8 fe b3 e9 20 6a a3 a4 4f 8e 8e 34 56 06 b3 7a 6c aa 10 9b 48 61 2b 36 90 69 e3 34 0a 47 a7 bb 7b de aa 6a fb eb 82 95 8f ca 1d 7f af 75 a6 a8 4c da 20 67 61 1a 0d 86 c1 ca c1 87 af ac 4e e4 de 62 1b 2f 9d b1 98 af c6 01 fb 17 70 db ac 14 59 ec 6f 3f 33 7f a6 98 0b e4 e2 38 af f5 7f 85 6d 0e 74 04 9d f6 27 86 c7 9b 8f e7 71 2a 08 f4 03 02 40 63 24 7d 40 57 8f 54 e0 54 7e b6 13 48 61 f1 de ce 0e bd b6 fa 4d 98 b2 d9 0d 8d 79 a6 e0 aa cd 0c 91 9a a5 df ab 73 bb ca 14 78 5c 47 29 a1 ca c5 ba 9f c7 da 60 f7 ff e7 7f f2 d9 da a1 2d 0f 49 16 a7 d3 00 92 cf 8a 47 d9 4d f8 d5 95 66 d3 74 f9 80 63 00 4f 4c 84 16 1f b3 f5 24 1f a1 4e de e8 95 d6 b2 0b 09 8b 2c 6b c7 5c 2f 8c 63 c9 99 cb 52 b1 62 7b 73 01 62 7f 63 6c d8 68
  359. EAPOL: Received EAP-Packet frame
  360. EAPOL: SUPP_BE entering state REQUEST
  361. EAPOL: getSuppRsp
  362. EAP: EAP entering state RECEIVED
  363. EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
  364. EAP: EAP entering state METHOD
  365. SSL: Received packet(len=1006) - Flags 0x40
  366. SSL: Need 681 bytes more input data
  367. SSL: Building ACK (type=25 id=5 ver=0)
  368. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1784d00
  369. EAP: EAP entering state SEND_RESPONSE
  370. EAP: EAP entering state IDLE
  371. EAPOL: SUPP_BE entering state RESPONSE
  372. EAPOL: txSuppRsp
  373. TX EAPOL: dst=00:0c:e6:9a:26:bb
  374. TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
  375. EAPOL: SUPP_BE entering state RECEIVE
  376. l2_packet_receive: src=00:0c:e6:9a:26:bb len=691
  377. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  378. RX EAPOL - hexdump(len=691): 01 00 02 af 01 06 02 af 19 00 a0 ee 6a a8 8d 1f 29 f3 d0 18 ac ad 02 03 01 00 01 a3 82 01 77 30 82 01 73 30 1f 06 03 55 1d 23 04 18 30 16 80 14 ad bd 98 7a 34 b4 26 f7 fa c4 26 54 ef 03 bd e0 24 cb 54 1a 30 1d 06 03 55 1d 0e 04 16 04 14 48 4f 5a fa 2f 4a 9a 5e e0 50 f3 6b 7b 55 a5 de f5 be 34 5d 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 11 06 03 55 1d 20 04 0a 30 08 30 06 06 04 55 1d 20 00 30 44 06 03 55 1d 1f 04 3d 30 3b 30 39 a0 37 a0 35 86 33 68 74 74 70 3a 2f 2f 63 72 6c 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 63 72 6c 30 81 b3 06 08 2b 06 01 05 05 07 01 01 04 81 a6 30 81 a3 30 3f 06 08 2b 06 01 05 05 07 30 02 86 33 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 45 78 74 65 72 6e 61 6c 43 41 52 6f 6f 74 2e 70 37 63 30 39 06 08 2b 06 01 05 05 07 30 02 86 2d 68 74 74 70 3a 2f 2f 63 72 74 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 2f 41 64 64 54 72 75 73 74 55 54 4e 53 47 43 43 41 2e 63 72 74 30 25 06 08 2b 06 01 05 05 07 30 01 86 19 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 75 73 65 72 74 72 75 73 74 2e 63 6f 6d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 93 66 21 80 74 45 85 4b c2 ab ce 32 b0 29 fe dd df d6 24 5b bf 03 6a 6f 50 3e 0e 1b b3 0d 88 a3 5b ee c4 a4 12 3b 56 ef 06 7f cf 7f 21 95 56 3b 41 31 fe e1 aa 93 d2 95 f3 95 0d 3c 47 ab ca 5c 26 ad 3e f1 f9 8c 34 6e 11 be f4 67 e3 02 49 f9 a6 7c 7b 64 25 dd 17 46 f2 50 e3 e3 0a 21 3a 49 24 cd c6 84 65 68 67 68 b0 45 2d 47 99 cd 9c ab 86 29 11 72 dc d6 9c 36 43 74 f3 d4 97 9e 56 a0 fe 5f 40 58 d2 d5 d7 7e 7c c5 8e 1a b2 04 5c 92 66 0e 85 ad 2e 06 ce c8 a3 d8 eb 14 27 91 de cf 17 30 81 53 b6 66 12 ad 37 e4 f5 ef 96 5c 20 0e 36 e9 ac 62 7d 19 81 8a f5 90 61 a6 49 ab ce 3c df e6 ca 64 ee 82 65 39 45 95 16 ba 41 06 00 98 ba 0c 56 61 e4 c6 c6 86 01 cf 66 a9 22 29 02 d6 3d cf c4 2a 8d 99 de fb 09 14 9e 0e d1 d5 c6 d7 81 dd ad 24 ab ac 07 05 e2 1d 68 c3 70 66 5f d3 16 03 03 00 04 0e 00 00 00
  379. EAPOL: Received EAP-Packet frame
  380. EAPOL: SUPP_BE entering state REQUEST
  381. EAPOL: getSuppRsp
  382. EAP: EAP entering state RECEIVED
  383. EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
  384. EAP: EAP entering state METHOD
  385. SSL: Received packet(len=687) - Flags 0x00
  386. OpenSSL: RX ver=0x303 content_type=22
  387. OpenSSL: Message - hexdump(len=86): [REMOVED]
  388. SSL: (where=0x1001 ret=0x1)
  389. SSL: SSL_connect:SSLv3 read server hello A
  390. OpenSSL: RX ver=0x303 content_type=22
  391. OpenSSL: Message - hexdump(len=2576): [REMOVED]
  392. TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=1 buf='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA'
  393. wlp4s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA' hash=623727ec472644a6bb70d240565c24223fdb0f2f5ac698027e3012489c70e817
  394. EAP: Status notification: remote certificate verification (param=success)
  395. TLS: tls_verify_cb - preverify_ok=1 err=27 (certificate not trusted) ca_cert_verify=0 depth=1 buf='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA'
  396. wlp4s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA' hash=623727ec472644a6bb70d240565c24223fdb0f2f5ac698027e3012489c70e817
  397. EAP: Status notification: remote certificate verification (param=success)
  398. TLS: tls_verify_cb - preverify_ok=1 err=27 (certificate not trusted) ca_cert_verify=0 depth=0 buf='/C=US/postalCode=61801/ST=IL/L=Urbana/O=University of Illinois/OU=Urbana-Champaign Campus/CN=wireless.illinois.edu'
  399. wlp4s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=US/postalCode=61801/ST=IL/L=Urbana/O=University of Illinois/OU=Urbana-Champaign Campus/CN=wireless.illinois.edu' hash=8e7e51e42fa59c0bc0c2893b5098492b9007d189d7556ceca63df12e988f5713
  400. wlp4s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:wireless.illinois.edu
  401. EAP: Status notification: remote certificate verification (param=success)
  402. SSL: (where=0x1001 ret=0x1)
  403. SSL: SSL_connect:SSLv3 read server certificate A
  404. OpenSSL: RX ver=0x303 content_type=22
  405. OpenSSL: Message - hexdump(len=4): [REMOVED]
  406. SSL: (where=0x1001 ret=0x1)
  407. SSL: SSL_connect:SSLv3 read server done A
  408. OpenSSL: TX ver=0x303 content_type=22
  409. OpenSSL: Message - hexdump(len=262): [REMOVED]
  410. SSL: (where=0x1001 ret=0x1)
  411. SSL: SSL_connect:SSLv3 write client key exchange A
  412. OpenSSL: TX ver=0x303 content_type=20
  413. OpenSSL: Message - hexdump(len=1): [REMOVED]
  414. SSL: (where=0x1001 ret=0x1)
  415. SSL: SSL_connect:SSLv3 write change cipher spec A
  416. OpenSSL: TX ver=0x303 content_type=22
  417. OpenSSL: Message - hexdump(len=16): [REMOVED]
  418. SSL: (where=0x1001 ret=0x1)
  419. SSL: SSL_connect:SSLv3 write finished A
  420. SSL: (where=0x1001 ret=0x1)
  421. SSL: SSL_connect:SSLv3 flush data
  422. SSL: (where=0x1002 ret=0xffffffff)
  423. SSL: SSL_connect:error in SSLv3 read finished A
  424. SSL: (where=0x1002 ret=0xffffffff)
  425. SSL: SSL_connect:error in SSLv3 read finished A
  426. SSL: SSL_connect - want more data
  427. SSL: 318 bytes pending from ssl_out
  428. SSL: 318 bytes left to be sent out (of total 318 bytes)
  429. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17b9910
  430. EAP: EAP entering state SEND_RESPONSE
  431. EAP: EAP entering state IDLE
  432. EAPOL: SUPP_BE entering state RESPONSE
  433. EAPOL: txSuppRsp
  434. TX EAPOL: dst=00:0c:e6:9a:26:bb
  435. TX EAPOL - hexdump(len=332): 01 00 01 48 02 06 01 48 19 80 00 00 01 3e 16 03 03 01 06 10 00 01 02 01 00 7c 49 59 4c af 25 1b d3 25 b8 b4 bc 5d 77 5c c7 78 e4 cd d0 5b 78 23 7d e1 b5 af 80 87 29 bb 23 c3 25 eb 59 19 41 52 bc 6d 0a 34 33 3f 32 88 5a 71 48 2c fe c2 ff 1f 8b 91 db 04 67 fc 57 6c ba aa 48 71 78 db 40 84 4b db 25 84 43 53 33 2b ff ea 52 ee e4 6c c8 6a 42 7f 0b 27 d3 ad 54 97 1a bb 98 53 0f 76 b9 93 f8 0d 37 bf 91 e1 11 91 ed 83 e9 92 00 49 c2 4b f0 4c 83 bd 39 ca 54 0d f2 00 06 ef b3 e8 b3 7e 27 57 02 7a df e2 71 31 9d 37 71 dc 78 0f ff a0 00 1f 16 0c 9b 17 82 91 40 57 5c 67 86 58 63 36 a4 f5 ed b0 3f 65 80 2d 3e c2 42 37 d0 13 31 21 91 b6 e3 f2 30 ed e5 18 1b 7c 21 96 66 b4 7c ca 21 6d 82 e5 a6 d1 0c 0a 36 68 6a 29 36 dd d4 58 25 2b 1e 55 bc da 7c fe e0 e9 2b 1c 81 dc 4a 6f 7d 05 b2 09 d1 cd 26 18 90 bf 25 2d 04 78 9c 62 1f e7 60 f9 a9 3d 6d a8 90 14 03 03 00 01 01 16 03 03 00 28 e5 81 fa 09 07 34 39 15 78 0d a7 7f a8 ba 64 04 77 1f fe 9c f8 2b 9c 80 1d 3d 7f 27 d0 06 1a 76 07 2d 39 ff c6 dd 0f bf
  436. EAPOL: SUPP_BE entering state RECEIVE
  437. l2_packet_receive: src=00:0c:e6:9a:26:bb len=65
  438. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  439. RX EAPOL - hexdump(len=65): 01 00 00 3d 01 07 00 3d 19 80 00 00 00 33 14 03 03 00 01 01 16 03 03 00 28 1a 1e 51 01 64 17 70 b7 f9 29 40 19 d9 78 5c f8 75 89 3f 8d b0 24 79 9d b6 e1 1b 47 9e 42 2a 59 b7 94 8b 75 70 1b a2 51
  440. EAPOL: Received EAP-Packet frame
  441. EAPOL: SUPP_BE entering state REQUEST
  442. EAPOL: getSuppRsp
  443. EAP: EAP entering state RECEIVED
  444. EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
  445. EAP: EAP entering state METHOD
  446. SSL: Received packet(len=61) - Flags 0x80
  447. SSL: TLS Message Length: 51
  448. OpenSSL: RX ver=0x303 content_type=20
  449. OpenSSL: Message - hexdump(len=1): [REMOVED]
  450. OpenSSL: RX ver=0x303 content_type=22
  451. OpenSSL: Message - hexdump(len=16): [REMOVED]
  452. SSL: (where=0x1001 ret=0x1)
  453. SSL: SSL_connect:SSLv3 read finished A
  454. SSL: (where=0x20 ret=0x1)
  455. SSL: (where=0x1002 ret=0x1)
  456. SSL: 0 bytes pending from ssl_out
  457. SSL: No Application Data included
  458. SSL: No data to be sent out
  459. EAP-PEAP: TLS done, proceed to Phase 2
  460. EAP-PEAP: using label 'client EAP encryption' in key derivation
  461. OpenSSL: Using internal PRF
  462. EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
  463. EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5
  464. SSL: Building ACK (type=25 id=7 ver=0)
  465. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1784d00
  466. EAP: EAP entering state SEND_RESPONSE
  467. EAP: EAP entering state IDLE
  468. EAPOL: SUPP_BE entering state RESPONSE
  469. EAPOL: txSuppRsp
  470. TX EAPOL: dst=00:0c:e6:9a:26:bb
  471. TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 19 00
  472. EAPOL: SUPP_BE entering state RECEIVE
  473. l2_packet_receive: src=00:0c:e6:9a:26:bb len=40
  474. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  475. RX EAPOL - hexdump(len=40): 01 00 00 24 01 08 00 24 19 00 17 03 03 00 19 1a 1e 51 01 64 17 70 b8 7a a2 f2 45 9c b1 53 52 82 02 4b 18 0d 5d 4e a7 b9
  476. EAPOL: Received EAP-Packet frame
  477. EAPOL: SUPP_BE entering state REQUEST
  478. EAPOL: getSuppRsp
  479. EAP: EAP entering state RECEIVED
  480. EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
  481. EAP: EAP entering state METHOD
  482. SSL: Received packet(len=36) - Flags 0x00
  483. EAP-PEAP: received 30 bytes encrypted data for Phase 2
  484. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
  485. EAP-PEAP: received Phase 2: code=1 identifier=8 length=5
  486. EAP-PEAP: Phase 2 Request: type=1
  487. EAP: using real identity - hexdump_ascii(len=):
  488. REMOVED
  489. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=): [REMOVED]
  490. SSL: 38 bytes left to be sent out (of total 38 bytes)
  491. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17b6280
  492. EAP: EAP entering state SEND_RESPONSE
  493. EAP: EAP entering state IDLE
  494. EAPOL: SUPP_BE entering state RESPONSE
  495. EAPOL: txSuppRsp
  496. TX EAPOL: dst=00:0c:e6:9a:26:bb
  497. TX EAPOL - hexdump(len=48): 01 00 00 2c 02 08 00 2c 19 00 17 03 03 00 21 e5 81 fa 09 07 34 39 16 60 a1 2e b7 62 42 65 e3 6d 66 60 10 f5 c4 19 a7 ff e3 99 84 9a 8d ae b4 11
  498. EAPOL: SUPP_BE entering state RECEIVE
  499. l2_packet_receive: src=00:0c:e6:9a:26:bb len=87
  500. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  501. RX EAPOL - hexdump(len=87): 01 00 00 53 01 09 00 53 19 00 17 03 03 00 48 1a 1e 51 01 64 17 70 b9 10 33 c8 32 e6 22 45 15 2e ce ea 93 51 cd e2 c3 09 31 db f6 49 ae 64 59 3b a9 4d 0e cd 28 a9 9c 81 b2 a3 77 9d 7b 13 de be 16 55 9a b0 8d 8c 1d 12 32 06 0e 4b 5a 27 fd fa c6 01 b3 1c b5 3f 39
  502. EAPOL: Received EAP-Packet frame
  503. EAPOL: SUPP_BE entering state REQUEST
  504. EAPOL: getSuppRsp
  505. EAP: EAP entering state RECEIVED
  506. EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
  507. EAP: EAP entering state METHOD
  508. SSL: Received packet(len=83) - Flags 0x00
  509. EAP-PEAP: received 77 bytes encrypted data for Phase 2
  510. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=48): 1a 01 09 00 2f 10 24 55 a2 65 c3 fb af aa 5e bf 86 b0 a5 00 64 fa 72 61 64 69 75 73 33 2e 63 69 74 65 73 2e 69 6c 6c 69 6e 6f 69 73 2e 65 64 75
  511. EAP-PEAP: received Phase 2: code=1 identifier=9 length=52
  512. EAP-PEAP: Phase 2 Request: type=26
  513. EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
  514. EAP-MSCHAPV2: RX identifier 9 mschapv2_id 9
  515. EAP-MSCHAPV2: Received challenge
  516. EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=26):
  517. 72 61 64 69 75 73 33 2e 63 69 74 65 73 2e 69 6c radius3.cites.il
  518. 6c 69 6e 6f 69 73 2e 65 64 75 linois.edu
  519. EAP-MSCHAPV2: Generating Challenge Response
  520. Get randomness: len=16 entropy=10
  521. MSCHAPV2: Identity - hexdump_ascii(len=):
  522. REMOVED
  523. MSCHAPV2: Username - hexdump_ascii(len=):
  524. REMOVED
  525. MSCHAPV2: auth_challenge - hexdump(len=16): 24 55 a2 65 c3 fb af aa 5e bf 86 b0 a5 00 64 fa
  526. MSCHAPV2: peer_challenge - hexdump(len=16): 80 a4 a2 d9 30 05 10 18 88 b6 a2 ca 06 aa c6 8f
  527. MSCHAPV2: username - hexdump_ascii(len=):
  528. REMOVED
  529. MSCHAPV2: password - hexdump_ascii(len=): [REMOVED]
  530. MSCHAPV2: NT Response - hexdump(len=24): 3c da 5d 6b 74 9d ad 92 ef 8b 09 82 45 40 22 74 3b 95 cf a7 3d b8 1f cd
  531. MSCHAPV2: Auth Response - hexdump(len=20): 94 d5 cd 01 1a 81 4e 9e 37 b7 60 1c 78 50 68 0a fb c0 44 e5
  532. MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
  533. EAP-MSCHAPV2: TX identifier 9 mschapv2_id 9 (response)
  534. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=67): [REMOVED]
  535. SSL: 92 bytes left to be sent out (of total 92 bytes)
  536. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17a9f30
  537. EAP: EAP entering state SEND_RESPONSE
  538. EAP: EAP entering state IDLE
  539. EAPOL: SUPP_BE entering state RESPONSE
  540. EAPOL: txSuppRsp
  541. TX EAPOL: dst=00:0c:e6:9a:26:bb
  542. TX EAPOL - hexdump(len=102): 01 00 00 62 02 09 00 62 19 00 17 03 03 00 57 e5 81 fa 09 07 34 39 17 de 3c 51 39 62 2b 64 93 34 6c b5 6d b9 3b a4 6e fd dd f8 63 fc ad 1f bd 59 df dc 1b 2e f0 5e ea cf 00 03 54 39 f3 e7 c2 e7 3d ed f1 70 b8 bb ac 5d 31 2e d6 b6 ea 6d 9e 34 08 96 d9 98 e0 c9 67 44 57 d9 0d 43 0d ba 43 5e 3a 15 d7 31 b9 0a
  543. EAPOL: SUPP_BE entering state RECEIVE
  544. l2_packet_receive: src=00:0c:e6:9a:26:bb len=96
  545. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  546. RX EAPOL - hexdump(len=96): 01 00 00 5c 01 0a 00 5c 19 00 17 03 03 00 51 1a 1e 51 01 64 17 70 ba 07 5e 10 17 c4 1d 03 4c 7a e1 4b f1 56 12 b9 f7 e2 a4 68 91 93 5b 07 22 74 e0 2f b5 3f 15 36 14 38 0c 16 8c cb 75 ed 30 76 08 e7 07 94 ac 58 01 83 53 b7 82 da 9c 77 44 33 19 b6 65 08 63 25 6b 6f 33 c6 70 cf 96 80 28 63
  547. EAPOL: Received EAP-Packet frame
  548. EAPOL: SUPP_BE entering state REQUEST
  549. EAPOL: getSuppRsp
  550. EAP: EAP entering state RECEIVED
  551. EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
  552. EAP: EAP entering state METHOD
  553. SSL: Received packet(len=92) - Flags 0x00
  554. EAP-PEAP: received 86 bytes encrypted data for Phase 2
  555. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=57): 1a 03 09 00 38 53 3d 39 34 44 35 43 44 30 31 31 41 38 31 34 45 39 45 33 37 42 37 36 30 31 43 37 38 35 30 36 38 30 41 46 42 43 30 34 34 45 35 20 4d 3d 73 75 63 63 65 73 73
  556. EAP-PEAP: received Phase 2: code=1 identifier=10 length=61
  557. EAP-PEAP: Phase 2 Request: type=26
  558. EAP-MSCHAPV2: RX identifier 10 mschapv2_id 9
  559. EAP-MSCHAPV2: Received success
  560. EAP-MSCHAPV2: Success message - hexdump_ascii(len=9):
  561. 4d 3d 73 75 63 63 65 73 73 M=success
  562. EAP-MSCHAPV2: Authentication succeeded
  563. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
  564. SSL: 31 bytes left to be sent out (of total 31 bytes)
  565. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x17b9a70
  566. EAP: Session-Id - hexdump(len=65): 19 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5
  567. EAP: EAP entering state SEND_RESPONSE
  568. EAP: EAP entering state IDLE
  569. EAPOL: SUPP_BE entering state RESPONSE
  570. EAPOL: txSuppRsp
  571. TX EAPOL: dst=00:0c:e6:9a:26:bb
  572. TX EAPOL - hexdump(len=41): 01 00 00 25 02 0a 00 25 19 00 17 03 03 00 1a e5 81 fa 09 07 34 39 18 19 47 e9 24 ca 4f a0 78 dd e2 4b 7c dd 8b df 1a 50 6e
  573. EAPOL: SUPP_BE entering state RECEIVE
  574. l2_packet_receive: src=00:0c:e6:9a:26:bb len=50
  575. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  576. RX EAPOL - hexdump(len=50): 01 00 00 2e 01 0b 00 2e 19 00 17 03 03 00 23 1a 1e 51 01 64 17 70 bb bf 13 7a 6b ce 50 77 27 1e 85 c0 b5 3a 38 3b 1b 4e b9 18 1a 5f ba 45 f3 0e b8 02
  577. EAPOL: Received EAP-Packet frame
  578. EAPOL: SUPP_BE entering state REQUEST
  579. EAPOL: getSuppRsp
  580. EAP: EAP entering state RECEIVED
  581. EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
  582. EAP: EAP entering state METHOD
  583. SSL: Received packet(len=46) - Flags 0x00
  584. EAP-PEAP: received 40 bytes encrypted data for Phase 2
  585. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0b 00 0b 21 80 03 00 02 00 01
  586. EAP-PEAP: received Phase 2: code=1 identifier=11 length=11
  587. EAP-PEAP: Phase 2 Request: type=33
  588. EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
  589. EAP-TLV: Result TLV - hexdump(len=2): 00 01
  590. EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  591. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  592. SSL: 40 bytes left to be sent out (of total 40 bytes)
  593. EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x17b9ac0
  594. EAP: Session-Id - hexdump(len=65): 19 75 a6 79 1d 8a 1f cf 03 b7 1b 46 05 8b 2c 3e b0 69 51 1f d8 e7 10 17 92 0c 71 5d b2 1c 1f 8d a7 55 42 58 6f c9 53 47 e7 3f 02 df b3 64 ff 36 1c 5e 82 8c 3d c3 52 be 15 2c 38 02 1c 0e 63 1b a5
  595. EAP: EAP entering state SEND_RESPONSE
  596. EAP: EAP entering state IDLE
  597. EAPOL: SUPP_BE entering state RESPONSE
  598. EAPOL: txSuppRsp
  599. TX EAPOL: dst=00:0c:e6:9a:26:bb
  600. TX EAPOL - hexdump(len=50): 01 00 00 2e 02 0b 00 2e 19 00 17 03 03 00 23 e5 81 fa 09 07 34 39 19 ed f1 6a de 39 ec c0 d4 39 c2 0d db 16 68 ea 0b 31 b9 ef 7e fa 62 1a e6 26 a8 cf
  601. EAPOL: SUPP_BE entering state RECEIVE
  602. l2_packet_receive: src=00:0c:e6:9a:26:bb len=8
  603. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  604. RX EAPOL - hexdump(len=8): 01 00 00 04 03 0b 00 04
  605. EAPOL: Received EAP-Packet frame
  606. EAPOL: SUPP_BE entering state REQUEST
  607. EAPOL: getSuppRsp
  608. EAP: EAP entering state RECEIVED
  609. EAP: Received EAP-Success
  610. EAP: Status notification: completion (param=success)
  611. EAP: EAP entering state SUCCESS
  612. wlp4s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
  613. EAPOL: SUPP_BE entering state RECEIVE
  614. EAPOL: SUPP_BE entering state SUCCESS
  615. EAPOL: SUPP_BE entering state IDLE
  616. l2_packet_receive: src=00:0c:e6:9a:26:bb len=121
  617. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  618. RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 83 ab 98 88 86 8d ec 1e c9 2a d3 4b a1 81 53 66 8b 6d 0e e1 e3 de 36 bd c6 ea 1d d9 8d ee c5 bb db 31 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
  619. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  620. wlp4s0: IEEE 802.1X RX: version=2 type=3 length=117
  621. WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 83 ab 98 88 86 8d ec 1e c9 2a d3 4b a1 81 53 66 8b 6d 0e e1 e3 de 36 bd c6 ea 1d d9 8d ee c5 bb db 31 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
  622. wlp4s0: EAPOL-Key type=2
  623. wlp4s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  624. wlp4s0: key_length=16 key_data_length=22
  625. replay_counter - hexdump(len=8): 00 00 00 00 00 83 ab 98
  626. key_nonce - hexdump(len=32): 88 86 8d ec 1e c9 2a d3 4b a1 81 53 66 8b 6d 0e e1 e3 de 36 bd c6 ea 1d d9 8d ee c5 bb db 31 86
  627. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  628. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  629. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  630. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  631. wlp4s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  632. wlp4s0: WPA: RX message 1 of 4-Way Handshake from 00:0c:e6:9a:26:bb (ver=2)
  633. RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
  634. WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
  635. RSN: PMKID from Authenticator - hexdump(len=16): 56 27 f8 35 fc ca f7 4b 04 b7 e9 aa 7a 63 63 55
  636. wlp4s0: RSN: no matching PMKID found
  637. EAPOL: Successfully fetched key (len=32)
  638. EAPOL: Successfully fetched key (len=64)
  639. WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
  640. RSN: Added PMKSA cache entry for 00:0c:e6:9a:26:bb network_ctx=0x1783a40
  641. nl80211: Add PMKID for 00:0c:e6:9a:26:bb
  642. wlp4s0: RSN: no PMKSA entry found - trigger full EAP authentication
  643. wlp4s0: RSN: Do not reply to msg 1/4 - requesting full EAP authentication
  644. l2_packet_receive: src=00:0c:e6:9a:26:bb len=14
  645. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  646. RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
  647. EAPOL: Received EAP-Packet frame
  648. EAPOL: startWhen --> 0
  649. EAPOL: authWhile --> 0
  650. l2_packet_receive: src=00:0c:e6:9a:26:bb len=14
  651. wlp4s0: RX EAPOL from 00:0c:e6:9a:26:bb
  652. RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
  653. EAPOL: Received EAP-Packet frame
  654. nl80211: Event message available
  655. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp4s0
  656. wlp4s0: nl80211: Scan trigger
  657. wlp4s0: Event SCAN_STARTED (47) received
  658. wlp4s0: External program started a scan
  659. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  660. nl80211: Event message available
  661. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp4s0
  662. wlp4s0: nl80211: New scan results available
  663. nl80211: Scan probed for SSID ''
  664. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
  665. wlp4s0: Event SCAN_RESULTS (3) received
  666. wlp4s0: Scan completed in 4.934183 seconds
  667. nl80211: Associated on 5180 MHz
  668. nl80211: Associated with 00:0c:e6:9a:26:bb
  669. nl80211: Received scan results (6 BSSes)
  670. nl80211: Scan results indicate BSS status with 00:0c:e6:9a:26:bb as associated
  671. wlp4s0: BSS: Start scan result update 2
  672. BSS: last_scan_res_used=6/32
  673. wlp4s0: New scan results available (own=0 ext=1)
  674. wlp4s0: Do not use results from externally requested scan operation for network selection
  675. nl80211: Event message available
  676. nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp4s0
  677. nl80211: Delete station 00:0c:e6:9a:26:bb
  678. nl80211: Event message available
  679. nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp4s0
  680. nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp4s0(60:57:18:69:6d:6f) A1=00:0c:e6:9a:26:bb A2=60:57:18:69:6d:6f
  681. nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 0c e6 9a 26 bb 60 57 18 69 6d 6f 00 0c e6 9a 26 bb 00 00 03 00
  682. nl80211: Deauthenticate event
  683. wlp4s0: Event DEAUTH (12) received
  684. wlp4s0: Deauthentication notification
  685. wlp4s0: * reason 3 (locally generated)
  686. wlp4s0: * address 00:0c:e6:9a:26:bb
  687. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  688. wlp4s0: CTRL-EVENT-DISCONNECTED bssid=00:0c:e6:9a:26:bb reason=3 locally_generated=1
  689. wlp4s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
  690. wlp4s0: Setting scan request: 0.100000 sec
  691. wlp4s0: Radio work 'sme-connect'@0x179f9c0 done in 37.976781 seconds
  692. Added BSSID 00:0c:e6:9a:26:bb into blacklist
  693. wlp4s0: Another BSS in this ESS has been seen; try it next
  694. BSSID 00:0c:e6:9a:26:bb blacklist count incremented to 2
  695. wlp4s0: Blacklist count 1 --> request scan in 100 ms
  696. wlp4s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
  697. wlp4s0: WPA: Clear old PMK and PTK
  698. wlp4s0: Disconnect event - remove keys
  699. wlp4s0: State: 4WAY_HANDSHAKE -> DISCONNECTED
  700. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  701. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  702. WMM AC: WMM AC is disabled
  703. EAPOL: External notification - portEnabled=0
  704. EAPOL: SUPP_PAE entering state DISCONNECTED
  705. EAPOL: Supplicant port status: Unauthorized
  706. nl80211: Skip set_supp_port(unauthorized) while not associated
  707. EAPOL: SUPP_BE entering state INITIALIZE
  708. EAP: EAP entering state DISABLED
  709. EAPOL: External notification - portValid=0
  710. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 ()
  711. nl80211: Interface down (wlp4s0/wlp4s0)
  712. wlp4s0: Event INTERFACE_DISABLED (27) received
  713. wlp4s0: Interface was disabled
  714. wlp4s0: State: DISCONNECTED -> DISCONNECTED
  715. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  716. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  717. EAPOL: External notification - portEnabled=0
  718. EAPOL: External notification - portValid=0
  719. wlp4s0: State: DISCONNECTED -> INTERFACE_DISABLED
  720. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  721. nl80211: Ignore interface up event since interface wlp4s0 is down
  722. nl80211: Event message available
  723. nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp4s0
  724. nl80211: Ignore disconnect event when using userspace SME
  725. l2_packet_receive - recvfrom: Network is down
  726. nl80211: Event message available
  727. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp4s0
  728. nl80211: Regulatory domain change
  729. * initiator=0
  730. * type=1
  731. wlp4s0: Ignore event CHANNEL_LIST_CHANGED (28) while interface is disabled
  732. RTM_NEWLINK: ifi_index=4 ifname=wlp4s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  733. nl80211: Interface up
  734. wlp4s0: Event INTERFACE_ENABLED (26) received
  735. wlp4s0: Interface was enabled
  736. wlp4s0: State: INTERFACE_DISABLED -> DISCONNECTED
  737. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  738. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  739. wlp4s0: Rescheduling scan request: 0.000000 sec
  740. wlp4s0: State: DISCONNECTED -> SCANNING
  741. wlp4s0: Starting AP scan for wildcard SSID
  742. wlp4s0: Optimize scan based on previously generated frequency list
  743. wlp4s0: Add radio work 'scan'@0x179f9c0
  744. wlp4s0: First radio work item in the queue - schedule start immediately
  745. wlp4s0: Control interface command 'TERMINATE'
  746. wlp4s0: Removing interface wlp4s0
  747. wlp4s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
  748. wlp4s0: State: SCANNING -> DISCONNECTED
  749. nl80211: Set wlp4s0 operstate 0->0 (DORMANT)
  750. netlink: Operstate: ifindex=4 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  751. EAPOL: External notification - portEnabled=0
  752. EAPOL: External notification - portValid=0
  753. RSN: Flush PMKSA cache entry for 00:0c:e6:9a:26:bb
  754. nl80211: Delete PMKID for 00:0c:e6:9a:26:bb
  755. wlp4s0: RSN: PMKSA cache entry free_cb: 00:0c:e6:9a:26:bb reason=0
  756. EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
  757. ENGINE: engine deinit
  758. wlp4s0: WPA: Clear old PMK and PTK
  759. Removed BSSID 00:0c:e6:9a:26:bb from blacklist (clear)
  760. wlp4s0: BSS: Remove id 0 BSSID 00:0c:e6:9a:1b:81 SSID 'eduroam' due to wpa_bss_flush
  761. wlp4s0: BSS: Remove id 5 BSSID 00:0c:e6:9a:56:be SSID 'UIpublicWiFi' due to wpa_bss_flush
  762. wlp4s0: BSS: Remove id 6 BSSID 00:0c:e6:9a:ac:d5 SSID 'UIUCnet' due to wpa_bss_flush
  763. wlp4s0: BSS: Remove id 1 BSSID 00:0c:e6:9a:26:bb SSID 'IllinoisNet' due to wpa_bss_flush
  764. wlp4s0: BSS: Remove id 2 BSSID 00:0c:e6:9a:97:66 SSID 'IllinoisNet' due to wpa_bss_flush
  765. wlp4s0: BSS: Remove id 3 BSSID 00:0c:e6:9a:dc:46 SSID 'eduroam' due to wpa_bss_flush
  766. wlp4s0: BSS: Remove id 4 BSSID 02:1a:11:f3:bb:0b SSID 'KR' due to wpa_bss_flush
  767. wlp4s0: BSS: Remove id 8 BSSID 00:0c:e6:9a:6c:32 SSID 'UIpublicWiFi' due to wpa_bss_flush
  768. wlp4s0: BSS: Remove id 7 BSSID 00:0c:e6:9a:47:60 SSID 'UIUCnet' due to wpa_bss_flush
  769. wlp4s0: Cancelling delayed sched scan
  770. wlp4s0: Cancelling scan request
  771. wlp4s0: Cancelling authentication timeout
  772. Remove interface wlp4s0 from radio phy0
  773. wlp4s0: Remove radio work 'scan'@0x179f9c0
  774. Remove radio phy0
  775. nl80211: deinit ifname=wlp4s0 disabled_11b_rates=0
  776. nl80211: Remove monitor interface: refcount=0
  777. netlink: Operstate: ifindex=4 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  778. nl80211: Set mode ifindex 4 iftype 2 (STATION)
  779. nl80211: Unsubscribe mgmt frames handle 0x8888888889f0b019 (mode change)
  780. wlp4s0: CTRL-EVENT-TERMINATING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement