Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Mar 26th, 2013  |  syntax: None  |  size: 44.57 KB  |  views: 17  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. wpa_supplicant v2.0
  2. Successfully initialized wpa_supplicant
  3. Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  4. Configuration file 'wpa_networkers.conf' -> '/home/jwidel/wpa_networkers.conf'
  5. Reading configuration file '/home/jwidel/wpa_networkers.conf'
  6. Line: 2 - start of a new network block
  7. ssid - hexdump_ascii(len=10):
  8.      6e 65 74 77 6f 72 6b 65 72 73                     networkers      
  9. key_mgmt: 0x1
  10. eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
  11. identity - hexdump_ascii(len=6):
  12.      6a 77 69 64 65 6c                                 jwidel          
  13. password - hexdump_ascii(len=10): [REMOVED]
  14. ca_cert - hexdump_ascii(len=38):
  15.      2f 68 6f 6d 65 2f 6a 77 69 64 65 6c 2f 74 6d 70   /home/jwidel/tmp
  16.      2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65   /rootca-networke
  17.      72 73 2e 70 65 6d                                 rs.pem          
  18. phase1 - hexdump_ascii(len=11):
  19.      70 65 61 70 6c 61 62 65 6c 3d 30                  peaplabel=0    
  20. phase2 - hexdump_ascii(len=13):
  21.      61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2  
  22. priority=10 (0xa)
  23. Priority group 10
  24.    id=0 ssid='networkers'
  25. WEXT: cfg80211-based driver detected
  26. wext: interface wlan0 phy: phy0
  27. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  28. rfkill: initial event: idx=1 type=1 op=0 soft=1 hard=0
  29. rfkill: WLAN soft blocked
  30. rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0
  31. SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  32.   capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  33. netlink: Operstate: linkmode=1, operstate=5
  34. wlan0: Own MAC address: 20:68:9d:d0:49:25
  35. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  36. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  37. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  38. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  39. wpa_driver_wext_set_countermeasures
  40. wlan0: RSN: flushing PMKID list in the driver
  41. wlan0: Setting scan request: 0 sec 100000 usec
  42. WPS: Set UUID for interface wlan0
  43. WPS: UUID based on MAC address - hexdump(len=16): 2f 09 dc a4 48 dd 58 bd 9f ba 5e 5e c0 f2 ea c8
  44. EAPOL: SUPP_PAE entering state DISCONNECTED
  45. EAPOL: Supplicant port status: Unauthorized
  46. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  47. EAPOL: SUPP_BE entering state INITIALIZE
  48. EAP: EAP entering state DISABLED
  49. EAPOL: Supplicant port status: Unauthorized
  50. EAPOL: Supplicant port status: Unauthorized
  51. wlan0: Added interface wlan0
  52. wlan0: State: DISCONNECTED -> DISCONNECTED
  53. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  54. netlink: Operstate: linkmode=-1, operstate=5
  55. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  56. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  57. WEXT: if_removed already cleared - ignore event
  58. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  59. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  60. WEXT: if_removed already cleared - ignore event
  61. Wireless event: cmd=0x8b06 len=12
  62. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  63. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  64. WEXT: if_removed already cleared - ignore event
  65. Wireless event: cmd=0x8b1a len=16
  66. wlan0: State: DISCONNECTED -> SCANNING
  67. wlan0: Starting AP scan for wildcard SSID
  68. Scan requested (ret=0) - scan timeout 10 seconds
  69. EAPOL: disable timer tick
  70. EAPOL: Supplicant port status: Unauthorized
  71. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  72. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  73. WEXT: if_removed already cleared - ignore event
  74. Wireless event: cmd=0x8b19 len=16
  75. wlan0: Event SCAN_RESULTS (3) received
  76. Received 3726 bytes of scan results (7 BSSes)
  77. wlan0: BSS: Start scan result update 1
  78. wlan0: BSS: Add new id 0 BSSID 20:3a:07:97:15:72 SSID 'networkers'
  79. wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:70 SSID 'networkers-data'
  80. wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:71 SSID '\x00'
  81. wlan0: BSS: Add new id 3 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42'
  82. wlan0: BSS: Add new id 4 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279'
  83. wlan0: BSS: Add new id 5 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0'
  84. wlan0: BSS: Add new id 6 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET'
  85. BSS: last_scan_res_used=7/32 last_scan_full=0
  86. wlan0: New scan results available
  87. WPS: AP 90:94:e4:35:57:ba type 0 added
  88. WPS: AP 00:19:70:79:97:c8 type 0 added
  89. WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  90. WPS: AP[1] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  91. wlan0: Selecting BSS from priority group 10
  92. wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-57
  93. wlan0:    selected based on RSN IE
  94. wlan0:    selected BSS 20:3a:07:97:15:72 ssid='networkers'
  95. wlan0: Request association: reassociate: 0  selected: 20:3a:07:97:15:72  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
  96. wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2462 MHz)
  97. wlan0: Cancelling scan request
  98. wlan0: WPA: clearing own WPA/RSN IE
  99. wlan0: Automatic auth_alg selection: 0x1
  100. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  101. RSN: Search for BSSID 20:3a:07:97:15:72
  102. RSN: No PMKSA cache entry found
  103. wlan0: RSN: using IEEE 802.11i/D9.0
  104. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  105. wlan0: WPA: clearing AP WPA IE
  106. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  107. wlan0: WPA: using GTK CCMP
  108. wlan0: WPA: using PTK CCMP
  109. wlan0: WPA: using KEY_MGMT 802.1X
  110. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  111. wlan0: No keys have been configured - skip key clearing
  112. wlan0: State: SCANNING -> ASSOCIATING
  113. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  114. netlink: Operstate: linkmode=-1, operstate=5
  115. Limit connection to BSSID 20:3a:07:97:15:72 freq=2462 MHz based on scan results (bssid_set=0)
  116. wlan0: set_disable_max_amsdu: -1
  117. wlan0: set_ampdu_factor: -1
  118. wlan0: set_ampdu_density: -1
  119. wlan0: set_disable_ht40: 0
  120. wlan0: set_disable_sgi: 0
  121. wpa_driver_wext_associate
  122. wpa_driver_wext_set_drop_unencrypted
  123. wpa_driver_wext_set_psk
  124. wlan0: Setting authentication timeout: 10 sec 0 usec
  125. EAPOL: External notification - EAP success=0
  126. EAPOL: Supplicant port status: Unauthorized
  127. EAPOL: External notification - EAP fail=0
  128. EAPOL: Supplicant port status: Unauthorized
  129. EAPOL: External notification - portControl=Auto
  130. EAPOL: Supplicant port status: Unauthorized
  131. RSN: Ignored PMKID candidate without preauth flag
  132. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  133. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  134. WEXT: if_removed already cleared - ignore event
  135. Wireless event: cmd=0x8b1a len=16
  136. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  137. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  138. WEXT: if_removed already cleared - ignore event
  139. Wireless event: cmd=0x8b06 len=12
  140. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  141. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  142. WEXT: if_removed already cleared - ignore event
  143. Wireless event: cmd=0x8b04 len=16
  144. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  145. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  146. WEXT: if_removed already cleared - ignore event
  147. Wireless event: cmd=0x8b1a len=26
  148. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  149. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  150. WEXT: if_removed already cleared - ignore event
  151. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  152. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  153. WEXT: if_removed already cleared - ignore event
  154. Wireless event: cmd=0x8c08 len=110
  155. AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  156. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  157. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  158. WEXT: if_removed already cleared - ignore event
  159. Wireless event: cmd=0x8b15 len=24
  160. Wireless event: new AP: 20:3a:07:97:15:72
  161. wlan0: Event ASSOCINFO (4) received
  162. wlan0: Association info event
  163. resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  164. wlan0: Event ASSOC (0) received
  165. wlan0: State: ASSOCIATING -> ASSOCIATED
  166. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  167. netlink: Operstate: linkmode=-1, operstate=5
  168. wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
  169. wlan0: No keys have been configured - skip key clearing
  170. wlan0: Associated with 20:3a:07:97:15:72
  171. wlan0: WPA: Association event - clear replay counter
  172. wlan0: WPA: Clear old PTK
  173. EAPOL: External notification - portEnabled=0
  174. EAPOL: Supplicant port status: Unauthorized
  175. EAPOL: External notification - portValid=0
  176. EAPOL: Supplicant port status: Unauthorized
  177. EAPOL: External notification - portEnabled=1
  178. EAPOL: SUPP_PAE entering state CONNECTING
  179. EAPOL: enable timer tick
  180. EAPOL: SUPP_BE entering state IDLE
  181. EAP: EAP entering state INITIALIZE
  182. EAP: EAP entering state IDLE
  183. wlan0: Setting authentication timeout: 10 sec 0 usec
  184. wlan0: Cancelling scan request
  185. wlan0: RX EAPOL from 20:3a:07:97:15:72
  186. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  187. wlan0: Setting authentication timeout: 70 sec 0 usec
  188. EAPOL: Received EAP-Packet frame
  189. EAPOL: SUPP_PAE entering state RESTART
  190. EAP: EAP entering state INITIALIZE
  191. EAP: EAP entering state IDLE
  192. EAPOL: SUPP_PAE entering state AUTHENTICATING
  193. EAPOL: SUPP_BE entering state REQUEST
  194. EAPOL: getSuppRsp
  195. EAP: EAP entering state RECEIVED
  196. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  197. EAP: EAP entering state IDENTITY
  198. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  199. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  200.      00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f   _networkid=netwo
  201.      72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d   rkers,nasid=WLC-
  202.      31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31   1-NET-MGMT-MDF-1
  203.      2c 70 6f 72 74 69 64 3d 31                        ,portid=1      
  204. EAP: using real identity - hexdump_ascii(len=6):
  205.      6a 77 69 64 65 6c                                 jwidel          
  206. EAP: EAP entering state SEND_RESPONSE
  207. EAP: EAP entering state IDLE
  208. EAPOL: SUPP_BE entering state RESPONSE
  209. EAPOL: txSuppRsp
  210. TX EAPOL: dst=20:3a:07:97:15:72
  211. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
  212. EAPOL: SUPP_BE entering state RECEIVE
  213. wlan0: RX EAPOL from 20:3a:07:97:15:72
  214. RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 03 2b 41 ac 1b 9b b8 c6 ad bc c1 c6 bb bd 23 3b
  215. EAPOL: Received EAP-Packet frame
  216. EAPOL: SUPP_BE entering state REQUEST
  217. EAPOL: getSuppRsp
  218. EAP: EAP entering state RECEIVED
  219. EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0
  220. EAP: EAP entering state GET_METHOD
  221. EAP: configuration does not allow: vendor 0 method 4
  222. EAP: vendor 0 method 4 not allowed
  223. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  224. EAP: Status notification: refuse proposed method (param=MD5)
  225. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  226. EAP: allowed methods - hexdump(len=1): 19
  227. EAP: EAP entering state SEND_RESPONSE
  228. EAP: EAP entering state IDLE
  229. EAPOL: SUPP_BE entering state RESPONSE
  230. EAPOL: txSuppRsp
  231. TX EAPOL: dst=20:3a:07:97:15:72
  232. TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19
  233. EAPOL: SUPP_BE entering state RECEIVE
  234. wlan0: RX EAPOL from 20:3a:07:97:15:72
  235. RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20
  236. EAPOL: Received EAP-Packet frame
  237. EAPOL: SUPP_BE entering state REQUEST
  238. EAPOL: getSuppRsp
  239. EAP: EAP entering state RECEIVED
  240. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  241. EAP: EAP entering state GET_METHOD
  242. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  243. EAP: Status notification: accept proposed method (param=PEAP)
  244. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  245. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  246. TLS: using phase1 config options
  247. TLS: Trusted root certificate(s) loaded
  248. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  249. EAP: EAP entering state METHOD
  250. SSL: Received packet(len=6) - Flags 0x20
  251. EAP-PEAP: Start (server ver=0, own ver=1)
  252. EAP-PEAP: Using PEAP version 0
  253. SSL: (where=0x10 ret=0x1)
  254. SSL: (where=0x1001 ret=0x1)
  255. SSL: SSL_connect:before/connect initialization
  256. SSL: (where=0x1001 ret=0x1)
  257. SSL: SSL_connect:SSLv3 write client hello A
  258. SSL: (where=0x1002 ret=0xffffffff)
  259. SSL: SSL_connect:error in SSLv3 read server hello A
  260. SSL: SSL_connect - want more data
  261. SSL: 223 bytes pending from ssl_out
  262. SSL: 223 bytes left to be sent out (of total 223 bytes)
  263. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  264. EAP: EAP entering state SEND_RESPONSE
  265. EAP: EAP entering state IDLE
  266. EAPOL: SUPP_BE entering state RESPONSE
  267. EAPOL: txSuppRsp
  268. TX EAPOL: dst=20:3a:07:97:15:72
  269. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 51 95 51 4c 8d 09 c9 f5 05 66 7b 0d 95 b1 a8 c3 62 46 fe b4 24 8d 16 e1 df a0 92 b0 5c 2b aa 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  270. EAPOL: SUPP_BE entering state RECEIVE
  271. wlan0: RX EAPOL from 20:3a:07:97:15:72
  272. RX EAPOL - hexdump(len=1028): 02 00 04 00 01 04 04 00 19 c0 00 00 0f 0c 16 03 01 00 31 02 00 00 2d 03 01 51 51 95 53 6b ae 47 e4 4a f7 67 eb b7 d8 85 65 52 5f a8 de 2e 36 19 3f 9e 20 16 f4 a1 ca bc ba 00 00 39 00 00 05 ff 01 00 01 00 16 03 01 0c b6 0b 00 0c b2 00 0c af 00 04 13 30 82 04 0f 30 82 02 f7 a0 03 02 01 02 02 01 0d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 32 32 32 31 32 36 35 32 5a 17 0d 32 38 30 32 31 39 32 31 32 36 35 32 5a 30 81 94 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 21 30 1f 06 03 55 04 03 13 18 72 61 64 69 75 73 31 2e 6e 65 74 77 6f 72 6b 65 72 73 2e 6c 6f 63 61 6c 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e0 79 50 d8 dc 34 e3 84 41 fb 6d c2 ad 77 1c 2e 0c 7e 06 fa 57 9c 58 1e 6b d1 84 25 a2 12 de 0d 82 18 af d7 ee 9a f1 16 24 26 25 e0 15 8b 70 24 98 17 93 5b 4e 43 04 ac 1c 91 db 6a bf 82 45 65 d5 53 d4 01 8c 78 27 07 5d 5e 6a 02 8e d9 8c 37 47 2b a4 fc a5 f7 f8 dd 3f 7d 3d bc bd 09 e7 0c 13 1a 62 ca 44 2c 1d 96 6e 84 37 83 98 53 a0 ec dd 7e 7a ef 60 31 21 66 07 03 0c bd 5e d9 c7 78 26 11 3f 2f 9f 94 5e 67 ed 27 78 2a 56 86 dc 4f 38 c8 f1 56 f6 aa 2d f7 05 c4 87 f5 ed 08 b2 73 45 fb 52 c5 d4 bd 53 ed 34 d8 90 ab d1 25 d6 fd 0e 92 68 a8 c5 aa 5f 83 70 bb e8 fb cd cf 96 a6 90 e1 f0 61 23 16 9d 2e 34 ed a5 6b be 8e 0b 92 79 de 5f 5f e7 4d 4e 65 b4 32 c6 61 e0 30 f9 e4 fe 06 28 c3 14 69 11 a2 87 33 7b d1 4f 7f 05 91 79 5b c3 5d 7f 6e e2 52 08 3e 9c 40 6f fc 36 93 02 03 01 00 01 a3 7b 30 79 30 09 06 03 55 1d 13 04 02 30 00 30 2c 06 09 60 86 48 01 86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 53 4c 20 47 65 6e 65 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 16 04 14 55 33 38 cb 7d 01 e7 6d a7 b6 b9 3f e8 33 05 22 95 2a 9b 6c 30 1f 06 03 55 1d 23 04 18 30 16 80 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 68 cd 51 3b 47 b3 5f 86 55 b7 9f a3 20 59 2f f5 2c 6d 90 58 2f 9f a2 f4 e5 0b 30 ea 7e 4a ed f1 e5 cc 24 86 d2 b8 f1 12 b0 59 be 5a 38 9f 89 12 17 86 69 aa c5 29 61 21 e9 be 6b ae 9c a4 70 de a2 37 50 c7 e4 68 d3 29 d8 79 79 92 1f f8 e0 31 de c2 5f 33 71 a6 fc fb c0 03 54 e0 a8 72 22 d3 d5 6f f0 91 b0 0f 61 d7 35 ff 71 4b 57 65 cd 13 d9 64 d8 f6 df 1d f7 65 f9 47 c2 16 8f 9f 1d 19 bd 98 1f 30 c3 fd ec a2 3b bc a4 1e b2 a4 4b 4f 3b b3 be 89 80 73 d3 81 ff ff cc d3 90 a1
  273. EAPOL: Received EAP-Packet frame
  274. EAPOL: SUPP_BE entering state REQUEST
  275. EAPOL: getSuppRsp
  276. EAP: EAP entering state RECEIVED
  277. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  278. EAP: EAP entering state METHOD
  279. SSL: Received packet(len=1024) - Flags 0xc0
  280. SSL: TLS Message Length: 3852
  281. SSL: Need 2838 bytes more input data
  282. SSL: Building ACK (type=25 id=4 ver=0)
  283. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  284. EAP: EAP entering state SEND_RESPONSE
  285. EAP: EAP entering state IDLE
  286. EAPOL: SUPP_BE entering state RESPONSE
  287. EAPOL: txSuppRsp
  288. TX EAPOL: dst=20:3a:07:97:15:72
  289. TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
  290. EAPOL: SUPP_BE entering state RECEIVE
  291. wlan0: RX EAPOL from 20:3a:07:97:15:72
  292. RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 05 03 fc 19 40 81 86 8c 71 0d 01 40 f4 81 e1 4a 8c 19 2d 1d 1c 05 b1 98 5e fa 21 b7 d2 0a dc 65 2c e8 99 5d 53 2d c4 13 b2 ab e3 52 46 aa 1f b9 3f ce f2 c1 95 57 98 de 6c fe 88 63 40 13 5a 34 1b 2f 0e ac ec e7 b2 fa 1f c5 46 cf 30 55 09 18 06 7c 57 55 d0 4e 07 be 0f 25 c3 88 fd 19 4d 80 41 e3 12 56 02 34 1f 00 04 53 30 82 04 4f 30 82 03 37 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b ea 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 32 30 33 30 34 33 5a 17 0d 33 33 30 31 32 37 32 30 33 30 34 33 5a 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 dc 31 39 98 9c a1 6f 4e fb 31 7a ec 6d 0c 59 5d 7b 2c 11 74 76 06 87 d2 60 97 c4 95 35 1b 35 89 61 a9 bb 6f 83 6a 76 dd e6 77 4e 9d 1b b0 b0 c0 e0 f7 0b 66 e3 2d 6d d0 f2 63 60 15 cc f1 8b 7a c6 79 28 9f a9 53 06 5b 63 6d b0 e3 d7 9e 17 a0 f2 dc 55 b5 5f 74 31 4d 4c 91 bc 9f 3c ac 6a 17 37 69 6d 03 43 0c 3c 97 fe c4 c3 70 38 6a b3 7a 95 9e 9a 72 b3 50 58 a7 a8 f6 47 74 8b 67 7f fb d4 82 7c 67 12 73 70 28 d5 ff a6 ed 42 07 e5 8d 2f 1c db de 44 f4 b3 6b ff 36 e7 67 cf 18 08 e6 4e 7a d7 9e 5a f5 0f 0e 05 26 42 76 5f 30 ed 5a 94 5b f3 a9 64 1d a1 e8 7c 8f eb 81 64 38 e1 15 fa 75 0a 94 1a 24 0d 71 d0 d4 8e 67 be e3 84 38 e8 1d 48 7e 85 9e b8 a5 5a bf f2 0d bd 3b fc 08 04 48 4b bd 93 39 27 fc f2 bc 79 bc e2 c8 4c 06 e3 3b d9 72 af 25 ce 3e ef 73 99 6e ba 74 ac 73 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 53 2a d6 45 13 bc a6 a7 49 b3 a9 32 65 b3 23 fc 97 48 f3 22 ea c7 03 c7 40 bc 4b 44 86 49 cd 3c da b6 7d 4b a0 fb 0d 87 cc 9e 7c 92 14 0c 6d 47 86 8f 26 8a 0a d5 98 8f 30 1d f6 55 66 75
  293. EAPOL: Received EAP-Packet frame
  294. EAPOL: SUPP_BE entering state REQUEST
  295. EAPOL: getSuppRsp
  296. EAP: EAP entering state RECEIVED
  297. EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
  298. EAP: EAP entering state METHOD
  299. SSL: Received packet(len=1020) - Flags 0x40
  300. SSL: Need 1824 bytes more input data
  301. SSL: Building ACK (type=25 id=5 ver=0)
  302. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  303. EAP: EAP entering state SEND_RESPONSE
  304. EAP: EAP entering state IDLE
  305. EAPOL: SUPP_BE entering state RESPONSE
  306. EAPOL: txSuppRsp
  307. TX EAPOL: dst=20:3a:07:97:15:72
  308. TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
  309. EAPOL: SUPP_BE entering state RECEIVE
  310. wlan0: RX EAPOL from 20:3a:07:97:15:72
  311. RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 06 03 fc 19 40 e8 5a 74 a4 94 66 39 f6 8e bd bd 33 a0 bf 10 c5 29 3c c8 9e 50 f9 32 52 42 8f 19 65 75 cf fc ac a2 58 c7 87 c5 bc 04 71 9f 13 82 d4 13 ae 46 67 b1 34 34 20 91 bb b2 a0 f2 e3 d4 17 b5 6a 7e 5c ff 65 09 c1 4a 4d 4d 2e 06 7a 0b 20 c2 12 67 d9 67 67 de a3 86 c4 f2 36 4e 4a 56 c4 ee e4 b2 06 6b e2 4b 0b 33 35 74 3d 3e 74 dc 86 10 cd 54 71 3a 6b b7 c7 e8 9a 01 70 54 f2 2f de cb 67 c9 be 3a ba 01 cc e0 9f 95 ab 7d d7 0b d2 79 a4 c2 7c 48 54 68 b1 23 17 78 b3 1e 59 e4 78 90 a9 9c 01 5d c8 ea 07 76 43 db b0 66 e1 84 10 9f 55 a8 2b 41 99 ab 7b ca f7 6e 0b bd b0 5b 0f c8 95 4d b9 64 b0 00 04 40 30 82 04 3c 30 82 03 24 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b e9 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 31 38 35 34 34 39 5a 17 0d 34 33 30 31 32 35 31 38 35 34 34 39 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a9 73 32 65 98 c1 13 31 31 63 37 b7 e1 d0 a5 77 e1 07 28 1e 5c 9b c0 21 29 99 29 49 46 61 83 3c 66 f7 cf e7 88 5c da 07 ee 8d 22 1f 77 7c f0 88 34 9d 75 c3 6f cf 54 72 17 1e 11 41 b7 0f 8e 15 c9 c4 ad 90 b8 e0 e4 2d 6b 9f cf 3c 9f e0 00 20 d1 1c 35 df 08 d3 92 25 15 b6 4c d2 58 36 d2 c0 52 8b 80 1c 5c 11 e7 28 7e e1 31 59 5e 81 a4 d7 80 bc 06 92 9f f4 6e 7c 3d a6 f7 a2 c1 ed 7c c5 91 4e fc 03 da ed b7 da 1c e7 b9 c4 4c bc df 69 c6 08 58 b0 f2 02 36 ee 52 d4 04 79 e2 61 87 3f 9e 31 bb ae 9f d8 b8 69 67 3f c4 58 ac 46 94 6f 99 c0 34 e1 85 90 ca 2e 9d c1 e0 2d 3e b7 65 5e bd 8c 6f 9d af 54 70 e8 4c 1b be e4 5d 51 47 1a 8f c9 0c 78 69 f2 bc f6 77 9d cd 06 a4 4a fd 95 a5 2b 7f 73 e3 1d 7a 94 0c a5 2b 3a 1c 9a 9a a9 ff 1d 31 94 1b a9 f4 e8 63 0d 29 bb 38 43 cc 35 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a
  312. EAPOL: Received EAP-Packet frame
  313. EAPOL: SUPP_BE entering state REQUEST
  314. EAPOL: getSuppRsp
  315. EAP: EAP entering state RECEIVED
  316. EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
  317. EAP: EAP entering state METHOD
  318. SSL: Received packet(len=1020) - Flags 0x40
  319. SSL: Need 810 bytes more input data
  320. SSL: Building ACK (type=25 id=6 ver=0)
  321. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  322. EAP: EAP entering state SEND_RESPONSE
  323. EAP: EAP entering state IDLE
  324. EAPOL: SUPP_BE entering state RESPONSE
  325. EAPOL: txSuppRsp
  326. TX EAPOL: dst=20:3a:07:97:15:72
  327. TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00
  328. EAPOL: SUPP_BE entering state RECEIVE
  329. wlan0: RX EAPOL from 20:3a:07:97:15:72
  330. RX EAPOL - hexdump(len=820): 02 00 03 30 01 07 03 30 19 00 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 2b d4 1d a8 76 72 e7 52 60 a7 68 fe 7f d7 f0 58 42 9a 94 d4 5f f8 65 5c 2e d9 c1 ff de 33 30 f3 89 c8 67 55 8e eb e5 94 66 ad df ff 95 ea f0 c5 50 4b 5e d1 94 9a b8 3f f3 68 41 f3 68 b8 b2 37 69 36 90 80 27 e9 90 15 b2 0f 12 89 9b 9f af a7 48 25 7d 7c ad 56 04 cd c3 68 7c 8d b1 7c 66 5b 3e 45 90 b2 c8 76 78 3d 6e 4c fd 77 a1 37 d7 e5 15 60 d4 18 fc 40 40 f0 82 d3 45 0e ca c3 5c 49 d8 20 9d 22 63 ca 48 79 9d ca 26 b7 f1 39 e1 e3 7d 82 64 d0 51 b9 05 96 e4 6a fc 59 5a 10 2c 1b 56 ff c3 7f d1 81 db bf ce fb 0f 71 a4 df 22 84 92 87 62 a0 7a 39 ed 2f 0b 26 6c 8f ad d4 32 c0 93 6b c9 7f df 18 73 52 ff 00 cd 54 84 b9 30 bd 7f 03 51 99 ed d9 a7 d2 e8 65 58 0e 73 1d c9 c8 47 53 4b 85 5a 0e 4d dd e9 7a 79 61 e6 ef bd d3 11 a8 93 54 d9 fb 4c 0a b1 3a 0a 77 0c 0b 49 87 16 03 01 02 0d 0c 00 02 09 00 80 e1 1c b9 f7 d1 bd 7a 76 58 0e 61 57 73 03 a4 eb 32 66 db 69 5b f2 c6 fa e8 37 86 dc b6 b2 c4 0d ca 4c 03 61 78 69 af 20 aa c0 12 71 12 4a c6 86 5d c1 45 80 68 9f a9 79 23 bf 23 d5 5d 70 93 f5 7e ce 9a 65 99 8e dd 35 b9 07 c8 cb 31 27 f0 05 4c 6d cf 90 1e ac 1a 8c f1 4d 85 d4 4b ab f4 1a 8a bf 04 c4 83 93 f7 5b 67 da bf 27 c6 0f 61 f3 c7 bf 97 66 4e 36 c9 3f c1 9a 7f db 9a 86 2b 5b 00 01 02 00 80 68 fb bc 03 aa ad f4 2c 29 ab f9 b1 09 b6 02 cf c5 1f 8a f6 2c 9d 46 fe 60 7a 28 8d 7c 5a 64 bb 6a 07 a8 f6 d8 1f f4 cf bb 82 fc 78 c8 fa c2 75 ca ec 95 02 15 3d 43 6b ac a1 87 8b ec 03 10 89 9f c1 09 67 5d 48 b6 36 7f 08 87 dd d7 1e 4c 1e fb 86 d9 fb 31 98 a4 b4 ba aa ff b9 44 de 98 29 fc 08 cb cf 62 7c 92 69 27 79 ec 1d 31 58 bc 72 fc 9d 63 ab b6 0c 2b 61 2b bf d5 fe 96 a9 74 9a 01 00 60 9c ee a9 72 c9 9f 12 ef 5d 88 d1 7e 50 8d fe 84 74 ea 20 d1 51 16 ab 8c df 40 0a be c4 8a 33 b0 fe 5f a1 1a be 69 f9 8d a3 c0 d3 3f 94 d1 39 45 30 e4 ea 5b 91 40 16 bb d3 7c 3e 53 ea 3b 8a 46 40 a3 ac 0a 02 59 09 20 b7 99 4e 68 4d 17 6b 62 4d bc 2a 8b a7 1d 28 0e c9 af 3a ba 21 93 cd cb 56 c2 a0 60 9a ac ef ef c1 f9 ca 1d 21 fe 73 5e 93 79 45 38 e9 10 25 d5 df ba 0d f2 75 48 e8 ce f3 24 6d 9e b8 51 77 7a 23 e9 dd b3 36 ae fe aa a4 97 cf 8a fd fb 45 0f 7a a5 87 d8 af ec 73 fd d8 33 70 4b 93 8a d1 4c 09 33 6e 4e 8c 8c 02 86 0d 12 fd 31 c9 a4 9f 8b 64 91 a5 3b 01 4b 6a ca 96 b6 7a 89 ad 9f ab a2 11 db 0a 35 a5 32 3b 4a 10 fb 35 52 25 34 47 23 92 37 c0 c7 1f c4 0a 82 35 74 7f 39 3f e3 07 e4 f5 9d 40 1d 6e fe fc e0 66 c4 a0 dd 1a 55 f9 ca 16 c8 70 a8 fd 2c 30 16 03 01 00 04 0e 00 00 00
  331. EAPOL: Received EAP-Packet frame
  332. EAPOL: SUPP_BE entering state REQUEST
  333. EAPOL: getSuppRsp
  334. EAP: EAP entering state RECEIVED
  335. EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
  336. EAP: EAP entering state METHOD
  337. SSL: Received packet(len=816) - Flags 0x00
  338. SSL: (where=0x1001 ret=0x1)
  339. SSL: SSL_connect:SSLv3 read server hello A
  340. TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 buf='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl'
  341. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl'
  342. EAP: Status notification: remote certificate verification (param=success)
  343. TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl'
  344. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl'
  345. EAP: Status notification: remote certificate verification (param=success)
  346. TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl'
  347. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl'
  348. EAP: Status notification: remote certificate verification (param=success)
  349. SSL: (where=0x1001 ret=0x1)
  350. SSL: SSL_connect:SSLv3 read server certificate A
  351. SSL: (where=0x1001 ret=0x1)
  352. SSL: SSL_connect:SSLv3 read server key exchange A
  353. SSL: (where=0x1001 ret=0x1)
  354. SSL: SSL_connect:SSLv3 read server done A
  355. SSL: (where=0x1001 ret=0x1)
  356. SSL: SSL_connect:SSLv3 write client key exchange A
  357. SSL: (where=0x1001 ret=0x1)
  358. SSL: SSL_connect:SSLv3 write change cipher spec A
  359. SSL: (where=0x1001 ret=0x1)
  360. SSL: SSL_connect:SSLv3 write finished A
  361. SSL: (where=0x1001 ret=0x1)
  362. SSL: SSL_connect:SSLv3 flush data
  363. SSL: (where=0x1002 ret=0xffffffff)
  364. SSL: SSL_connect:error in SSLv3 read finished A
  365. SSL: SSL_connect - want more data
  366. SSL: 198 bytes pending from ssl_out
  367. SSL: 198 bytes left to be sent out (of total 198 bytes)
  368. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  369. EAP: EAP entering state SEND_RESPONSE
  370. EAP: EAP entering state IDLE
  371. EAPOL: SUPP_BE entering state RESPONSE
  372. EAPOL: txSuppRsp
  373. TX EAPOL: dst=20:3a:07:97:15:72
  374. TX EAPOL - hexdump(len=212): 01 00 00 d0 02 07 00 d0 19 80 00 00 00 c6 16 03 01 00 86 10 00 00 82 00 80 44 9d ab 74 09 e0 54 ba 19 b5 0e bd 66 3d 90 ae 12 82 02 2a e1 ca 0f 8d 54 2f 6c b5 4f 3f 65 35 f2 d6 a3 bf af 80 87 6a a7 a7 f1 57 62 87 60 b8 b8 57 ed 6d 6a f0 82 44 83 91 ea 40 3d fd 1d a6 73 da 4f c3 b4 85 bb 09 0c 8b fb 2f bb 6d 46 02 f1 7a e0 1d a8 0d f1 7e 81 f7 fa d2 e7 21 67 aa 84 63 0a ee cd 00 e9 14 6e 14 31 79 b1 97 60 e7 cc 40 89 b8 19 d9 40 59 c6 d4 93 c0 53 41 bc a5 14 03 01 00 01 01 16 03 01 00 30 11 71 f2 f9 20 24 22 ea 6f 99 36 f9 1f a0 10 f6 55 ca b7 d2 50 f8 03 db 3c 60 48 58 62 87 0e bc 6b a0 a7 4e a2 7e ac f4 6a 12 e2 78 f2 7c 9f e9
  375. EAPOL: SUPP_BE entering state RECEIVE
  376. wlan0: RX EAPOL from 20:3a:07:97:15:72
  377. RX EAPOL - hexdump(len=69): 02 00 00 41 01 08 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 13 3c 18 b1 39 30 91 9f c6 0a b1 2a 28 95 86 0f 9f b7 9c f9 ae e9 a9 7a 14 1c 80 89 24 54 ce 24 c8 89 0e b4 e6 8c 6b dc 21 3f a6 f5 a0 7f cc ca
  378. EAPOL: Received EAP-Packet frame
  379. EAPOL: SUPP_BE entering state REQUEST
  380. EAPOL: getSuppRsp
  381. EAP: EAP entering state RECEIVED
  382. EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
  383. EAP: EAP entering state METHOD
  384. SSL: Received packet(len=65) - Flags 0x00
  385. SSL: (where=0x1001 ret=0x1)
  386. SSL: SSL_connect:SSLv3 read finished A
  387. SSL: (where=0x20 ret=0x1)
  388. SSL: (where=0x1002 ret=0x1)
  389. SSL: 0 bytes pending from ssl_out
  390. SSL: No Application Data included
  391. SSL: No data to be sent out
  392. EAP-PEAP: TLS done, proceed to Phase 2
  393. EAP-PEAP: using label 'client EAP encryption' in key derivation
  394. OpenSSL: Using internal PRF
  395. EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
  396. SSL: Building ACK (type=25 id=8 ver=0)
  397. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  398. EAP: EAP entering state SEND_RESPONSE
  399. EAP: EAP entering state IDLE
  400. EAPOL: SUPP_BE entering state RESPONSE
  401. EAPOL: txSuppRsp
  402. TX EAPOL: dst=20:3a:07:97:15:72
  403. TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 19 00
  404. EAPOL: SUPP_BE entering state RECEIVE
  405. wlan0: RX EAPOL from 20:3a:07:97:15:72
  406. RX EAPOL - hexdump(len=47): 02 00 00 2b 01 09 00 2b 19 00 17 03 01 00 20 f1 5a 03 23 52 5c 5f 71 b2 79 b0 61 4b 26 78 37 e0 cb 40 e3 ea 65 2a 10 81 ae 99 5d 86 00 2b 17
  407. EAPOL: Received EAP-Packet frame
  408. EAPOL: SUPP_BE entering state REQUEST
  409. EAPOL: getSuppRsp
  410. EAP: EAP entering state RECEIVED
  411. EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
  412. EAP: EAP entering state METHOD
  413. SSL: Received packet(len=43) - Flags 0x00
  414. EAP-PEAP: received 37 bytes encrypted data for Phase 2
  415. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 09 00 05 01
  416. EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
  417. EAP-PEAP: Phase 2 Request: type=1
  418. EAP: using real identity - hexdump_ascii(len=6):
  419.      6a 77 69 64 65 6c                                 jwidel          
  420. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  421. SSL: 74 bytes left to be sent out (of total 74 bytes)
  422. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  423. EAP: EAP entering state SEND_RESPONSE
  424. EAP: EAP entering state IDLE
  425. EAPOL: SUPP_BE entering state RESPONSE
  426. EAPOL: txSuppRsp
  427. TX EAPOL: dst=20:3a:07:97:15:72
  428. TX EAPOL - hexdump(len=84): 01 00 00 50 02 09 00 50 19 00 17 03 01 00 20 40 d6 a0 72 da 2c 74 de 5e 94 dd 38 7e 02 51 37 dd 05 4e f7 3f 5d 3a c8 2b 84 20 6a 4c e1 d7 ad 17 03 01 00 20 54 15 30 c7 03 cd 45 c9 28 73 cb 00 dd 16 ca 93 cd 95 12 2d f2 ac 89 f6 03 b2 25 83 87 33 eb 6f
  429. EAPOL: SUPP_BE entering state RECEIVE
  430. wlan0: RX EAPOL from 20:3a:07:97:15:72
  431. RX EAPOL - hexdump(len=79): 02 00 00 4b 01 0a 00 4b 19 00 17 03 01 00 40 9e 4b 8d ba 68 f7 9a 0c 51 57 53 c1 b5 a8 74 c6 f7 df ee e0 d8 36 7f d8 11 91 49 70 11 49 8d b7 c4 b4 f0 13 93 e7 29 20 79 c8 f7 32 15 d6 e2 d4 81 d0 76 19 88 0c 50 df 19 e6 04 72 2d bb 7c 74
  432. EAPOL: Received EAP-Packet frame
  433. EAPOL: SUPP_BE entering state REQUEST
  434. EAPOL: getSuppRsp
  435. EAP: EAP entering state RECEIVED
  436. EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
  437. EAP: EAP entering state METHOD
  438. SSL: Received packet(len=75) - Flags 0x00
  439. EAP-PEAP: received 69 bytes encrypted data for Phase 2
  440. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=28): 1a 01 0a 00 1b 10 9c af 34 80 9d a8 56 c2 3d d5 25 b5 68 9c ba c0 6a 77 69 64 65 6c
  441. EAP-PEAP: received Phase 2: code=1 identifier=10 length=32
  442. EAP-PEAP: Phase 2 Request: type=26
  443. EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
  444. EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10
  445. EAP-MSCHAPV2: Received challenge
  446. EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=6):
  447.      6a 77 69 64 65 6c                                 jwidel          
  448. EAP-MSCHAPV2: Generating Challenge Response
  449. MSCHAPV2: Identity - hexdump_ascii(len=6):
  450.      6a 77 69 64 65 6c                                 jwidel          
  451. MSCHAPV2: Username - hexdump_ascii(len=6):
  452.      6a 77 69 64 65 6c                                 jwidel          
  453. MSCHAPV2: auth_challenge - hexdump(len=16): 9c af 34 80 9d a8 56 c2 3d d5 25 b5 68 9c ba c0
  454. MSCHAPV2: peer_challenge - hexdump(len=16): 92 0b de c6 b2 ac f7 52 aa 83 f4 59 30 bd 39 b0
  455. MSCHAPV2: username - hexdump_ascii(len=6):
  456.      6a 77 69 64 65 6c                                 jwidel          
  457. MSCHAPV2: password - hexdump_ascii(len=10): [REMOVED]
  458. MSCHAPV2: NT Response - hexdump(len=24): f7 43 ef f4 9b 2f fb db d5 38 b5 42 31 54 5c e8 67 10 cf 78 01 2d f0 73
  459. MSCHAPV2: Auth Response - hexdump(len=20): c0 a5 d0 36 ec a1 2a 9c eb b6 02 2d 51 47 3e 17 a9 db 35 ba
  460. MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
  461. EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response)
  462. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=65): [REMOVED]
  463. SSL: 138 bytes left to be sent out (of total 138 bytes)
  464. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  465. EAP: EAP entering state SEND_RESPONSE
  466. EAP: EAP entering state IDLE
  467. EAPOL: SUPP_BE entering state RESPONSE
  468. EAPOL: txSuppRsp
  469. TX EAPOL: dst=20:3a:07:97:15:72
  470. TX EAPOL - hexdump(len=148): 01 00 00 90 02 0a 00 90 19 00 17 03 01 00 20 01 4c fb f9 28 e5 33 11 f1 1c 3e 4c 78 c1 46 e0 40 5c f0 2f c8 e5 6f fc 9e 60 a9 c5 62 00 b1 53 17 03 01 00 60 9c 75 f7 63 34 ca 0a 0f 29 98 52 a7 b5 3f 16 ec 2b 12 27 a2 38 cd e7 f5 8f 01 1b b8 6b 6d 57 6d d1 12 22 6b dc 74 4e 8a a5 63 f3 d7 59 6a 9c 1e 19 a9 0f 17 fb ac 4d 9c 00 1d 74 b0 cb b3 e0 ca 6e 79 93 97 ca 52 17 3b 9b e7 7a 57 e4 5d 8d b3 33 40 ce 3a a7 0e b7 b7 6f 01 ed 25 b3 50 8f a4
  471. EAPOL: SUPP_BE entering state RECEIVE
  472. wlan0: RX EAPOL from 20:3a:07:97:15:72
  473. RX EAPOL - hexdump(len=95): 02 00 00 5b 01 0b 00 5b 19 00 17 03 01 00 50 54 35 b3 92 4f 32 1c 40 cb b2 28 b9 13 32 b9 69 47 11 23 fb 7e c5 f3 36 00 3d 06 19 e7 45 1b 61 cf cc 68 1c 27 27 c1 a8 4c b5 3c 3f 04 7c fd f2 7b 99 3d 0f 01 0f 36 e5 7f 9d dc e4 9d d0 61 3c d9 ff bf 0b 04 53 43 6a e4 6d 65 7e 9f ea 7b 2e
  474. EAPOL: Received EAP-Packet frame
  475. EAPOL: SUPP_BE entering state REQUEST
  476. EAPOL: getSuppRsp
  477. EAP: EAP entering state RECEIVED
  478. EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
  479. EAP: EAP entering state METHOD
  480. SSL: Received packet(len=91) - Flags 0x00
  481. EAP-PEAP: received 85 bytes encrypted data for Phase 2
  482. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53 3d 43 30 41 35 44 30 33 36 45 43 41 31 32 41 39 43 45 42 42 36 30 32 32 44 35 31 34 37 33 45 31 37 41 39 44 42 33 35 42 41
  483. EAP-PEAP: received Phase 2: code=1 identifier=11 length=51
  484. EAP-PEAP: Phase 2 Request: type=26
  485. EAP-MSCHAPV2: RX identifier 11 mschapv2_id 10
  486. EAP-MSCHAPV2: Received success
  487. EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
  488. EAP-MSCHAPV2: Authentication succeeded
  489. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
  490. SSL: 74 bytes left to be sent out (of total 74 bytes)
  491. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  492. EAP: EAP entering state SEND_RESPONSE
  493. EAP: EAP entering state IDLE
  494. EAPOL: SUPP_BE entering state RESPONSE
  495. EAPOL: txSuppRsp
  496. TX EAPOL: dst=20:3a:07:97:15:72
  497. TX EAPOL - hexdump(len=84): 01 00 00 50 02 0b 00 50 19 00 17 03 01 00 20 fc b3 d5 62 4e d5 9e 8c 88 93 61 b6 20 0b cf c0 61 74 ea 8f 98 77 9e f6 a4 7d 96 f5 16 80 f1 ed 17 03 01 00 20 31 c8 7f 3c 46 3e 3f 50 f6 f1 19 9c 9b 13 36 d1 3c d7 8a 68 da 52 a7 7d ec 5d eb 87 93 7e 17 fb
  498. EAPOL: SUPP_BE entering state RECEIVE
  499. wlan0: RX EAPOL from 20:3a:07:97:15:72
  500. RX EAPOL - hexdump(len=47): 02 00 00 2b 01 0c 00 2b 19 00 17 03 01 00 20 9b a3 9c 4e 36 39 b3 eb 66 c8 c3 e1 be ef e1 1e 7f d4 a9 de 71 71 ab ec a3 9f 13 0f e4 0a 0c 69
  501. EAPOL: Received EAP-Packet frame
  502. EAPOL: SUPP_BE entering state REQUEST
  503. EAPOL: getSuppRsp
  504. EAP: EAP entering state RECEIVED
  505. EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
  506. EAP: EAP entering state METHOD
  507. SSL: Received packet(len=43) - Flags 0x00
  508. EAP-PEAP: received 37 bytes encrypted data for Phase 2
  509. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 01
  510. EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
  511. EAP-PEAP: Phase 2 Request: type=33
  512. EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
  513. EAP-TLV: Result TLV - hexdump(len=2): 00 01
  514. EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  515. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  516. SSL: 74 bytes left to be sent out (of total 74 bytes)
  517. EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
  518. EAP: EAP entering state SEND_RESPONSE
  519. EAP: EAP entering state IDLE
  520. EAPOL: SUPP_BE entering state RESPONSE
  521. EAPOL: txSuppRsp
  522. TX EAPOL: dst=20:3a:07:97:15:72
  523. TX EAPOL - hexdump(len=84): 01 00 00 50 02 0c 00 50 19 00 17 03 01 00 20 a5 ac 6d 8b 72 c4 d4 42 04 74 fc 52 2a d4 96 e9 5a a7 94 99 6a 0c df a5 3c a8 7b 76 d7 81 1a df 17 03 01 00 20 e7 1e 97 26 11 a4 f3 f7 3d d3 70 16 00 f0 ed 64 9c 3e a2 f1 63 32 c3 14 f0 60 89 51 36 6a ef 02
  524. EAPOL: SUPP_BE entering state RECEIVE
  525. wlan0: RX EAPOL from 20:3a:07:97:15:72
  526. RX EAPOL - hexdump(len=8): 02 00 00 04 03 0c 00 04
  527. EAPOL: Received EAP-Packet frame
  528. EAPOL: SUPP_BE entering state REQUEST
  529. EAPOL: getSuppRsp
  530. EAP: EAP entering state RECEIVED
  531. EAP: Received EAP-Success
  532. EAP: Status notification: completion (param=success)
  533. EAP: EAP entering state SUCCESS
  534. wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
  535. EAPOL: SUPP_BE entering state RECEIVE
  536. EAPOL: SUPP_BE entering state SUCCESS
  537. EAPOL: SUPP_BE entering state IDLE
  538. wlan0: RX EAPOL from 20:3a:07:97:15:72
  539. RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80
  540. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  541. wlan0: IEEE 802.1X RX: version=2 type=3 length=117
  542. wlan0:   EAPOL-Key type=2
  543. wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  544. wlan0:   key_length=16 key_data_length=22
  545.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  546.   key_nonce - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be
  547.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  548.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  549.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  550.   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  551. WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80
  552. wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  553. wlan0: WPA: RX message 1 of 4-Way Handshake from 20:3a:07:97:15:72 (ver=2)
  554. RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80
  555. WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80
  556. RSN: PMKID from Authenticator - hexdump(len=16): 0e 40 f1 82 9f 99 c8 8a 04 59 c4 56 59 18 aa 80
  557. wlan0: RSN: no matching PMKID found
  558. EAPOL: Successfully fetched key (len=32)
  559. WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
  560. RSN: Added PMKSA cache entry for 20:3a:07:97:15:72 network_ctx=0x1028460
  561. wlan0: RSN: the new PMK matches with the PMKID
  562. WPA: Renewed SNonce - hexdump(len=32): 40 a7 ea 8f 98 25 d6 ef 38 49 6b 5d 49 e3 35 48 df 28 c4 e1 6b ab 8a 36 c5 21 ff 76 60 39 a8 fb
  563. WPA: PTK derivation - A1=20:68:9d:d0:49:25 A2=20:3a:07:97:15:72
  564. WPA: Nonce1 - hexdump(len=32): 40 a7 ea 8f 98 25 d6 ef 38 49 6b 5d 49 e3 35 48 df 28 c4 e1 6b ab 8a 36 c5 21 ff 76 60 39 a8 fb
  565. WPA: Nonce2 - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be
  566. WPA: PMK - hexdump(len=32): [REMOVED]
  567. WPA: PTK - hexdump(len=48): [REMOVED]
  568. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  569. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  570. wlan0: WPA: Sending EAPOL-Key 2/4
  571. WPA: KCK - hexdump(len=16): [REMOVED]
  572. WPA: Derived Key MIC - hexdump(len=16): 6d 38 84 18 ae ef e5 a4 6b 9e 32 85 56 ed 4e 3a
  573. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 40 a7 ea 8f 98 25 d6 ef 38 49 6b 5d 49 e3 35 48 df 28 c4 e1 6b ab 8a 36 c5 21 ff 76 60 39 a8 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 38 84 18 ae ef e5 a4 6b 9e 32 85 56 ed 4e 3a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  574. wlan0: RX EAPOL from 20:3a:07:97:15:72
  575. RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 5a be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 ad 13 ac 53 22 1b b5 ff c6 38 6f b8 d1 dd 57 00 38 b9 e3 06 38 b6 61 d3 2d 02 b2 c3 a1 da 34 13 18 4b 59 7a bd 6b 6b 6c 85 27 b3 c7 e7 6c 7b 83 82 2a 6e 2b 1c e3 9d ce c3 65 20 a6 20 aa 99 d6 79 f6 1d 7e d3 04 18 59 1c
  576. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  577. wlan0: IEEE 802.1X RX: version=2 type=3 length=151
  578. wlan0:   EAPOL-Key type=2
  579. wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  580. wlan0:   key_length=16 key_data_length=56
  581.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  582.   key_nonce - hexdump(le
clone this paste RAW Paste Data