Guest User

wpa_supplicant dump

a guest
Jan 31st, 2017
53
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 25.30 KB | None | 0 0
  1. wpa_supplicant v2.6
  2. Successfully initialized wpa_supplicant
  3. Initializing interface 'wlp3s0' conf '/home/zack/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  4. Configuration file '/home/zack/wpa_supplicant.conf' -> '/home/zack/wpa_supplicant.conf'
  5. Reading configuration file '/home/zack/wpa_supplicant.conf'
  6. Priority group 0
  7. id=0 ssid='Rogers21932'
  8. nl80211: Supported cipher 00-0f-ac:1
  9. nl80211: Supported cipher 00-0f-ac:5
  10. nl80211: Supported cipher 00-0f-ac:2
  11. nl80211: Supported cipher 00-0f-ac:4
  12. nl80211: Supported cipher 00-0f-ac:10
  13. nl80211: Supported cipher 00-0f-ac:8
  14. nl80211: Supported cipher 00-0f-ac:9
  15. nl80211: Supported cipher 00-0f-ac:6
  16. nl80211: Supported cipher 00-0f-ac:13
  17. nl80211: Supported cipher 00-0f-ac:11
  18. nl80211: Supported cipher 00-0f-ac:12
  19. nl80211: Using driver-based off-channel TX
  20. nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
  21. nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
  22. nl80211: interface wlp3s0 in phy phy0
  23. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  24. nl80211: Subscribe to mgmt frames with non-AP handle 0x23c71e0
  25. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=040a
  26. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=040b
  27. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=040c
  28. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=040d
  29. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=090a
  30. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=090b
  31. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=090c
  32. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=090d
  33. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=0409506f9a09
  34. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=7f506f9a09
  35. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=0801
  36. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=06
  37. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=0a07
  38. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=0a11
  39. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=1101
  40. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=1102
  41. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=0505
  42. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x23c71e0 match=0500
  43. rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
  44. netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
  45. Add interface wlp3s0 to a new radio phy0
  46. nl80211: Regulatory information - country=00
  47. nl80211: 2402-2472 @ 40 MHz 20 mBm
  48. nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
  49. nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
  50. nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
  51. nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
  52. nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
  53. nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
  54. nl80211: 57240-63720 @ 2160 MHz 0 mBm
  55. nl80211: Added 802.11b mode based on 802.11g information
  56. wlp3s0: Own MAC address: 7c:e9:d3:f7:50:7a
  57. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  58. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  59. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  60. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  61. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  62. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  63. wlp3s0: RSN: flushing PMKID list in the driver
  64. nl80211: Flush PMKIDs
  65. wlp3s0: Setting scan request: 0.100000 sec
  66. TDLS: TDLS operation not supported by driver
  67. TDLS: Driver uses internal link setup
  68. TDLS: Driver does not support TDLS channel switching
  69. wlp3s0: WPS: UUID based on MAC address: cceebfa4-dc4b-5516-bdf5-4fb06a33a32b
  70. ENGINE: Loading dynamic engine
  71. ENGINE: Loading dynamic engine
  72. EAPOL: SUPP_PAE entering state DISCONNECTED
  73. EAPOL: Supplicant port status: Unauthorized
  74. nl80211: Skip set_supp_port(unauthorized) while not associated
  75. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  76. EAPOL: SUPP_BE entering state INITIALIZE
  77. EAP: EAP entering state DISABLED
  78. P2P: Add operating class 81
  79. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  80. P2P: Own listen channel: 81:11
  81. P2P: Random operating channel: 81:11
  82. P2P: initialized
  83. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  84. P2P: cli_channels:
  85. wlp3s0: Added interface wlp3s0
  86. wlp3s0: State: DISCONNECTED -> DISCONNECTED
  87. nl80211: Set wlp3s0 operstate 0->0 (DORMANT)
  88. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  89. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  90. wlp3s0: State: DISCONNECTED -> SCANNING
  91. wlp3s0: Determining shared radio frequencies (max len 1)
  92. wlp3s0: Shared frequencies (len=0): completed iteration
  93. P2P: Add operating class 81
  94. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  95. P2P: Update channel list
  96. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  97. P2P: cli_channels:
  98. wlp3s0: Starting AP scan for wildcard SSID
  99. WPS: Building WPS IE for Probe Request
  100. WPS: * Version (hardcoded 0x10)
  101. WPS: * Request Type
  102. WPS: * Config Methods (3148)
  103. WPS: * UUID-E
  104. WPS: * Primary Device Type
  105. WPS: * RF Bands (1)
  106. WPS: * Association State
  107. WPS: * Configuration Error (0)
  108. WPS: * Device Password ID (0)
  109. WPS: * Manufacturer
  110. WPS: * Model Name
  111. WPS: * Model Number
  112. WPS: * Device Name
  113. WPS: * Version2 (0x20)
  114. P2P: * P2P IE header
  115. P2P: * Capability dev=21 group=00
  116. P2P: * Listen Channel: Regulatory Class 81 Channel 11
  117. wlp3s0: Add radio work 'scan'@0x23e4dd0
  118. wlp3s0: First radio work item in the queue - schedule start immediately
  119. wlp3s0: Starting radio work 'scan'@0x23e4dd0 after 0.000012 second wait
  120. wlp3s0: nl80211: scan request
  121. Scan requested (ret=0) - scan timeout 10 seconds
  122. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp3s0
  123. wlp3s0: nl80211: Scan trigger
  124. wlp3s0: Event SCAN_STARTED (47) received
  125. wlp3s0: Own scan request started a scan in 0.000034 seconds
  126. EAPOL: disable timer tick
  127. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  128. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp3s0
  129. wlp3s0: nl80211: New scan results available
  130. nl80211: Scan probed for SSID ''
  131. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472
  132. wlp3s0: Event SCAN_RESULTS (3) received
  133. wlp3s0: Scan completed in 0.996348 seconds
  134. nl80211: Received scan results (5 BSSes)
  135. wlp3s0: BSS: Start scan result update 1
  136. wlp3s0: BSS: Add new id 0 BSSID 84:94:8c:1f:94:08 SSID 'Rogers21932' freq 2462
  137. wlp3s0: BSS: Add new id 1 BSSID bc:4d:fb:a1:e8:e8 SSID 'WhitePenguin' freq 2437
  138. wlp3s0: BSS: Add new id 2 BSSID bc:4d:fb:a1:e8:ea SSID '' freq 2437
  139. wlp3s0: BSS: Add new id 3 BSSID 18:62:2c:de:65:ca SSID 'BELL@223' freq 2412
  140. wlp3s0: BSS: Add new id 4 BSSID f0:f2:49:5d:79:aa SSID '' freq 2412
  141. BSS: last_scan_res_used=5/32
  142. wlp3s0: New scan results available (own=1 ext=0)
  143. WPS: AP 84:94:8c:1f:94:08 type 0 added
  144. WPS: AP bc:4d:fb:a1:e8:e8 type 0 added
  145. WPS: AP 18:62:2c:de:65:ca type 0 added
  146. WPS: AP[0] 84:94:8c:1f:94:08 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  147. WPS: AP[1] bc:4d:fb:a1:e8:e8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  148. WPS: AP[2] 18:62:2c:de:65:ca type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  149. wlp3s0: Radio work 'scan'@0x23e4dd0 done in 0.996858 seconds
  150. wlp3s0: radio_work_free('scan'@0x23e4dd0: num_active_works --> 0
  151. wlp3s0: Selecting BSS from priority group 0
  152. wlp3s0: 0: 84:94:8c:1f:94:08 ssid='Rogers21932' wpa_ie_len=26 rsn_ie_len=24 caps=0xc11 level=-54 freq=2462 wps
  153. wlp3s0: selected based on RSN IE
  154. wlp3s0: selected BSS 84:94:8c:1f:94:08 ssid='Rogers21932'
  155. wlp3s0: Considering connect request: reassociate: 0 selected: 84:94:8c:1f:94:08 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x23c6b50 current_ssid=(nil)
  156. wlp3s0: Request association with 84:94:8c:1f:94:08
  157. wlp3s0: Add radio work 'sme-connect'@0x23e4dd0
  158. wlp3s0: First radio work item in the queue - schedule start immediately
  159. wlp3s0: Starting radio work 'sme-connect'@0x23e4dd0 after 0.000019 second wait
  160. wlp3s0: Automatic auth_alg selection: 0x1
  161. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  162. RSN: Search for BSSID 84:94:8c:1f:94:08
  163. RSN: No PMKSA cache entry found
  164. wlp3s0: RSN: using IEEE 802.11i/D9.0
  165. wlp3s0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  166. wlp3s0: WPA: Selected mgmt group cipher 32
  167. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02
  168. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
  169. wlp3s0: WPA: using GTK TKIP
  170. wlp3s0: WPA: using PTK CCMP
  171. wlp3s0: WPA: using KEY_MGMT WPA-PSK
  172. wlp3s0: WPA: not using MGMT group cipher
  173. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  174. RRM: Determining whether RRM can be used - device support: 0x10
  175. RRM: No RRM in network
  176. wlp3s0: Cancelling scan request
  177. wlp3s0: SME: Trying to authenticate with 84:94:8c:1f:94:08 (SSID='Rogers21932' freq=2462 MHz)
  178. wlp3s0: State: SCANNING -> AUTHENTICATING
  179. wlp3s0: Determining shared radio frequencies (max len 1)
  180. wlp3s0: Shared frequencies (len=0): completed iteration
  181. P2P: Add operating class 81
  182. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  183. P2P: Update channel list
  184. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  185. P2P: cli_channels:
  186. EAPOL: External notification - EAP success=0
  187. EAPOL: External notification - EAP fail=0
  188. EAPOL: External notification - portControl=Auto
  189. wlp3s0: Determining shared radio frequencies (max len 1)
  190. wlp3s0: Shared frequencies (len=0): completed iteration
  191. nl80211: Authenticate (ifindex=3)
  192. * bssid=84:94:8c:1f:94:08
  193. * freq=2462
  194. * SSID - hexdump_ascii(len=11):
  195. 52 6f 67 65 72 73 32 31 39 33 32 Rogers21932
  196. * IEs - hexdump(len=0): [NULL]
  197. * Auth Type 0
  198. nl80211: Authentication request send successfully
  199. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp3s0
  200. nl80211: New station 84:94:8c:1f:94:08
  201. nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp3s0
  202. nl80211: Authenticate event
  203. wlp3s0: Event AUTH (11) received
  204. wlp3s0: SME: Authentication response: peer=84:94:8c:1f:94:08 auth_type=0 auth_transaction=2 status_code=0
  205. wlp3s0: set_disable_max_amsdu: -1
  206. wlp3s0: set_ampdu_factor: -1
  207. wlp3s0: set_ampdu_density: -1
  208. wlp3s0: set_disable_ht40: 0
  209. wlp3s0: set_disable_sgi: 0
  210. wlp3s0: set_disable_ldpc: 0
  211. wlp3s0: Trying to associate with 84:94:8c:1f:94:08 (SSID='Rogers21932' freq=2462 MHz)
  212. wlp3s0: State: AUTHENTICATING -> ASSOCIATING
  213. nl80211: Set wlp3s0 operstate 0->0 (DORMANT)
  214. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  215. wlp3s0: Determining shared radio frequencies (max len 1)
  216. wlp3s0: Shared frequencies (len=0): completed iteration
  217. P2P: Add operating class 81
  218. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  219. P2P: Update channel list
  220. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  221. P2P: cli_channels:
  222. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  223. nl80211: Associate (ifindex=3)
  224. * bssid=84:94:8c:1f:94:08
  225. * freq=2462
  226. * SSID - hexdump_ascii(len=11):
  227. 52 6f 67 65 72 73 32 31 39 33 32 Rogers21932
  228. * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 00 00 00 40
  229. * WPA Versions 0x2
  230. * pairwise=0xfac04
  231. * group=0xfac02
  232. * akm=0xfac02
  233. * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  234. * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  235. * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  236. * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  237. nl80211: Association request send successfully
  238. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  239. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  240. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  241. nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp3s0
  242. nl80211: Associate event
  243. wlp3s0: Event ASSOC (0) received
  244. wlp3s0: Association info event
  245. resp_ies - hexdump(len=182): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 61 00 2d 1a ee 11 17 ff ff ff 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 18 46 47 11 00 3d 16 0b 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 ee 11 17 ff ff ff 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 18 46 47 11 00 dd 1a 00 90 4c 34 0b 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 07 00 0c 43 04 00 00 00
  246. wlp3s0: freq=2462 MHz
  247. wlp3s0: State: ASSOCIATING -> ASSOCIATED
  248. nl80211: Set wlp3s0 operstate 0->0 (DORMANT)
  249. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  250. wlp3s0: Determining shared radio frequencies (max len 1)
  251. wlp3s0: Shared frequencies (len=1): completed iteration
  252. wlp3s0: freq[0]: 2462, flags=0x1
  253. P2P: Add operating class 81
  254. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  255. P2P: Update channel list
  256. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  257. P2P: cli_channels:
  258. wlp3s0: Associated to a new BSS: BSSID=84:94:8c:1f:94:08
  259. wlp3s0: Associated with 84:94:8c:1f:94:08
  260. wlp3s0: WPA: Association event - clear replay counter
  261. wlp3s0: WPA: Clear old PTK
  262. TDLS: Remove peers on association
  263. EAPOL: External notification - portEnabled=0
  264. EAPOL: External notification - portValid=0
  265. EAPOL: External notification - EAP success=0
  266. EAPOL: External notification - portEnabled=1
  267. EAPOL: SUPP_PAE entering state CONNECTING
  268. EAPOL: enable timer tick
  269. EAPOL: SUPP_BE entering state IDLE
  270. wlp3s0: Setting authentication timeout: 10 sec 0 usec
  271. wlp3s0: Cancelling scan request
  272. WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
  273. WMM AC: U-APSD queues=0x0
  274. WMM AC: Valid WMM association, WMM AC is enabled
  275. wlp3s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  276. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp3s0
  277. nl80211: Ignore connect event (cmd=46) when using userspace SME
  278. l2_packet_receive: src=84:94:8c:1f:94:08 len=99
  279. wlp3s0: RX EAPOL from 84:94:8c:1f:94:08
  280. wlp3s0: Setting authentication timeout: 10 sec 0 usec
  281. wlp3s0: IEEE 802.1X RX: version=1 type=3 length=95
  282. wlp3s0: EAPOL-Key type=2
  283. wlp3s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  284. wlp3s0: key_length=16 key_data_length=0
  285. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  286. key_nonce - hexdump(len=32): 1b be ce 02 f8 b1 4e 16 ea 56 db f3 3d ea be 4b 39 f2 79 8b 20 1c 88 37 5d 3d ae f2 3d 55 23 5e
  287. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  288. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  289. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  290. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  291. wlp3s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  292. wlp3s0: Determining shared radio frequencies (max len 1)
  293. wlp3s0: Shared frequencies (len=1): completed iteration
  294. wlp3s0: freq[0]: 2462, flags=0x1
  295. P2P: Add operating class 81
  296. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  297. P2P: Update channel list
  298. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  299. P2P: cli_channels:
  300. wlp3s0: WPA: RX message 1 of 4-Way Handshake from 84:94:8c:1f:94:08 (ver=2)
  301. RSN: msg 1/4 key data - hexdump(len=0):
  302. WPA: Renewed SNonce - hexdump(len=32): 39 45 49 8f ba 89 5d 65 a8 e8 bc 95 a1 fd 2f c3 2f da de 9d e5 85 a9 80 7b 68 63 83 6b dc 17 db
  303. WPA: PTK derivation - A1=7c:e9:d3:f7:50:7a A2=84:94:8c:1f:94:08
  304. WPA: Nonce1 - hexdump(len=32): 39 45 49 8f ba 89 5d 65 a8 e8 bc 95 a1 fd 2f c3 2f da de 9d e5 85 a9 80 7b 68 63 83 6b dc 17 db
  305. WPA: Nonce2 - hexdump(len=32): 1b be ce 02 f8 b1 4e 16 ea 56 db f3 3d ea be 4b 39 f2 79 8b 20 1c 88 37 5d 3d ae f2 3d 55 23 5e
  306. WPA: PMK - hexdump(len=32): [REMOVED]
  307. WPA: PTK - hexdump(len=48): [REMOVED]
  308. WPA: KCK - hexdump(len=16): [REMOVED]
  309. WPA: KEK - hexdump(len=16): [REMOVED]
  310. WPA: TK - hexdump(len=16): [REMOVED]
  311. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  312. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  313. wlp3s0: WPA: Sending EAPOL-Key 2/4
  314. WPA: KCK - hexdump(len=16): [REMOVED]
  315. WPA: Derived Key MIC - hexdump(len=16): 63 b4 fc b9 ae ea 36 33 e4 ca cc 25 32 d3 cd 4b
  316. l2_packet_receive: src=84:94:8c:1f:94:08 len=179
  317. wlp3s0: RX EAPOL from 84:94:8c:1f:94:08
  318. wlp3s0: IEEE 802.1X RX: version=1 type=3 length=175
  319. wlp3s0: EAPOL-Key type=2
  320. wlp3s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  321. wlp3s0: key_length=16 key_data_length=80
  322. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  323. key_nonce - hexdump(len=32): 1b be ce 02 f8 b1 4e 16 ea 56 db f3 3d ea be 4b 39 f2 79 8b 20 1c 88 37 5d 3d ae f2 3d 55 23 5e
  324. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  325. key_rsc - hexdump(len=8): b7 2f 02 00 00 00 00 00
  326. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  327. key_mic - hexdump(len=16): 88 4b a3 73 66 0f b6 63 81 8e d5 8c d5 ca 59 f1
  328. RSN: encrypted key data - hexdump(len=80): ab 1c 16 22 18 21 20 16 44 a7 d1 fe ab 08 1c 8d 20 d7 32 fb 4c 06 df 6c f3 f5 7a 86 24 1b 69 2f ed 29 94 e5 10 71 cb a8 f7 e5 0b 1e ba 53 7f 8f 66 27 e7 d3 be df e1 ab 16 7b 8f de 74 d0 af 00 65 dd 13 7a 97 3c 77 d0 1c e2 21 cd 5b d2 6c b0
  329. WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
  330. wlp3s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  331. wlp3s0: WPA: RX message 3 of 4-Way Handshake from 84:94:8c:1f:94:08 (ver=2)
  332. WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 03 4a 88 33 71 bf 78 f9 61 47 24 90 8c b0 97 70 4a bd 51 9d 59 92 6b 87 5c 17 f5 e5 ac fc 72 2d dd 00 00 00 00 00
  333. WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
  334. WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
  335. wlp3s0: WPA: Sending EAPOL-Key 4/4
  336. WPA: KCK - hexdump(len=16): [REMOVED]
  337. WPA: Derived Key MIC - hexdump(len=16): d5 a2 77 1f c1 21 d6 15 7a 7e 10 49 17 42 8f 9d
  338. wlp3s0: WPA: Installing PTK to the driver
  339. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=3 addr=0x23c6628 key_idx=0 set_tx=1 seq_len=6 key_len=16
  340. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  341. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  342. addr=84:94:8c:1f:94:08
  343. EAPOL: External notification - portValid=1
  344. wlp3s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  345. wlp3s0: Determining shared radio frequencies (max len 1)
  346. wlp3s0: Shared frequencies (len=1): completed iteration
  347. wlp3s0: freq[0]: 2462, flags=0x1
  348. P2P: Add operating class 81
  349. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  350. P2P: Update channel list
  351. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  352. P2P: cli_channels:
  353. RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
  354. WPA: Group Key - hexdump(len=32): [REMOVED]
  355. wlp3s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
  356. WPA: RSC - hexdump(len=6): b7 2f 02 00 00 00
  357. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=2 addr=0x5369b9 key_idx=1 set_tx=0 seq_len=6 key_len=32
  358. nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
  359. nl80211: KEY_SEQ - hexdump(len=6): b7 2f 02 00 00 00
  360. broadcast key
  361. wlp3s0: WPA: Key negotiation completed with 84:94:8c:1f:94:08 [PTK=CCMP GTK=TKIP]
  362. wlp3s0: Cancelling authentication timeout
  363. wlp3s0: State: GROUP_HANDSHAKE -> COMPLETED
  364. wlp3s0: Radio work 'sme-connect'@0x23e4dd0 done in 0.241951 seconds
  365. wlp3s0: radio_work_free('sme-connect'@0x23e4dd0: num_active_works --> 0
  366. wlp3s0: CTRL-EVENT-CONNECTED - Connection to 84:94:8c:1f:94:08 completed [id=0 id_str=]
  367. nl80211: Set wlp3s0 operstate 0->1 (UP)
  368. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  369. SME: OBSS Scan Interval 300 sec
  370. wlp3s0: Determining shared radio frequencies (max len 1)
  371. wlp3s0: Shared frequencies (len=1): completed iteration
  372. wlp3s0: freq[0]: 2462, flags=0x1
  373. P2P: Add operating class 81
  374. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  375. P2P: Update channel list
  376. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  377. P2P: cli_channels:
  378. EAPOL: External notification - portValid=1
  379. EAPOL: External notification - EAP success=1
  380. EAPOL: SUPP_PAE entering state AUTHENTICATING
  381. EAPOL: SUPP_BE entering state SUCCESS
  382. EAP: EAP entering state DISABLED
  383. EAPOL: SUPP_PAE entering state AUTHENTICATED
  384. EAPOL: Supplicant port status: Authorized
  385. nl80211: Set supplicant port authorized for 84:94:8c:1f:94:08
  386. EAPOL: SUPP_BE entering state IDLE
  387. EAPOL authentication completed - result=SUCCESS
  388. nl80211: Set rekey offload
  389. nl80211: Driver does not support rekey offload
  390. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  391. EAPOL: startWhen --> 0
  392. EAPOL: disable timer tick
  393. RTM_NEWLINK: ifi_index=3 ifname=wlp3s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  394. wlp3s0: Removing interface wlp3s0
  395. wlp3s0: Request to deauthenticate - bssid=84:94:8c:1f:94:08 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
  396. TDLS: Tear down peers
  397. wpa_driver_nl80211_deauthenticate(addr=84:94:8c:1f:94:08 reason_code=3)
  398. wlp3s0: Event DEAUTH (12) received
  399. wlp3s0: Deauthentication notification
  400. wlp3s0: * reason 3 (locally generated)
  401. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  402. wlp3s0: CTRL-EVENT-DISCONNECTED bssid=84:94:8c:1f:94:08 reason=3 locally_generated=1
  403. wlp3s0: Auto connect disabled: do not try to re-connect
  404. wlp3s0: Ignore connection failure indication since interface has been put into disconnected state
  405. TDLS: Remove peers on disassociation
  406. wlp3s0: WPA: Clear old PMK and PTK
  407. wlp3s0: Disconnect event - remove keys
  408. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  409. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  410. wpa_driver_nl80211_set_key: ifindex=3 (wlp3s0) alg=0 addr=0x23c4b58 key_idx=0 set_tx=0 seq_len=0 key_len=0
  411. addr=84:94:8c:1f:94:08
  412. wlp3s0: State: COMPLETED -> DISCONNECTED
  413. nl80211: Set wlp3s0 operstate 1->0 (DORMANT)
  414. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  415. WMM AC: WMM AC is disabled
  416. wlp3s0: Determining shared radio frequencies (max len 1)
  417. wlp3s0: Shared frequencies (len=0): completed iteration
  418. P2P: Add operating class 81
  419. P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
  420. P2P: Update channel list
  421. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
  422. P2P: cli_channels:
  423. EAPOL: External notification - portEnabled=0
  424. EAPOL: SUPP_PAE entering state DISCONNECTED
  425. EAPOL: Supplicant port status: Unauthorized
  426. nl80211: Skip set_supp_port(unauthorized) while not associated
  427. EAPOL: SUPP_BE entering state INITIALIZE
  428. EAPOL: External notification - portValid=0
  429. EAPOL: External notification - EAP success=0
  430. wlp3s0: State: DISCONNECTED -> DISCONNECTED
  431. nl80211: Set wlp3s0 operstate 0->0 (DORMANT)
  432. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  433. EAPOL: External notification - portEnabled=0
  434. EAPOL: External notification - portValid=0
  435. wlp3s0: WPA: Clear old PMK and PTK
  436. wlp3s0: BSS: Remove id 0 BSSID 84:94:8c:1f:94:08 SSID 'Rogers21932' due to wpa_bss_flush
  437. wlp3s0: BSS: Remove id 1 BSSID bc:4d:fb:a1:e8:e8 SSID 'WhitePenguin' due to wpa_bss_flush
  438. wlp3s0: BSS: Remove id 2 BSSID bc:4d:fb:a1:e8:ea SSID '' due to wpa_bss_flush
  439. wlp3s0: BSS: Remove id 3 BSSID 18:62:2c:de:65:ca SSID 'BELL@223' due to wpa_bss_flush
  440. wlp3s0: BSS: Remove id 4 BSSID f0:f2:49:5d:79:aa SSID '' due to wpa_bss_flush
  441. wlp3s0: Cancelling scan request
  442. wlp3s0: Cancelling authentication timeout
  443. Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
  444. wlp3s0: P2P: Disable P2P since removing the management interface is being removed
  445. P2P: All ASP advertisements flushed
  446. P2P: Disabling Extended Listen Timing
  447. P2P: Stopping find
  448. P2P: Clear timeout (state=IDLE)
  449. P2P: State IDLE -> IDLE
  450. P2P: All ASP advertisements flushed
  451. Remove interface wlp3s0 from radio phy0
  452. Remove radio phy0
  453. nl80211: deinit ifname=wlp3s0 disabled_11b_rates=0
  454. nl80211: Remove monitor interface: refcount=0
  455. netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  456. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  457. nl80211: Unsubscribe mgmt frames handle 0x888888888ab4f969 (mode change)
  458. wlp3s0: CTRL-EVENT-TERMINATING
Add Comment
Please, Sign In to add comment