Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant.conf'
- ctrl_interface='/var/run/wpa_supplicant'
- ctrl_interface_group='0' (DEPRECATED)
- eapol_version=1
- ap_scan=1
- fast_reauth=1
- Line: 14 - start of a new network block
- scan_ssid=0 (0x0)
- ssid - hexdump_ascii(len=8):
- 46 41 4e 54 4f 4d 41 5a FANTOMAZ
- proto: 0x1
- key_mgmt: 0x2
- pairwise: 0x18
- group: 0x1e
- PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
- PSK (from passphrase) - hexdump(len=32): [REMOVED]
- Priority group 0
- id=0 ssid='FANTOMAZ'
- Initializing interface (2) 'eth1'
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0xf
- WEXT: Operstate: linkmode=1, operstate=5
- Own MAC address: 00:16:6f:07:c6:46
- wpa_driver_wext_set_wpa
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- wpa_driver_wext_set_drop_unencrypted
- Setting scan request: 0 sec 100000 usec
- ctrl_interface_group=0
- Added interface eth1
- RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Trying to get current scan results first without requesting a new scan to speed up initial association
- Received 788 bytes of scan results (3 BSSes)
- Scan results: 3
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
- selected based on WPA IE
- selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
- Try to find non-WPA AP
- Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- WPA: using IEEE 802.11i/D3.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:c0:49:f2:33:5e
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
- No keys have been configured - skip key clearing
- Associated with 00:c0:49:f2:33:5e
- WPA: Association event - clear replay counter
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=1 type=3 length=95
- EAPOL-Key type=254
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: Renewed SNonce - hexdump(len=32): d9 55 e3 20 35 00 f3 8d 08 fe 8d 85 99 da a9 6f 95 9c 49 17 d9 78 b9 c0 0f 66 de ce f7 de 62 83
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=64): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- WPA: Sending EAPOL-Key 2/4
- WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 d9 55 e3 20 35 00 f3 8d 08 fe 8d 85 99 da a9 6f 95 9c 49 17 d9 78 b9 c0 0f 66 de ce f7 de 62 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c e1 d1 08 c3 86 b2 1a 7c bb ca 8c c4 d0 11 ba 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 cd 4b ef 6f 60 a7 da 8f 9e 23 01 59 e9 3e 17 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- IEEE 802.1X RX: version=1 type=3 length=125
- EAPOL-Key type=254
- key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
- key_length=16 key_data_length=30
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 33 cd 4b ef 6f 60 a7 da 8f 9e 23 01 59 e9 3e 17
- WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 cd 4b ef 6f 60 a7 da 8f 9e 23 01 59 e9 3e 17 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: Sending EAPOL-Key 4/4
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 1a 57 43 0e dc 24 be f1 4f 42 16 a1 25 66 1b 00 00
- WPA: Installing PTK to the driver.
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Setting scan request: 0 sec 100000 usec
- Added BSSID 00:c0:49:f2:33:5e into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: GROUP_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 5 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b19 len=8
- Received 786 bytes of scan results (3 BSSes)
- Scan results: 3
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
- selected based on WPA IE
- selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
- Try to find non-WPA AP
- Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- WPA: using IEEE 802.11i/D3.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:c0:49:f2:33:5e
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
- No keys have been configured - skip key clearing
- Associated with 00:c0:49:f2:33:5e
- WPA: Association event - clear replay counter
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=1 type=3 length=95
- EAPOL-Key type=254
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: Renewed SNonce - hexdump(len=32): 84 93 6e f8 1d 25 fa f4 3a ea 1b 76 63 eb 9c fd c6 d1 b1 27 19 ee 56 6d c6 b0 2e 99 45 e0 18 5e
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=64): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- WPA: Sending EAPOL-Key 2/4
- WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 84 93 6e f8 1d 25 fa f4 3a ea 1b 76 63 eb 9c fd c6 d1 b1 27 19 ee 56 6d c6 b0 2e 99 45 e0 18 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 71 19 99 df 3f 7b 6b ae 39 b3 39 8e 05 7a 1f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea 98 6a 6e fa 5e 34 e6 fc f0 1d 9a f6 3a 40 0a 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- IEEE 802.1X RX: version=1 type=3 length=125
- EAPOL-Key type=254
- key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
- key_length=16 key_data_length=30
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): ea 98 6a 6e fa 5e 34 e6 fc f0 1d 9a f6 3a 40 0a
- WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea 98 6a 6e fa 5e 34 e6 fc f0 1d 9a f6 3a 40 0a 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: Sending EAPOL-Key 4/4
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 db 84 79 c1 a5 61 0b 62 77 57 ec 03 89 a2 d2 00 00
- WPA: Installing PTK to the driver.
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Setting scan request: 0 sec 100000 usec
- BSSID 00:c0:49:f2:33:5e blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: GROUP_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b19 len=8
- Received 787 bytes of scan results (3 BSSes)
- Scan results: 3
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
- skip - blacklisted
- 1: 00:1d:6a:eb:9b:9a ssid='Alice-11843278' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 00:0f:3d:a7:ac:6e ssid='WiFi 604' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
- skip - blacklisted
- 1: 00:1d:6a:eb:9b:9a ssid='Alice-11843278' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 00:0f:3d:a7:ac:6e ssid='WiFi 604' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 00:c0:49:f2:33:5e from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
- selected based on WPA IE
- selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
- Try to find non-WPA AP
- Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- WPA: using IEEE 802.11i/D3.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:c0:49:f2:33:5e
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
- No keys have been configured - skip key clearing
- Associated with 00:c0:49:f2:33:5e
- WPA: Association event - clear replay counter
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=1 type=3 length=95
- EAPOL-Key type=254
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: Renewed SNonce - hexdump(len=32): e3 d6 d8 a7 ab 09 6c c8 ba ff 0d 14 ee 6d 3b bd a3 fe db b7 ae 67 6b ff d2 66 e9 34 f0 70 ba d1
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=64): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- WPA: Sending EAPOL-Key 2/4
- WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 e3 d6 d8 a7 ab 09 6c c8 ba ff 0d 14 ee 6d 3b bd a3 fe db b7 ae 67 6b ff d2 66 e9 34 f0 70 ba d1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af 68 4d e3 43 91 74 b6 9b be fd d4 0e d5 e5 38 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 7a a3 1e ad 97 27 4a aa 0c 3a 86 4d 6d 7b 86 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- IEEE 802.1X RX: version=1 type=3 length=125
- EAPOL-Key type=254
- key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
- key_length=16 key_data_length=30
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): c0 7a a3 1e ad 97 27 4a aa 0c 3a 86 4d 6d 7b 86
- WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 7a a3 1e ad 97 27 4a aa 0c 3a 86 4d 6d 7b 86 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: Sending EAPOL-Key 4/4
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 6c 17 28 29 05 c3 a9 be 1c 57 d7 e2 31 56 26 00 00
- WPA: Installing PTK to the driver.
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Setting scan request: 0 sec 100000 usec
- Added BSSID 00:c0:49:f2:33:5e into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: GROUP_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- State: DISCONNECTED -> SCANNING
- Starting AP scan (broadcast SSID)
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b19 len=8
- Received 554 bytes of scan results (2 BSSes)
- Scan results: 2
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
- selected based on WPA IE
- selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
- Try to find non-WPA AP
- Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- WPA: using IEEE 802.11i/D3.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- No keys have been configured - skip key clearing
- wpa_driver_wext_set_drop_unencrypted
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:c0:49:f2:33:5e
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
- No keys have been configured - skip key clearing
- Associated with 00:c0:49:f2:33:5e
- WPA: Association event - clear replay counter
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=1 type=3 length=95
- EAPOL-Key type=254
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: Renewed SNonce - hexdump(len=32): 88 b6 d2 c6 8c 00 a7 8f c5 4a a5 71 98 b4 7e 2d 56 68 a0 9b 6f 56 da 20 ef ee 1a 1c b7 19 90 bd
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=64): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- WPA: Sending EAPOL-Key 2/4
- WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 88 b6 d2 c6 8c 00 a7 8f c5 4a a5 71 98 b4 7e 2d 56 68 a0 9b 6f 56 da 20 ef ee 1a 1c b7 19 90 bd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 c2 68 0a 69 47 51 6e 79 06 fe 0b 8f c6 a0 22 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
- RX EAPOL from 00:c0:49:f2:33:5e
- RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 06 91 12 5d 47 3d 5d 8a f6 78 22 e2 82 4a a7 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- IEEE 802.1X RX: version=1 type=3 length=125
- EAPOL-Key type=254
- key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
- key_length=16 key_data_length=30
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 90 06 91 12 5d 47 3d 5d 8a f6 78 22 e2 82 4a a7
- WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 06 91 12 5d 47 3d 5d 8a f6 78 22 e2 82 4a a7 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
- WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
- WPA: Sending EAPOL-Key 4/4
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 9b f4 bb 3c 0d e4 88 4f ae da fb 77 a0 70 00 00 00
- WPA: Installing PTK to the driver.
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- CTRL-EVENT-TERMINATING - signal 2 received
- Removing interface eth1
- State: GROUP_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- WEXT: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_deauthenticate
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- wpa_driver_wext_set_wpa
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_countermeasures
- No keys have been configured - skip key clearing
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 00:c0:49:f2:33:5e from blacklist (clear)
- Cancelling scan request
- Cancelling authentication timeout
- WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement