Advertisement
Guest User

ponciarello

a guest
Jul 25th, 2008
79
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 38.69 KB | None | 0 0
  1. Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  2. Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
  3. Reading configuration file '/etc/wpa_supplicant.conf'
  4. ctrl_interface='/var/run/wpa_supplicant'
  5. ctrl_interface_group='0' (DEPRECATED)
  6. eapol_version=1
  7. ap_scan=1
  8. fast_reauth=1
  9. Line: 14 - start of a new network block
  10. scan_ssid=0 (0x0)
  11. ssid - hexdump_ascii(len=8):
  12. 46 41 4e 54 4f 4d 41 5a FANTOMAZ
  13. proto: 0x1
  14. key_mgmt: 0x2
  15. pairwise: 0x18
  16. group: 0x1e
  17. PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
  18. PSK (from passphrase) - hexdump(len=32): [REMOVED]
  19. Priority group 0
  20. id=0 ssid='FANTOMAZ'
  21. Initializing interface (2) 'eth1'
  22. EAPOL: SUPP_PAE entering state DISCONNECTED
  23. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  24. EAPOL: SUPP_BE entering state INITIALIZE
  25. EAP: EAP entering state DISABLED
  26. EAPOL: External notification - portEnabled=0
  27. EAPOL: External notification - portValid=0
  28. SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  29. capabilities: key_mgmt 0xf enc 0xf
  30. WEXT: Operstate: linkmode=1, operstate=5
  31. Own MAC address: 00:16:6f:07:c6:46
  32. wpa_driver_wext_set_wpa
  33. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  34. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  35. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  36. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  37. wpa_driver_wext_set_countermeasures
  38. wpa_driver_wext_set_drop_unencrypted
  39. Setting scan request: 0 sec 100000 usec
  40. ctrl_interface_group=0
  41. Added interface eth1
  42. RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
  43. Wireless event: cmd=0x8b06 len=8
  44. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  45. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  46. State: DISCONNECTED -> SCANNING
  47. Starting AP scan (broadcast SSID)
  48. Trying to get current scan results first without requesting a new scan to speed up initial association
  49. Received 788 bytes of scan results (3 BSSes)
  50. Scan results: 3
  51. Selecting BSS from priority group 0
  52. Try to find WPA-enabled AP
  53. 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
  54. selected based on WPA IE
  55. selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
  56. Try to find non-WPA AP
  57. Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
  58. Cancelling scan request
  59. WPA: clearing own WPA/RSN IE
  60. Automatic auth_alg selection: 0x1
  61. WPA: using IEEE 802.11i/D3.0
  62. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
  63. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  64. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  65. WPA: using GTK TKIP
  66. WPA: using PTK CCMP
  67. WPA: using KEY_MGMT WPA-PSK
  68. WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  69. No keys have been configured - skip key clearing
  70. wpa_driver_wext_set_drop_unencrypted
  71. State: SCANNING -> ASSOCIATING
  72. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  73. WEXT: Operstate: linkmode=-1, operstate=5
  74. wpa_driver_wext_associate
  75. Setting authentication timeout: 10 sec 0 usec
  76. EAPOL: External notification - EAP success=0
  77. EAPOL: External notification - EAP fail=0
  78. EAPOL: External notification - portControl=Auto
  79. RSN: Ignored PMKID candidate without preauth flag
  80. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  81. Wireless event: cmd=0x8b06 len=8
  82. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  83. Wireless event: cmd=0x8b04 len=12
  84. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  85. Wireless event: cmd=0x8b1a len=16
  86. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  87. Wireless event: cmd=0x8b15 len=20
  88. Wireless event: new AP: 00:c0:49:f2:33:5e
  89. State: ASSOCIATING -> ASSOCIATED
  90. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  91. WEXT: Operstate: linkmode=-1, operstate=5
  92. Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
  93. No keys have been configured - skip key clearing
  94. Associated with 00:c0:49:f2:33:5e
  95. WPA: Association event - clear replay counter
  96. EAPOL: External notification - portEnabled=0
  97. EAPOL: External notification - portValid=0
  98. EAPOL: External notification - EAP success=0
  99. EAPOL: External notification - portEnabled=1
  100. EAPOL: SUPP_PAE entering state CONNECTING
  101. EAPOL: SUPP_BE entering state IDLE
  102. Setting authentication timeout: 10 sec 0 usec
  103. Cancelling scan request
  104. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  105. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  106. RX EAPOL from 00:c0:49:f2:33:5e
  107. RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  108. Setting authentication timeout: 10 sec 0 usec
  109. IEEE 802.1X RX: version=1 type=3 length=95
  110. EAPOL-Key type=254
  111. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  112. key_length=16 key_data_length=0
  113. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  114. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94
  115. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  116. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  117. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  118. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  119. WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  120. State: ASSOCIATED -> 4WAY_HANDSHAKE
  121. WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  122. WPA: Renewed SNonce - hexdump(len=32): d9 55 e3 20 35 00 f3 8d 08 fe 8d 85 99 da a9 6f 95 9c 49 17 d9 78 b9 c0 0f 66 de ce f7 de 62 83
  123. WPA: PMK - hexdump(len=32): [REMOVED]
  124. WPA: PTK - hexdump(len=64): [REMOVED]
  125. WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  126. WPA: Sending EAPOL-Key 2/4
  127. WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 d9 55 e3 20 35 00 f3 8d 08 fe 8d 85 99 da a9 6f 95 9c 49 17 d9 78 b9 c0 0f 66 de ce f7 de 62 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c e1 d1 08 c3 86 b2 1a 7c bb ca 8c c4 d0 11 ba 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  128. RX EAPOL from 00:c0:49:f2:33:5e
  129. RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 cd 4b ef 6f 60 a7 da 8f 9e 23 01 59 e9 3e 17 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  130. IEEE 802.1X RX: version=1 type=3 length=125
  131. EAPOL-Key type=254
  132. key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  133. key_length=16 key_data_length=30
  134. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  135. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94
  136. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  137. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  138. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  139. key_mic - hexdump(len=16): 33 cd 4b ef 6f 60 a7 da 8f 9e 23 01 59 e9 3e 17
  140. WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 cd 4b ef 6f 60 a7 da 8f 9e 23 01 59 e9 3e 17 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  141. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  142. WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  143. WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  144. WPA: Sending EAPOL-Key 4/4
  145. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 1a 57 43 0e dc 24 be f1 4f 42 16 a1 25 66 1b 00 00
  146. WPA: Installing PTK to the driver.
  147. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  148. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  149. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  150. EAPOL: startWhen --> 0
  151. EAPOL: SUPP_PAE entering state CONNECTING
  152. EAPOL: txStart
  153. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  154. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  155. Wireless event: cmd=0x8b15 len=20
  156. Wireless event: new AP: 00:00:00:00:00:00
  157. Setting scan request: 0 sec 100000 usec
  158. Added BSSID 00:c0:49:f2:33:5e into blacklist
  159. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  160. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  161. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  162. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  163. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  164. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  165. State: GROUP_HANDSHAKE -> DISCONNECTED
  166. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  167. WEXT: Operstate: linkmode=-1, operstate=5
  168. EAPOL: External notification - portEnabled=0
  169. EAPOL: SUPP_PAE entering state DISCONNECTED
  170. EAPOL: SUPP_BE entering state INITIALIZE
  171. EAPOL: External notification - portValid=0
  172. EAPOL: External notification - EAP success=0
  173. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  174. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  175. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  176. Wireless event: cmd=0x8b15 len=20
  177. Wireless event: new AP: 00:00:00:00:00:00
  178. Added BSSID 00:00:00:00:00:00 into blacklist
  179. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  180. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  181. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  182. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  183. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  184. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  185. State: DISCONNECTED -> DISCONNECTED
  186. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  187. WEXT: Operstate: linkmode=-1, operstate=5
  188. EAPOL: External notification - portEnabled=0
  189. EAPOL: External notification - portValid=0
  190. EAPOL: External notification - EAP success=0
  191. State: DISCONNECTED -> SCANNING
  192. Starting AP scan (broadcast SSID)
  193. Scan requested (ret=0) - scan timeout 5 seconds
  194. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  195. Wireless event: cmd=0x8b19 len=8
  196. Received 786 bytes of scan results (3 BSSes)
  197. Scan results: 3
  198. Selecting BSS from priority group 0
  199. Try to find WPA-enabled AP
  200. 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
  201. selected based on WPA IE
  202. selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
  203. Try to find non-WPA AP
  204. Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
  205. Cancelling scan request
  206. WPA: clearing own WPA/RSN IE
  207. Automatic auth_alg selection: 0x1
  208. WPA: using IEEE 802.11i/D3.0
  209. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
  210. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  211. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  212. WPA: using GTK TKIP
  213. WPA: using PTK CCMP
  214. WPA: using KEY_MGMT WPA-PSK
  215. WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  216. No keys have been configured - skip key clearing
  217. wpa_driver_wext_set_drop_unencrypted
  218. State: SCANNING -> ASSOCIATING
  219. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  220. WEXT: Operstate: linkmode=-1, operstate=5
  221. wpa_driver_wext_associate
  222. Setting authentication timeout: 10 sec 0 usec
  223. EAPOL: External notification - EAP success=0
  224. EAPOL: External notification - EAP fail=0
  225. EAPOL: External notification - portControl=Auto
  226. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  227. Wireless event: cmd=0x8b06 len=8
  228. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  229. Wireless event: cmd=0x8b04 len=12
  230. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  231. Wireless event: cmd=0x8b1a len=16
  232. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  233. Wireless event: cmd=0x8b15 len=20
  234. Wireless event: new AP: 00:c0:49:f2:33:5e
  235. State: ASSOCIATING -> ASSOCIATED
  236. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  237. WEXT: Operstate: linkmode=-1, operstate=5
  238. Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
  239. No keys have been configured - skip key clearing
  240. Associated with 00:c0:49:f2:33:5e
  241. WPA: Association event - clear replay counter
  242. EAPOL: External notification - portEnabled=0
  243. EAPOL: External notification - portValid=0
  244. EAPOL: External notification - EAP success=0
  245. EAPOL: External notification - portEnabled=1
  246. EAPOL: SUPP_PAE entering state CONNECTING
  247. EAPOL: SUPP_BE entering state IDLE
  248. Setting authentication timeout: 10 sec 0 usec
  249. Cancelling scan request
  250. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  251. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  252. RX EAPOL from 00:c0:49:f2:33:5e
  253. RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  254. Setting authentication timeout: 10 sec 0 usec
  255. IEEE 802.1X RX: version=1 type=3 length=95
  256. EAPOL-Key type=254
  257. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  258. key_length=16 key_data_length=0
  259. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  260. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95
  261. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  262. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  263. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  264. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  265. WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  266. State: ASSOCIATED -> 4WAY_HANDSHAKE
  267. WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  268. WPA: Renewed SNonce - hexdump(len=32): 84 93 6e f8 1d 25 fa f4 3a ea 1b 76 63 eb 9c fd c6 d1 b1 27 19 ee 56 6d c6 b0 2e 99 45 e0 18 5e
  269. WPA: PMK - hexdump(len=32): [REMOVED]
  270. WPA: PTK - hexdump(len=64): [REMOVED]
  271. WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  272. WPA: Sending EAPOL-Key 2/4
  273. WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 84 93 6e f8 1d 25 fa f4 3a ea 1b 76 63 eb 9c fd c6 d1 b1 27 19 ee 56 6d c6 b0 2e 99 45 e0 18 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 71 19 99 df 3f 7b 6b ae 39 b3 39 8e 05 7a 1f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  274. RX EAPOL from 00:c0:49:f2:33:5e
  275. RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea 98 6a 6e fa 5e 34 e6 fc f0 1d 9a f6 3a 40 0a 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  276. IEEE 802.1X RX: version=1 type=3 length=125
  277. EAPOL-Key type=254
  278. key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  279. key_length=16 key_data_length=30
  280. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  281. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95
  282. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  283. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  284. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  285. key_mic - hexdump(len=16): ea 98 6a 6e fa 5e 34 e6 fc f0 1d 9a f6 3a 40 0a
  286. WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea 98 6a 6e fa 5e 34 e6 fc f0 1d 9a f6 3a 40 0a 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  287. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  288. WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  289. WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  290. WPA: Sending EAPOL-Key 4/4
  291. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 db 84 79 c1 a5 61 0b 62 77 57 ec 03 89 a2 d2 00 00
  292. WPA: Installing PTK to the driver.
  293. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  294. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  295. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  296. EAPOL: startWhen --> 0
  297. EAPOL: SUPP_PAE entering state CONNECTING
  298. EAPOL: txStart
  299. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  300. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  301. Wireless event: cmd=0x8b15 len=20
  302. Wireless event: new AP: 00:00:00:00:00:00
  303. Setting scan request: 0 sec 100000 usec
  304. BSSID 00:c0:49:f2:33:5e blacklist count incremented to 2
  305. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  306. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  307. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  308. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  309. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  310. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  311. State: GROUP_HANDSHAKE -> DISCONNECTED
  312. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  313. WEXT: Operstate: linkmode=-1, operstate=5
  314. EAPOL: External notification - portEnabled=0
  315. EAPOL: SUPP_PAE entering state DISCONNECTED
  316. EAPOL: SUPP_BE entering state INITIALIZE
  317. EAPOL: External notification - portValid=0
  318. EAPOL: External notification - EAP success=0
  319. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  320. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  321. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  322. Wireless event: cmd=0x8b15 len=20
  323. Wireless event: new AP: 00:00:00:00:00:00
  324. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  325. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  326. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  327. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  328. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  329. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  330. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  331. State: DISCONNECTED -> DISCONNECTED
  332. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  333. WEXT: Operstate: linkmode=-1, operstate=5
  334. EAPOL: External notification - portEnabled=0
  335. EAPOL: External notification - portValid=0
  336. EAPOL: External notification - EAP success=0
  337. State: DISCONNECTED -> SCANNING
  338. Starting AP scan (broadcast SSID)
  339. Scan requested (ret=0) - scan timeout 30 seconds
  340. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  341. Wireless event: cmd=0x8b19 len=8
  342. Received 787 bytes of scan results (3 BSSes)
  343. Scan results: 3
  344. Selecting BSS from priority group 0
  345. Try to find WPA-enabled AP
  346. 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
  347. skip - blacklisted
  348. 1: 00:1d:6a:eb:9b:9a ssid='Alice-11843278' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
  349. skip - SSID mismatch
  350. 2: 00:0f:3d:a7:ac:6e ssid='WiFi 604' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  351. skip - no WPA/RSN IE
  352. Try to find non-WPA AP
  353. 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
  354. skip - blacklisted
  355. 1: 00:1d:6a:eb:9b:9a ssid='Alice-11843278' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
  356. skip - SSID mismatch
  357. 2: 00:0f:3d:a7:ac:6e ssid='WiFi 604' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  358. skip - SSID mismatch
  359. No APs found - clear blacklist and try again
  360. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  361. Removed BSSID 00:c0:49:f2:33:5e from blacklist (clear)
  362. Selecting BSS from priority group 0
  363. Try to find WPA-enabled AP
  364. 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
  365. selected based on WPA IE
  366. selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
  367. Try to find non-WPA AP
  368. Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
  369. Cancelling scan request
  370. WPA: clearing own WPA/RSN IE
  371. Automatic auth_alg selection: 0x1
  372. WPA: using IEEE 802.11i/D3.0
  373. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
  374. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  375. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  376. WPA: using GTK TKIP
  377. WPA: using PTK CCMP
  378. WPA: using KEY_MGMT WPA-PSK
  379. WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  380. No keys have been configured - skip key clearing
  381. wpa_driver_wext_set_drop_unencrypted
  382. State: SCANNING -> ASSOCIATING
  383. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  384. WEXT: Operstate: linkmode=-1, operstate=5
  385. wpa_driver_wext_associate
  386. Setting authentication timeout: 10 sec 0 usec
  387. EAPOL: External notification - EAP success=0
  388. EAPOL: External notification - EAP fail=0
  389. EAPOL: External notification - portControl=Auto
  390. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  391. Wireless event: cmd=0x8b06 len=8
  392. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  393. Wireless event: cmd=0x8b04 len=12
  394. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  395. Wireless event: cmd=0x8b1a len=16
  396. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  397. Wireless event: cmd=0x8b15 len=20
  398. Wireless event: new AP: 00:c0:49:f2:33:5e
  399. State: ASSOCIATING -> ASSOCIATED
  400. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  401. WEXT: Operstate: linkmode=-1, operstate=5
  402. Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
  403. No keys have been configured - skip key clearing
  404. Associated with 00:c0:49:f2:33:5e
  405. WPA: Association event - clear replay counter
  406. EAPOL: External notification - portEnabled=0
  407. EAPOL: External notification - portValid=0
  408. EAPOL: External notification - EAP success=0
  409. EAPOL: External notification - portEnabled=1
  410. EAPOL: SUPP_PAE entering state CONNECTING
  411. EAPOL: SUPP_BE entering state IDLE
  412. Setting authentication timeout: 10 sec 0 usec
  413. Cancelling scan request
  414. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  415. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  416. RX EAPOL from 00:c0:49:f2:33:5e
  417. RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  418. Setting authentication timeout: 10 sec 0 usec
  419. IEEE 802.1X RX: version=1 type=3 length=95
  420. EAPOL-Key type=254
  421. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  422. key_length=16 key_data_length=0
  423. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  424. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96
  425. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  426. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  427. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  428. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  429. WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  430. State: ASSOCIATED -> 4WAY_HANDSHAKE
  431. WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  432. WPA: Renewed SNonce - hexdump(len=32): e3 d6 d8 a7 ab 09 6c c8 ba ff 0d 14 ee 6d 3b bd a3 fe db b7 ae 67 6b ff d2 66 e9 34 f0 70 ba d1
  433. WPA: PMK - hexdump(len=32): [REMOVED]
  434. WPA: PTK - hexdump(len=64): [REMOVED]
  435. WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  436. WPA: Sending EAPOL-Key 2/4
  437. WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 e3 d6 d8 a7 ab 09 6c c8 ba ff 0d 14 ee 6d 3b bd a3 fe db b7 ae 67 6b ff d2 66 e9 34 f0 70 ba d1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af 68 4d e3 43 91 74 b6 9b be fd d4 0e d5 e5 38 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  438. RX EAPOL from 00:c0:49:f2:33:5e
  439. RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 7a a3 1e ad 97 27 4a aa 0c 3a 86 4d 6d 7b 86 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  440. IEEE 802.1X RX: version=1 type=3 length=125
  441. EAPOL-Key type=254
  442. key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  443. key_length=16 key_data_length=30
  444. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  445. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96
  446. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  447. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  448. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  449. key_mic - hexdump(len=16): c0 7a a3 1e ad 97 27 4a aa 0c 3a 86 4d 6d 7b 86
  450. WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 7a a3 1e ad 97 27 4a aa 0c 3a 86 4d 6d 7b 86 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  451. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  452. WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  453. WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  454. WPA: Sending EAPOL-Key 4/4
  455. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 6c 17 28 29 05 c3 a9 be 1c 57 d7 e2 31 56 26 00 00
  456. WPA: Installing PTK to the driver.
  457. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  458. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  459. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  460. EAPOL: startWhen --> 0
  461. EAPOL: SUPP_PAE entering state CONNECTING
  462. EAPOL: txStart
  463. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  464. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  465. Wireless event: cmd=0x8b15 len=20
  466. Wireless event: new AP: 00:00:00:00:00:00
  467. Setting scan request: 0 sec 100000 usec
  468. Added BSSID 00:c0:49:f2:33:5e into blacklist
  469. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  470. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  471. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  472. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  473. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  474. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  475. State: GROUP_HANDSHAKE -> DISCONNECTED
  476. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  477. WEXT: Operstate: linkmode=-1, operstate=5
  478. EAPOL: External notification - portEnabled=0
  479. EAPOL: SUPP_PAE entering state DISCONNECTED
  480. EAPOL: SUPP_BE entering state INITIALIZE
  481. EAPOL: External notification - portValid=0
  482. EAPOL: External notification - EAP success=0
  483. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  484. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  485. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  486. Wireless event: cmd=0x8b15 len=20
  487. Wireless event: new AP: 00:00:00:00:00:00
  488. Added BSSID 00:00:00:00:00:00 into blacklist
  489. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  490. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  491. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  492. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  493. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  494. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  495. State: DISCONNECTED -> DISCONNECTED
  496. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  497. WEXT: Operstate: linkmode=-1, operstate=5
  498. EAPOL: External notification - portEnabled=0
  499. EAPOL: External notification - portValid=0
  500. EAPOL: External notification - EAP success=0
  501. State: DISCONNECTED -> SCANNING
  502. Starting AP scan (broadcast SSID)
  503. Scan requested (ret=0) - scan timeout 30 seconds
  504. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  505. Wireless event: cmd=0x8b19 len=8
  506. Received 554 bytes of scan results (2 BSSes)
  507. Scan results: 2
  508. Selecting BSS from priority group 0
  509. Try to find WPA-enabled AP
  510. 0: 00:c0:49:f2:33:5e ssid='FANTOMAZ' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
  511. selected based on WPA IE
  512. selected WPA AP 00:c0:49:f2:33:5e ssid='FANTOMAZ'
  513. Try to find non-WPA AP
  514. Trying to associate with 00:c0:49:f2:33:5e (SSID='FANTOMAZ' freq=2462 MHz)
  515. Cancelling scan request
  516. WPA: clearing own WPA/RSN IE
  517. Automatic auth_alg selection: 0x1
  518. WPA: using IEEE 802.11i/D3.0
  519. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
  520. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  521. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  522. WPA: using GTK TKIP
  523. WPA: using PTK CCMP
  524. WPA: using KEY_MGMT WPA-PSK
  525. WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  526. No keys have been configured - skip key clearing
  527. wpa_driver_wext_set_drop_unencrypted
  528. State: SCANNING -> ASSOCIATING
  529. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  530. WEXT: Operstate: linkmode=-1, operstate=5
  531. wpa_driver_wext_associate
  532. Setting authentication timeout: 10 sec 0 usec
  533. EAPOL: External notification - EAP success=0
  534. EAPOL: External notification - EAP fail=0
  535. EAPOL: External notification - portControl=Auto
  536. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  537. Wireless event: cmd=0x8b06 len=8
  538. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  539. Wireless event: cmd=0x8b04 len=12
  540. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  541. Wireless event: cmd=0x8b1a len=16
  542. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  543. Wireless event: cmd=0x8b15 len=20
  544. Wireless event: new AP: 00:c0:49:f2:33:5e
  545. State: ASSOCIATING -> ASSOCIATED
  546. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  547. WEXT: Operstate: linkmode=-1, operstate=5
  548. Associated to a new BSS: BSSID=00:c0:49:f2:33:5e
  549. No keys have been configured - skip key clearing
  550. Associated with 00:c0:49:f2:33:5e
  551. WPA: Association event - clear replay counter
  552. EAPOL: External notification - portEnabled=0
  553. EAPOL: External notification - portValid=0
  554. EAPOL: External notification - EAP success=0
  555. EAPOL: External notification - portEnabled=1
  556. EAPOL: SUPP_PAE entering state CONNECTING
  557. EAPOL: SUPP_BE entering state IDLE
  558. Setting authentication timeout: 10 sec 0 usec
  559. Cancelling scan request
  560. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  561. RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  562. RX EAPOL from 00:c0:49:f2:33:5e
  563. RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  564. Setting authentication timeout: 10 sec 0 usec
  565. IEEE 802.1X RX: version=1 type=3 length=95
  566. EAPOL-Key type=254
  567. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  568. key_length=16 key_data_length=0
  569. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  570. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97
  571. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  572. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  573. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  574. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  575. WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  576. State: ASSOCIATED -> 4WAY_HANDSHAKE
  577. WPA: RX message 1 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  578. WPA: Renewed SNonce - hexdump(len=32): 88 b6 d2 c6 8c 00 a7 8f c5 4a a5 71 98 b4 7e 2d 56 68 a0 9b 6f 56 da 20 ef ee 1a 1c b7 19 90 bd
  579. WPA: PMK - hexdump(len=32): [REMOVED]
  580. WPA: PTK - hexdump(len=64): [REMOVED]
  581. WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  582. WPA: Sending EAPOL-Key 2/4
  583. WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 88 b6 d2 c6 8c 00 a7 8f c5 4a a5 71 98 b4 7e 2d 56 68 a0 9b 6f 56 da 20 ef ee 1a 1c b7 19 90 bd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 c2 68 0a 69 47 51 6e 79 06 fe 0b 8f c6 a0 22 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
  584. RX EAPOL from 00:c0:49:f2:33:5e
  585. RX EAPOL - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 06 91 12 5d 47 3d 5d 8a f6 78 22 e2 82 4a a7 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  586. IEEE 802.1X RX: version=1 type=3 length=125
  587. EAPOL-Key type=254
  588. key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  589. key_length=16 key_data_length=30
  590. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  591. key_nonce - hexdump(len=32): ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97
  592. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  593. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  594. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  595. key_mic - hexdump(len=16): 90 06 91 12 5d 47 3d 5d 8a f6 78 22 e2 82 4a a7
  596. WPA: RX EAPOL-Key - hexdump(len=129): 01 03 00 7d fe 01 ca 00 10 00 00 00 00 00 00 00 01 ea 7d 07 14 99 7a f1 d9 e1 89 fd 13 c4 65 ec b6 a8 00 cc 7b 7d 33 b7 81 32 14 8e 56 8f 18 e5 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 06 91 12 5d 47 3d 5d 8a f6 78 22 e2 82 4a a7 00 1e dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  597. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  598. WPA: RX message 3 of 4-Way Handshake from 00:c0:49:f2:33:5e (ver=2)
  599. WPA: IE KeyData - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
  600. WPA: Sending EAPOL-Key 4/4
  601. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 9b f4 bb 3c 0d e4 88 4f ae da fb 77 a0 70 00 00 00
  602. WPA: Installing PTK to the driver.
  603. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  604. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  605. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  606. EAPOL: startWhen --> 0
  607. EAPOL: SUPP_PAE entering state CONNECTING
  608. EAPOL: txStart
  609. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  610. CTRL-EVENT-TERMINATING - signal 2 received
  611. Removing interface eth1
  612. State: GROUP_HANDSHAKE -> DISCONNECTED
  613. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  614. WEXT: Operstate: linkmode=-1, operstate=5
  615. wpa_driver_wext_deauthenticate
  616. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  617. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  618. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  619. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  620. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  621. EAPOL: External notification - portEnabled=0
  622. EAPOL: SUPP_PAE entering state DISCONNECTED
  623. EAPOL: SUPP_BE entering state INITIALIZE
  624. EAPOL: External notification - portValid=0
  625. wpa_driver_wext_set_wpa
  626. wpa_driver_wext_set_drop_unencrypted
  627. wpa_driver_wext_set_countermeasures
  628. No keys have been configured - skip key clearing
  629. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  630. Removed BSSID 00:c0:49:f2:33:5e from blacklist (clear)
  631. Cancelling scan request
  632. Cancelling authentication timeout
  633. WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement