Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # wpa_supplicant -d -i wlan0 -c /etc/wpa_supplicant.conf
- wpa_supplicant v2.0
- Successfully initialized wpa_supplicant
- Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant.conf'
- ctrl_interface='/var/run/wpa_supplicant'
- eapol_version=1
- ap_scan=1
- fast_reauth=1
- Priority group 50
- id=0 ssid='hometest'
- id=1 ssid='selectel'
- id=5 ssid='Selectel-THD1'
- wpa_driver_bsd_capa: drivercaps=0x4f85ed01,cryptocaps=0x0000001f
- wlan0: Own MAC address: 00:25:d3:7b:94:87
- bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=0
- bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=1
- bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=2
- bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=3
- wpa_driver_bsd_set_countermeasures: enabled=0
- wlan0: RSN: flushing PMKID list in the driver
- wlan0: Setting scan request: 0 sec 100000 usec
- WPS: Set UUID for interface wlan0
- WPS: UUID based on MAC address - hexdump(len=16): ee e5 6e e8 64 59 5f 5b 98 87 79 3b b5 d9 78 e1
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- wlan0: Added interface wlan0
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Starting AP scan for wildcard SSID
- wpa_driver_bsd_set_wpa: enabled=1
- wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
- EAPOL: disable timer tick
- EAPOL: Supplicant port status: Unauthorized
- wlan0: Event SCAN_RESULTS (3) received
- Received 2240 bytes of scan results (9 BSSes)
- wlan0: BSS: Start scan result update 1
- wlan0: BSS: Add new id 0 BSSID 58:6d::50 SSID 'hometest'
- BSS: last_scan_res_used=9/32 last_scan_full=0
- wlan0: New scan results available
- WPS: AP 58:6d::50 type 0 added
- wlan0: Selecting BSS from priority group 2500
- wlan0: 0: 58:6d::50 ssid='hometest' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-71 wps
- wlan0: skip - SSID mismatch
- wlan0: Selecting BSS from priority group 500
- wlan0: 0: 58:6d::50 ssid='hometest' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-71 wps
- wlan0: skip - SSID mismatch
- ...
- wlan0: Selecting BSS from priority group 50
- wlan0: 0: 58:6d::50 ssid='hometest' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-71 wps
- wlan0: selected based on RSN IE
- wlan0: selected BSS 58:6d::50 ssid='hometest'
- wlan0: Request association: reassociate: 0 selected: 58:6d::50 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Trying to associate with 58:6d::50 (SSID='hometest' freq=2472 MHz)
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- wlan0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=0x0 try_opportunistic=0
- RSN: Search for BSSID 58:6d::50
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> ASSOCIATING
- Limit connection to BSSID 58:6d::50 freq=2472 MHz based on scan results (bssid_set=0)
- wpa_driver_bsd_associate: ssid 'hometest' wpa ie len 22 pairwise 3 group 3 key mgmt 1
- wpa_driver_bsd_set_drop_unencrypted: enabled=1
- bsd_set_opt_ie: set WPA+RSN ie (len 22)
- wpa_driver_bsd_associate: set PRIVACY 1
- wlan0: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Event ASSOC (0) received
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wlan0: Associated to a new BSS: BSSID=58:6d::50
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 58:6d::50
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- wlan0: RX EAPOL from 58:6d::50
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: IEEE 802.1X RX: version=2 type=3 length=95
- wlan0: EAPOL-Key type=2
- wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlan0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 30 26 c1 fc 74 09 ea c6 30 00 ca c0 1f cc 36 2c 97 6d 0e a9 1d cd 39 18 ee 15 41 0e aa ce 81 45
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 1 of 4-Way Handshake from 58:6d::50 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 71 c7 ad 86 a7 8b 79 ed 18 7c b2 f1 e4 5c 2c 12 77 48 bc 81 0c bb 45 58 8c a9 93 7b e1 a1 df 9a
- WPA: PTK derivation - A1=00:25:d3:7b:94:87 A2=58:6d::50
- WPA: Nonce1 - hexdump(len=32): 71 c7 ad 86 a7 8b 79 ed 18 7c b2 f1 e4 5c 2c 12 77 48 bc 81 0c bb 45 58 8c a9 93 7b e1 a1 df 9a
- WPA: Nonce2 - hexdump(len=32): 30 26 c1 fc 74 09 ea c6 30 00 ca c0 1f cc 36 2c 97 6d 0e a9 1d cd 39 18 ee 15 41 0e aa ce 81 45
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- wlan0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 34 cc 1c 35 ae 52 11 12 6c a0 01 23 98 34 c6 94
- wlan0: RX EAPOL from 58:6d::50
- wlan0: IEEE 802.1X RX: version=2 type=3 length=151
- wlan0: EAPOL-Key type=2
- wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- wlan0: key_length=16 key_data_length=56
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
- key_nonce - hexdump(len=32): 30 26 c1 fc 74 09 ea c6 30 00 ca c0 1f cc 36 2c 97 6d 0e a9 1d cd 39 18 ee 15 41 0e aa ce 81 45
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): bb db f7 c0 18 aa c0 c0 45 58 7f 2e 94 44 5e 13
- RSN: encrypted key data - hexdump(len=56): 73 d1 88 fd 8e ea 40 81 3c f4 19 12 bb b0 ea 92 2c 49 94 69 90 22 a7 d8 90 e2 19 70 71 4b b1 39 b4 25 7d 19 26 c1 7b 6f 82 23 a0 87 91 76 10 14 59 95 1c fb 6e 56 d3 eb
- WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
- wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 3 of 4-Way Handshake from 58:6d::50 (ver=2)
- WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 44 d2 51 ad ab 44 85 09 f8 51 06 2d e6 54 e4 fb dd 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
- wlan0: WPA: Sending EAPOL-Key 4/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 74 aa 78 e2 e9 16 ad 3c f0 00 27 31 a3 9c c0 0a
- wlan0: WPA: Installing PTK to the driver
- bsd_set_key: alg=3 addr=0x801c303d8 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
- WPA: Group Key - hexdump(len=16): [REMOVED]
- wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- bsd_set_key: alg=3 addr=0x46f8e4 key_idx=2 set_tx=0 seq_len=6 key_len=16
- wlan0: WPA: Key negotiation completed with 58:6d::50 [PTK=CCMP GTK=CCMP]
- wlan0: Cancelling authentication timeout
- wlan0: State: GROUP_HANDSHAKE -> COMPLETED
- wlan0: CTRL-EVENT-CONNECTED - Connection to 58:6d::50 completed [id=0 id_str=]
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
Add Comment
Please, Sign In to add comment