Guest User

FreeBSD ath wpa_supplicant debug

a guest
Jul 23rd, 2013
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.63 KB | None | 0 0
  1. # wpa_supplicant -d -i wlan0 -c /etc/wpa_supplicant.conf
  2. wpa_supplicant v2.0
  3. Successfully initialized wpa_supplicant
  4. Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  5. Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
  6. Reading configuration file '/etc/wpa_supplicant.conf'
  7. ctrl_interface='/var/run/wpa_supplicant'
  8. eapol_version=1
  9. ap_scan=1
  10. fast_reauth=1
  11. Priority group 50
  12. id=0 ssid='hometest'
  13. id=1 ssid='selectel'
  14. id=5 ssid='Selectel-THD1'
  15. wpa_driver_bsd_capa: drivercaps=0x4f85ed01,cryptocaps=0x0000001f
  16. wlan0: Own MAC address: 00:25:d3:7b:94:87
  17. bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  18. bsd_del_key: key_idx=0
  19. bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  20. bsd_del_key: key_idx=1
  21. bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  22. bsd_del_key: key_idx=2
  23. bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  24. bsd_del_key: key_idx=3
  25. wpa_driver_bsd_set_countermeasures: enabled=0
  26. wlan0: RSN: flushing PMKID list in the driver
  27. wlan0: Setting scan request: 0 sec 100000 usec
  28. WPS: Set UUID for interface wlan0
  29. WPS: UUID based on MAC address - hexdump(len=16): ee e5 6e e8 64 59 5f 5b 98 87 79 3b b5 d9 78 e1
  30. EAPOL: SUPP_PAE entering state DISCONNECTED
  31. EAPOL: Supplicant port status: Unauthorized
  32. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  33. EAPOL: SUPP_BE entering state INITIALIZE
  34. EAP: EAP entering state DISABLED
  35. EAPOL: Supplicant port status: Unauthorized
  36. EAPOL: Supplicant port status: Unauthorized
  37. wlan0: Added interface wlan0
  38. wlan0: State: DISCONNECTED -> DISCONNECTED
  39. wlan0: State: DISCONNECTED -> SCANNING
  40. wlan0: Starting AP scan for wildcard SSID
  41. wpa_driver_bsd_set_wpa: enabled=1
  42. wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
  43. EAPOL: disable timer tick
  44. EAPOL: Supplicant port status: Unauthorized
  45. wlan0: Event SCAN_RESULTS (3) received
  46. Received 2240 bytes of scan results (9 BSSes)
  47. wlan0: BSS: Start scan result update 1
  48. wlan0: BSS: Add new id 0 BSSID 58:6d::50 SSID 'hometest'
  49. BSS: last_scan_res_used=9/32 last_scan_full=0
  50. wlan0: New scan results available
  51. WPS: AP 58:6d::50 type 0 added
  52. wlan0: Selecting BSS from priority group 2500
  53. wlan0: 0: 58:6d::50 ssid='hometest' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-71 wps
  54. wlan0: skip - SSID mismatch
  55. wlan0: Selecting BSS from priority group 500
  56. wlan0: 0: 58:6d::50 ssid='hometest' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-71 wps
  57. wlan0: skip - SSID mismatch
  58. ...
  59. wlan0: Selecting BSS from priority group 50
  60. wlan0: 0: 58:6d::50 ssid='hometest' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-71 wps
  61. wlan0: selected based on RSN IE
  62. wlan0: selected BSS 58:6d::50 ssid='hometest'
  63. wlan0: Request association: reassociate: 0 selected: 58:6d::50 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  64. wlan0: Trying to associate with 58:6d::50 (SSID='hometest' freq=2472 MHz)
  65. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  66. wlan0: Cancelling scan request
  67. wlan0: WPA: clearing own WPA/RSN IE
  68. wlan0: Automatic auth_alg selection: 0x1
  69. RSN: PMKSA cache search - network_ctx=0x0 try_opportunistic=0
  70. RSN: Search for BSSID 58:6d::50
  71. RSN: No PMKSA cache entry found
  72. wlan0: RSN: using IEEE 802.11i/D9.0
  73. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  74. wlan0: WPA: clearing AP WPA IE
  75. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  76. wlan0: WPA: using GTK CCMP
  77. wlan0: WPA: using PTK CCMP
  78. wlan0: WPA: using KEY_MGMT WPA-PSK
  79. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  80. wlan0: No keys have been configured - skip key clearing
  81. wlan0: State: SCANNING -> ASSOCIATING
  82. Limit connection to BSSID 58:6d::50 freq=2472 MHz based on scan results (bssid_set=0)
  83. wpa_driver_bsd_associate: ssid 'hometest' wpa ie len 22 pairwise 3 group 3 key mgmt 1
  84. wpa_driver_bsd_set_drop_unencrypted: enabled=1
  85. bsd_set_opt_ie: set WPA+RSN ie (len 22)
  86. wpa_driver_bsd_associate: set PRIVACY 1
  87. wlan0: Setting authentication timeout: 10 sec 0 usec
  88. EAPOL: External notification - EAP success=0
  89. EAPOL: Supplicant port status: Unauthorized
  90. EAPOL: External notification - EAP fail=0
  91. EAPOL: Supplicant port status: Unauthorized
  92. EAPOL: External notification - portControl=Auto
  93. EAPOL: Supplicant port status: Unauthorized
  94. RSN: Ignored PMKID candidate without preauth flag
  95. wlan0: Event ASSOC (0) received
  96. wlan0: State: ASSOCIATING -> ASSOCIATED
  97. wlan0: Associated to a new BSS: BSSID=58:6d::50
  98. wlan0: No keys have been configured - skip key clearing
  99. wlan0: Associated with 58:6d::50
  100. wlan0: WPA: Association event - clear replay counter
  101. wlan0: WPA: Clear old PTK
  102. EAPOL: External notification - portEnabled=0
  103. EAPOL: Supplicant port status: Unauthorized
  104. EAPOL: External notification - portValid=0
  105. EAPOL: Supplicant port status: Unauthorized
  106. EAPOL: External notification - EAP success=0
  107. EAPOL: Supplicant port status: Unauthorized
  108. EAPOL: External notification - portEnabled=1
  109. EAPOL: SUPP_PAE entering state CONNECTING
  110. EAPOL: enable timer tick
  111. EAPOL: SUPP_BE entering state IDLE
  112. wlan0: Setting authentication timeout: 10 sec 0 usec
  113. wlan0: Cancelling scan request
  114. wlan0: RX EAPOL from 58:6d::50
  115. wlan0: Setting authentication timeout: 10 sec 0 usec
  116. wlan0: IEEE 802.1X RX: version=2 type=3 length=95
  117. wlan0: EAPOL-Key type=2
  118. wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  119. wlan0: key_length=16 key_data_length=0
  120. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  121. key_nonce - hexdump(len=32): 30 26 c1 fc 74 09 ea c6 30 00 ca c0 1f cc 36 2c 97 6d 0e a9 1d cd 39 18 ee 15 41 0e aa ce 81 45
  122. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  123. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  124. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  125. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  126. wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  127. wlan0: WPA: RX message 1 of 4-Way Handshake from 58:6d::50 (ver=2)
  128. RSN: msg 1/4 key data - hexdump(len=0):
  129. WPA: Renewed SNonce - hexdump(len=32): 71 c7 ad 86 a7 8b 79 ed 18 7c b2 f1 e4 5c 2c 12 77 48 bc 81 0c bb 45 58 8c a9 93 7b e1 a1 df 9a
  130. WPA: PTK derivation - A1=00:25:d3:7b:94:87 A2=58:6d::50
  131. WPA: Nonce1 - hexdump(len=32): 71 c7 ad 86 a7 8b 79 ed 18 7c b2 f1 e4 5c 2c 12 77 48 bc 81 0c bb 45 58 8c a9 93 7b e1 a1 df 9a
  132. WPA: Nonce2 - hexdump(len=32): 30 26 c1 fc 74 09 ea c6 30 00 ca c0 1f cc 36 2c 97 6d 0e a9 1d cd 39 18 ee 15 41 0e aa ce 81 45
  133. WPA: PMK - hexdump(len=32): [REMOVED]
  134. WPA: PTK - hexdump(len=48): [REMOVED]
  135. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  136. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  137. wlan0: WPA: Sending EAPOL-Key 2/4
  138. WPA: KCK - hexdump(len=16): [REMOVED]
  139. WPA: Derived Key MIC - hexdump(len=16): 34 cc 1c 35 ae 52 11 12 6c a0 01 23 98 34 c6 94
  140. wlan0: RX EAPOL from 58:6d::50
  141. wlan0: IEEE 802.1X RX: version=2 type=3 length=151
  142. wlan0: EAPOL-Key type=2
  143. wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  144. wlan0: key_length=16 key_data_length=56
  145. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  146. key_nonce - hexdump(len=32): 30 26 c1 fc 74 09 ea c6 30 00 ca c0 1f cc 36 2c 97 6d 0e a9 1d cd 39 18 ee 15 41 0e aa ce 81 45
  147. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  148. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  149. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  150. key_mic - hexdump(len=16): bb db f7 c0 18 aa c0 c0 45 58 7f 2e 94 44 5e 13
  151. RSN: encrypted key data - hexdump(len=56): 73 d1 88 fd 8e ea 40 81 3c f4 19 12 bb b0 ea 92 2c 49 94 69 90 22 a7 d8 90 e2 19 70 71 4b b1 39 b4 25 7d 19 26 c1 7b 6f 82 23 a0 87 91 76 10 14 59 95 1c fb 6e 56 d3 eb
  152. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  153. wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  154. wlan0: WPA: RX message 3 of 4-Way Handshake from 58:6d::50 (ver=2)
  155. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 44 d2 51 ad ab 44 85 09 f8 51 06 2d e6 54 e4 fb dd 00
  156. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  157. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  158. wlan0: WPA: Sending EAPOL-Key 4/4
  159. WPA: KCK - hexdump(len=16): [REMOVED]
  160. WPA: Derived Key MIC - hexdump(len=16): 74 aa 78 e2 e9 16 ad 3c f0 00 27 31 a3 9c c0 0a
  161. wlan0: WPA: Installing PTK to the driver
  162. bsd_set_key: alg=3 addr=0x801c303d8 key_idx=0 set_tx=1 seq_len=6 key_len=16
  163. EAPOL: External notification - portValid=1
  164. wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  165. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  166. WPA: Group Key - hexdump(len=16): [REMOVED]
  167. wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
  168. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  169. bsd_set_key: alg=3 addr=0x46f8e4 key_idx=2 set_tx=0 seq_len=6 key_len=16
  170. wlan0: WPA: Key negotiation completed with 58:6d::50 [PTK=CCMP GTK=CCMP]
  171. wlan0: Cancelling authentication timeout
  172. wlan0: State: GROUP_HANDSHAKE -> COMPLETED
  173. wlan0: CTRL-EVENT-CONNECTED - Connection to 58:6d::50 completed [id=0 id_str=]
  174. EAPOL: External notification - portValid=1
  175. EAPOL: External notification - EAP success=1
  176. EAPOL: SUPP_PAE entering state AUTHENTICATING
  177. EAPOL: SUPP_BE entering state SUCCESS
  178. EAP: EAP entering state DISABLED
  179. EAPOL: SUPP_PAE entering state AUTHENTICATED
  180. EAPOL: Supplicant port status: Authorized
  181. EAPOL: SUPP_BE entering state IDLE
  182. EAPOL authentication completed successfully
  183. EAPOL: startWhen --> 0
  184. EAPOL: disable timer tick
Add Comment
Please, Sign In to add comment