Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [root@houseserver networkmanager-dispatcher-net_daemons]# dhcpcd
- dhcpcd[1161]: version 5.5.6 starting
- dhcpcd[1161]: wlan1: sending IPv6 Router Solicitation
- dhcpcd[1161]: wlan1: broadcasting for a lease
- dhcpcd[1161]: eth0: waiting for carrier
- dhcpcd[1161]: wlan0: waiting for carrier
- dhcpcd[1161]: wlan1: offered 192.168.0.3 from 192.168.0.1
- dhcpcd[1161]: wlan1: acknowledged 192.168.0.3 from 192.168.0.1
- dhcpcd[1161]: wlan1: checking for 192.168.0.3
- dhcpcd[1161]: wlan1: sending IPv6 Router Solicitation
- dhcpcd[1161]: wlan1: leased 192.168.0.3 for 3600 seconds
- dhcpcd[1161]: forked to background, child pid 1207
- wpa_supplicant debug:
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 1508 bytes of scan results (3 BSSes)
- BSS: Start scan result update 7
- BSS: Expire BSS 7 due to no match in scan
- BSS: Remove id 7 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No suitable network found
- Setting scan request: 5 sec 0 usec
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 2202 bytes of scan results (4 BSSes)
- BSS: Start scan result update 8
- BSS: Add new id 11 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
- Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=33
- Authentication with a0:21:b7:4d:dd:a0 timed out.
- Added BSSID a0:21:b7:4d:dd:a0 into blacklist
- No keys have been configured - skip key clearing
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 2201 bytes of scan results (4 BSSes)
- BSS: Start scan result update 9
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
- Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=33
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8c08 len=181
- AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: a0:21:b7:4d:dd:a0
- Association info event
- resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
- No keys have been configured - skip key clearing
- Associated with a0:21:b7:4d:dd:a0
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RX EAPOL from a0:21:b7:4d:dd:a0
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=117
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=22
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): 40 e1 34 67 f1 a5 9a 56 01 f8 77 e0 7f 59 c0 1e 2d 72 e9 8f f5 35 28 19 84 a2 51 f8 44 f6 ce 7c
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- RSN: PMKID from Authenticator - hexdump(len=16): 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- RSN: no matching PMKID found
- WPA: Renewed SNonce - hexdump(len=32): ff 13 77 d8 41 96 de 14 02 40 37 3b f9 55 a1 49 5b fa 46 66 93 43 19 53 31 d0 c4 20 fc 50 31 ee
- WPA: PTK derivation - A1=90:f6:52:08:11:8f A2=a0:21:b7:4d:dd:a0
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from a0:21:b7:4d:dd:a0
- IEEE 802.1X RX: version=2 type=3 length=175
- EAPOL-Key type=2
- key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- key_length=16 key_data_length=80
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 40 e1 34 67 f1 a5 9a 56 01 f8 77 e0 7f 59 c0 1e 2d 72 e9 8f f5 35 28 19 84 a2 51 f8 44 f6 ce 7c
- key_iv - hexdump(len=16): 2d 72 e9 8f f5 35 28 19 84 a2 51 f8 44 f6 ce 7e
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 48 f9 75 02 e9 15 9c 87 d4 f3 ed b6 4f e7 b1 c4
- RSN: encrypted key data - hexdump(len=80): 33 7b 23 a6 3d 19 c4 c7 ab f3 99 e4 73 9a 9e 89 ee dd cb 6a 94 7c 37 9e 24 19 d6 25 c2 34 46 bc db ac 34 b5 4f 60 7b 49 32 96 06 71 c0 a9 f9 63 08 45 4a ae f5 12 c2 e6 4e c8 74 ad 34 bc d9 2e 9b 5d 75 cf 21 ed dc 75 b4 36 d8 c1 9d 71 a1 82
- WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
- WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 50 93 b7 fe 2f a5 ab 83 ef a5 d2 7f 05 dd 50 9d 23 5b d0 86 83 67 9d fb be 62 b9 68 a8 b7 f8 2c dd 00 00 00 00 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
- WPA: Sending EAPOL-Key 4/4
- WPA: Installing PTK to the driver.
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
- WPA: Group Key - hexdump(len=32): [REMOVED]
- WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
- WPA: Key negotiation completed with a0:21:b7:4d:dd:a0 [PTK=CCMP GTK=TKIP]
- Cancelling authentication timeout
- Removed BSSID a0:21:b7:4d:dd:a0 from blacklist
- State: GROUP_HANDSHAKE -> COMPLETED
- CTRL-EVENT-CONNECTED - Connection to a0:21:b7:4d:dd:a0 completed (reauth) [id=0 id_str=]
- wpa_driver_wext_set_operstate: operstate 0->1 (UP)
- netlink: Operstate: linkmode=-1, operstate=6
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:00:00:00:00:00
- Disassociation notification
- Setting scan request: 0 sec 100000 usec
- Added BSSID a0:21:b7:4d:dd:a0 into blacklist
- CTRL-EVENT-DISCONNECTED bssid=a0:21:b7:4d:dd:a0 reason=0
- Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: COMPLETED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- State: DISCONNECTED -> SCANNING
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 1508 bytes of scan results (3 BSSes)
- BSS: Start scan result update 10
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID a0:21:b7:4d:dd:a0 from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No suitable network found
- Setting scan request: 5 sec 0 usec
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 1508 bytes of scan results (3 BSSes)
- BSS: Start scan result update 11
- BSS: Expire BSS 11 due to no match in scan
- BSS: Remove id 11 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No suitable network found
- Setting scan request: 5 sec 0 usec
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 1508 bytes of scan results (3 BSSes)
- BSS: Start scan result update 12
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No suitable network found
- Setting scan request: 5 sec 0 usec
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 2201 bytes of scan results (4 BSSes)
- BSS: Start scan result update 13
- BSS: Add new id 12 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
- Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=33
- Authentication with a0:21:b7:4d:dd:a0 timed out.
- Added BSSID a0:21:b7:4d:dd:a0 into blacklist
- No keys have been configured - skip key clearing
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 2201 bytes of scan results (4 BSSes)
- BSS: Start scan result update 14
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
- Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=33
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8c08 len=181
- AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: a0:21:b7:4d:dd:a0
- Association info event
- resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
- No keys have been configured - skip key clearing
- Associated with a0:21:b7:4d:dd:a0
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RX EAPOL from a0:21:b7:4d:dd:a0
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=117
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=22
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): 2f cf 53 d7 9e 06 3f 14 90 94 f8 1f 78 e0 07 9a b9 06 3f ab 39 36 f7 50 2f 68 2e 03 ae e8 84 3d
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- RSN: PMKID from Authenticator - hexdump(len=16): 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- RSN: no matching PMKID found
- WPA: Renewed SNonce - hexdump(len=32): 79 60 60 dd 1c 13 18 fc 1a ec 66 e0 f6 cb b7 e3 df 43 3b 2d cf ad 51 61 26 3f d5 39 5a 2e 8b 4e
- WPA: PTK derivation - A1=90:f6:52:08:11:8f A2=a0:21:b7:4d:dd:a0
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from a0:21:b7:4d:dd:a0
- IEEE 802.1X RX: version=2 type=3 length=175
- EAPOL-Key type=2
- key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- key_length=16 key_data_length=80
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 2f cf 53 d7 9e 06 3f 14 90 94 f8 1f 78 e0 07 9a b9 06 3f ab 39 36 f7 50 2f 68 2e 03 ae e8 84 3d
- key_iv - hexdump(len=16): b9 06 3f ab 39 36 f7 50 2f 68 2e 03 ae e8 84 3f
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): f7 8b 46 6d 91 c8 0e 5b 38 17 a6 41 87 6d aa 2e
- RSN: encrypted key data - hexdump(len=80): c4 5b f6 9e 5c ab c4 45 7a 6e ef e7 2b b6 a5 0d ed 85 cc dc 97 89 e6 7f bd 7d 40 8c 37 e9 d8 a4 c7 94 fe 1e 12 5c c3 18 e7 c6 cc 89 bf c5 64 ee 25 c0 79 cc dc 02 0c b3 2b 9a f9 fe ff 88 53 db 80 e4 bb e3 71 ae 06 1f 1b 52 6c 79 dd 8a 8d a7
- WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
- WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 15 38 79 b0 97 84 0c 37 31 1a 29 27 6c 77 80 ef e5 aa 02 85 d7 1a ac 36 c3 16 0c 1b c7 9d 45 5c dd 00 00 00 00 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
- WPA: Sending EAPOL-Key 4/4
- WPA: Installing PTK to the driver.
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
- WPA: Group Key - hexdump(len=32): [REMOVED]
- WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
- WPA: Key negotiation completed with a0:21:b7:4d:dd:a0 [PTK=CCMP GTK=TKIP]
- Cancelling authentication timeout
- Removed BSSID a0:21:b7:4d:dd:a0 from blacklist
- State: GROUP_HANDSHAKE -> COMPLETED
- CTRL-EVENT-CONNECTED - Connection to a0:21:b7:4d:dd:a0 completed (reauth) [id=0 id_str=]
- wpa_driver_wext_set_operstate: operstate 0->1 (UP)
- netlink: Operstate: linkmode=-1, operstate=6
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- BSS: Expire BSS 8 due to age
- BSS: Remove id 8 BSSID c0:3f:0e:fe:43:b7 SSID 'virginmedia5821443'
- BSS: Expire BSS 9 due to age
- BSS: Remove id 9 BSSID 00:1d:68:05:63:0f SSID 'BTHomeHub-E6DF'
- BSS: Expire BSS 10 due to age
- BSS: Remove id 10 BSSID 02:1d:68:05:63:10 SSID 'BTOpenzone-H'
- RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:00:00:00:00:00
- Disassociation notification
- Setting scan request: 0 sec 100000 usec
- Added BSSID a0:21:b7:4d:dd:a0 into blacklist
- CTRL-EVENT-DISCONNECTED bssid=a0:21:b7:4d:dd:a0 reason=0
- Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: COMPLETED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- State: DISCONNECTED -> SCANNING
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 1508 bytes of scan results (3 BSSes)
- BSS: Start scan result update 15
- BSS: Add new id 13 BSSID c0:3f:0e:fe:43:b7 SSID 'virginmedia5821443'
- BSS: Add new id 14 BSSID 00:1d:68:05:63:0f SSID 'BTHomeHub-E6DF'
- BSS: Add new id 15 BSSID 02:1d:68:05:63:10 SSID 'BTOpenzone-H'
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No APs found - clear blacklist and try again
- Removed BSSID a0:21:b7:4d:dd:a0 from blacklist (clear)
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No suitable network found
- Setting scan request: 5 sec 0 usec
- BSS: Expire BSS 12 due to age
- BSS: Remove id 12 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 1508 bytes of scan results (3 BSSes)
- BSS: Start scan result update 16
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - no WPA/RSN IE
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - no WPA/RSN IE
- Try to find non-WPA AP
- 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- skip - SSID mismatch
- 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
- skip - SSID mismatch
- 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
- skip - SSID mismatch
- No suitable network found
- Setting scan request: 5 sec 0 usec
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 2201 bytes of scan results (4 BSSes)
- BSS: Start scan result update 17
- BSS: Add new id 16 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
- Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=33
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8c08 len=181
- AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: a0:21:b7:4d:dd:a0
- Association info event
- resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
- No keys have been configured - skip key clearing
- Associated with a0:21:b7:4d:dd:a0
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- Authentication with a0:21:b7:4d:dd:a0 timed out.
- Added BSSID a0:21:b7:4d:dd:a0 into blacklist
- wpa_driver_wext_disassociate
- No keys have been configured - skip key clearing
- State: ASSOCIATED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- Setting scan request: 0 sec 0 usec
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:00:00:00:00:00
- Disassociation notification
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
- Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- State: DISCONNECTED -> SCANNING
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b19 len=16
- Received 2201 bytes of scan results (4 BSSes)
- BSS: Start scan result update 18
- New scan results available
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
- Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b1a len=33
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8c08 len=181
- AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: a0:21:b7:4d:dd:a0
- Association info event
- resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
- No keys have been configured - skip key clearing
- Associated with a0:21:b7:4d:dd:a0
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RX EAPOL from a0:21:b7:4d:dd:a0
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=2 type=3 length=117
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=22
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): 46 09 d4 0b bc e8 77 bf e5 c3 49 9c e3 05 c4 c2 1a 6b 5a 6e 83 25 ec 32 65 a0 76 00 36 3b fe d1
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- RSN: PMKID from Authenticator - hexdump(len=16): 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
- RSN: no matching PMKID found
- WPA: Renewed SNonce - hexdump(len=32): 04 2d ac 5e 75 43 14 f6 37 77 7b 80 a7 cd ce e1 06 d1 40 c7 d6 f0 1d 30 17 06 e8 88 6b 54 35 7e
- WPA: PTK derivation - A1=90:f6:52:08:11:8f A2=a0:21:b7:4d:dd:a0
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- RX EAPOL from a0:21:b7:4d:dd:a0
- IEEE 802.1X RX: version=2 type=3 length=175
- EAPOL-Key type=2
- key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- key_length=16 key_data_length=80
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 46 09 d4 0b bc e8 77 bf e5 c3 49 9c e3 05 c4 c2 1a 6b 5a 6e 83 25 ec 32 65 a0 76 00 36 3b fe d1
- key_iv - hexdump(len=16): 1a 6b 5a 6e 83 25 ec 32 65 a0 76 00 36 3b fe d3
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 08 cf 50 6f 93 5c a6 d9 3a 69 c2 f9 2c 3c d9 4f
- RSN: encrypted key data - hexdump(len=80): a8 b5 26 ac 7a 12 7c 9c e1 a1 7e b2 d9 c6 cd 16 6f 2d 75 b5 87 2c 44 9b 29 a7 b0 35 e7 d6 dc a7 b7 ab f9 48 db 2c f2 9d 62 a9 46 e7 74 72 0d 7f 9a 13 5b 91 d4 0f 99 7b 69 be 89 6a fa f3 77 dd 63 30 10 42 dd dc b5 91 19 cb ec 1d 13 01 9a 8a
- WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
- State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- WPA: RX message 3 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
- WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 06 60 6d 32 b6 87 f8 d3 e9 f8 b4 bf 97 90 2b db 0f 20 79 11 ff 4a 05 66 91 08 40 78 0c 66 e9 bb dd 00 00 00 00 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
- WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
- WPA: Sending EAPOL-Key 4/4
- WPA: Installing PTK to the driver.
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
- WPA: Group Key - hexdump(len=32): [REMOVED]
- WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
- WPA: Key negotiation completed with a0:21:b7:4d:dd:a0 [PTK=CCMP GTK=TKIP]
- Cancelling authentication timeout
- Removed BSSID a0:21:b7:4d:dd:a0 from blacklist
- State: GROUP_HANDSHAKE -> COMPLETED
- CTRL-EVENT-CONNECTED - Connection to a0:21:b7:4d:dd:a0 completed (reauth) [id=0 id_str=]
- wpa_driver_wext_set_operstate: operstate 0->1 (UP)
- netlink: Operstate: linkmode=-1, operstate=6
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- BSS: Expire BSS 13 due to age
- BSS: Remove id 13 BSSID c0:3f:0e:fe:43:b7 SSID 'virginmedia5821443'
- BSS: Expire BSS 14 due to age
- BSS: Remove id 14 BSSID 00:1d:68:05:63:0f SSID 'BTHomeHub-E6DF'
- BSS: Expire BSS 15 due to age
- BSS: Remove id 15 BSSID 02:1d:68:05:63:10 SSID 'BTOpenzone-H'
Advertisement
Add Comment
Please, Sign In to add comment