Guest User

dhcpcd / wpasupp

a guest
Jun 24th, 2012
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 53.15 KB | None | 0 0
  1. [root@houseserver networkmanager-dispatcher-net_daemons]# dhcpcd
  2. dhcpcd[1161]: version 5.5.6 starting
  3. dhcpcd[1161]: wlan1: sending IPv6 Router Solicitation
  4. dhcpcd[1161]: wlan1: broadcasting for a lease
  5. dhcpcd[1161]: eth0: waiting for carrier
  6. dhcpcd[1161]: wlan0: waiting for carrier
  7. dhcpcd[1161]: wlan1: offered 192.168.0.3 from 192.168.0.1
  8. dhcpcd[1161]: wlan1: acknowledged 192.168.0.3 from 192.168.0.1
  9. dhcpcd[1161]: wlan1: checking for 192.168.0.3
  10. dhcpcd[1161]: wlan1: sending IPv6 Router Solicitation
  11. dhcpcd[1161]: wlan1: leased 192.168.0.3 for 3600 seconds
  12. dhcpcd[1161]: forked to background, child pid 1207
  13.  
  14. wpa_supplicant debug:
  15.  
  16. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  17. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  18. Wireless event: cmd=0x8b19 len=16
  19. Received 1508 bytes of scan results (3 BSSes)
  20. BSS: Start scan result update 7
  21. BSS: Expire BSS 7 due to no match in scan
  22. BSS: Remove id 7 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
  23. New scan results available
  24. Selecting BSS from priority group 0
  25. Try to find WPA-enabled AP
  26. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  27. skip - SSID mismatch
  28. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  29. skip - no WPA/RSN IE
  30. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  31. skip - no WPA/RSN IE
  32. Try to find non-WPA AP
  33. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  34. skip - SSID mismatch
  35. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  36. skip - SSID mismatch
  37. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  38. skip - SSID mismatch
  39. No suitable network found
  40. Setting scan request: 5 sec 0 usec
  41. Starting AP scan for wildcard SSID
  42. Scan requested (ret=0) - scan timeout 30 seconds
  43. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  44. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  45. Wireless event: cmd=0x8b19 len=16
  46. Received 2202 bytes of scan results (4 BSSes)
  47. BSS: Start scan result update 8
  48. BSS: Add new id 11 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
  49. New scan results available
  50. Selecting BSS from priority group 0
  51. Try to find WPA-enabled AP
  52. 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  53. selected based on RSN IE
  54. selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
  55. Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
  56. Cancelling scan request
  57. WPA: clearing own WPA/RSN IE
  58. Automatic auth_alg selection: 0x1
  59. RSN: using IEEE 802.11i/D9.0
  60. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  61. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
  62. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  63. WPA: using GTK TKIP
  64. WPA: using PTK CCMP
  65. WPA: using KEY_MGMT WPA-PSK
  66. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  67. No keys have been configured - skip key clearing
  68. State: SCANNING -> ASSOCIATING
  69. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  70. netlink: Operstate: linkmode=-1, operstate=5
  71. wpa_driver_wext_associate
  72. wpa_driver_wext_set_drop_unencrypted
  73. wpa_driver_wext_set_psk
  74. Setting authentication timeout: 10 sec 0 usec
  75. EAPOL: External notification - EAP success=0
  76. EAPOL: Supplicant port status: Unauthorized
  77. EAPOL: External notification - EAP fail=0
  78. EAPOL: Supplicant port status: Unauthorized
  79. EAPOL: External notification - portControl=Auto
  80. EAPOL: Supplicant port status: Unauthorized
  81. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  82. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  83. Wireless event: cmd=0x8b1a len=16
  84. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  85. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  86. Wireless event: cmd=0x8b06 len=12
  87. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  88. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  89. Wireless event: cmd=0x8b04 len=16
  90. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  91. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  92. Wireless event: cmd=0x8b1a len=33
  93. Authentication with a0:21:b7:4d:dd:a0 timed out.
  94. Added BSSID a0:21:b7:4d:dd:a0 into blacklist
  95. No keys have been configured - skip key clearing
  96. State: ASSOCIATING -> DISCONNECTED
  97. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  98. netlink: Operstate: linkmode=-1, operstate=5
  99. EAPOL: External notification - portEnabled=0
  100. EAPOL: Supplicant port status: Unauthorized
  101. EAPOL: External notification - portValid=0
  102. EAPOL: Supplicant port status: Unauthorized
  103. EAPOL: External notification - EAP success=0
  104. EAPOL: Supplicant port status: Unauthorized
  105. Setting scan request: 0 sec 0 usec
  106. State: DISCONNECTED -> SCANNING
  107. Starting AP scan for wildcard SSID
  108. Scan requested (ret=0) - scan timeout 30 seconds
  109. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  110. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  111. Wireless event: cmd=0x8b19 len=16
  112. Received 2201 bytes of scan results (4 BSSes)
  113. BSS: Start scan result update 9
  114. New scan results available
  115. Selecting BSS from priority group 0
  116. Try to find WPA-enabled AP
  117. 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  118. selected based on RSN IE
  119. selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
  120. Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
  121. Cancelling scan request
  122. WPA: clearing own WPA/RSN IE
  123. Automatic auth_alg selection: 0x1
  124. RSN: using IEEE 802.11i/D9.0
  125. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  126. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
  127. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  128. WPA: using GTK TKIP
  129. WPA: using PTK CCMP
  130. WPA: using KEY_MGMT WPA-PSK
  131. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  132. No keys have been configured - skip key clearing
  133. State: SCANNING -> ASSOCIATING
  134. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  135. netlink: Operstate: linkmode=-1, operstate=5
  136. wpa_driver_wext_associate
  137. wpa_driver_wext_set_drop_unencrypted
  138. wpa_driver_wext_set_psk
  139. Setting authentication timeout: 10 sec 0 usec
  140. EAPOL: External notification - EAP success=0
  141. EAPOL: Supplicant port status: Unauthorized
  142. EAPOL: External notification - EAP fail=0
  143. EAPOL: Supplicant port status: Unauthorized
  144. EAPOL: External notification - portControl=Auto
  145. EAPOL: Supplicant port status: Unauthorized
  146. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  147. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  148. Wireless event: cmd=0x8b1a len=16
  149. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  150. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  151. Wireless event: cmd=0x8b06 len=12
  152. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  153. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  154. Wireless event: cmd=0x8b04 len=16
  155. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  156. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  157. Wireless event: cmd=0x8b1a len=33
  158. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  159. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  160. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  161. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  162. Wireless event: cmd=0x8c08 len=181
  163. AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  164. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  165. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  166. Wireless event: cmd=0x8b15 len=24
  167. Wireless event: new AP: a0:21:b7:4d:dd:a0
  168. Association info event
  169. resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  170. State: ASSOCIATING -> ASSOCIATED
  171. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  172. netlink: Operstate: linkmode=-1, operstate=5
  173. Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
  174. No keys have been configured - skip key clearing
  175. Associated with a0:21:b7:4d:dd:a0
  176. WPA: Association event - clear replay counter
  177. WPA: Clear old PTK
  178. EAPOL: External notification - portEnabled=0
  179. EAPOL: Supplicant port status: Unauthorized
  180. EAPOL: External notification - portValid=0
  181. EAPOL: Supplicant port status: Unauthorized
  182. EAPOL: External notification - EAP success=0
  183. EAPOL: Supplicant port status: Unauthorized
  184. EAPOL: External notification - portEnabled=1
  185. EAPOL: SUPP_PAE entering state CONNECTING
  186. EAPOL: enable timer tick
  187. EAPOL: SUPP_BE entering state IDLE
  188. Setting authentication timeout: 10 sec 0 usec
  189. Cancelling scan request
  190. RX EAPOL from a0:21:b7:4d:dd:a0
  191. Setting authentication timeout: 10 sec 0 usec
  192. IEEE 802.1X RX: version=2 type=3 length=117
  193. EAPOL-Key type=2
  194. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  195. key_length=16 key_data_length=22
  196. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  197. key_nonce - hexdump(len=32): 40 e1 34 67 f1 a5 9a 56 01 f8 77 e0 7f 59 c0 1e 2d 72 e9 8f f5 35 28 19 84 a2 51 f8 44 f6 ce 7c
  198. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  199. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  200. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  201. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  202. State: ASSOCIATED -> 4WAY_HANDSHAKE
  203. WPA: RX message 1 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
  204. RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  205. WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  206. RSN: PMKID from Authenticator - hexdump(len=16): 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  207. RSN: no matching PMKID found
  208. WPA: Renewed SNonce - hexdump(len=32): ff 13 77 d8 41 96 de 14 02 40 37 3b f9 55 a1 49 5b fa 46 66 93 43 19 53 31 d0 c4 20 fc 50 31 ee
  209. WPA: PTK derivation - A1=90:f6:52:08:11:8f A2=a0:21:b7:4d:dd:a0
  210. WPA: PMK - hexdump(len=32): [REMOVED]
  211. WPA: PTK - hexdump(len=48): [REMOVED]
  212. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  213. WPA: Sending EAPOL-Key 2/4
  214. RX EAPOL from a0:21:b7:4d:dd:a0
  215. IEEE 802.1X RX: version=2 type=3 length=175
  216. EAPOL-Key type=2
  217. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  218. key_length=16 key_data_length=80
  219. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  220. key_nonce - hexdump(len=32): 40 e1 34 67 f1 a5 9a 56 01 f8 77 e0 7f 59 c0 1e 2d 72 e9 8f f5 35 28 19 84 a2 51 f8 44 f6 ce 7c
  221. key_iv - hexdump(len=16): 2d 72 e9 8f f5 35 28 19 84 a2 51 f8 44 f6 ce 7e
  222. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  223. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  224. key_mic - hexdump(len=16): 48 f9 75 02 e9 15 9c 87 d4 f3 ed b6 4f e7 b1 c4
  225. RSN: encrypted key data - hexdump(len=80): 33 7b 23 a6 3d 19 c4 c7 ab f3 99 e4 73 9a 9e 89 ee dd cb 6a 94 7c 37 9e 24 19 d6 25 c2 34 46 bc db ac 34 b5 4f 60 7b 49 32 96 06 71 c0 a9 f9 63 08 45 4a ae f5 12 c2 e6 4e c8 74 ad 34 bc d9 2e 9b 5d 75 cf 21 ed dc 75 b4 36 d8 c1 9d 71 a1 82
  226. WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
  227. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  228. WPA: RX message 3 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
  229. WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 50 93 b7 fe 2f a5 ab 83 ef a5 d2 7f 05 dd 50 9d 23 5b d0 86 83 67 9d fb be 62 b9 68 a8 b7 f8 2c dd 00 00 00 00 00
  230. WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  231. WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
  232. WPA: Sending EAPOL-Key 4/4
  233. WPA: Installing PTK to the driver.
  234. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  235. EAPOL: External notification - portValid=1
  236. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  237. RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
  238. WPA: Group Key - hexdump(len=32): [REMOVED]
  239. WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
  240. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  241. wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
  242. WPA: Key negotiation completed with a0:21:b7:4d:dd:a0 [PTK=CCMP GTK=TKIP]
  243. Cancelling authentication timeout
  244. Removed BSSID a0:21:b7:4d:dd:a0 from blacklist
  245. State: GROUP_HANDSHAKE -> COMPLETED
  246. CTRL-EVENT-CONNECTED - Connection to a0:21:b7:4d:dd:a0 completed (reauth) [id=0 id_str=]
  247. wpa_driver_wext_set_operstate: operstate 0->1 (UP)
  248. netlink: Operstate: linkmode=-1, operstate=6
  249. EAPOL: External notification - portValid=1
  250. EAPOL: External notification - EAP success=1
  251. EAPOL: SUPP_PAE entering state AUTHENTICATING
  252. EAPOL: SUPP_BE entering state SUCCESS
  253. EAP: EAP entering state DISABLED
  254. EAPOL: SUPP_PAE entering state AUTHENTICATED
  255. EAPOL: Supplicant port status: Authorized
  256. EAPOL: SUPP_BE entering state IDLE
  257. EAPOL authentication completed successfully
  258. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  259. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  260. EAPOL: startWhen --> 0
  261. EAPOL: disable timer tick
  262. RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
  263. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  264. RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
  265. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  266. Wireless event: cmd=0x8b15 len=24
  267. Wireless event: new AP: 00:00:00:00:00:00
  268. Disassociation notification
  269. Setting scan request: 0 sec 100000 usec
  270. Added BSSID a0:21:b7:4d:dd:a0 into blacklist
  271. CTRL-EVENT-DISCONNECTED bssid=a0:21:b7:4d:dd:a0 reason=0
  272. Disconnect event - remove keys
  273. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  274. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  275. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  276. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  277. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  278. State: COMPLETED -> DISCONNECTED
  279. wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
  280. netlink: Operstate: linkmode=-1, operstate=5
  281. EAPOL: External notification - portEnabled=0
  282. EAPOL: SUPP_PAE entering state DISCONNECTED
  283. EAPOL: Supplicant port status: Unauthorized
  284. EAPOL: SUPP_BE entering state INITIALIZE
  285. EAPOL: Supplicant port status: Unauthorized
  286. EAPOL: External notification - portValid=0
  287. EAPOL: Supplicant port status: Unauthorized
  288. EAPOL: External notification - EAP success=0
  289. EAPOL: Supplicant port status: Unauthorized
  290. State: DISCONNECTED -> SCANNING
  291. Starting AP scan for wildcard SSID
  292. Scan requested (ret=0) - scan timeout 30 seconds
  293. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  294. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  295. Wireless event: cmd=0x8b19 len=16
  296. Received 1508 bytes of scan results (3 BSSes)
  297. BSS: Start scan result update 10
  298. New scan results available
  299. Selecting BSS from priority group 0
  300. Try to find WPA-enabled AP
  301. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  302. skip - SSID mismatch
  303. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  304. skip - no WPA/RSN IE
  305. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  306. skip - no WPA/RSN IE
  307. Try to find non-WPA AP
  308. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  309. skip - SSID mismatch
  310. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  311. skip - SSID mismatch
  312. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  313. skip - SSID mismatch
  314. No APs found - clear blacklist and try again
  315. Removed BSSID a0:21:b7:4d:dd:a0 from blacklist (clear)
  316. Selecting BSS from priority group 0
  317. Try to find WPA-enabled AP
  318. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  319. skip - SSID mismatch
  320. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  321. skip - no WPA/RSN IE
  322. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  323. skip - no WPA/RSN IE
  324. Try to find non-WPA AP
  325. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  326. skip - SSID mismatch
  327. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  328. skip - SSID mismatch
  329. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  330. skip - SSID mismatch
  331. No suitable network found
  332. Setting scan request: 5 sec 0 usec
  333. Starting AP scan for wildcard SSID
  334. Scan requested (ret=0) - scan timeout 30 seconds
  335. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  336. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  337. Wireless event: cmd=0x8b19 len=16
  338. Received 1508 bytes of scan results (3 BSSes)
  339. BSS: Start scan result update 11
  340. BSS: Expire BSS 11 due to no match in scan
  341. BSS: Remove id 11 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
  342. New scan results available
  343. Selecting BSS from priority group 0
  344. Try to find WPA-enabled AP
  345. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  346. skip - SSID mismatch
  347. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  348. skip - no WPA/RSN IE
  349. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  350. skip - no WPA/RSN IE
  351. Try to find non-WPA AP
  352. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  353. skip - SSID mismatch
  354. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  355. skip - SSID mismatch
  356. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  357. skip - SSID mismatch
  358. No suitable network found
  359. Setting scan request: 5 sec 0 usec
  360. Starting AP scan for wildcard SSID
  361. Scan requested (ret=0) - scan timeout 30 seconds
  362. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  363. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  364. Wireless event: cmd=0x8b19 len=16
  365. Received 1508 bytes of scan results (3 BSSes)
  366. BSS: Start scan result update 12
  367. New scan results available
  368. Selecting BSS from priority group 0
  369. Try to find WPA-enabled AP
  370. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  371. skip - SSID mismatch
  372. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  373. skip - no WPA/RSN IE
  374. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  375. skip - no WPA/RSN IE
  376. Try to find non-WPA AP
  377. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  378. skip - SSID mismatch
  379. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  380. skip - SSID mismatch
  381. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  382. skip - SSID mismatch
  383. No suitable network found
  384. Setting scan request: 5 sec 0 usec
  385. Starting AP scan for wildcard SSID
  386. Scan requested (ret=0) - scan timeout 30 seconds
  387. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  388. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  389. Wireless event: cmd=0x8b19 len=16
  390. Received 2201 bytes of scan results (4 BSSes)
  391. BSS: Start scan result update 13
  392. BSS: Add new id 12 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
  393. New scan results available
  394. Selecting BSS from priority group 0
  395. Try to find WPA-enabled AP
  396. 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  397. selected based on RSN IE
  398. selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
  399. Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
  400. Cancelling scan request
  401. WPA: clearing own WPA/RSN IE
  402. Automatic auth_alg selection: 0x1
  403. RSN: using IEEE 802.11i/D9.0
  404. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  405. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
  406. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  407. WPA: using GTK TKIP
  408. WPA: using PTK CCMP
  409. WPA: using KEY_MGMT WPA-PSK
  410. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  411. No keys have been configured - skip key clearing
  412. State: SCANNING -> ASSOCIATING
  413. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  414. netlink: Operstate: linkmode=-1, operstate=5
  415. wpa_driver_wext_associate
  416. wpa_driver_wext_set_drop_unencrypted
  417. wpa_driver_wext_set_psk
  418. Setting authentication timeout: 10 sec 0 usec
  419. EAPOL: External notification - EAP success=0
  420. EAPOL: Supplicant port status: Unauthorized
  421. EAPOL: External notification - EAP fail=0
  422. EAPOL: Supplicant port status: Unauthorized
  423. EAPOL: External notification - portControl=Auto
  424. EAPOL: Supplicant port status: Unauthorized
  425. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  426. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  427. Wireless event: cmd=0x8b1a len=16
  428. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  429. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  430. Wireless event: cmd=0x8b06 len=12
  431. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  432. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  433. Wireless event: cmd=0x8b04 len=16
  434. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  435. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  436. Wireless event: cmd=0x8b1a len=33
  437. Authentication with a0:21:b7:4d:dd:a0 timed out.
  438. Added BSSID a0:21:b7:4d:dd:a0 into blacklist
  439. No keys have been configured - skip key clearing
  440. State: ASSOCIATING -> DISCONNECTED
  441. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  442. netlink: Operstate: linkmode=-1, operstate=5
  443. EAPOL: External notification - portEnabled=0
  444. EAPOL: Supplicant port status: Unauthorized
  445. EAPOL: External notification - portValid=0
  446. EAPOL: Supplicant port status: Unauthorized
  447. EAPOL: External notification - EAP success=0
  448. EAPOL: Supplicant port status: Unauthorized
  449. Setting scan request: 0 sec 0 usec
  450. State: DISCONNECTED -> SCANNING
  451. Starting AP scan for wildcard SSID
  452. Scan requested (ret=0) - scan timeout 30 seconds
  453. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  454. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  455. Wireless event: cmd=0x8b19 len=16
  456. Received 2201 bytes of scan results (4 BSSes)
  457. BSS: Start scan result update 14
  458. New scan results available
  459. Selecting BSS from priority group 0
  460. Try to find WPA-enabled AP
  461. 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  462. selected based on RSN IE
  463. selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
  464. Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
  465. Cancelling scan request
  466. WPA: clearing own WPA/RSN IE
  467. Automatic auth_alg selection: 0x1
  468. RSN: using IEEE 802.11i/D9.0
  469. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  470. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
  471. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  472. WPA: using GTK TKIP
  473. WPA: using PTK CCMP
  474. WPA: using KEY_MGMT WPA-PSK
  475. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  476. No keys have been configured - skip key clearing
  477. State: SCANNING -> ASSOCIATING
  478. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  479. netlink: Operstate: linkmode=-1, operstate=5
  480. wpa_driver_wext_associate
  481. wpa_driver_wext_set_drop_unencrypted
  482. wpa_driver_wext_set_psk
  483. Setting authentication timeout: 10 sec 0 usec
  484. EAPOL: External notification - EAP success=0
  485. EAPOL: Supplicant port status: Unauthorized
  486. EAPOL: External notification - EAP fail=0
  487. EAPOL: Supplicant port status: Unauthorized
  488. EAPOL: External notification - portControl=Auto
  489. EAPOL: Supplicant port status: Unauthorized
  490. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  491. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  492. Wireless event: cmd=0x8b1a len=16
  493. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  494. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  495. Wireless event: cmd=0x8b06 len=12
  496. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  497. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  498. Wireless event: cmd=0x8b04 len=16
  499. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  500. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  501. Wireless event: cmd=0x8b1a len=33
  502. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  503. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  504. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  505. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  506. Wireless event: cmd=0x8c08 len=181
  507. AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  508. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  509. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  510. Wireless event: cmd=0x8b15 len=24
  511. Wireless event: new AP: a0:21:b7:4d:dd:a0
  512. Association info event
  513. resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  514. State: ASSOCIATING -> ASSOCIATED
  515. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  516. netlink: Operstate: linkmode=-1, operstate=5
  517. Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
  518. No keys have been configured - skip key clearing
  519. Associated with a0:21:b7:4d:dd:a0
  520. WPA: Association event - clear replay counter
  521. WPA: Clear old PTK
  522. EAPOL: External notification - portEnabled=0
  523. EAPOL: Supplicant port status: Unauthorized
  524. EAPOL: External notification - portValid=0
  525. EAPOL: Supplicant port status: Unauthorized
  526. EAPOL: External notification - EAP success=0
  527. EAPOL: Supplicant port status: Unauthorized
  528. EAPOL: External notification - portEnabled=1
  529. EAPOL: SUPP_PAE entering state CONNECTING
  530. EAPOL: enable timer tick
  531. EAPOL: SUPP_BE entering state IDLE
  532. Setting authentication timeout: 10 sec 0 usec
  533. Cancelling scan request
  534. RX EAPOL from a0:21:b7:4d:dd:a0
  535. Setting authentication timeout: 10 sec 0 usec
  536. IEEE 802.1X RX: version=2 type=3 length=117
  537. EAPOL-Key type=2
  538. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  539. key_length=16 key_data_length=22
  540. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  541. key_nonce - hexdump(len=32): 2f cf 53 d7 9e 06 3f 14 90 94 f8 1f 78 e0 07 9a b9 06 3f ab 39 36 f7 50 2f 68 2e 03 ae e8 84 3d
  542. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  543. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  544. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  545. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  546. State: ASSOCIATED -> 4WAY_HANDSHAKE
  547. WPA: RX message 1 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
  548. RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  549. WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  550. RSN: PMKID from Authenticator - hexdump(len=16): 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  551. RSN: no matching PMKID found
  552. WPA: Renewed SNonce - hexdump(len=32): 79 60 60 dd 1c 13 18 fc 1a ec 66 e0 f6 cb b7 e3 df 43 3b 2d cf ad 51 61 26 3f d5 39 5a 2e 8b 4e
  553. WPA: PTK derivation - A1=90:f6:52:08:11:8f A2=a0:21:b7:4d:dd:a0
  554. WPA: PMK - hexdump(len=32): [REMOVED]
  555. WPA: PTK - hexdump(len=48): [REMOVED]
  556. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  557. WPA: Sending EAPOL-Key 2/4
  558. RX EAPOL from a0:21:b7:4d:dd:a0
  559. IEEE 802.1X RX: version=2 type=3 length=175
  560. EAPOL-Key type=2
  561. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  562. key_length=16 key_data_length=80
  563. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  564. key_nonce - hexdump(len=32): 2f cf 53 d7 9e 06 3f 14 90 94 f8 1f 78 e0 07 9a b9 06 3f ab 39 36 f7 50 2f 68 2e 03 ae e8 84 3d
  565. key_iv - hexdump(len=16): b9 06 3f ab 39 36 f7 50 2f 68 2e 03 ae e8 84 3f
  566. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  567. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  568. key_mic - hexdump(len=16): f7 8b 46 6d 91 c8 0e 5b 38 17 a6 41 87 6d aa 2e
  569. RSN: encrypted key data - hexdump(len=80): c4 5b f6 9e 5c ab c4 45 7a 6e ef e7 2b b6 a5 0d ed 85 cc dc 97 89 e6 7f bd 7d 40 8c 37 e9 d8 a4 c7 94 fe 1e 12 5c c3 18 e7 c6 cc 89 bf c5 64 ee 25 c0 79 cc dc 02 0c b3 2b 9a f9 fe ff 88 53 db 80 e4 bb e3 71 ae 06 1f 1b 52 6c 79 dd 8a 8d a7
  570. WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
  571. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  572. WPA: RX message 3 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
  573. WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 15 38 79 b0 97 84 0c 37 31 1a 29 27 6c 77 80 ef e5 aa 02 85 d7 1a ac 36 c3 16 0c 1b c7 9d 45 5c dd 00 00 00 00 00
  574. WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  575. WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
  576. WPA: Sending EAPOL-Key 4/4
  577. WPA: Installing PTK to the driver.
  578. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  579. EAPOL: External notification - portValid=1
  580. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  581. RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
  582. WPA: Group Key - hexdump(len=32): [REMOVED]
  583. WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
  584. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  585. wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
  586. WPA: Key negotiation completed with a0:21:b7:4d:dd:a0 [PTK=CCMP GTK=TKIP]
  587. Cancelling authentication timeout
  588. Removed BSSID a0:21:b7:4d:dd:a0 from blacklist
  589. State: GROUP_HANDSHAKE -> COMPLETED
  590. CTRL-EVENT-CONNECTED - Connection to a0:21:b7:4d:dd:a0 completed (reauth) [id=0 id_str=]
  591. wpa_driver_wext_set_operstate: operstate 0->1 (UP)
  592. netlink: Operstate: linkmode=-1, operstate=6
  593. EAPOL: External notification - portValid=1
  594. EAPOL: External notification - EAP success=1
  595. EAPOL: SUPP_PAE entering state AUTHENTICATING
  596. EAPOL: SUPP_BE entering state SUCCESS
  597. EAP: EAP entering state DISABLED
  598. EAPOL: SUPP_PAE entering state AUTHENTICATED
  599. EAPOL: Supplicant port status: Authorized
  600. EAPOL: SUPP_BE entering state IDLE
  601. EAPOL authentication completed successfully
  602. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  603. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  604. EAPOL: startWhen --> 0
  605. EAPOL: disable timer tick
  606. BSS: Expire BSS 8 due to age
  607. BSS: Remove id 8 BSSID c0:3f:0e:fe:43:b7 SSID 'virginmedia5821443'
  608. BSS: Expire BSS 9 due to age
  609. BSS: Remove id 9 BSSID 00:1d:68:05:63:0f SSID 'BTHomeHub-E6DF'
  610. BSS: Expire BSS 10 due to age
  611. BSS: Remove id 10 BSSID 02:1d:68:05:63:10 SSID 'BTOpenzone-H'
  612. RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
  613. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  614. RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
  615. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  616. Wireless event: cmd=0x8b15 len=24
  617. Wireless event: new AP: 00:00:00:00:00:00
  618. Disassociation notification
  619. Setting scan request: 0 sec 100000 usec
  620. Added BSSID a0:21:b7:4d:dd:a0 into blacklist
  621. CTRL-EVENT-DISCONNECTED bssid=a0:21:b7:4d:dd:a0 reason=0
  622. Disconnect event - remove keys
  623. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  624. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  625. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  626. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  627. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  628. State: COMPLETED -> DISCONNECTED
  629. wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
  630. netlink: Operstate: linkmode=-1, operstate=5
  631. EAPOL: External notification - portEnabled=0
  632. EAPOL: SUPP_PAE entering state DISCONNECTED
  633. EAPOL: Supplicant port status: Unauthorized
  634. EAPOL: SUPP_BE entering state INITIALIZE
  635. EAPOL: Supplicant port status: Unauthorized
  636. EAPOL: External notification - portValid=0
  637. EAPOL: Supplicant port status: Unauthorized
  638. EAPOL: External notification - EAP success=0
  639. EAPOL: Supplicant port status: Unauthorized
  640. State: DISCONNECTED -> SCANNING
  641. Starting AP scan for wildcard SSID
  642. Scan requested (ret=0) - scan timeout 30 seconds
  643. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  644. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  645. Wireless event: cmd=0x8b19 len=16
  646. Received 1508 bytes of scan results (3 BSSes)
  647. BSS: Start scan result update 15
  648. BSS: Add new id 13 BSSID c0:3f:0e:fe:43:b7 SSID 'virginmedia5821443'
  649. BSS: Add new id 14 BSSID 00:1d:68:05:63:0f SSID 'BTHomeHub-E6DF'
  650. BSS: Add new id 15 BSSID 02:1d:68:05:63:10 SSID 'BTOpenzone-H'
  651. New scan results available
  652. Selecting BSS from priority group 0
  653. Try to find WPA-enabled AP
  654. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  655. skip - SSID mismatch
  656. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  657. skip - no WPA/RSN IE
  658. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  659. skip - no WPA/RSN IE
  660. Try to find non-WPA AP
  661. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  662. skip - SSID mismatch
  663. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  664. skip - SSID mismatch
  665. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  666. skip - SSID mismatch
  667. No APs found - clear blacklist and try again
  668. Removed BSSID a0:21:b7:4d:dd:a0 from blacklist (clear)
  669. Selecting BSS from priority group 0
  670. Try to find WPA-enabled AP
  671. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  672. skip - SSID mismatch
  673. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  674. skip - no WPA/RSN IE
  675. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  676. skip - no WPA/RSN IE
  677. Try to find non-WPA AP
  678. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  679. skip - SSID mismatch
  680. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  681. skip - SSID mismatch
  682. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  683. skip - SSID mismatch
  684. No suitable network found
  685. Setting scan request: 5 sec 0 usec
  686. BSS: Expire BSS 12 due to age
  687. BSS: Remove id 12 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
  688. Starting AP scan for wildcard SSID
  689. Scan requested (ret=0) - scan timeout 30 seconds
  690. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  691. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  692. Wireless event: cmd=0x8b19 len=16
  693. Received 1508 bytes of scan results (3 BSSes)
  694. BSS: Start scan result update 16
  695. New scan results available
  696. Selecting BSS from priority group 0
  697. Try to find WPA-enabled AP
  698. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  699. skip - SSID mismatch
  700. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  701. skip - no WPA/RSN IE
  702. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  703. skip - no WPA/RSN IE
  704. Try to find non-WPA AP
  705. 0: c0:3f:0e:fe:43:b7 ssid='virginmedia5821443' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  706. skip - SSID mismatch
  707. 1: 00:1d:68:05:63:0f ssid='BTHomeHub-E6DF' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
  708. skip - SSID mismatch
  709. 2: 02:1d:68:05:63:10 ssid='BTOpenzone-H' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
  710. skip - SSID mismatch
  711. No suitable network found
  712. Setting scan request: 5 sec 0 usec
  713. Starting AP scan for wildcard SSID
  714. Scan requested (ret=0) - scan timeout 30 seconds
  715. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  716. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  717. Wireless event: cmd=0x8b19 len=16
  718. Received 2201 bytes of scan results (4 BSSes)
  719. BSS: Start scan result update 17
  720. BSS: Add new id 16 BSSID a0:21:b7:4d:dd:a0 SSID 'smokie the bandit'
  721. New scan results available
  722. Selecting BSS from priority group 0
  723. Try to find WPA-enabled AP
  724. 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  725. selected based on RSN IE
  726. selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
  727. Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
  728. Cancelling scan request
  729. WPA: clearing own WPA/RSN IE
  730. Automatic auth_alg selection: 0x1
  731. RSN: using IEEE 802.11i/D9.0
  732. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  733. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
  734. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  735. WPA: using GTK TKIP
  736. WPA: using PTK CCMP
  737. WPA: using KEY_MGMT WPA-PSK
  738. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  739. No keys have been configured - skip key clearing
  740. State: SCANNING -> ASSOCIATING
  741. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  742. netlink: Operstate: linkmode=-1, operstate=5
  743. wpa_driver_wext_associate
  744. wpa_driver_wext_set_drop_unencrypted
  745. wpa_driver_wext_set_psk
  746. Setting authentication timeout: 10 sec 0 usec
  747. EAPOL: External notification - EAP success=0
  748. EAPOL: Supplicant port status: Unauthorized
  749. EAPOL: External notification - EAP fail=0
  750. EAPOL: Supplicant port status: Unauthorized
  751. EAPOL: External notification - portControl=Auto
  752. EAPOL: Supplicant port status: Unauthorized
  753. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  754. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  755. Wireless event: cmd=0x8b1a len=16
  756. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  757. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  758. Wireless event: cmd=0x8b06 len=12
  759. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  760. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  761. Wireless event: cmd=0x8b04 len=16
  762. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  763. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  764. Wireless event: cmd=0x8b1a len=33
  765. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  766. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  767. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  768. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  769. Wireless event: cmd=0x8c08 len=181
  770. AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  771. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  772. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  773. Wireless event: cmd=0x8b15 len=24
  774. Wireless event: new AP: a0:21:b7:4d:dd:a0
  775. Association info event
  776. resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  777. State: ASSOCIATING -> ASSOCIATED
  778. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  779. netlink: Operstate: linkmode=-1, operstate=5
  780. Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
  781. No keys have been configured - skip key clearing
  782. Associated with a0:21:b7:4d:dd:a0
  783. WPA: Association event - clear replay counter
  784. WPA: Clear old PTK
  785. EAPOL: External notification - portEnabled=0
  786. EAPOL: Supplicant port status: Unauthorized
  787. EAPOL: External notification - portValid=0
  788. EAPOL: Supplicant port status: Unauthorized
  789. EAPOL: External notification - EAP success=0
  790. EAPOL: Supplicant port status: Unauthorized
  791. EAPOL: External notification - portEnabled=1
  792. EAPOL: SUPP_PAE entering state CONNECTING
  793. EAPOL: enable timer tick
  794. EAPOL: SUPP_BE entering state IDLE
  795. Setting authentication timeout: 10 sec 0 usec
  796. Cancelling scan request
  797. EAPOL: startWhen --> 0
  798. EAPOL: disable timer tick
  799. EAPOL: SUPP_PAE entering state CONNECTING
  800. EAPOL: enable timer tick
  801. EAPOL: txStart
  802. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  803. Authentication with a0:21:b7:4d:dd:a0 timed out.
  804. Added BSSID a0:21:b7:4d:dd:a0 into blacklist
  805. wpa_driver_wext_disassociate
  806. No keys have been configured - skip key clearing
  807. State: ASSOCIATED -> DISCONNECTED
  808. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  809. netlink: Operstate: linkmode=-1, operstate=5
  810. EAPOL: External notification - portEnabled=0
  811. EAPOL: SUPP_PAE entering state DISCONNECTED
  812. EAPOL: Supplicant port status: Unauthorized
  813. EAPOL: SUPP_BE entering state INITIALIZE
  814. EAPOL: Supplicant port status: Unauthorized
  815. EAPOL: External notification - portValid=0
  816. EAPOL: Supplicant port status: Unauthorized
  817. EAPOL: External notification - EAP success=0
  818. EAPOL: Supplicant port status: Unauthorized
  819. Setting scan request: 0 sec 0 usec
  820. EAPOL: Supplicant port status: Unauthorized
  821. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  822. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  823. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  824. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  825. Wireless event: cmd=0x8b15 len=24
  826. Wireless event: new AP: 00:00:00:00:00:00
  827. Disassociation notification
  828. Added BSSID 00:00:00:00:00:00 into blacklist
  829. CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
  830. Disconnect event - remove keys
  831. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  832. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  833. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  834. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  835. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  836. State: DISCONNECTED -> DISCONNECTED
  837. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  838. netlink: Operstate: linkmode=-1, operstate=5
  839. EAPOL: External notification - portEnabled=0
  840. EAPOL: Supplicant port status: Unauthorized
  841. EAPOL: External notification - portValid=0
  842. EAPOL: Supplicant port status: Unauthorized
  843. EAPOL: External notification - EAP success=0
  844. EAPOL: Supplicant port status: Unauthorized
  845. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  846. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  847. Wireless event: cmd=0x8b1a len=16
  848. State: DISCONNECTED -> SCANNING
  849. Starting AP scan for wildcard SSID
  850. Scan requested (ret=0) - scan timeout 30 seconds
  851. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  852. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  853. Wireless event: cmd=0x8b19 len=16
  854. Received 2201 bytes of scan results (4 BSSes)
  855. BSS: Start scan result update 18
  856. New scan results available
  857. Selecting BSS from priority group 0
  858. Try to find WPA-enabled AP
  859. 0: a0:21:b7:4d:dd:a0 ssid='smokie the bandit' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  860. selected based on RSN IE
  861. selected WPA AP a0:21:b7:4d:dd:a0 ssid='smokie the bandit'
  862. Trying to associate with a0:21:b7:4d:dd:a0 (SSID='smokie the bandit' freq=2462 MHz)
  863. Cancelling scan request
  864. WPA: clearing own WPA/RSN IE
  865. Automatic auth_alg selection: 0x1
  866. RSN: using IEEE 802.11i/D9.0
  867. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  868. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
  869. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  870. WPA: using GTK TKIP
  871. WPA: using PTK CCMP
  872. WPA: using KEY_MGMT WPA-PSK
  873. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  874. No keys have been configured - skip key clearing
  875. State: SCANNING -> ASSOCIATING
  876. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  877. netlink: Operstate: linkmode=-1, operstate=5
  878. wpa_driver_wext_associate
  879. wpa_driver_wext_set_drop_unencrypted
  880. wpa_driver_wext_set_psk
  881. Setting authentication timeout: 10 sec 0 usec
  882. EAPOL: External notification - EAP success=0
  883. EAPOL: Supplicant port status: Unauthorized
  884. EAPOL: External notification - EAP fail=0
  885. EAPOL: Supplicant port status: Unauthorized
  886. EAPOL: External notification - portControl=Auto
  887. EAPOL: Supplicant port status: Unauthorized
  888. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  889. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  890. Wireless event: cmd=0x8b1a len=16
  891. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  892. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  893. Wireless event: cmd=0x8b06 len=12
  894. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  895. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  896. Wireless event: cmd=0x8b04 len=16
  897. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  898. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  899. Wireless event: cmd=0x8b1a len=33
  900. EAPOL: Supplicant port status: Unauthorized
  901. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  902. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  903. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  904. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  905. Wireless event: cmd=0x8c08 len=181
  906. AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  907. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  908. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  909. Wireless event: cmd=0x8b15 len=24
  910. Wireless event: new AP: a0:21:b7:4d:dd:a0
  911. Association info event
  912. resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 7c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  913. State: ASSOCIATING -> ASSOCIATED
  914. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  915. netlink: Operstate: linkmode=-1, operstate=5
  916. Associated to a new BSS: BSSID=a0:21:b7:4d:dd:a0
  917. No keys have been configured - skip key clearing
  918. Associated with a0:21:b7:4d:dd:a0
  919. WPA: Association event - clear replay counter
  920. WPA: Clear old PTK
  921. EAPOL: External notification - portEnabled=0
  922. EAPOL: Supplicant port status: Unauthorized
  923. EAPOL: External notification - portValid=0
  924. EAPOL: Supplicant port status: Unauthorized
  925. EAPOL: External notification - EAP success=0
  926. EAPOL: Supplicant port status: Unauthorized
  927. EAPOL: External notification - portEnabled=1
  928. EAPOL: SUPP_PAE entering state CONNECTING
  929. EAPOL: SUPP_BE entering state IDLE
  930. Setting authentication timeout: 10 sec 0 usec
  931. Cancelling scan request
  932. RX EAPOL from a0:21:b7:4d:dd:a0
  933. Setting authentication timeout: 10 sec 0 usec
  934. IEEE 802.1X RX: version=2 type=3 length=117
  935. EAPOL-Key type=2
  936. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  937. key_length=16 key_data_length=22
  938. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  939. key_nonce - hexdump(len=32): 46 09 d4 0b bc e8 77 bf e5 c3 49 9c e3 05 c4 c2 1a 6b 5a 6e 83 25 ec 32 65 a0 76 00 36 3b fe d1
  940. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  941. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  942. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  943. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  944. State: ASSOCIATED -> 4WAY_HANDSHAKE
  945. WPA: RX message 1 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
  946. RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  947. WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  948. RSN: PMKID from Authenticator - hexdump(len=16): 2e 21 6f c4 26 cb af f9 93 f4 58 f1 e2 b7 12 cf
  949. RSN: no matching PMKID found
  950. WPA: Renewed SNonce - hexdump(len=32): 04 2d ac 5e 75 43 14 f6 37 77 7b 80 a7 cd ce e1 06 d1 40 c7 d6 f0 1d 30 17 06 e8 88 6b 54 35 7e
  951. WPA: PTK derivation - A1=90:f6:52:08:11:8f A2=a0:21:b7:4d:dd:a0
  952. WPA: PMK - hexdump(len=32): [REMOVED]
  953. WPA: PTK - hexdump(len=48): [REMOVED]
  954. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  955. WPA: Sending EAPOL-Key 2/4
  956. RX EAPOL from a0:21:b7:4d:dd:a0
  957. IEEE 802.1X RX: version=2 type=3 length=175
  958. EAPOL-Key type=2
  959. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  960. key_length=16 key_data_length=80
  961. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  962. key_nonce - hexdump(len=32): 46 09 d4 0b bc e8 77 bf e5 c3 49 9c e3 05 c4 c2 1a 6b 5a 6e 83 25 ec 32 65 a0 76 00 36 3b fe d1
  963. key_iv - hexdump(len=16): 1a 6b 5a 6e 83 25 ec 32 65 a0 76 00 36 3b fe d3
  964. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  965. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  966. key_mic - hexdump(len=16): 08 cf 50 6f 93 5c a6 d9 3a 69 c2 f9 2c 3c d9 4f
  967. RSN: encrypted key data - hexdump(len=80): a8 b5 26 ac 7a 12 7c 9c e1 a1 7e b2 d9 c6 cd 16 6f 2d 75 b5 87 2c 44 9b 29 a7 b0 35 e7 d6 dc a7 b7 ab f9 48 db 2c f2 9d 62 a9 46 e7 74 72 0d 7f 9a 13 5b 91 d4 0f 99 7b 69 be 89 6a fa f3 77 dd 63 30 10 42 dd dc b5 91 19 cb ec 1d 13 01 9a 8a
  968. WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
  969. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  970. WPA: RX message 3 of 4-Way Handshake from a0:21:b7:4d:dd:a0 (ver=2)
  971. WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 06 60 6d 32 b6 87 f8 d3 e9 f8 b4 bf 97 90 2b db 0f 20 79 11 ff 4a 05 66 91 08 40 78 0c 66 e9 bb dd 00 00 00 00 00
  972. WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
  973. WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
  974. WPA: Sending EAPOL-Key 4/4
  975. WPA: Installing PTK to the driver.
  976. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  977. EAPOL: External notification - portValid=1
  978. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  979. RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
  980. WPA: Group Key - hexdump(len=32): [REMOVED]
  981. WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
  982. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  983. wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
  984. WPA: Key negotiation completed with a0:21:b7:4d:dd:a0 [PTK=CCMP GTK=TKIP]
  985. Cancelling authentication timeout
  986. Removed BSSID a0:21:b7:4d:dd:a0 from blacklist
  987. State: GROUP_HANDSHAKE -> COMPLETED
  988. CTRL-EVENT-CONNECTED - Connection to a0:21:b7:4d:dd:a0 completed (reauth) [id=0 id_str=]
  989. wpa_driver_wext_set_operstate: operstate 0->1 (UP)
  990. netlink: Operstate: linkmode=-1, operstate=6
  991. EAPOL: External notification - portValid=1
  992. EAPOL: External notification - EAP success=1
  993. EAPOL: SUPP_PAE entering state AUTHENTICATING
  994. EAPOL: SUPP_BE entering state SUCCESS
  995. EAP: EAP entering state DISABLED
  996. EAPOL: SUPP_PAE entering state AUTHENTICATED
  997. EAPOL: Supplicant port status: Authorized
  998. EAPOL: SUPP_BE entering state IDLE
  999. EAPOL authentication completed successfully
  1000. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  1001. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1002. EAPOL: startWhen --> 0
  1003. EAPOL: disable timer tick
  1004. BSS: Expire BSS 13 due to age
  1005. BSS: Remove id 13 BSSID c0:3f:0e:fe:43:b7 SSID 'virginmedia5821443'
  1006. BSS: Expire BSS 14 due to age
  1007. BSS: Remove id 14 BSSID 00:1d:68:05:63:0f SSID 'BTHomeHub-E6DF'
  1008. BSS: Expire BSS 15 due to age
  1009. BSS: Remove id 15 BSSID 02:1d:68:05:63:10 SSID 'BTOpenzone-H'
Advertisement
Add Comment
Please, Sign In to add comment