Advertisement
Guest User

log-sta

a guest
Jul 23rd, 2012
117
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.44 KB | None | 0 0
  1. Initializing interface 'wlan0' conf 'x' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
  2. Configuration file 'x' -> '/root/x'
  3. Reading configuration file '/root/x'
  4. Line: 1 - start of a new network block
  5. ssid - hexdump_ascii(len=7):
  6. 46 65 4d 2e 50 53 4b FeM.PSK
  7. scan_ssid=1 (0x1)
  8. proto: 0x2
  9. key_mgmt: 0x2
  10. PSK (ASCII passphrase) - hexdump_ascii(len=11): [REMOVED]
  11. PSK (from passphrase) - hexdump(len=32): [REMOVED]
  12. Priority group 0
  13. id=0 ssid='FeM.PSK'
  14. Initializing interface (2) 'wlan0'
  15. SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  16. capabilities: key_mgmt 0xf enc 0xf
  17. WEXT: Operstate: linkmode=1, operstate=5
  18. Own MAC address: 24:77:03:27:13:08
  19. wpa_driver_nl80211_set_wpa
  20. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=0 set_tx=0 seq_len=0 key_len=0
  21. nl80211: set_key failed; err=-67
  22. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=1 set_tx=0 seq_len=0 key_len=0
  23. nl80211: set_key failed; err=-67
  24. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=2 set_tx=0 seq_len=0 key_len=0
  25. nl80211: set_key failed; err=-67
  26. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=3 set_tx=0 seq_len=0 key_len=0
  27. nl80211: set_key failed; err=-67
  28. wpa_driver_nl80211_set_countermeasures
  29. wpa_driver_nl80211_set_drop_unencrypted
  30. RSN: flushing PMKID list in the driver
  31. Setting scan request: 0 sec 100000 usec
  32. WPS: UUID based on MAC address - hexdump(len=16): 2a 90 e4 e2 a7 cb 52 b1 a7 a2 e6 56 d4 88 ca 54
  33. WPS: Build Beacon and Probe Response IEs
  34. WPS: * Version
  35. WPS: * Wi-Fi Protected Setup State (0)
  36. WPS: * Version
  37. WPS: * Wi-Fi Protected Setup State (0)
  38. WPS: * Response Type (2)
  39. WPS: * UUID-E
  40. WPS: * Manufacturer
  41. WPS: * Model Name
  42. WPS: * Model Number
  43. WPS: * Serial Number
  44. WPS: * Primary Device Type
  45. WPS: * Device Name
  46. WPS: * Config Methods (0)
  47. WPS: * RF Bands (3)
  48. EAPOL: SUPP_PAE entering state DISCONNECTED
  49. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  50. EAPOL: SUPP_BE entering state INITIALIZE
  51. EAP: EAP entering state DISABLED
  52. Added interface wlan0
  53. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  54. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  55. State: DISCONNECTED -> SCANNING
  56. Starting AP scan (specific SSID)
  57. Scan SSID - hexdump_ascii(len=7):
  58. 46 65 4d 2e 50 53 4b FeM.PSK
  59. Trying to get current scan results first without requesting a new scan to speed up initial association
  60. Received scan results (0 BSSes)
  61. Cached scan results are empty - not posting
  62. Selecting BSS from priority group 0
  63. Try to find WPA-enabled AP
  64. Try to find non-WPA AP
  65. No suitable AP found.
  66. Setting scan request: 0 sec 0 usec
  67. Starting AP scan (broadcast SSID)
  68. Scan requested (ret=0) - scan timeout 10 seconds
  69. EAPOL: disable timer tick
  70. nl80211: Event message available
  71. nl80211: New scan results available
  72. Received scan results (20 BSSes)
  73. New scan results available
  74. Selecting BSS from priority group 0
  75. Try to find WPA-enabled AP
  76. 0: 00:04:9f:01:c1:04 ssid='club.1X' wpa_ie_len=26 rsn_ie_len=30 caps=0x411
  77. skip - SSID mismatch
  78. 1: 00:04:9f:01:c1:01 ssid='FeM.1X' wpa_ie_len=26 rsn_ie_len=30 caps=0x411
  79. skip - SSID mismatch
  80. 2: 00:04:9f:01:c1:02 ssid='FeM.PSK' wpa_ie_len=0 rsn_ie_len=26 caps=0x411
  81. wpa_parse_wpa_ie_rsn: ie has 4 trailing bytes - ignored
  82. selected based on RSN IE
  83. selected WPA AP 00:04:9f:01:c1:02 ssid='FeM.PSK'
  84. Trying to associate with 00:04:9f:01:c1:02 (SSID='FeM.PSK' freq=2437 MHz)
  85. Cancelling scan request
  86. WPA: clearing own WPA/RSN IE
  87. Automatic auth_alg selection: 0x1
  88. wpa_parse_wpa_ie_rsn: ie has 4 trailing bytes - ignored
  89. RSN: using IEEE 802.11i/D9.0
  90. WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  91. WPA: clearing AP WPA IE
  92. WPA: set AP RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8d 02 00 00 00 0f ac 06
  93. WPA: using GTK CCMP
  94. WPA: using PTK CCMP
  95. WPA: using KEY_MGMT WPA-PSK
  96. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  97. No keys have been configured - skip key clearing
  98. wpa_driver_nl80211_set_drop_unencrypted
  99. State: SCANNING -> ASSOCIATING
  100. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  101. WEXT: Operstate: linkmode=-1, operstate=5
  102. wpa_driver_nl80211_associate
  103. Setting authentication timeout: 10 sec 0 usec
  104. EAPOL: External notification - EAP success=0
  105. EAPOL: External notification - EAP fail=0
  106. EAPOL: External notification - portControl=Auto
  107. wpa_parse_wpa_ie_rsn: ie has 4 trailing bytes - ignored
  108. RSN: added PMKSA cache candidate 00:04:9f:01:c1:02 prio 1000
  109. RSN: processing PMKSA candidate list
  110. RSN: not in suitable state for new pre-authentication
  111. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  112. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  113. Wireless event: cmd=0x8b19 len=16
  114. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  115. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  116. Wireless event: cmd=0x8b04 len=16
  117. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  118. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  119. Wireless event: cmd=0x8b1a len=23
  120. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  121. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  122. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  123. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  124. Wireless event: cmd=0x8c08 len=104
  125. AssocResp IE wireless event - hexdump(len=88): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a ec 11 1b ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  126. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  127. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  128. Wireless event: cmd=0x8b15 len=24
  129. Wireless event: new AP: 00:04:9f:01:c1:02
  130. Association info event
  131. resp_ies - hexdump(len=88): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a ec 11 1b ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  132. State: ASSOCIATING -> ASSOCIATED
  133. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  134. WEXT: Operstate: linkmode=-1, operstate=5
  135. Associated to a new BSS: BSSID=00:04:9f:01:c1:02
  136. No keys have been configured - skip key clearing
  137. Associated with 00:04:9f:01:c1:02
  138. WPA: Association event - clear replay counter
  139. WPA: Clear old PTK
  140. EAPOL: External notification - portEnabled=0
  141. EAPOL: External notification - portValid=0
  142. EAPOL: External notification - EAP success=0
  143. EAPOL: External notification - portEnabled=1
  144. EAPOL: SUPP_PAE entering state CONNECTING
  145. EAPOL: enable timer tick
  146. EAPOL: SUPP_BE entering state IDLE
  147. Setting authentication timeout: 10 sec 0 usec
  148. Cancelling scan request
  149. RX EAPOL from 00:04:9f:01:c1:02
  150. RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e7 44 83 1a 0a 20 ed d7 89 90 59 f5 ed 0d c6 47 94 b5 3e 94 f0 12 76 78 82 94 71 5f ee 47 db f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  151. Setting authentication timeout: 10 sec 0 usec
  152. IEEE 802.1X RX: version=2 type=3 length=95
  153. EAPOL-Key type=2
  154. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  155. key_length=16 key_data_length=0
  156. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  157. key_nonce - hexdump(len=32): e7 44 83 1a 0a 20 ed d7 89 90 59 f5 ed 0d c6 47 94 b5 3e 94 f0 12 76 78 82 94 71 5f ee 47 db f7
  158. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  159. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  160. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  161. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  162. WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e7 44 83 1a 0a 20 ed d7 89 90 59 f5 ed 0d c6 47 94 b5 3e 94 f0 12 76 78 82 94 71 5f ee 47 db f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  163. State: ASSOCIATED -> 4WAY_HANDSHAKE
  164. WPA: RX message 1 of 4-Way Handshake from 00:04:9f:01:c1:02 (ver=2)
  165. RSN: msg 1/4 key data - hexdump(len=0):
  166. WPA: Renewed SNonce - hexdump(len=32): 14 5f 2e b7 d9 03 1c 2d d6 9d f5 86 40 1b 7d 17 f3 2c 2f db 4c 8d 05 cb c8 f8 6d 30 be f3 85 38
  167. WPA: PTK derivation - A1=24:77:03:27:13:08 A2=00:04:9f:01:c1:02
  168. WPA: PMK - hexdump(len=32): [REMOVED]
  169. WPA: PTK - hexdump(len=48): [REMOVED]
  170. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  171. WPA: Sending EAPOL-Key 2/4
  172. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 14 5f 2e b7 d9 03 1c 2d d6 9d f5 86 40 1b 7d 17 f3 2c 2f db 4c 8d 05 cb c8 f8 6d 30 be f3 85 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 67 c0 fd c2 d4 37 a6 90 82 30 40 de 6f cb 7f 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  173. RX EAPOL from 00:04:9f:01:c1:02
  174. RX EAPOL - hexdump(len=163): 02 03 00 9f 02 13 ca 00 10 00 00 00 00 00 00 00 02 e7 44 83 1a 0a 20 ed d7 89 90 59 f5 ed 0d c6 47 94 b5 3e 94 f0 12 76 78 82 94 71 5f ee 47 db f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed c3 bc d3 63 db 96 87 be 7e 78 bd 67 02 f2 c6 00 40 b0 53 77 3d cc 53 84 31 70 43 f6 93 ed 12 11 81 9c c2 88 78 14 88 09 d6 47 69 01 df 2a 98 66 68 93 94 eb ac e9 2f 9d b1 8a 18 75 af 3e 61 94 ca e6 e7 a6 c3 28 94 85 7f c8 c3 f6 11 fc a0 87 02
  175. IEEE 802.1X RX: version=2 type=3 length=159
  176. EAPOL-Key type=2
  177. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  178. key_length=16 key_data_length=64
  179. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  180. key_nonce - hexdump(len=32): e7 44 83 1a 0a 20 ed d7 89 90 59 f5 ed 0d c6 47 94 b5 3e 94 f0 12 76 78 82 94 71 5f ee 47 db f7
  181. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  182. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  183. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  184. key_mic - hexdump(len=16): ed c3 bc d3 63 db 96 87 be 7e 78 bd 67 02 f2 c6
  185. WPA: RX EAPOL-Key - hexdump(len=163): 02 03 00 9f 02 13 ca 00 10 00 00 00 00 00 00 00 02 e7 44 83 1a 0a 20 ed d7 89 90 59 f5 ed 0d c6 47 94 b5 3e 94 f0 12 76 78 82 94 71 5f ee 47 db f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ed c3 bc d3 63 db 96 87 be 7e 78 bd 67 02 f2 c6 00 40 b0 53 77 3d cc 53 84 31 70 43 f6 93 ed 12 11 81 9c c2 88 78 14 88 09 d6 47 69 01 df 2a 98 66 68 93 94 eb ac e9 2f 9d b1 8a 18 75 af 3e 61 94 ca e6 e7 a6 c3 28 94 85 7f c8 c3 f6 11 fc a0 87 02
  186. RSN: encrypted key data - hexdump(len=64): b0 53 77 3d cc 53 84 31 70 43 f6 93 ed 12 11 81 9c c2 88 78 14 88 09 d6 47 69 01 df 2a 98 66 68 93 94 eb ac e9 2f 9d b1 8a 18 75 af 3e 61 94 ca e6 e7 a6 c3 28 94 85 7f c8 c3 f6 11 fc a0 87 02
  187. WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
  188. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  189. WPA: RX message 3 of 4-Way Handshake from 00:04:9f:01:c1:02 (ver=2)
  190. WPA: IE KeyData - hexdump(len=56): 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8d 02 00 00 00 0f ac 06 dd 16 00 0f ac 01 01 00 69 a5 19 c0 f4 31 3e 6d 2f 61 4e 88 0a d6 90 70 dd 00 00 00
  191. WPA: Sending EAPOL-Key 4/4
  192. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 a0 5e 2e 0c 30 7d 8e 7b d6 d7 c2 5b 8d ce 1f 00 00
  193. WPA: Installing PTK to the driver.
  194. wpa_driver_nl80211_set_key: alg=3 addr=00:04:9f:01:c1:02 key_idx=0 set_tx=1 seq_len=6 key_len=16
  195. * key - hexdump(len=16): 1c fa 58 f7 f1 68 65 34 f4 5a 79 65 12 ce 0c 2d
  196. addr=00:04:9f:01:c1:02
  197. EAPOL: External notification - portValid=1
  198. State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  199. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  200. WPA: Group Key - hexdump(len=16): [REMOVED]
  201. WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
  202. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  203. wpa_driver_nl80211_set_key: alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1 set_tx=0 seq_len=6 key_len=16
  204. * key - hexdump(len=16): 69 a5 19 c0 f4 31 3e 6d 2f 61 4e 88 0a d6 90 70
  205. WPA: Key negotiation completed with 00:04:9f:01:c1:02 [PTK=CCMP GTK=CCMP]
  206. Cancelling authentication timeout
  207. State: GROUP_HANDSHAKE -> COMPLETED
  208. CTRL-EVENT-CONNECTED - Connection to 00:04:9f:01:c1:02 completed (auth) [id=0 id_str=]
  209. wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
  210. WEXT: Operstate: linkmode=-1, operstate=6
  211. EAPOL: External notification - portValid=1
  212. EAPOL: External notification - EAP success=1
  213. EAPOL: SUPP_PAE entering state AUTHENTICATING
  214. EAPOL: SUPP_BE entering state SUCCESS
  215. EAP: EAP entering state DISABLED
  216. EAPOL: SUPP_PAE entering state AUTHENTICATED
  217. EAPOL: SUPP_BE entering state IDLE
  218. EAPOL authentication completed successfully
  219. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  220. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  221. EAPOL: startWhen --> 0
  222. EAPOL: disable timer tick
  223. RSN: processing PMKSA candidate list
  224. RSN: not in suitable state for new pre-authentication
  225. RX EAPOL from 00:04:9f:01:c1:02
  226. RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 03 63 05 6b a9 0a 74 ce 27 9a 48 c2 74 39 0d ad 23 65 26 cc e2 93 0c 55 41 b9 8d 39 a0 fe 1d 20 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b2 13 8d e5 48 ff 02 c4 fc 72 5a 6a ab 47 ea 4a 00 20 99 7c 27 ab f3 12 bb 55 ab be 07 5a f1 42 93 a1 47 19 d0 4d 80 58 06 66 17 5e f8 fd b0 1e f6 81
  227. IEEE 802.1X RX: version=2 type=3 length=127
  228. EAPOL-Key type=2
  229. key_info 0x1382 (ver=2 keyidx=0 rsvd=0 Group Ack MIC Secure Encr)
  230. key_length=16 key_data_length=32
  231. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  232. key_nonce - hexdump(len=32): 63 05 6b a9 0a 74 ce 27 9a 48 c2 74 39 0d ad 23 65 26 cc e2 93 0c 55 41 b9 8d 39 a0 fe 1d 20 8d
  233. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  234. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  235. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  236. key_mic - hexdump(len=16): b2 13 8d e5 48 ff 02 c4 fc 72 5a 6a ab 47 ea 4a
  237. WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 03 63 05 6b a9 0a 74 ce 27 9a 48 c2 74 39 0d ad 23 65 26 cc e2 93 0c 55 41 b9 8d 39 a0 fe 1d 20 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b2 13 8d e5 48 ff 02 c4 fc 72 5a 6a ab 47 ea 4a 00 20 99 7c 27 ab f3 12 bb 55 ab be 07 5a f1 42 93 a1 47 19 d0 4d 80 58 06 66 17 5e f8 fd b0 1e f6 81
  238. RSN: encrypted key data - hexdump(len=32): 99 7c 27 ab f3 12 bb 55 ab be 07 5a f1 42 93 a1 47 19 d0 4d 80 58 06 66 17 5e f8 fd b0 1e f6 81
  239. WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED]
  240. WPA: RX message 1 of Group Key Handshake from 00:04:9f:01:c1:02 (ver=2)
  241. RSN: msg 1/2 key data - hexdump(len=24): dd 16 00 0f ac 01 01 00 69 a5 19 c0 f4 31 3e 6d 2f 61 4e 88 0a d6 90 70
  242. RSN: received GTK in group key handshake - hexdump(len=18): 01 00 69 a5 19 c0 f4 31 3e 6d 2f 61 4e 88 0a d6 90 70
  243. State: COMPLETED -> GROUP_HANDSHAKE
  244. WPA: Group Key - hexdump(len=16): [REMOVED]
  245. WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
  246. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  247. wpa_driver_nl80211_set_key: alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1 set_tx=0 seq_len=6 key_len=16
  248. * key - hexdump(len=16): 69 a5 19 c0 f4 31 3e 6d 2f 61 4e 88 0a d6 90 70
  249. WPA: Sending EAPOL-Key 2/2
  250. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 02 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 6f 3e 13 a8 62 d1 32 9e c3 f4 77 a6 47 92 5b 00 00
  251. WPA: Group rekeying completed with 00:04:9f:01:c1:02 [GTK=CCMP]
  252. Cancelling authentication timeout
  253. State: GROUP_HANDSHAKE -> COMPLETED
  254. RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
  255. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  256. RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
  257. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  258. Wireless event: cmd=0x8b15 len=24
  259. Wireless event: new AP: 00:00:00:00:00:00
  260. Setting scan request: 0 sec 100000 usec
  261. Added BSSID 00:04:9f:01:c1:02 into blacklist
  262. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  263. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=0 set_tx=0 seq_len=0 key_len=0
  264. nl80211: set_key failed; err=-67
  265. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=1 set_tx=0 seq_len=0 key_len=0
  266. nl80211: set_key failed; err=-67
  267. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=2 set_tx=0 seq_len=0 key_len=0
  268. nl80211: set_key failed; err=-67
  269. wpa_driver_nl80211_set_key: alg=0 addr=ff:ff:ff:ff:ff:ff key_idx=3 set_tx=0 seq_len=0 key_len=0
  270. nl80211: set_key failed; err=-67
  271. wpa_driver_nl80211_set_key: alg=0 addr=00:04:9f:01:c1:02 key_idx=0 set_tx=0 seq_len=0 key_len=0
  272. addr=00:04:9f:01:c1:02
  273. nl80211: set_key failed; err=-67
  274. State: COMPLETED -> DISCONNECTED
  275. wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT)
  276. WEXT: Operstate: linkmode=-1, operstate=5
  277. EAPOL: External notification - portEnabled=0
  278. EAPOL: SUPP_PAE entering state DISCONNECTED
  279. EAPOL: SUPP_BE entering state INITIALIZE
  280. EAPOL: External notification - portValid=0
  281. EAPOL: External notification - EAP success=0
  282. State: DISCONNECTED -> SCANNING
  283. Starting AP scan (specific SSID)
  284. Scan SSID - hexdump_ascii(len=7):
  285. 46 65 4d 2e 50 53 4b FeM.PSK
  286. Scan requested (ret=0) - scan timeout 30 seconds
  287. CTRL-EVENT-TERMINATING - signal 2 received
  288. Removing interface wlan0
  289. No keys have been configured - skip key clearing
  290. State: SCANNING -> DISCONNECTED
  291. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  292. WEXT: Operstate: linkmode=-1, operstate=5
  293. EAPOL: External notification - portEnabled=0
  294. EAPOL: External notification - portValid=0
  295. EAPOL: External notification - EAP success=0
  296. wpa_driver_nl80211_set_wpa
  297. wpa_driver_nl80211_set_drop_unencrypted
  298. wpa_driver_nl80211_set_countermeasures
  299. No keys have been configured - skip key clearing
  300. Removed BSSID 00:04:9f:01:c1:02 from blacklist (clear)
  301. Cancelling scan request
  302. Cancelling authentication timeout
  303. WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement