Advertisement
Guest User

Untitled

a guest
Jan 1st, 2013
276
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.58 KB | None | 0 0
  1. wpa_supplicant v1.0
  2. random: Trying to read entropy from /dev/random
  3. Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  4. Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
  5. Reading configuration file '/etc/wpa_supplicant.conf'
  6. Priority group 0
  7. id=0 ssid='phat-vieniav'
  8. rfkill: Cannot open RFKILL control device
  9. WEXT: RFKILL status not available
  10. SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
  11. capabilities: key_mgmt 0xf enc 0xf flags 0x0
  12. WEXT: Failed to clear BSSID selection on disconnect
  13. netlink: Operstate: linkmode=1, operstate=5
  14. wlan0: Own MAC address: 80:1f:02:84:e3:cd
  15. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  16. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  17. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  18. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  19. wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
  20. Driver did not support SIOCSIWENCODEEXT
  21. wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
  22. Driver did not support SIOCSIWENCODEEXT
  23. wpa_driver_wext_set_countermeasures
  24. wlan0: RSN: flushing PMKID list in the driver
  25. wlan0: Setting scan request: 0 sec 100000 usec
  26. WPS: Set UUID for interface wlan0
  27. WPS: UUID based on MAC address - hexdump(len=16): 0a 26 12 1c d5 58 5a ae a3 f6 eb 4a ea 8c 1a 22
  28. EAPOL: SUPP_PAE entering state DISCONNECTED
  29. EAPOL: Supplicant port status: Unauthorized
  30. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  31. EAPOL: SUPP_BE entering state INITIALIZE
  32. EAP: EAP entering state DISABLED
  33. EAPOL: Supplicant port status: Unauthorized
  34. EAPOL: Supplicant port status: Unauthorized
  35. wlan0: Added interface wlan0
  36. random: Got 20/20 bytes from /dev/random
  37. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  38. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  39. WEXT: if_removed already cleared - ignore event
  40. Wireless event: cmd=0x8b06 len=8
  41. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  42. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  43. WEXT: if_removed already cleared - ignore event
  44. Wireless event: cmd=0x8b1a len=40
  45. wlan0: State: DISCONNECTED -> SCANNING
  46. wlan0: Starting AP scan for wildcard SSID
  47. Scan requested (ret=0) - scan timeout 10 seconds
  48. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  49. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  50. WEXT: if_removed already cleared - ignore event
  51. Wireless event: cmd=0x8b19 len=8
  52. wlan0: Event SCAN_RESULTS (3) received
  53. Received 760 bytes of scan results (2 BSSes)
  54. wlan0: BSS: Start scan result update 1
  55. wlan0: BSS: Add new id 0 BSSID c8:d7:19:73:cb:76 SSID 'LilFoxy'
  56. wlan0: BSS: Add new id 1 BSSID fc:75:16:e8:44:de SSID 'phat-vieniav'
  57. wlan0: New scan results available
  58. wlan0: Selecting BSS from priority group 0
  59. wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
  60. wlan0: skip - SSID mismatch
  61. wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=92 wps
  62. wlan0: selected based on RSN IE
  63. wlan0: selected BSS fc:75:16:e8:44:de ssid='phat-vieniav'
  64. wlan0: Request association: reassociate: 0 selected: fc:75:16:e8:44:de bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  65. wlan0: Trying to associate with fc:75:16:e8:44:de (SSID='phat-vieniav' freq=2412 MHz)
  66. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  67. wlan0: Cancelling scan request
  68. wlan0: WPA: clearing own WPA/RSN IE
  69. wlan0: Automatic auth_alg selection: 0x1
  70. wlan0: RSN: using IEEE 802.11i/D9.0
  71. wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  72. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  73. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  74. wlan0: WPA: using GTK TKIP
  75. wlan0: WPA: using PTK CCMP
  76. wlan0: WPA: using KEY_MGMT WPA-PSK
  77. wlan0: WPA: not using MGMT group cipher
  78. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  79. wlan0: No keys have been configured - skip key clearing
  80. wlan0: State: SCANNING -> ASSOCIATING
  81. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  82. netlink: Operstate: linkmode=-1, operstate=5
  83. wpa_driver_wext_associate
  84. wpa_driver_wext_set_drop_unencrypted
  85. wpa_driver_wext_set_psk
  86. wlan0: Association request to the driver failed
  87. wlan0: Setting authentication timeout: 5 sec 0 usec
  88. EAPOL: External notification - EAP success=0
  89. EAPOL: Supplicant port status: Unauthorized
  90. EAPOL: External notification - EAP fail=0
  91. EAPOL: Supplicant port status: Unauthorized
  92. EAPOL: External notification - portControl=Auto
  93. EAPOL: Supplicant port status: Unauthorized
  94. RSN: Ignored PMKID candidate without preauth flag
  95. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  96. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  97. WEXT: if_removed already cleared - ignore event
  98. Wireless event: cmd=0x8b19 len=8
  99. wlan0: Event SCAN_RESULTS (3) received
  100. Received 760 bytes of scan results (2 BSSes)
  101. wlan0: BSS: Start scan result update 2
  102. wlan0: New scan results available
  103. wlan0: Selecting BSS from priority group 0
  104. wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
  105. wlan0: skip - SSID mismatch
  106. wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=92 wps
  107. wlan0: selected based on RSN IE
  108. wlan0: selected BSS fc:75:16:e8:44:de ssid='phat-vieniav'
  109. wlan0: Already associated with the selected AP
  110. RSN: Ignored PMKID candidate without preauth flag
  111. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  112. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  113. WEXT: if_removed already cleared - ignore event
  114. Wireless event: cmd=0x8b06 len=8
  115. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  116. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  117. WEXT: if_removed already cleared - ignore event
  118. Wireless event: cmd=0x8b04 len=12
  119. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  120. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  121. WEXT: if_removed already cleared - ignore event
  122. Wireless event: cmd=0x8b1a len=20
  123. EAPOL: disable timer tick
  124. EAPOL: Supplicant port status: Unauthorized
  125. wlan0: RX EAPOL from fc:75:16:e8:44:de
  126. wlan0: Not associated - Delay processing of received EAPOL frame
  127. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  128. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  129. WEXT: if_removed already cleared - ignore event
  130. Wireless event: cmd=0x8b15 len=20
  131. Wireless event: new AP: fc:75:16:e8:44:de
  132. wlan0: Event ASSOC (0) received
  133. wlan0: State: ASSOCIATING -> ASSOCIATED
  134. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  135. netlink: Operstate: linkmode=-1, operstate=5
  136. wlan0: Associated to a new BSS: BSSID=fc:75:16:e8:44:de
  137. wlan0: No keys have been configured - skip key clearing
  138. wlan0: Associated with fc:75:16:e8:44:de
  139. wlan0: WPA: Association event - clear replay counter
  140. wlan0: WPA: Clear old PTK
  141. EAPOL: External notification - portEnabled=0
  142. EAPOL: Supplicant port status: Unauthorized
  143. EAPOL: External notification - portValid=0
  144. EAPOL: Supplicant port status: Unauthorized
  145. EAPOL: External notification - EAP success=0
  146. EAPOL: Supplicant port status: Unauthorized
  147. EAPOL: External notification - portEnabled=1
  148. EAPOL: SUPP_PAE entering state CONNECTING
  149. EAPOL: enable timer tick
  150. EAPOL: SUPP_BE entering state IDLE
  151. wlan0: Setting authentication timeout: 10 sec 0 usec
  152. wlan0: Cancelling scan request
  153. wlan0: Process pending EAPOL frame that was received just before association notification
  154. wlan0: RX EAPOL from fc:75:16:e8:44:de
  155. wlan0: Setting authentication timeout: 10 sec 0 usec
  156. wlan0: IEEE 802.1X RX: version=2 type=3 length=95
  157. wlan0: EAPOL-Key type=2
  158. wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  159. wlan0: key_length=16 key_data_length=0
  160. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  161. key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  162. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  163. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  164. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  165. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  166. wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  167. wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
  168. RSN: msg 1/4 key data - hexdump(len=0):
  169. WPA: Renewed SNonce - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
  170. WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
  171. WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
  172. WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  173. WPA: PMK - hexdump(len=32): [REMOVED]
  174. WPA: PTK - hexdump(len=48): [REMOVED]
  175. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  176. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  177. wlan0: WPA: Sending EAPOL-Key 2/4
  178. WPA: KCK - hexdump(len=16): [REMOVED]
  179. WPA: Derived Key MIC - hexdump(len=16): 9d e5 24 d8 28 2c 96 6b 79 e0 a1 31 2a ac 50 67
  180. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  181. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  182. WEXT: if_removed already cleared - ignore event
  183. wlan0: RX EAPOL from fc:75:16:e8:44:de
  184. wlan0: IEEE 802.1X RX: version=2 type=3 length=95
  185. wlan0: EAPOL-Key type=2
  186. wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  187. wlan0: key_length=16 key_data_length=0
  188. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  189. key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  190. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  191. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  192. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  193. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  194. wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  195. wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
  196. RSN: msg 1/4 key data - hexdump(len=0):
  197. WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
  198. WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
  199. WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  200. WPA: PMK - hexdump(len=32): [REMOVED]
  201. WPA: PTK - hexdump(len=48): [REMOVED]
  202. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  203. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  204. wlan0: WPA: Sending EAPOL-Key 2/4
  205. WPA: KCK - hexdump(len=16): [REMOVED]
  206. WPA: Derived Key MIC - hexdump(len=16): 7d 18 38 70 c1 d3 7e f8 a9 3e 28 5b 98 dc 8c 36
  207. EAPOL: startWhen --> 0
  208. EAPOL: disable timer tick
  209. EAPOL: SUPP_PAE entering state CONNECTING
  210. EAPOL: enable timer tick
  211. EAPOL: txStart
  212. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  213. wlan0: RX EAPOL from fc:75:16:e8:44:de
  214. wlan0: IEEE 802.1X RX: version=2 type=3 length=95
  215. wlan0: EAPOL-Key type=2
  216. wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  217. wlan0: key_length=16 key_data_length=0
  218. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  219. key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  220. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  221. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  222. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  223. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  224. wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  225. wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
  226. RSN: msg 1/4 key data - hexdump(len=0):
  227. WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
  228. WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
  229. WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  230. WPA: PMK - hexdump(len=32): [REMOVED]
  231. WPA: PTK - hexdump(len=48): [REMOVED]
  232. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  233. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  234. wlan0: WPA: Sending EAPOL-Key 2/4
  235. WPA: KCK - hexdump(len=16): [REMOVED]
  236. WPA: Derived Key MIC - hexdump(len=16): 33 6b 25 0f 22 19 91 a5 60 2e c9 5b e8 ed e3 6b
  237. wlan0: RX EAPOL from fc:75:16:e8:44:de
  238. wlan0: IEEE 802.1X RX: version=2 type=3 length=95
  239. wlan0: EAPOL-Key type=2
  240. wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  241. wlan0: key_length=16 key_data_length=0
  242. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  243. key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  244. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  245. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  246. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  247. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  248. wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  249. wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
  250. RSN: msg 1/4 key data - hexdump(len=0):
  251. WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
  252. WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
  253. WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
  254. WPA: PMK - hexdump(len=32): [REMOVED]
  255. WPA: PTK - hexdump(len=48): [REMOVED]
  256. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  257. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  258. wlan0: WPA: Sending EAPOL-Key 2/4
  259. WPA: KCK - hexdump(len=16): [REMOVED]
  260. WPA: Derived Key MIC - hexdump(len=16): 7c b2 09 71 73 59 43 46 f4 33 5a b7 00 90 e2 20
  261. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  262. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  263. WEXT: if_removed already cleared - ignore event
  264. Wireless event: cmd=0x8b15 len=20
  265. Wireless event: new AP: 00:00:00:00:00:00
  266. wlan0: Event DISASSOC (1) received
  267. wlan0: Disassociation notification
  268. wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  269. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  270. wlan0: Setting scan request: 0 sec 100000 usec
  271. Added BSSID fc:75:16:e8:44:de into blacklist
  272. wlan0: Setting scan request: 0 sec 100000 usec
  273. wlan0: CTRL-EVENT-DISCONNECTED bssid=fc:75:16:e8:44:de reason=0
  274. wlan0: Disconnect event - remove keys
  275. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  276. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  277. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  278. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  279. wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
  280. Driver did not support SIOCSIWENCODEEXT
  281. wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
  282. Driver did not support SIOCSIWENCODEEXT
  283. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  284. wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
  285. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  286. netlink: Operstate: linkmode=-1, operstate=5
  287. EAPOL: External notification - portEnabled=0
  288. EAPOL: SUPP_PAE entering state DISCONNECTED
  289. EAPOL: Supplicant port status: Unauthorized
  290. EAPOL: SUPP_BE entering state INITIALIZE
  291. EAPOL: Supplicant port status: Unauthorized
  292. EAPOL: External notification - portValid=0
  293. EAPOL: Supplicant port status: Unauthorized
  294. EAPOL: External notification - EAP success=0
  295. EAPOL: Supplicant port status: Unauthorized
  296. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  297. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  298. WEXT: if_removed already cleared - ignore event
  299. wlan0: State: DISCONNECTED -> SCANNING
  300. wlan0: Starting AP scan for wildcard SSID
  301. Scan requested (ret=0) - scan timeout 30 seconds
  302. EAPOL: Supplicant port status: Unauthorized
  303. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  304. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  305. WEXT: if_removed already cleared - ignore event
  306. Wireless event: cmd=0x8b19 len=8
  307. wlan0: Event SCAN_RESULTS (3) received
  308. Received 760 bytes of scan results (2 BSSes)
  309. wlan0: BSS: Start scan result update 3
  310. wlan0: New scan results available
  311. wlan0: Selecting BSS from priority group 0
  312. wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
  313. wlan0: skip - SSID mismatch
  314. wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=100 wps
  315. wlan0: skip - blacklisted (count=1 limit=0)
  316. wlan0: No APs found - clear blacklist and try again
  317. Removed BSSID fc:75:16:e8:44:de from blacklist (clear)
  318. wlan0: Selecting BSS from priority group 0
  319. wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
  320. wlan0: skip - SSID mismatch
  321. wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=100 wps
  322. wlan0: selected based on RSN IE
  323. wlan0: selected BSS fc:75:16:e8:44:de ssid='phat-vieniav'
  324. wlan0: Request association: reassociate: 0 selected: fc:75:16:e8:44:de bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  325. wlan0: Trying to associate with fc:75:16:e8:44:de (SSID='phat-vieniav' freq=2412 MHz)
  326. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  327. wlan0: Cancelling scan request
  328. wlan0: WPA: clearing own WPA/RSN IE
  329. wlan0: Automatic auth_alg selection: 0x1
  330. wlan0: RSN: using IEEE 802.11i/D9.0
  331. wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  332. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  333. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  334. wlan0: WPA: using GTK TKIP
  335. wlan0: WPA: using PTK CCMP
  336. wlan0: WPA: using KEY_MGMT WPA-PSK
  337. wlan0: WPA: not using MGMT group cipher
  338. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  339. wlan0: No keys have been configured - skip key clearing
  340. wlan0: State: SCANNING -> ASSOCIATING
  341. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  342. netlink: Operstate: linkmode=-1, operstate=5
  343. wpa_driver_wext_associate
  344. wpa_driver_wext_set_drop_unencrypted
  345. wpa_driver_wext_set_psk
  346. wlan0: Association request to the driver failed
  347. wlan0: Setting authentication timeout: 5 sec 0 usec
  348. EAPOL: External notification - EAP success=0
  349. EAPOL: Supplicant port status: Unauthorized
  350. EAPOL: External notification - EAP fail=0
  351. EAPOL: Supplicant port status: Unauthorized
  352. EAPOL: External notification - portControl=Auto
  353. EAPOL: Supplicant port status: Unauthorized
  354. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  355. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  356. WEXT: if_removed already cleared - ignore event
  357. Wireless event: cmd=0x8b06 len=8
  358. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  359. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  360. WEXT: if_removed already cleared - ignore event
  361. Wireless event: cmd=0x8b04 len=12
  362. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  363. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  364. WEXT: if_removed already cleared - ignore event
  365. Wireless event: cmd=0x8b1a len=20
  366. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  367. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  368. WEXT: if_removed already cleared - ignore event
  369. Wireless event: cmd=0x8b15 len=20
  370. Wireless event: new AP: fc:75:16:e8:44:de
  371. wlan0: Event ASSOC (0) received
  372. wlan0: State: ASSOCIATING -> ASSOCIATED
  373. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  374. netlink: Operstate: linkmode=-1, operstate=5
  375. wlan0: Associated to a new BSS: BSSID=fc:75:16:e8:44:de
  376. wlan0: No keys have been configured - skip key clearing
  377. wlan0: Associated with fc:75:16:e8:44:de
  378. wlan0: WPA: Association event - clear replay counter
  379. wlan0: WPA: Clear old PTK
  380. EAPOL: External notification - portEnabled=0
  381. EAPOL: Supplicant port status: Unauthorized
  382. EAPOL: External notification - portValid=0
  383. EAPOL: Supplicant port status: Unauthorized
  384. EAPOL: External notification - EAP success=0
  385. EAPOL: Supplicant port status: Unauthorized
  386. EAPOL: External notification - portEnabled=1
  387. EAPOL: SUPP_PAE entering state CONNECTING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement