Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v1.0
- random: Trying to read entropy from /dev/random
- Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant.conf'
- Priority group 0
- id=0 ssid='phat-vieniav'
- rfkill: Cannot open RFKILL control device
- WEXT: RFKILL status not available
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0xf flags 0x0
- WEXT: Failed to clear BSSID selection on disconnect
- netlink: Operstate: linkmode=1, operstate=5
- wlan0: Own MAC address: 80:1f:02:84:e3:cd
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
- Driver did not support SIOCSIWENCODEEXT
- wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
- Driver did not support SIOCSIWENCODEEXT
- wpa_driver_wext_set_countermeasures
- wlan0: RSN: flushing PMKID list in the driver
- wlan0: Setting scan request: 0 sec 100000 usec
- WPS: Set UUID for interface wlan0
- WPS: UUID based on MAC address - hexdump(len=16): 0a 26 12 1c d5 58 5a ae a3 f6 eb 4a ea 8c 1a 22
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- wlan0: Added interface wlan0
- random: Got 20/20 bytes from /dev/random
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=40
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 10 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=8
- wlan0: Event SCAN_RESULTS (3) received
- Received 760 bytes of scan results (2 BSSes)
- wlan0: BSS: Start scan result update 1
- wlan0: BSS: Add new id 0 BSSID c8:d7:19:73:cb:76 SSID 'LilFoxy'
- wlan0: BSS: Add new id 1 BSSID fc:75:16:e8:44:de SSID 'phat-vieniav'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
- wlan0: skip - SSID mismatch
- wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=92 wps
- wlan0: selected based on RSN IE
- wlan0: selected BSS fc:75:16:e8:44:de ssid='phat-vieniav'
- wlan0: Request association: reassociate: 0 selected: fc:75:16:e8:44:de bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Trying to associate with fc:75:16:e8:44:de (SSID='phat-vieniav' freq=2412 MHz)
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- wlan0: WPA: using GTK TKIP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT WPA-PSK
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wlan0: Association request to the driver failed
- wlan0: Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=8
- wlan0: Event SCAN_RESULTS (3) received
- Received 760 bytes of scan results (2 BSSes)
- wlan0: BSS: Start scan result update 2
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
- wlan0: skip - SSID mismatch
- wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=92 wps
- wlan0: selected based on RSN IE
- wlan0: selected BSS fc:75:16:e8:44:de ssid='phat-vieniav'
- wlan0: Already associated with the selected AP
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=20
- EAPOL: disable timer tick
- EAPOL: Supplicant port status: Unauthorized
- wlan0: RX EAPOL from fc:75:16:e8:44:de
- wlan0: Not associated - Delay processing of received EAPOL frame
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: fc:75:16:e8:44:de
- wlan0: Event ASSOC (0) received
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=fc:75:16:e8:44:de
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with fc:75:16:e8:44:de
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- wlan0: Process pending EAPOL frame that was received just before association notification
- wlan0: RX EAPOL from fc:75:16:e8:44:de
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: IEEE 802.1X RX: version=2 type=3 length=95
- wlan0: EAPOL-Key type=2
- wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlan0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
- WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
- WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
- WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- wlan0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 9d e5 24 d8 28 2c 96 6b 79 e0 a1 31 2a ac 50 67
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- wlan0: RX EAPOL from fc:75:16:e8:44:de
- wlan0: IEEE 802.1X RX: version=2 type=3 length=95
- wlan0: EAPOL-Key type=2
- wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlan0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
- WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
- WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- wlan0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 7d 18 38 70 c1 d3 7e f8 a9 3e 28 5b 98 dc 8c 36
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- wlan0: RX EAPOL from fc:75:16:e8:44:de
- wlan0: IEEE 802.1X RX: version=2 type=3 length=95
- wlan0: EAPOL-Key type=2
- wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlan0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
- key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
- WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
- WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
- wlan0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 33 6b 25 0f 22 19 91 a5 60 2e c9 5b e8 ed e3 6b
- wlan0: RX EAPOL from fc:75:16:e8:44:de
- wlan0: IEEE 802.1X RX: version=2 type=3 length=95
- wlan0: EAPOL-Key type=2
- wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlan0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
- key_nonce - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 1 of 4-Way Handshake from fc:75:16:e8:44:de (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: PTK derivation - A1=80:1f:02:84:e3:cd A2=fc:75:16:e8:44:de
- WPA: Nonce1 - hexdump(len=32): 4c a3 3f 57 42 e5 09 c7 83 37 0d 06 9d 5c 52 2c 8c 22 c4 ca 3e 52 76 d9 ee 12 17 b5 7e 6e 7a e5
- WPA: Nonce2 - hexdump(len=32): 48 c6 ea 62 d1 fd 9d 54 42 af 19 47 78 6f aa f0 c9 96 ae 45 4f 43 0f d8 ba 54 33 ea f1 fd 33 c3
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
- wlan0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 7c b2 09 71 73 59 43 46 f4 33 5a b7 00 90 e2 20
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- wlan0: Event DISASSOC (1) received
- wlan0: Disassociation notification
- wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID fc:75:16:e8:44:de into blacklist
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: CTRL-EVENT-DISCONNECTED bssid=fc:75:16:e8:44:de reason=0
- wlan0: Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
- Driver did not support SIOCSIWENCODEEXT
- wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
- Driver did not support SIOCSIWENCODEEXT
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=8
- wlan0: Event SCAN_RESULTS (3) received
- Received 760 bytes of scan results (2 BSSes)
- wlan0: BSS: Start scan result update 3
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
- wlan0: skip - SSID mismatch
- wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=100 wps
- wlan0: skip - blacklisted (count=1 limit=0)
- wlan0: No APs found - clear blacklist and try again
- Removed BSSID fc:75:16:e8:44:de from blacklist (clear)
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: c8:d7:19:73:cb:76 ssid='LilFoxy' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=43
- wlan0: skip - SSID mismatch
- wlan0: 1: fc:75:16:e8:44:de ssid='phat-vieniav' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=100 wps
- wlan0: selected based on RSN IE
- wlan0: selected BSS fc:75:16:e8:44:de ssid='phat-vieniav'
- wlan0: Request association: reassociate: 0 selected: fc:75:16:e8:44:de bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Trying to associate with fc:75:16:e8:44:de (SSID='phat-vieniav' freq=2412 MHz)
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
- wlan0: WPA: using GTK TKIP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT WPA-PSK
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wlan0: Association request to the driver failed
- wlan0: Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=20
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: fc:75:16:e8:44:de
- wlan0: Event ASSOC (0) received
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=fc:75:16:e8:44:de
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with fc:75:16:e8:44:de
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement