1. wpa_supplicant v2.0
  2. Successfully initialized wpa_supplicant
  3. Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  4. Configuration file 'wpa_networkers.conf' -> '/home/jwidel/wpa_networkers.conf'
  5. Reading configuration file '/home/jwidel/wpa_networkers.conf'
  6. Line: 2 - start of a new network block
  7. ssid - hexdump_ascii(len=10):
  8. 6e 65 74 77 6f 72 6b 65 72 73 networkers
  9. key_mgmt: 0x1
  10. eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
  11. identity - hexdump_ascii(len=6):
  12. 6a 77 69 64 65 6c jwidel
  13. password - hexdump_ascii(len=10): [REMOVED]
  14. ca_cert - hexdump_ascii(len=38):
  15. 2f 68 6f 6d 65 2f 6a 77 69 64 65 6c 2f 74 6d 70 /home/jwidel/tmp
  16. 2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65 /rootca-networke
  17. 72 73 2e 70 65 6d rs.pem
  18. phase1 - hexdump_ascii(len=11):
  19. 70 65 61 70 6c 61 62 65 6c 3d 30 peaplabel=0
  20. phase2 - hexdump_ascii(len=13):
  21. 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
  22. priority=10 (0xa)
  23. Priority group 10
  24. id=0 ssid='networkers'
  25. WEXT: cfg80211-based driver detected
  26. wext: interface wlan0 phy: phy0
  27. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  28. rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
  29. rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0
  30. SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  31. capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  32. netlink: Operstate: linkmode=1, operstate=5
  33. wlan0: Own MAC address: 20:68:9d:d0:49:25
  34. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  35. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  36. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  37. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  38. wpa_driver_wext_set_countermeasures
  39. wlan0: RSN: flushing PMKID list in the driver
  40. wlan0: Setting scan request: 0 sec 100000 usec
  41. WPS: Set UUID for interface wlan0
  42. WPS: UUID based on MAC address - hexdump(len=16): 2f 09 dc a4 48 dd 58 bd 9f ba 5e 5e c0 f2 ea c8
  43. EAPOL: SUPP_PAE entering state DISCONNECTED
  44. EAPOL: Supplicant port status: Unauthorized
  45. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  46. EAPOL: SUPP_BE entering state INITIALIZE
  47. EAP: EAP entering state DISABLED
  48. EAPOL: Supplicant port status: Unauthorized
  49. EAPOL: Supplicant port status: Unauthorized
  50. wlan0: Added interface wlan0
  51. wlan0: State: DISCONNECTED -> DISCONNECTED
  52. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  53. netlink: Operstate: linkmode=-1, operstate=5
  54. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  55. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  56. WEXT: if_removed already cleared - ignore event
  57. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  58. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  59. WEXT: if_removed already cleared - ignore event
  60. Wireless event: cmd=0x8b06 len=12
  61. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  62. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  63. WEXT: if_removed already cleared - ignore event
  64. Wireless event: cmd=0x8b1a len=16
  65. wlan0: State: DISCONNECTED -> SCANNING
  66. wlan0: Starting AP scan for wildcard SSID
  67. Scan requested (ret=0) - scan timeout 10 seconds
  68. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  69. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  70. WEXT: if_removed already cleared - ignore event
  71. Wireless event: cmd=0x8b19 len=16
  72. wlan0: Event SCAN_RESULTS (3) received
  73. Scan results did not fit - trying larger buffer (8192 bytes)
  74. Received 5146 bytes of scan results (9 BSSes)
  75. wlan0: BSS: Start scan result update 1
  76. wlan0: BSS: Add new id 0 BSSID 20:3a:07:97:15:72 SSID 'networkers'
  77. wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:71 SSID '\x00'
  78. wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:70 SSID 'networkers-data'
  79. wlan0: BSS: Add new id 3 BSSID 00:18:39:a1:f7:c9 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
  80. wlan0: BSS: Add new id 4 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42'
  81. wlan0: BSS: Add new id 5 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0'
  82. wlan0: BSS: Add new id 6 BSSID c8:3a:35:27:59:70 SSID 'mani'
  83. wlan0: BSS: Add new id 7 BSSID f0:7d:68:8e:10:ce SSID ''
  84. wlan0: BSS: Add new id 8 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET'
  85. BSS: last_scan_res_used=9/32 last_scan_full=0
  86. wlan0: New scan results available
  87. WPS: AP 90:94:e4:35:57:ba type 0 added
  88. WPS: AP 00:12:2a:98:72:d8 type 0 added
  89. WPS: AP f0:7d:68:8e:10:ce type 0 added
  90. WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  91. WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  92. WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  93. wlan0: Selecting BSS from priority group 10
  94. wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56
  95. wlan0: selected based on RSN IE
  96. wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers'
  97. wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  98. wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
  99. wlan0: Cancelling scan request
  100. wlan0: WPA: clearing own WPA/RSN IE
  101. wlan0: Automatic auth_alg selection: 0x1
  102. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  103. RSN: Search for BSSID 20:3a:07:97:15:72
  104. RSN: No PMKSA cache entry found
  105. wlan0: RSN: using IEEE 802.11i/D9.0
  106. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  107. wlan0: WPA: clearing AP WPA IE
  108. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  109. wlan0: WPA: using GTK CCMP
  110. wlan0: WPA: using PTK CCMP
  111. wlan0: WPA: using KEY_MGMT 802.1X
  112. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  113. wlan0: No keys have been configured - skip key clearing
  114. wlan0: State: SCANNING -> ASSOCIATING
  115. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  116. netlink: Operstate: linkmode=-1, operstate=5
  117. Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
  118. wlan0: set_disable_max_amsdu: -1
  119. wlan0: set_ampdu_factor: -1
  120. wlan0: set_ampdu_density: -1
  121. wlan0: set_disable_ht40: 0
  122. wlan0: set_disable_sgi: 0
  123. wpa_driver_wext_associate
  124. wpa_driver_wext_set_drop_unencrypted
  125. wpa_driver_wext_set_psk
  126. wlan0: Association request to the driver failed
  127. wlan0: Setting authentication timeout: 5 sec 0 usec
  128. EAPOL: External notification - EAP success=0
  129. EAPOL: Supplicant port status: Unauthorized
  130. EAPOL: External notification - EAP fail=0
  131. EAPOL: Supplicant port status: Unauthorized
  132. EAPOL: External notification - portControl=Auto
  133. EAPOL: Supplicant port status: Unauthorized
  134. RSN: Ignored PMKID candidate without preauth flag
  135. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  136. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  137. WEXT: if_removed already cleared - ignore event
  138. Wireless event: cmd=0x8b1a len=16
  139. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  140. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  141. WEXT: if_removed already cleared - ignore event
  142. Wireless event: cmd=0x8b06 len=12
  143. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  144. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  145. WEXT: if_removed already cleared - ignore event
  146. Wireless event: cmd=0x8b1a len=26
  147. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  148. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  149. WEXT: if_removed already cleared - ignore event
  150. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  151. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  152. WEXT: if_removed already cleared - ignore event
  153. Wireless event: cmd=0x8c08 len=110
  154. AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  155. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  156. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  157. WEXT: if_removed already cleared - ignore event
  158. Wireless event: cmd=0x8b15 len=24
  159. Wireless event: new AP: 20:3a:07:97:15:72
  160. wlan0: Event ASSOCINFO (4) received
  161. wlan0: Association info event
  162. resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  163. wlan0: Event ASSOC (0) received
  164. wlan0: State: ASSOCIATING -> ASSOCIATED
  165. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  166. netlink: Operstate: linkmode=-1, operstate=5
  167. wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
  168. wlan0: No keys have been configured - skip key clearing
  169. wlan0: Associated with 20:3a:07:97:15:72
  170. wlan0: WPA: Association event - clear replay counter
  171. wlan0: WPA: Clear old PTK
  172. EAPOL: External notification - portEnabled=0
  173. EAPOL: Supplicant port status: Unauthorized
  174. EAPOL: External notification - portValid=0
  175. EAPOL: Supplicant port status: Unauthorized
  176. EAPOL: External notification - portEnabled=1
  177. EAPOL: SUPP_PAE entering state CONNECTING
  178. EAPOL: SUPP_BE entering state IDLE
  179. EAP: EAP entering state INITIALIZE
  180. EAP: EAP entering state IDLE
  181. wlan0: Setting authentication timeout: 10 sec 0 usec
  182. wlan0: Cancelling scan request
  183. EAPOL: startWhen --> 0
  184. EAPOL: SUPP_PAE entering state CONNECTING
  185. EAPOL: txStart
  186. TX EAPOL: dst=20:3a:07:97:15:72
  187. TX EAPOL - hexdump(len=4): 01 01 00 00
  188. wlan0: RX EAPOL from 20:3a:07:97:15:72
  189. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  190. wlan0: Setting authentication timeout: 70 sec 0 usec
  191. EAPOL: Received EAP-Packet frame
  192. EAPOL: SUPP_PAE entering state RESTART
  193. EAP: EAP entering state INITIALIZE
  194. EAP: EAP entering state IDLE
  195. EAPOL: SUPP_PAE entering state AUTHENTICATING
  196. EAPOL: SUPP_BE entering state REQUEST
  197. EAPOL: getSuppRsp
  198. EAP: EAP entering state RECEIVED
  199. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  200. EAP: EAP entering state IDENTITY
  201. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  202. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  203. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  204. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  205. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  206. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  207. EAP: using real identity - hexdump_ascii(len=6):
  208. 6a 77 69 64 65 6c jwidel
  209. EAP: EAP entering state SEND_RESPONSE
  210. EAP: EAP entering state IDLE
  211. EAPOL: SUPP_BE entering state RESPONSE
  212. EAPOL: txSuppRsp
  213. TX EAPOL: dst=20:3a:07:97:15:72
  214. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
  215. EAPOL: SUPP_BE entering state RECEIVE
  216. wlan0: RX EAPOL from 20:3a:07:97:15:72
  217. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 02 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  218. EAPOL: Received EAP-Packet frame
  219. EAPOL: SUPP_BE entering state REQUEST
  220. EAPOL: getSuppRsp
  221. EAP: EAP entering state RECEIVED
  222. EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
  223. EAP: EAP entering state IDENTITY
  224. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  225. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  226. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  227. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  228. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  229. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  230. EAP: using real identity - hexdump_ascii(len=6):
  231. 6a 77 69 64 65 6c jwidel
  232. EAP: EAP entering state SEND_RESPONSE
  233. EAP: EAP entering state IDLE
  234. EAPOL: SUPP_BE entering state RESPONSE
  235. EAPOL: txSuppRsp
  236. TX EAPOL: dst=20:3a:07:97:15:72
  237. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 02 00 0b 01 6a 77 69 64 65 6c
  238. EAPOL: SUPP_BE entering state RECEIVE
  239. wlan0: RX EAPOL from 20:3a:07:97:15:72
  240. RX EAPOL - hexdump(len=26): 02 00 00 16 01 03 00 16 04 10 3f be a0 98 13 2f f5 bf 38 c1 6d 3a 4e 5f e1 94
  241. EAPOL: Received EAP-Packet frame
  242. EAPOL: SUPP_BE entering state REQUEST
  243. EAPOL: getSuppRsp
  244. EAP: EAP entering state RECEIVED
  245. EAP: Received EAP-Request id=3 method=4 vendor=0 vendorMethod=0
  246. EAP: EAP entering state GET_METHOD
  247. EAP: configuration does not allow: vendor 0 method 4
  248. EAP: vendor 0 method 4 not allowed
  249. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  250. EAP: Status notification: refuse proposed method (param=MD5)
  251. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  252. EAP: allowed methods - hexdump(len=1): 19
  253. EAP: EAP entering state SEND_RESPONSE
  254. EAP: EAP entering state IDLE
  255. EAPOL: SUPP_BE entering state RESPONSE
  256. EAPOL: txSuppRsp
  257. TX EAPOL: dst=20:3a:07:97:15:72
  258. TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 03 19
  259. EAPOL: SUPP_BE entering state RECEIVE
  260. wlan0: RX EAPOL from 20:3a:07:97:15:72
  261. RX EAPOL - hexdump(len=10): 02 00 00 06 01 04 00 06 19 20
  262. EAPOL: Received EAP-Packet frame
  263. EAPOL: SUPP_BE entering state REQUEST
  264. EAPOL: getSuppRsp
  265. EAP: EAP entering state RECEIVED
  266. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  267. EAP: EAP entering state GET_METHOD
  268. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  269. EAP: Status notification: accept proposed method (param=PEAP)
  270. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  271. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  272. TLS: using phase1 config options
  273. TLS: Trusted root certificate(s) loaded
  274. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  275. EAP: EAP entering state METHOD
  276. SSL: Received packet(len=6) - Flags 0x20
  277. EAP-PEAP: Start (server ver=0, own ver=1)
  278. EAP-PEAP: Using PEAP version 0
  279. SSL: (where=0x10 ret=0x1)
  280. SSL: (where=0x1001 ret=0x1)
  281. SSL: SSL_connect:before/connect initialization
  282. SSL: (where=0x1001 ret=0x1)
  283. SSL: SSL_connect:SSLv3 write client hello A
  284. SSL: (where=0x1002 ret=0xffffffff)
  285. SSL: SSL_connect:error in SSLv3 read server hello A
  286. SSL: SSL_connect - want more data
  287. SSL: 223 bytes pending from ssl_out
  288. SSL: 223 bytes left to be sent out (of total 223 bytes)
  289. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  290. EAP: EAP entering state SEND_RESPONSE
  291. EAP: EAP entering state IDLE
  292. EAPOL: SUPP_BE entering state RESPONSE
  293. EAPOL: txSuppRsp
  294. TX EAPOL: dst=20:3a:07:97:15:72
  295. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 04 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 03 a8 ee 8e 10 2e 5c e3 31 c8 eb e2 c4 5a 02 98 d2 f5 85 04 aa be d1 02 ad 70 ef 45 2e 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  296. EAPOL: SUPP_BE entering state RECEIVE
  297. EAPOL: startWhen --> 0
  298. EAPOL: authWhile --> 0
  299. EAPOL: SUPP_BE entering state TIMEOUT
  300. EAPOL: SUPP_PAE entering state CONNECTING
  301. EAPOL: SUPP_BE entering state IDLE
  302. EAPOL: startWhen --> 0
  303. EAPOL: SUPP_PAE entering state CONNECTING
  304. EAPOL: txStart
  305. TX EAPOL: dst=20:3a:07:97:15:72
  306. TX EAPOL - hexdump(len=4): 01 01 00 00
  307. wlan0: RX EAPOL from 20:3a:07:97:15:72
  308. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 07 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  309. EAPOL: Received EAP-Packet frame
  310. EAPOL: SUPP_PAE entering state RESTART
  311. EAP: EAP entering state INITIALIZE
  312. EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
  313. ENGINE: engine deinit
  314. EAP: EAP entering state IDLE
  315. EAPOL: SUPP_PAE entering state AUTHENTICATING
  316. EAPOL: SUPP_BE entering state REQUEST
  317. EAPOL: getSuppRsp
  318. EAP: EAP entering state RECEIVED
  319. EAP: Received EAP-Request id=7 method=1 vendor=0 vendorMethod=0
  320. EAP: EAP entering state IDENTITY
  321. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  322. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  323. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  324. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  325. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  326. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  327. EAP: using real identity - hexdump_ascii(len=6):
  328. 6a 77 69 64 65 6c jwidel
  329. EAP: EAP entering state SEND_RESPONSE
  330. EAP: EAP entering state IDLE
  331. EAPOL: SUPP_BE entering state RESPONSE
  332. EAPOL: txSuppRsp
  333. TX EAPOL: dst=20:3a:07:97:15:72
  334. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 07 00 0b 01 6a 77 69 64 65 6c
  335. EAPOL: SUPP_BE entering state RECEIVE
  336. wlan0: RX EAPOL from 20:3a:07:97:15:72
  337. RX EAPOL - hexdump(len=26): 02 00 00 16 01 08 00 16 04 10 a2 49 b1 32 a8 99 e5 5e 2c ec 71 a0 fe 00 38 c4
  338. EAPOL: Received EAP-Packet frame
  339. EAPOL: SUPP_BE entering state REQUEST
  340. EAPOL: getSuppRsp
  341. EAP: EAP entering state RECEIVED
  342. EAP: Received EAP-Request id=8 method=4 vendor=0 vendorMethod=0
  343. EAP: EAP entering state GET_METHOD
  344. EAP: configuration does not allow: vendor 0 method 4
  345. EAP: vendor 0 method 4 not allowed
  346. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  347. EAP: Status notification: refuse proposed method (param=MD5)
  348. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  349. EAP: allowed methods - hexdump(len=1): 19
  350. EAP: EAP entering state SEND_RESPONSE
  351. EAP: EAP entering state IDLE
  352. EAPOL: SUPP_BE entering state RESPONSE
  353. EAPOL: txSuppRsp
  354. TX EAPOL: dst=20:3a:07:97:15:72
  355. TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 03 19
  356. EAPOL: SUPP_BE entering state RECEIVE
  357. wlan0: RX EAPOL from 20:3a:07:97:15:72
  358. RX EAPOL - hexdump(len=10): 02 00 00 06 01 09 00 06 19 20
  359. EAPOL: Received EAP-Packet frame
  360. EAPOL: SUPP_BE entering state REQUEST
  361. EAPOL: getSuppRsp
  362. EAP: EAP entering state RECEIVED
  363. EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
  364. EAP: EAP entering state GET_METHOD
  365. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  366. EAP: Status notification: accept proposed method (param=PEAP)
  367. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  368. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  369. TLS: using phase1 config options
  370. TLS: Trusted root certificate(s) loaded
  371. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  372. EAP: EAP entering state METHOD
  373. SSL: Received packet(len=6) - Flags 0x20
  374. EAP-PEAP: Start (server ver=0, own ver=1)
  375. EAP-PEAP: Using PEAP version 0
  376. SSL: (where=0x10 ret=0x1)
  377. SSL: (where=0x1001 ret=0x1)
  378. SSL: SSL_connect:before/connect initialization
  379. SSL: (where=0x1001 ret=0x1)
  380. SSL: SSL_connect:SSLv3 write client hello A
  381. SSL: (where=0x1002 ret=0xffffffff)
  382. SSL: SSL_connect:error in SSLv3 read server hello A
  383. SSL: SSL_connect - want more data
  384. SSL: 223 bytes pending from ssl_out
  385. SSL: 223 bytes left to be sent out (of total 223 bytes)
  386. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  387. EAP: EAP entering state SEND_RESPONSE
  388. EAP: EAP entering state IDLE
  389. EAPOL: SUPP_BE entering state RESPONSE
  390. EAPOL: txSuppRsp
  391. TX EAPOL: dst=20:3a:07:97:15:72
  392. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 09 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 24 6e b8 62 b1 d0 b3 fc 6e 98 ae 86 2f 23 a0 f8 b8 43 51 71 ce 40 84 4d 3b a7 25 f0 9d 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  393. EAPOL: SUPP_BE entering state RECEIVE
  394. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  395. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  396. WEXT: if_removed already cleared - ignore event
  397. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  398. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  399. WEXT: if_removed already cleared - ignore event
  400. Wireless event: cmd=0x8b15 len=24
  401. Wireless event: new AP: 00:00:00:00:00:00
  402. wlan0: Event DISASSOC (1) received
  403. wlan0: Disassociation notification
  404. wlan0: CTRL-EVENT-DISCONNECTED bssid=20:3a:07:97:15:72 reason=0
  405. wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=6)
  406. wlan0: Setting scan request: 0 sec 100000 usec
  407. Added BSSID 20:3a:07:97:15:72 into blacklist
  408. wlan0: Blacklist count 1 --> request scan in 100 ms
  409. wlan0: Setting scan request: 0 sec 100000 usec
  410. wlan0: Disconnect event - remove keys
  411. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  412. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  413. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  414. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  415. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  416. wlan0: State: ASSOCIATED -> DISCONNECTED
  417. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  418. netlink: Operstate: linkmode=-1, operstate=5
  419. EAPOL: External notification - portEnabled=0
  420. EAPOL: SUPP_PAE entering state DISCONNECTED
  421. EAPOL: Supplicant port status: Unauthorized
  422. EAPOL: SUPP_BE entering state INITIALIZE
  423. EAP: EAP entering state DISABLED
  424. EAPOL: Supplicant port status: Unauthorized
  425. EAPOL: External notification - portValid=0
  426. EAPOL: Supplicant port status: Unauthorized
  427. wlan0: State: DISCONNECTED -> SCANNING
  428. wlan0: Starting AP scan for wildcard SSID
  429. Scan requested (ret=0) - scan timeout 30 seconds
  430. EAPOL: Supplicant port status: Unauthorized
  431. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  432. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  433. WEXT: if_removed already cleared - ignore event
  434. Wireless event: cmd=0x8b19 len=16
  435. wlan0: Event SCAN_RESULTS (3) received
  436. Scan results did not fit - trying larger buffer (8192 bytes)
  437. Received 5544 bytes of scan results (10 BSSes)
  438. wlan0: BSS: Start scan result update 2
  439. wlan0: BSS: Add new id 9 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279'
  440. wlan0: BSS: Add new id 10 BSSID 54:e6:fc:e8:c6:02 SSID 'Ukasz'
  441. wlan0: BSS: Add new id 11 BSSID e2:b9:c8:62:78:38 SSID '500_JoikuSpot_943AF04AD3F5'
  442. BSS: last_scan_res_used=10/32 last_scan_full=0
  443. wlan0: New scan results available
  444. WPS: AP 00:19:70:79:97:c8 type 0 added
  445. WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  446. WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  447. WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  448. WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  449. wlan0: Selecting BSS from priority group 10
  450. wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
  451. wlan0: skip - blacklisted (count=1 limit=0)
  452. wlan0: 1: 20:3a:07:97:15:71 ssid='\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-70
  453. wlan0: skip - SSID mismatch
  454. wlan0: 2: 20:3a:07:97:15:70 ssid='networkers-data' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74
  455. wlan0: skip - SSID mismatch
  456. wlan0: 3: 90:94:e4:35:57:ba ssid='konarskiego 42' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-74 wps
  457. wlan0: skip - SSID mismatch
  458. wlan0: 4: 00:12:2a:98:72:d8 ssid='NETIASPOT-9872D0' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-75 wps
  459. wlan0: skip - SSID mismatch
  460. wlan0: 5: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-76
  461. wlan0: skip - SSID mismatch
  462. wlan0: 6: 00:19:70:79:97:c8 ssid='FAST3764-4279' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-78 wps
  463. wlan0: skip - SSID mismatch
  464. wlan0: 7: 54:e6:fc:e8:c6:02 ssid='Ukasz' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-95
  465. wlan0: skip - SSID mismatch
  466. wlan0: 8: e2:b9:c8:62:78:38 ssid='500_JoikuSpot_943AF04AD3F5' wpa_ie_len=0 rsn_ie_len=0 caps=0x12 level=-91
  467. wlan0: skip - SSID mismatch
  468. wlan0: 9: 00:12:2a:98:72:da ssid='FON_NETIA_FREE_INTERNET' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-81
  469. wlan0: skip - SSID mismatch
  470. wlan0: No APs found - clear blacklist and try again
  471. Removed BSSID 20:3a:07:97:15:72 from blacklist (clear)
  472. wlan0: Selecting BSS from priority group 10
  473. wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
  474. wlan0: selected based on RSN IE
  475. wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers'
  476. wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  477. wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
  478. wlan0: Cancelling scan request
  479. wlan0: WPA: clearing own WPA/RSN IE
  480. wlan0: Automatic auth_alg selection: 0x1
  481. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  482. RSN: Search for BSSID 20:3a:07:97:15:72
  483. RSN: No PMKSA cache entry found
  484. wlan0: RSN: using IEEE 802.11i/D9.0
  485. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  486. wlan0: WPA: clearing AP WPA IE
  487. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  488. wlan0: WPA: using GTK CCMP
  489. wlan0: WPA: using PTK CCMP
  490. wlan0: WPA: using KEY_MGMT 802.1X
  491. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  492. wlan0: No keys have been configured - skip key clearing
  493. wlan0: State: SCANNING -> ASSOCIATING
  494. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  495. netlink: Operstate: linkmode=-1, operstate=5
  496. Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
  497. wlan0: set_disable_max_amsdu: -1
  498. wlan0: set_ampdu_factor: -1
  499. wlan0: set_ampdu_density: -1
  500. wlan0: set_disable_ht40: 0
  501. wlan0: set_disable_sgi: 0
  502. wpa_driver_wext_associate
  503. wpa_driver_wext_set_drop_unencrypted
  504. wpa_driver_wext_set_psk
  505. wlan0: Association request to the driver failed
  506. wlan0: Setting authentication timeout: 5 sec 0 usec
  507. EAPOL: External notification - EAP success=0
  508. EAPOL: Supplicant port status: Unauthorized
  509. EAPOL: External notification - EAP fail=0
  510. EAPOL: Supplicant port status: Unauthorized
  511. EAPOL: External notification - portControl=Auto
  512. EAPOL: Supplicant port status: Unauthorized
  513. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  514. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  515. WEXT: if_removed already cleared - ignore event
  516. Wireless event: cmd=0x8b1a len=16
  517. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  518. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  519. WEXT: if_removed already cleared - ignore event
  520. Wireless event: cmd=0x8b06 len=12
  521. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  522. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  523. WEXT: if_removed already cleared - ignore event
  524. Wireless event: cmd=0x8b1a len=26
  525. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  526. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  527. WEXT: if_removed already cleared - ignore event
  528. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  529. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  530. WEXT: if_removed already cleared - ignore event
  531. Wireless event: cmd=0x8c08 len=110
  532. AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  533. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  534. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  535. WEXT: if_removed already cleared - ignore event
  536. Wireless event: cmd=0x8b15 len=24
  537. Wireless event: new AP: 20:3a:07:97:15:72
  538. wlan0: Event ASSOCINFO (4) received
  539. wlan0: Association info event
  540. resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  541. wlan0: Event ASSOC (0) received
  542. wlan0: State: ASSOCIATING -> ASSOCIATED
  543. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  544. netlink: Operstate: linkmode=-1, operstate=5
  545. wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
  546. wlan0: No keys have been configured - skip key clearing
  547. wlan0: Associated with 20:3a:07:97:15:72
  548. wlan0: WPA: Association event - clear replay counter
  549. wlan0: WPA: Clear old PTK
  550. EAPOL: External notification - portEnabled=0
  551. EAPOL: Supplicant port status: Unauthorized
  552. EAPOL: External notification - portValid=0
  553. EAPOL: Supplicant port status: Unauthorized
  554. EAPOL: External notification - portEnabled=1
  555. EAPOL: SUPP_PAE entering state CONNECTING
  556. EAPOL: SUPP_BE entering state IDLE
  557. EAP: EAP entering state INITIALIZE
  558. EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
  559. ENGINE: engine deinit
  560. EAP: EAP entering state IDLE
  561. wlan0: Setting authentication timeout: 10 sec 0 usec
  562. wlan0: Cancelling scan request
  563. wlan0: RX EAPOL from 20:3a:07:97:15:72
  564. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  565. wlan0: Setting authentication timeout: 70 sec 0 usec
  566. EAPOL: Received EAP-Packet frame
  567. EAPOL: SUPP_PAE entering state RESTART
  568. EAP: EAP entering state INITIALIZE
  569. EAP: EAP entering state IDLE
  570. EAPOL: SUPP_PAE entering state AUTHENTICATING
  571. EAPOL: SUPP_BE entering state REQUEST
  572. EAPOL: getSuppRsp
  573. EAP: EAP entering state RECEIVED
  574. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  575. EAP: EAP entering state IDENTITY
  576. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  577. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  578. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  579. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  580. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  581. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  582. EAP: using real identity - hexdump_ascii(len=6):
  583. 6a 77 69 64 65 6c jwidel
  584. EAP: EAP entering state SEND_RESPONSE
  585. EAP: EAP entering state IDLE
  586. EAPOL: SUPP_BE entering state RESPONSE
  587. EAPOL: txSuppRsp
  588. TX EAPOL: dst=20:3a:07:97:15:72
  589. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
  590. EAPOL: SUPP_BE entering state RECEIVE
  591. wlan0: RX EAPOL from 20:3a:07:97:15:72
  592. RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 38 75 15 e9 3e 8d 75 c0 65 4f 03 ce 96 2e 8a e2
  593. EAPOL: Received EAP-Packet frame
  594. EAPOL: SUPP_BE entering state REQUEST
  595. EAPOL: getSuppRsp
  596. EAP: EAP entering state RECEIVED
  597. EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0
  598. EAP: EAP entering state GET_METHOD
  599. EAP: configuration does not allow: vendor 0 method 4
  600. EAP: vendor 0 method 4 not allowed
  601. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  602. EAP: Status notification: refuse proposed method (param=MD5)
  603. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  604. EAP: allowed methods - hexdump(len=1): 19
  605. EAP: EAP entering state SEND_RESPONSE
  606. EAP: EAP entering state IDLE
  607. EAPOL: SUPP_BE entering state RESPONSE
  608. EAPOL: txSuppRsp
  609. TX EAPOL: dst=20:3a:07:97:15:72
  610. TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19
  611. EAPOL: SUPP_BE entering state RECEIVE
  612. wlan0: RX EAPOL from 20:3a:07:97:15:72
  613. RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20
  614. EAPOL: Received EAP-Packet frame
  615. EAPOL: SUPP_BE entering state REQUEST
  616. EAPOL: getSuppRsp
  617. EAP: EAP entering state RECEIVED
  618. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  619. EAP: EAP entering state GET_METHOD
  620. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  621. EAP: Status notification: accept proposed method (param=PEAP)
  622. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  623. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  624. TLS: using phase1 config options
  625. TLS: Trusted root certificate(s) loaded
  626. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  627. EAP: EAP entering state METHOD
  628. SSL: Received packet(len=6) - Flags 0x20
  629. EAP-PEAP: Start (server ver=0, own ver=1)
  630. EAP-PEAP: Using PEAP version 0
  631. SSL: (where=0x10 ret=0x1)
  632. SSL: (where=0x1001 ret=0x1)
  633. SSL: SSL_connect:before/connect initialization
  634. SSL: (where=0x1001 ret=0x1)
  635. SSL: SSL_connect:SSLv3 write client hello A
  636. SSL: (where=0x1002 ret=0xffffffff)
  637. SSL: SSL_connect:error in SSLv3 read server hello A
  638. SSL: SSL_connect - want more data
  639. SSL: 223 bytes pending from ssl_out
  640. SSL: 223 bytes left to be sent out (of total 223 bytes)
  641. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  642. EAP: EAP entering state SEND_RESPONSE
  643. EAP: EAP entering state IDLE
  644. EAPOL: SUPP_BE entering state RESPONSE
  645. EAPOL: txSuppRsp
  646. TX EAPOL: dst=20:3a:07:97:15:72
  647. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 28 e4 b8 50 54 ba 28 d4 32 0d c1 f2 55 18 2e 2f a7 40 c3 39 9e 90 c8 dd 85 32 d0 b9 b8 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  648. EAPOL: SUPP_BE entering state RECEIVE
  649. EAPOL: startWhen --> 0
  650. EAPOL: authWhile --> 0
  651. EAPOL: SUPP_BE entering state TIMEOUT
  652. EAPOL: SUPP_PAE entering state CONNECTING
  653. EAPOL: SUPP_BE entering state IDLE
  654. EAPOL: startWhen --> 0
  655. EAPOL: SUPP_PAE entering state CONNECTING
  656. EAPOL: txStart
  657. TX EAPOL: dst=20:3a:07:97:15:72
  658. TX EAPOL - hexdump(len=4): 01 01 00 00
  659. wlan0: RX EAPOL from 20:3a:07:97:15:72
  660. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 06 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  661. EAPOL: Received EAP-Packet frame
  662. EAPOL: SUPP_PAE entering state RESTART
  663. EAP: EAP entering state INITIALIZE
  664. EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
  665. ENGINE: engine deinit
  666. EAP: EAP entering state IDLE
  667. EAPOL: SUPP_PAE entering state AUTHENTICATING
  668. EAPOL: SUPP_BE entering state REQUEST
  669. EAPOL: getSuppRsp
  670. EAP: EAP entering state RECEIVED
  671. EAP: Received EAP-Request id=6 method=1 vendor=0 vendorMethod=0
  672. EAP: EAP entering state IDENTITY
  673. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  674. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  675. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  676. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  677. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  678. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  679. EAP: using real identity - hexdump_ascii(len=6):
  680. 6a 77 69 64 65 6c jwidel
  681. EAP: EAP entering state SEND_RESPONSE
  682. EAP: EAP entering state IDLE
  683. EAPOL: SUPP_BE entering state RESPONSE
  684. EAPOL: txSuppRsp
  685. TX EAPOL: dst=20:3a:07:97:15:72
  686. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 06 00 0b 01 6a 77 69 64 65 6c
  687. EAPOL: SUPP_BE entering state RECEIVE
  688. wlan0: RX EAPOL from 20:3a:07:97:15:72
  689. RX EAPOL - hexdump(len=26): 02 00 00 16 01 07 00 16 04 10 65 31 12 25 0f b6 9a c1 de db 22 8c 77 25 9e 6d
  690. EAPOL: Received EAP-Packet frame
  691. EAPOL: SUPP_BE entering state REQUEST
  692. EAPOL: getSuppRsp
  693. EAP: EAP entering state RECEIVED
  694. EAP: Received EAP-Request id=7 method=4 vendor=0 vendorMethod=0
  695. EAP: EAP entering state GET_METHOD
  696. EAP: configuration does not allow: vendor 0 method 4
  697. EAP: vendor 0 method 4 not allowed
  698. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  699. EAP: Status notification: refuse proposed method (param=MD5)
  700. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  701. EAP: allowed methods - hexdump(len=1): 19
  702. EAP: EAP entering state SEND_RESPONSE
  703. EAP: EAP entering state IDLE
  704. EAPOL: SUPP_BE entering state RESPONSE
  705. EAPOL: txSuppRsp
  706. TX EAPOL: dst=20:3a:07:97:15:72
  707. TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 03 19
  708. EAPOL: SUPP_BE entering state RECEIVE
  709. wlan0: RX EAPOL from 20:3a:07:97:15:72
  710. RX EAPOL - hexdump(len=10): 02 00 00 06 01 08 00 06 19 20
  711. EAPOL: Received EAP-Packet frame
  712. EAPOL: SUPP_BE entering state REQUEST
  713. EAPOL: getSuppRsp
  714. EAP: EAP entering state RECEIVED
  715. EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
  716. EAP: EAP entering state GET_METHOD
  717. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  718. EAP: Status notification: accept proposed method (param=PEAP)
  719. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  720. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  721. TLS: using phase1 config options
  722. TLS: Trusted root certificate(s) loaded
  723. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  724. EAP: EAP entering state METHOD
  725. SSL: Received packet(len=6) - Flags 0x20
  726. EAP-PEAP: Start (server ver=0, own ver=1)
  727. EAP-PEAP: Using PEAP version 0
  728. SSL: (where=0x10 ret=0x1)
  729. SSL: (where=0x1001 ret=0x1)
  730. SSL: SSL_connect:before/connect initialization
  731. SSL: (where=0x1001 ret=0x1)
  732. SSL: SSL_connect:SSLv3 write client hello A
  733. SSL: (where=0x1002 ret=0xffffffff)
  734. SSL: SSL_connect:error in SSLv3 read server hello A
  735. SSL: SSL_connect - want more data
  736. SSL: 223 bytes pending from ssl_out
  737. SSL: 223 bytes left to be sent out (of total 223 bytes)
  738. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  739. EAP: EAP entering state SEND_RESPONSE
  740. EAP: EAP entering state IDLE
  741. EAPOL: SUPP_BE entering state RESPONSE
  742. EAPOL: txSuppRsp
  743. TX EAPOL: dst=20:3a:07:97:15:72
  744. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 08 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 48 db b5 8e 82 2d ce 2d 48 e3 76 96 00 63 73 a2 f2 19 7c 1e 36 50 4e c5 0c 99 6b ff dd 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  745. EAPOL: SUPP_BE entering state RECEIVE
  746. EAPOL: startWhen --> 0
  747. EAPOL: authWhile --> 0
  748. EAPOL: SUPP_BE entering state TIMEOUT
  749. EAPOL: SUPP_PAE entering state CONNECTING
  750. EAPOL: SUPP_BE entering state IDLE
  751. EAPOL: startWhen --> 0
  752. EAPOL: SUPP_PAE entering state CONNECTING
  753. EAPOL: txStart
  754. TX EAPOL: dst=20:3a:07:97:15:72
  755. TX EAPOL - hexdump(len=4): 01 01 00 00
  756. wlan0: RX EAPOL from 20:3a:07:97:15:72
  757. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 0b 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  758. EAPOL: Received EAP-Packet frame
  759. EAPOL: SUPP_PAE entering state RESTART
  760. EAP: EAP entering state INITIALIZE
  761. EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
  762. ENGINE: engine deinit
  763. EAP: EAP entering state IDLE
  764. EAPOL: SUPP_PAE entering state AUTHENTICATING
  765. EAPOL: SUPP_BE entering state REQUEST
  766. EAPOL: getSuppRsp
  767. EAP: EAP entering state RECEIVED
  768. EAP: Received EAP-Request id=11 method=1 vendor=0 vendorMethod=0
  769. EAP: EAP entering state IDENTITY
  770. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  771. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  772. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  773. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  774. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  775. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  776. EAP: using real identity - hexdump_ascii(len=6):
  777. 6a 77 69 64 65 6c jwidel
  778. EAP: EAP entering state SEND_RESPONSE
  779. EAP: EAP entering state IDLE
  780. EAPOL: SUPP_BE entering state RESPONSE
  781. EAPOL: txSuppRsp
  782. TX EAPOL: dst=20:3a:07:97:15:72
  783. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 0b 00 0b 01 6a 77 69 64 65 6c
  784. EAPOL: SUPP_BE entering state RECEIVE
  785. wlan0: RX EAPOL from 20:3a:07:97:15:72
  786. RX EAPOL - hexdump(len=26): 02 00 00 16 01 0c 00 16 04 10 8f 64 c4 83 f0 c3 78 1e 4b 01 ba 05 f5 03 0d 87
  787. EAPOL: Received EAP-Packet frame
  788. EAPOL: SUPP_BE entering state REQUEST
  789. EAPOL: getSuppRsp
  790. EAP: EAP entering state RECEIVED
  791. EAP: Received EAP-Request id=12 method=4 vendor=0 vendorMethod=0
  792. EAP: EAP entering state GET_METHOD
  793. EAP: configuration does not allow: vendor 0 method 4
  794. EAP: vendor 0 method 4 not allowed
  795. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  796. EAP: Status notification: refuse proposed method (param=MD5)
  797. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  798. EAP: allowed methods - hexdump(len=1): 19
  799. EAP: EAP entering state SEND_RESPONSE
  800. EAP: EAP entering state IDLE
  801. EAPOL: SUPP_BE entering state RESPONSE
  802. EAPOL: txSuppRsp
  803. TX EAPOL: dst=20:3a:07:97:15:72
  804. TX EAPOL - hexdump(len=10): 01 00 00 06 02 0c 00 06 03 19
  805. EAPOL: SUPP_BE entering state RECEIVE
  806. wlan0: RX EAPOL from 20:3a:07:97:15:72
  807. RX EAPOL - hexdump(len=10): 02 00 00 06 01 0d 00 06 19 20
  808. EAPOL: Received EAP-Packet frame
  809. EAPOL: SUPP_BE entering state REQUEST
  810. EAPOL: getSuppRsp
  811. EAP: EAP entering state RECEIVED
  812. EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
  813. EAP: EAP entering state GET_METHOD
  814. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  815. EAP: Status notification: accept proposed method (param=PEAP)
  816. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  817. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  818. TLS: using phase1 config options
  819. TLS: Trusted root certificate(s) loaded
  820. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  821. EAP: EAP entering state METHOD
  822. SSL: Received packet(len=6) - Flags 0x20
  823. EAP-PEAP: Start (server ver=0, own ver=1)
  824. EAP-PEAP: Using PEAP version 0
  825. SSL: (where=0x10 ret=0x1)
  826. SSL: (where=0x1001 ret=0x1)
  827. SSL: SSL_connect:before/connect initialization
  828. SSL: (where=0x1001 ret=0x1)
  829. SSL: SSL_connect:SSLv3 write client hello A
  830. SSL: (where=0x1002 ret=0xffffffff)
  831. SSL: SSL_connect:error in SSLv3 read server hello A
  832. SSL: SSL_connect - want more data
  833. SSL: 223 bytes pending from ssl_out
  834. SSL: 223 bytes left to be sent out (of total 223 bytes)
  835. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  836. EAP: EAP entering state SEND_RESPONSE
  837. EAP: EAP entering state IDLE
  838. EAPOL: SUPP_BE entering state RESPONSE
  839. EAPOL: txSuppRsp
  840. TX EAPOL: dst=20:3a:07:97:15:72
  841. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 0d 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 69 6f 8e a0 f4 61 2a 0e 36 c2 6f a5 0e 12 6d 5c 4b cf 60 ec 50 52 13 6c 81 36 b3 c0 3b 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  842. EAPOL: SUPP_BE entering state RECEIVE
  843. wlan0: Authentication with 20:3a:07:97:15:72 timed out.
  844. Added BSSID 20:3a:07:97:15:72 into blacklist
  845. wlan0: Request to deauthenticate - bssid=20:3a:07:97:15:72 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
  846. wpa_driver_wext_deauthenticate
  847. wlan0: Event DEAUTH (12) received
  848. wlan0: Deauthentication notification
  849. wlan0: * reason 3 (locally generated)
  850. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  851. wlan0: CTRL-EVENT-DISCONNECTED bssid=20:3a:07:97:15:72 reason=3 locally_generated=1
  852. wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=6)
  853. wlan0: Setting scan request: 0 sec 100000 usec
  854. BSSID 20:3a:07:97:15:72 blacklist count incremented to 2
  855. wlan0: Blacklist count 3 --> request scan in 1000 ms
  856. wlan0: Setting scan request: 1 sec 0 usec
  857. wlan0: Disconnect event - remove keys
  858. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  859. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  860. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  861. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  862. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  863. wlan0: State: ASSOCIATED -> DISCONNECTED
  864. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  865. netlink: Operstate: linkmode=-1, operstate=5
  866. EAPOL: External notification - portEnabled=0
  867. EAPOL: SUPP_PAE entering state DISCONNECTED
  868. EAPOL: Supplicant port status: Unauthorized
  869. EAPOL: SUPP_BE entering state INITIALIZE
  870. EAP: EAP entering state DISABLED
  871. EAPOL: Supplicant port status: Unauthorized
  872. EAPOL: External notification - portValid=0
  873. EAPOL: Supplicant port status: Unauthorized
  874. wlan0: No keys have been configured - skip key clearing
  875. wlan0: State: DISCONNECTED -> DISCONNECTED
  876. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  877. netlink: Operstate: linkmode=-1, operstate=5
  878. EAPOL: External notification - portEnabled=0
  879. EAPOL: Supplicant port status: Unauthorized
  880. EAPOL: External notification - portValid=0
  881. EAPOL: Supplicant port status: Unauthorized
  882. wlan0: Setting scan request: 1 sec 0 usec
  883. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  884. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  885. WEXT: if_removed already cleared - ignore event
  886. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  887. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  888. WEXT: if_removed already cleared - ignore event
  889. Wireless event: cmd=0x8b15 len=24
  890. Wireless event: new AP: 00:00:00:00:00:00
  891. wlan0: Event DISASSOC (1) received
  892. wlan0: Disassociation notification
  893. wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=0)
  894. wlan0: Do not request new immediate scan
  895. wlan0: Disconnect event - remove keys
  896. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  897. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  898. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  899. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  900. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  901. wlan0: State: DISCONNECTED -> DISCONNECTED
  902. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  903. netlink: Operstate: linkmode=-1, operstate=5
  904. EAPOL: External notification - portEnabled=0
  905. EAPOL: Supplicant port status: Unauthorized
  906. EAPOL: External notification - portValid=0
  907. EAPOL: Supplicant port status: Unauthorized
  908. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  909. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  910. WEXT: if_removed already cleared - ignore event
  911. Wireless event: cmd=0x8b1a len=16
  912. EAPOL: Supplicant port status: Unauthorized
  913. wlan0: State: DISCONNECTED -> SCANNING
  914. wlan0: Starting AP scan for wildcard SSID
  915. Scan requested (ret=0) - scan timeout 30 seconds
  916. EAPOL: Supplicant port status: Unauthorized
  917. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  918. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  919. WEXT: if_removed already cleared - ignore event
  920. Wireless event: cmd=0x8b19 len=16
  921. wlan0: Event SCAN_RESULTS (3) received
  922. Scan results did not fit - trying larger buffer (8192 bytes)
  923. Received 6123 bytes of scan results (11 BSSes)
  924. wlan0: BSS: Start scan result update 3
  925. wlan0: BSS: Add new id 12 BSSID c8:7b:5b:b9:3a:7d SSID 'lampart'
  926. wlan0: BSS: Remove id 6 BSSID c8:3a:35:27:59:70 SSID 'mani' due to no match in scan
  927. BSS: last_scan_res_used=11/32 last_scan_full=0
  928. wlan0: New scan results available
  929. WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  930. WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  931. WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  932. WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  933. wlan0: Selecting BSS from priority group 10
  934. wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58
  935. wlan0: skip - blacklisted (count=2 limit=0)
  936. wlan0: 1: 20:3a:07:97:15:71 ssid='\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59
  937. wlan0: skip - SSID mismatch
  938. wlan0: 2: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
  939. wlan0: skip - SSID mismatch
  940. wlan0: 3: 20:3a:07:97:15:70 ssid='networkers-data' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-65
  941. wlan0: skip - SSID mismatch
  942. wlan0: 4: 00:12:2a:98:72:d8 ssid='NETIASPOT-9872D0' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-77 wps
  943. wlan0: skip - SSID mismatch
  944. wlan0: 5: 00:19:70:79:97:c8 ssid='FAST3764-4279' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-82 wps
  945. wlan0: skip - SSID mismatch
  946. wlan0: 6: 90:94:e4:35:57:ba ssid='konarskiego 42' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-83 wps
  947. wlan0: skip - SSID mismatch
  948. wlan0: 7: c8:7b:5b:b9:3a:7d ssid='lampart' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-88
  949. wlan0: skip - SSID mismatch
  950. wlan0: 8: f0:7d:68:8e:10:ce ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-89 wps
  951. wlan0: skip - SSID not known
  952. wlan0: 9: e2:b9:c8:62:78:38 ssid='500_JoikuSpot_943AF04AD3F5' wpa_ie_len=0 rsn_ie_len=0 caps=0x12 level=-89
  953. wlan0: skip - SSID mismatch
  954. wlan0: 10: 00:12:2a:98:72:da ssid='FON_NETIA_FREE_INTERNET' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-80
  955. wlan0: skip - SSID mismatch
  956. wlan0: No APs found - clear blacklist and try again
  957. Removed BSSID 20:3a:07:97:15:72 from blacklist (clear)
  958. wlan0: Selecting BSS from priority group 10
  959. wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58
  960. wlan0: selected based on RSN IE
  961. wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers'
  962. wlan0: Request association: reassociate: 1 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  963. wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
  964. wlan0: Cancelling scan request
  965. wlan0: WPA: clearing own WPA/RSN IE
  966. wlan0: Automatic auth_alg selection: 0x1
  967. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  968. RSN: Search for BSSID 20:3a:07:97:15:72
  969. RSN: No PMKSA cache entry found
  970. wlan0: RSN: using IEEE 802.11i/D9.0
  971. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  972. wlan0: WPA: clearing AP WPA IE
  973. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  974. wlan0: WPA: using GTK CCMP
  975. wlan0: WPA: using PTK CCMP
  976. wlan0: WPA: using KEY_MGMT 802.1X
  977. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  978. wlan0: No keys have been configured - skip key clearing
  979. wlan0: State: SCANNING -> ASSOCIATING
  980. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  981. netlink: Operstate: linkmode=-1, operstate=5
  982. Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
  983. wlan0: set_disable_max_amsdu: -1
  984. wlan0: set_ampdu_factor: -1
  985. wlan0: set_ampdu_density: -1
  986. wlan0: set_disable_ht40: 0
  987. wlan0: set_disable_sgi: 0
  988. wpa_driver_wext_associate
  989. wpa_driver_wext_set_drop_unencrypted
  990. wpa_driver_wext_set_psk
  991. wlan0: Association request to the driver failed
  992. wlan0: Setting authentication timeout: 5 sec 0 usec
  993. EAPOL: External notification - EAP success=0
  994. EAPOL: Supplicant port status: Unauthorized
  995. EAPOL: External notification - EAP fail=0
  996. EAPOL: Supplicant port status: Unauthorized
  997. EAPOL: External notification - portControl=Auto
  998. EAPOL: Supplicant port status: Unauthorized
  999. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1000. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1001. WEXT: if_removed already cleared - ignore event
  1002. Wireless event: cmd=0x8b1a len=16
  1003. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1004. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1005. WEXT: if_removed already cleared - ignore event
  1006. Wireless event: cmd=0x8b06 len=12
  1007. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1008. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1009. WEXT: if_removed already cleared - ignore event
  1010. Wireless event: cmd=0x8b1a len=26
  1011. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1012. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1013. WEXT: if_removed already cleared - ignore event
  1014. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1015. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1016. WEXT: if_removed already cleared - ignore event
  1017. Wireless event: cmd=0x8c08 len=110
  1018. AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  1019. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1020. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1021. WEXT: if_removed already cleared - ignore event
  1022. Wireless event: cmd=0x8b15 len=24
  1023. Wireless event: new AP: 20:3a:07:97:15:72
  1024. wlan0: Event ASSOCINFO (4) received
  1025. wlan0: Association info event
  1026. resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  1027. wlan0: Event ASSOC (0) received
  1028. wlan0: State: ASSOCIATING -> ASSOCIATED
  1029. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1030. netlink: Operstate: linkmode=-1, operstate=5
  1031. wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
  1032. wlan0: No keys have been configured - skip key clearing
  1033. wlan0: Associated with 20:3a:07:97:15:72
  1034. wlan0: WPA: Association event - clear replay counter
  1035. wlan0: WPA: Clear old PTK
  1036. EAPOL: External notification - portEnabled=0
  1037. EAPOL: Supplicant port status: Unauthorized
  1038. EAPOL: External notification - portValid=0
  1039. EAPOL: Supplicant port status: Unauthorized
  1040. EAPOL: External notification - portEnabled=1
  1041. EAPOL: SUPP_PAE entering state CONNECTING
  1042. EAPOL: SUPP_BE entering state IDLE
  1043. EAP: EAP entering state INITIALIZE
  1044. EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
  1045. ENGINE: engine deinit
  1046. EAP: EAP entering state IDLE
  1047. wlan0: Setting authentication timeout: 10 sec 0 usec
  1048. wlan0: Cancelling scan request
  1049. wlan0: RX EAPOL from 20:3a:07:97:15:72
  1050. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  1051. wlan0: Setting authentication timeout: 70 sec 0 usec
  1052. EAPOL: Received EAP-Packet frame
  1053. EAPOL: SUPP_PAE entering state RESTART
  1054. EAP: EAP entering state INITIALIZE
  1055. EAP: EAP entering state IDLE
  1056. EAPOL: SUPP_PAE entering state AUTHENTICATING
  1057. EAPOL: SUPP_BE entering state REQUEST
  1058. EAPOL: getSuppRsp
  1059. EAP: EAP entering state RECEIVED
  1060. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  1061. EAP: EAP entering state IDENTITY
  1062. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  1063. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  1064. 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
  1065. 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
  1066. 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
  1067. 2c 70 6f 72 74 69 64 3d 31 ,portid=1
  1068. EAP: using real identity - hexdump_ascii(len=6):
  1069. 6a 77 69 64 65 6c jwidel
  1070. EAP: EAP entering state SEND_RESPONSE
  1071. EAP: EAP entering state IDLE
  1072. EAPOL: SUPP_BE entering state RESPONSE
  1073. EAPOL: txSuppRsp
  1074. TX EAPOL: dst=20:3a:07:97:15:72
  1075. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
  1076. EAPOL: SUPP_BE entering state RECEIVE
  1077. wlan0: RX EAPOL from 20:3a:07:97:15:72
  1078. RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 e4 67 45 93 73 e2 48 33 83 2e 65 99 6a df df 4c
  1079. EAPOL: Received EAP-Packet frame
  1080. EAPOL: SUPP_BE entering state REQUEST
  1081. EAPOL: getSuppRsp
  1082. EAP: EAP entering state RECEIVED
  1083. EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0
  1084. EAP: EAP entering state GET_METHOD
  1085. EAP: configuration does not allow: