wpa_supplicant v2.0 Successfully initialized wpa_supplicant Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_networkers.conf' -> '/home/jwidel/wpa_networkers.conf' Reading configuration file '/home/jwidel/wpa_networkers.conf' Line: 2 - start of a new network block ssid - hexdump_ascii(len=10): 6e 65 74 77 6f 72 6b 65 72 73 networkers key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel password - hexdump_ascii(len=10): [REMOVED] ca_cert - hexdump_ascii(len=38): 2f 68 6f 6d 65 2f 6a 77 69 64 65 6c 2f 74 6d 70 /home/jwidel/tmp 2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65 /rootca-networke 72 73 2e 70 65 6d rs.pem phase1 - hexdump_ascii(len=11): 70 65 61 70 6c 61 62 65 6c 3d 30 peaplabel=0 phase2 - hexdump_ascii(len=13): 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 priority=10 (0xa) Priority group 10 id=0 ssid='networkers' WEXT: cfg80211-based driver detected wext: interface wlan0 phy: phy0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0 SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0x1f flags 0x0 netlink: Operstate: linkmode=1, operstate=5 wlan0: Own MAC address: 20:68:9d:d0:49:25 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wlan0: RSN: flushing PMKID list in the driver wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): 2f 09 dc a4 48 dd 58 bd 9f ba 5e 5e c0 f2 ea c8 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized wlan0: Added interface wlan0 wlan0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Scan results did not fit - trying larger buffer (8192 bytes) Received 5146 bytes of scan results (9 BSSes) wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 20:3a:07:97:15:72 SSID 'networkers' wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:71 SSID '\x00' wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:70 SSID 'networkers-data' wlan0: BSS: Add new id 3 BSSID 00:18:39:a1:f7:c9 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wlan0: BSS: Add new id 4 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42' wlan0: BSS: Add new id 5 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0' wlan0: BSS: Add new id 6 BSSID c8:3a:35:27:59:70 SSID 'mani' wlan0: BSS: Add new id 7 BSSID f0:7d:68:8e:10:ce SSID '' wlan0: BSS: Add new id 8 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET' BSS: last_scan_res_used=9/32 last_scan_full=0 wlan0: New scan results available WPS: AP 90:94:e4:35:57:ba type 0 added WPS: AP 00:12:2a:98:72:d8 type 0 added WPS: AP f0:7d:68:8e:10:ce type 0 added WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlan0: Selecting BSS from priority group 10 wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56 wlan0: selected based on RSN IE wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers' wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz) wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 RSN: Search for BSSID 20:3a:07:97:15:72 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT 802.1X WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0) wlan0: set_disable_max_amsdu: -1 wlan0: set_ampdu_factor: -1 wlan0: set_ampdu_density: -1 wlan0: set_disable_ht40: 0 wlan0: set_disable_sgi: 0 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk wlan0: Association request to the driver failed wlan0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=26 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=110 AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 20:3a:07:97:15:72 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72 wlan0: No keys have been configured - skip key clearing wlan0: Associated with 20:3a:07:97:15:72 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=4): 01 01 00 00 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 wlan0: Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 02 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 02 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 03 00 16 04 10 3f be a0 98 13 2f f5 bf 38 c1 6d 3a 4e 5f e1 94 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 04 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 04 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 03 a8 ee 8e 10 2e 5c e3 31 c8 eb e2 c4 5a 02 98 d2 f5 85 04 aa be d1 02 ad 70 ef 45 2e 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 EAPOL: authWhile --> 0 EAPOL: SUPP_BE entering state TIMEOUT EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=4): 01 01 00 00 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 07 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 07 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 08 00 16 04 10 a2 49 b1 32 a8 99 e5 5e 2c ec 71 a0 fe 00 38 c4 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 09 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 09 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 24 6e b8 62 b1 d0 b3 fc 6e 98 ae 86 2f 23 a0 f8 b8 43 51 71 ce 40 84 4d 3b a7 25 f0 9d 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 wlan0: Event DISASSOC (1) received wlan0: Disassociation notification wlan0: CTRL-EVENT-DISCONNECTED bssid=20:3a:07:97:15:72 reason=0 wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=6) wlan0: Setting scan request: 0 sec 100000 usec Added BSSID 20:3a:07:97:15:72 into blacklist wlan0: Blacklist count 1 --> request scan in 100 ms wlan0: Setting scan request: 0 sec 100000 usec wlan0: Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wlan0: State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Scan results did not fit - trying larger buffer (8192 bytes) Received 5544 bytes of scan results (10 BSSes) wlan0: BSS: Start scan result update 2 wlan0: BSS: Add new id 9 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279' wlan0: BSS: Add new id 10 BSSID 54:e6:fc:e8:c6:02 SSID 'Ukasz' wlan0: BSS: Add new id 11 BSSID e2:b9:c8:62:78:38 SSID '500_JoikuSpot_943AF04AD3F5' BSS: last_scan_res_used=10/32 last_scan_full=0 wlan0: New scan results available WPS: AP 00:19:70:79:97:c8 type 0 added WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlan0: Selecting BSS from priority group 10 wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60 wlan0: skip - blacklisted (count=1 limit=0) wlan0: 1: 20:3a:07:97:15:71 ssid='\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-70 wlan0: skip - SSID mismatch wlan0: 2: 20:3a:07:97:15:70 ssid='networkers-data' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74 wlan0: skip - SSID mismatch wlan0: 3: 90:94:e4:35:57:ba ssid='konarskiego 42' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-74 wps wlan0: skip - SSID mismatch wlan0: 4: 00:12:2a:98:72:d8 ssid='NETIASPOT-9872D0' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-75 wps wlan0: skip - SSID mismatch wlan0: 5: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-76 wlan0: skip - SSID mismatch wlan0: 6: 00:19:70:79:97:c8 ssid='FAST3764-4279' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-78 wps wlan0: skip - SSID mismatch wlan0: 7: 54:e6:fc:e8:c6:02 ssid='Ukasz' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-95 wlan0: skip - SSID mismatch wlan0: 8: e2:b9:c8:62:78:38 ssid='500_JoikuSpot_943AF04AD3F5' wpa_ie_len=0 rsn_ie_len=0 caps=0x12 level=-91 wlan0: skip - SSID mismatch wlan0: 9: 00:12:2a:98:72:da ssid='FON_NETIA_FREE_INTERNET' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-81 wlan0: skip - SSID mismatch wlan0: No APs found - clear blacklist and try again Removed BSSID 20:3a:07:97:15:72 from blacklist (clear) wlan0: Selecting BSS from priority group 10 wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60 wlan0: selected based on RSN IE wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers' wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz) wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 RSN: Search for BSSID 20:3a:07:97:15:72 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT 802.1X WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0) wlan0: set_disable_max_amsdu: -1 wlan0: set_ampdu_factor: -1 wlan0: set_ampdu_density: -1 wlan0: set_disable_ht40: 0 wlan0: set_disable_sgi: 0 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk wlan0: Association request to the driver failed wlan0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=26 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=110 AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 20:3a:07:97:15:72 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72 wlan0: No keys have been configured - skip key clearing wlan0: Associated with 20:3a:07:97:15:72 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 wlan0: Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 38 75 15 e9 3e 8d 75 c0 65 4f 03 ce 96 2e 8a e2 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 28 e4 b8 50 54 ba 28 d4 32 0d c1 f2 55 18 2e 2f a7 40 c3 39 9e 90 c8 dd 85 32 d0 b9 b8 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 EAPOL: authWhile --> 0 EAPOL: SUPP_BE entering state TIMEOUT EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=4): 01 01 00 00 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 06 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 06 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 07 00 16 04 10 65 31 12 25 0f b6 9a c1 de db 22 8c 77 25 9e 6d EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 08 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 08 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 48 db b5 8e 82 2d ce 2d 48 e3 76 96 00 63 73 a2 f2 19 7c 1e 36 50 4e c5 0c 99 6b ff dd 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 EAPOL: authWhile --> 0 EAPOL: SUPP_BE entering state TIMEOUT EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=4): 01 01 00 00 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 0b 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=11 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 0b 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 0c 00 16 04 10 8f 64 c4 83 f0 c3 78 1e 4b 01 ba 05 f5 03 0d 87 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=12 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 0c 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 0d 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 0d 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 69 6f 8e a0 f4 61 2a 0e 36 c2 6f a5 0e 12 6d 5c 4b cf 60 ec 50 52 13 6c 81 36 b3 c0 3b 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE wlan0: Authentication with 20:3a:07:97:15:72 timed out. Added BSSID 20:3a:07:97:15:72 into blacklist wlan0: Request to deauthenticate - bssid=20:3a:07:97:15:72 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED wpa_driver_wext_deauthenticate wlan0: Event DEAUTH (12) received wlan0: Deauthentication notification wlan0: * reason 3 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlan0: CTRL-EVENT-DISCONNECTED bssid=20:3a:07:97:15:72 reason=3 locally_generated=1 wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=6) wlan0: Setting scan request: 0 sec 100000 usec BSSID 20:3a:07:97:15:72 blacklist count incremented to 2 wlan0: Blacklist count 3 --> request scan in 1000 ms wlan0: Setting scan request: 1 sec 0 usec wlan0: Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wlan0: State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized wlan0: No keys have been configured - skip key clearing wlan0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized wlan0: Setting scan request: 1 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 wlan0: Event DISASSOC (1) received wlan0: Disassociation notification wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=0) wlan0: Do not request new immediate scan wlan0: Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wlan0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 EAPOL: Supplicant port status: Unauthorized wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Scan results did not fit - trying larger buffer (8192 bytes) Received 6123 bytes of scan results (11 BSSes) wlan0: BSS: Start scan result update 3 wlan0: BSS: Add new id 12 BSSID c8:7b:5b:b9:3a:7d SSID 'lampart' wlan0: BSS: Remove id 6 BSSID c8:3a:35:27:59:70 SSID 'mani' due to no match in scan BSS: last_scan_res_used=11/32 last_scan_full=0 wlan0: New scan results available WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlan0: Selecting BSS from priority group 10 wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 wlan0: skip - blacklisted (count=2 limit=0) wlan0: 1: 20:3a:07:97:15:71 ssid='\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59 wlan0: skip - SSID mismatch wlan0: 2: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60 wlan0: skip - SSID mismatch wlan0: 3: 20:3a:07:97:15:70 ssid='networkers-data' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-65 wlan0: skip - SSID mismatch wlan0: 4: 00:12:2a:98:72:d8 ssid='NETIASPOT-9872D0' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-77 wps wlan0: skip - SSID mismatch wlan0: 5: 00:19:70:79:97:c8 ssid='FAST3764-4279' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-82 wps wlan0: skip - SSID mismatch wlan0: 6: 90:94:e4:35:57:ba ssid='konarskiego 42' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-83 wps wlan0: skip - SSID mismatch wlan0: 7: c8:7b:5b:b9:3a:7d ssid='lampart' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-88 wlan0: skip - SSID mismatch wlan0: 8: f0:7d:68:8e:10:ce ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-89 wps wlan0: skip - SSID not known wlan0: 9: e2:b9:c8:62:78:38 ssid='500_JoikuSpot_943AF04AD3F5' wpa_ie_len=0 rsn_ie_len=0 caps=0x12 level=-89 wlan0: skip - SSID mismatch wlan0: 10: 00:12:2a:98:72:da ssid='FON_NETIA_FREE_INTERNET' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-80 wlan0: skip - SSID mismatch wlan0: No APs found - clear blacklist and try again Removed BSSID 20:3a:07:97:15:72 from blacklist (clear) wlan0: Selecting BSS from priority group 10 wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58 wlan0: selected based on RSN IE wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers' wlan0: Request association: reassociate: 1 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz) wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 RSN: Search for BSSID 20:3a:07:97:15:72 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT 802.1X WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0) wlan0: set_disable_max_amsdu: -1 wlan0: set_ampdu_factor: -1 wlan0: set_ampdu_density: -1 wlan0: set_disable_ht40: 0 wlan0: set_disable_sgi: 0 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk wlan0: Association request to the driver failed wlan0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=26 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=110 AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 20:3a:07:97:15:72 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72 wlan0: No keys have been configured - skip key clearing wlan0: Associated with 20:3a:07:97:15:72 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 wlan0: Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 e4 67 45 93 73 e2 48 33 83 2e 65 99 6a df df 4c EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: