Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # wpa_supplicant -dd -c/etc/wpa_supplicant/wpa_supplicant.conf -iwlp2s0
- wpa_supplicant v2.4
- random: Trying to read entropy from /dev/random
- Successfully initialized wpa_supplicant
- Initializing interface 'wlp2s0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
- ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=wheel'
- update_config=1
- Line: 4 - start of a new network block
- ssid - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- scan_ssid=1 (0x1)
- bgscan - hexdump_ascii(len=17):
- 73 69 6d 70 6c 65 3a 33 30 3a 2d 36 30 3a 36 30 simple:30:-60:60
- 30 0
- PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
- priority=9 (0x9)
- PSK (from passphrase) - hexdump(len=32): [REMOVED]
- key_mgmt: 0x4
- auth_alg: 0x1
- Priority group 9
- id=0 ssid='my_network_name'
- Priority group 0
- id=1 ssid='AndroidAP'
- id=2 ssid='eduroam'
- id=3 ssid='webauth'
- rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
- nl80211: TDLS supported
- nl80211: TDLS external setup
- nl80211: Supported cipher 00-0f-ac:1
- nl80211: Supported cipher 00-0f-ac:5
- nl80211: Supported cipher 00-0f-ac:2
- nl80211: Supported cipher 00-0f-ac:4
- nl80211: Supported cipher 00-0f-ac:10
- nl80211: Supported cipher 00-0f-ac:8
- nl80211: Supported cipher 00-0f-ac:9
- nl80211: Supported cipher 00-0f-ac:6
- nl80211: Supported cipher 00-0f-ac:13
- nl80211: Supported cipher 00-0f-ac:11
- nl80211: Supported cipher 00-0f-ac:12
- nl80211: Using driver-based off-channel TX
- nl80211: Use separate P2P group interface (driver advertised support)
- nl80211: interface wlp2s0 in phy phy0
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1500480
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0505
- netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
- nl80211: driver param='(null)'
- Add interface wlp2s0 to a new radio phy0
- nl80211: Regulatory information - country=00
- nl80211: 2402-2472 @ 40 MHz 20 mBm
- nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
- nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
- nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
- nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
- nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
- nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
- nl80211: 57240-63720 @ 2160 MHz 0 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- wlp2s0: Own MAC address: 74:2f:68:cd:1d:83
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wlp2s0: RSN: flushing PMKID list in the driver
- nl80211: Flush PMKIDs
- wlp2s0: Setting scan request: 0.100000 sec
- ENGINE: Loading dynamic engine
- ENGINE: Loading dynamic engine
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- ctrl_interface_group=10 (from group name 'wheel')
- wlp2s0: Added interface wlp2s0
- wlp2s0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- random: Got 20/20 bytes from /dev/random
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- wlp2s0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- wlp2s0: Starting AP scan for wildcard SSID
- wlp2s0: Add radio work 'scan'@0x15230d0
- wlp2s0: First radio work item in the queue - schedule start immediately
- wlp2s0: Starting radio work 'scan'@0x15230d0 after 0.000059 second wait
- wlp2s0: nl80211: scan request
- nl80211: Scan SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- nl80211: Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
- Scan requested (ret=0) - scan timeout 10 seconds
- nl80211: Event message available
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
- wlp2s0: nl80211: Scan trigger
- wlp2s0: Event SCAN_STARTED (47) received
- wlp2s0: Own scan request started a scan in 0.000142 seconds
- CTRL_IFACE monitor attached /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Control interface command 'INTERFACES'
- wlp2s0: Control interface command 'GET_CAPABILITY eap'
- CTRL_IFACE: GET_CAPABILITY 'eap'
- wlp2s0: Control interface command 'STATUS'
- EAPOL: EAP Session-Id not available
- wlp2s0: Control interface command 'LIST_NETWORKS'
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- EAPOL: disable timer tick
- nl80211: Event message available
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
- wlp2s0: nl80211: New scan results available
- nl80211: Scan probed for SSID 'my_network_name'
- nl80211: Scan probed for SSID 'eduroam'
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484
- wlp2s0: Event SCAN_RESULTS (3) received
- wlp2s0: Scan completed in 1.012722 seconds
- nl80211: Received scan results (2 BSSes)
- wlp2s0: BSS: Start scan result update 1
- wlp2s0: BSS: Add new id 0 BSSID 00:16:b6:11:39:f4 SSID 'my_network_name'
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: BSS: Add new id 1 BSSID 00:1e:e5:46:0e:f0 SSID 'my_network_name'
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- BSS: last_scan_res_used=2/32
- wlp2s0: New scan results available (own=1 ext=0)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Radio work 'scan'@0x15230d0 done in 1.025107 seconds
- wlp2s0: Selecting BSS from priority group 9
- wlp2s0: 0: 00:16:b6:11:39:f4 ssid='my_network_name' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-29
- wlp2s0: selected based on RSN IE
- wlp2s0: selected BSS 00:16:b6:11:39:f4 ssid='my_network_name'
- wlp2s0: Considering connect request: reassociate: 0 selected: 00:16:b6:11:39:f4 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1500660 current_ssid=(nil)
- wlp2s0: Request association with 00:16:b6:11:39:f4
- wlp2s0: Add radio work 'sme-connect'@0x1523020
- wlp2s0: First radio work item in the queue - schedule start immediately
- wlp2s0: Starting radio work 'sme-connect'@0x1523020 after 0.000040 second wait
- wlp2s0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 00:16:b6:11:39:f4
- RSN: No PMKSA cache entry found
- wlp2s0: RSN: using IEEE 802.11i/D9.0
- wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
- wlp2s0: WPA: Selected mgmt group cipher 32
- wlp2s0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wlp2s0: WPA: using GTK CCMP
- wlp2s0: WPA: using PTK CCMP
- wlp2s0: WPA: using KEY_MGMT WPA-PSK
- wlp2s0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- RRM: Determining whether RRM can be used - device support: 0x0
- RRM: No RRM in network
- wlp2s0: Cancelling scan request
- wlp2s0: SME: Trying to authenticate with 00:16:b6:11:39:f4 (SSID='my_network_name' freq=2432 MHz)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- nl80211: Authenticate (ifindex=3)
- * bssid=00:16:b6:11:39:f4
- * freq=2432
- * SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- nl80211: Event message available
- nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
- nl80211: New station 00:16:b6:11:39:f4
- nl80211: Event message available
- nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
- nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:16:b6:11:39:f4
- nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 74 2f 68 cd 1d 83 00 16 b6 11 39 f4 00 16 b6 11 39 f4 10 fe 00 00 02 00 00 00 dd 09 00 10 18 02 01 f1 00 00 00
- nl80211: Authenticate event
- wlp2s0: Event AUTH (11) received
- wlp2s0: SME: Authentication response: peer=00:16:b6:11:39:f4 auth_type=0 auth_transaction=2 status_code=0
- SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 01 f1 00 00 00
- wlp2s0: Trying to associate with 00:16:b6:11:39:f4 (SSID='my_network_name' freq=2432 MHz)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: State: AUTHENTICATING -> ASSOCIATING
- nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- nl80211: Associate (ifindex=3)
- * bssid=00:16:b6:11:39:f4
- * freq=2432
- * SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 01 00 00 40
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac02
- nl80211: Association request send successfully
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Event message available
- nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
- nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:16:b6:11:39:f4
- nl80211: MLME event frame - hexdump(len=57): 10 00 3a 01 74 2f 68 cd 1d 83 00 16 b6 11 39 f4 00 16 b6 11 39 f4 20 fe 11 04 00 00 02 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00
- nl80211: Associate event
- wlp2s0: Event ASSOC (0) received
- wlp2s0: Association info event
- resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00
- wlp2s0: freq=2432 MHz
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlp2s0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlp2s0: Associated to a new BSS: BSSID=00:16:b6:11:39:f4
- wlp2s0: Associated with 00:16:b6:11:39:f4
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: WPA: Association event - clear replay counter
- wlp2s0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- wlp2s0: Setting authentication timeout: 10 sec 0 usec
- wlp2s0: Cancelling scan request
- WMM AC: No WMM IE
- nl80211: Event message available
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- l2_packet_receive: src=00:16:b6:11:39:f4 len=99
- wlp2s0: RX EAPOL from 00:16:b6:11:39:f4
- RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 19 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp2s0: Setting authentication timeout: 10 sec 0 usec
- wlp2s0: IEEE 802.1X RX: version=2 type=3 length=95
- WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 19 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp2s0: EAPOL-Key type=2
- wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlp2s0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 19
- key_nonce - hexdump(len=32): 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:16:b6:11:39:f4 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- Get randomness: len=32 entropy=3
- WPA: Renewed SNonce - hexdump(len=32): 94 84 be 51 5c 2d 42 de 23 bf 4f 68 3c 04 b5 42 f6 6c f7 ff 8a b3 71 98 d7 b0 e3 00 12 62 e1 d3
- WPA: PTK derivation - A1=74:2f:68:cd:1d:83 A2=00:16:b6:11:39:f4
- WPA: Nonce1 - hexdump(len=32): 94 84 be 51 5c 2d 42 de 23 bf 4f 68 3c 04 b5 42 f6 6c f7 ff 8a b3 71 98 d7 b0 e3 00 12 62 e1 d3
- WPA: Nonce2 - hexdump(len=32): 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: KEK - hexdump(len=16): [REMOVED]
- WPA: TK - hexdump(len=16): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 19
- wlp2s0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 6d 50 b9 be a9 80 df 39 49 9e 62 25 80 24 84 32
- WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 19 94 84 be 51 5c 2d 42 de 23 bf 4f 68 3c 04 b5 42 f6 6c f7 ff 8a b3 71 98 d7 b0 e3 00 12 62 e1 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 50 b9 be a9 80 df 39 49 9e 62 25 80 24 84 32 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- l2_packet_receive: src=00:16:b6:11:39:f4 len=155
- wlp2s0: RX EAPOL from 00:16:b6:11:39:f4
- RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 1a 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 65 b4 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 50 09 40 c1 9f 58 ed c9 e1 bb ff 02 1f f2 ad 00 38 2d 89 09 06 8f a1 9c 76 bc 89 59 24 66 47 e7 c5 b2 1d 58 ab 51 db ba ce cd 3c cd 46 72 7a 9c a7 d3 6f 93 b8 8a e5 97 ca 67 4d a3 d7 47 6a 71 8e 24 c9 7c 5a da 17 0c ee
- wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151
- WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 1a 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 65 b4 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 50 09 40 c1 9f 58 ed c9 e1 bb ff 02 1f f2 ad 00 38 2d 89 09 06 8f a1 9c 76 bc 89 59 24 66 47 e7 c5 b2 1d 58 ab 51 db ba ce cd 3c cd 46 72 7a 9c a7 d3 6f 93 b8 8a e5 97 ca 67 4d a3 d7 47 6a 71 8e 24 c9 7c 5a da 17 0c ee
- wlp2s0: EAPOL-Key type=2
- wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- wlp2s0: key_length=16 key_data_length=56
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 1a
- key_nonce - hexdump(len=32): 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64
- key_iv - hexdump(len=16): 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 65
- key_rsc - hexdump(len=8): b4 a2 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 26 50 09 40 c1 9f 58 ed c9 e1 bb ff 02 1f f2 ad
- RSN: encrypted key data - hexdump(len=56): 2d 89 09 06 8f a1 9c 76 bc 89 59 24 66 47 e7 c5 b2 1d 58 ab 51 db ba ce cd 3c cd 46 72 7a 9c a7 d3 6f 93 b8 8a e5 97 ca 67 4d a3 d7 47 6a 71 8e 24 c9 7c 5a da 17 0c ee
- WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
- wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:16:b6:11:39:f4 (ver=2)
- WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 1b fd d9 30 6b 94 21 cf 8f 5e a2 53 02 8a 7b 9d dd 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
- wlp2s0: WPA: Sending EAPOL-Key 4/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): b4 8c 94 ce bd 77 9b 9f 05 26 68 02 06 a9 0f 9f
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 8c 94 ce bd 77 9b 9f 05 26 68 02 06 a9 0f 9f 00 00
- wlp2s0: WPA: Installing PTK to the driver
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x1502210 key_idx=0 set_tx=1 seq_len=6 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
- nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
- addr=00:16:b6:11:39:f4
- EAPOL: External notification - portValid=1
- wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
- WPA: Group Key - hexdump(len=16): [REMOVED]
- wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
- WPA: RSC - hexdump(len=6): b4 a2 00 00 00 00
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x499201 key_idx=2 set_tx=0 seq_len=6 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
- nl80211: KEY_SEQ - hexdump(len=6): b4 a2 00 00 00 00
- broadcast key
- wlp2s0: WPA: Key negotiation completed with 00:16:b6:11:39:f4 [PTK=CCMP GTK=CCMP]
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Cancelling authentication timeout
- wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
- wlp2s0: Radio work 'sme-connect'@0x1523020 done in 0.044553 seconds
- wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:16:b6:11:39:f4 completed [id=0 id_str=]
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- nl80211: Set wlp2s0 operstate 0->1 (UP)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- nl80211: Set supplicant port authorized for 00:16:b6:11:39:f4
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- nl80211: Set rekey offload
- nl80211: Driver does not support rekey offload
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- CTRL_IFACE monitor attached /tmp/wpa_ctrl_3676-8\x00
- wlp2s0: Control interface command 'STATUS'
- EAPOL: EAP Session-Id not available
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- wlp2s0: Control interface command 'LIST_NETWORKS'
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- wlp2s0: Control interface command 'STATUS'
- EAPOL: EAP Session-Id not available
- wlp2s0: Control interface command 'SIGNAL_POLL'
- wlp2s0: Control interface command 'SIGNAL_POLL'
- wlp2s0: Control interface command 'SCAN'
- wlp2s0: Setting scan request: 0.000000 sec
- Scan SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- wlp2s0: Starting AP scan for wildcard SSID
- wlp2s0: Add radio work 'scan'@0x1522c60
- wlp2s0: First radio work item in the queue - schedule start immediately
- wlp2s0: Starting radio work 'scan'@0x1522c60 after 0.000028 second wait
- wlp2s0: nl80211: scan request
- nl80211: Scan SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- nl80211: Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
- wlp2s0: nl80211: Scan trigger
- wlp2s0: Event SCAN_STARTED (47) received
- wlp2s0: Own scan request started a scan in 0.000054 seconds
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Control interface command 'STATUS'
- EAPOL: EAP Session-Id not available
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- wlp2s0: Control interface command 'LIST_NETWORKS'
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- nl80211: Event message available
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
- wlp2s0: nl80211: New scan results available
- nl80211: Scan probed for SSID 'my_network_name'
- nl80211: Scan probed for SSID 'eduroam'
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484
- wlp2s0: Event SCAN_RESULTS (3) received
- wlp2s0: Scan completed in 2.690065 seconds
- nl80211: Associated on 2432 MHz
- nl80211: Associated with 00:16:b6:11:39:f4
- nl80211: Received scan results (3 BSSes)
- nl80211: Scan results indicate BSS status with 00:16:b6:11:39:f4 as associated
- wlp2s0: BSS: Start scan result update 2
- wlp2s0: BSS: Add new id 2 BSSID 5c:49:79:07:df:46 SSID 'Privat-Flur'
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- BSS: last_scan_res_used=3/32
- wlp2s0: New scan results available (own=1 ext=0)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Radio work 'scan'@0x1522c60 done in 2.695871 seconds
- wlp2s0: Selecting BSS from priority group 9
- wlp2s0: 0: 00:1e:e5:46:0e:f0 ssid='my_network_name' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-36
- wlp2s0: selected based on RSN IE
- wlp2s0: selected BSS 00:1e:e5:46:0e:f0 ssid='my_network_name'
- wlp2s0: Considering within-ESS reassociation
- wlp2s0: Current BSS: 00:16:b6:11:39:f4 level=-79 snr=3 est_throughput=2000
- wlp2s0: Selected BSS: 00:1e:e5:46:0e:f0 level=-36 snr=48 est_throughput=54000
- wlp2s0: Allow reassociation - selected BSS has better estimated throughput
- wlp2s0: Considering connect request: reassociate: 0 selected: 00:1e:e5:46:0e:f0 bssid: 00:16:b6:11:39:f4 pending: 00:00:00:00:00:00 wpa_state: COMPLETED ssid=0x1500660 current_ssid=0x1500660
- wlp2s0: Request association with 00:1e:e5:46:0e:f0
- wlp2s0: Re-association to the same ESS
- wlp2s0: Add radio work 'sme-connect'@0x1522c60
- wlp2s0: First radio work item in the queue - schedule start immediately
- RSN: Ignored PMKID candidate without preauth flag
- wlp2s0: Starting radio work 'sme-connect'@0x1522c60 after 0.000067 second wait
- wlp2s0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=0x1500660 try_opportunistic=0
- RSN: Search for BSSID 00:1e:e5:46:0e:f0
- RSN: No PMKSA cache entry found
- wlp2s0: RSN: using IEEE 802.11i/D9.0
- wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
- wlp2s0: WPA: Selected mgmt group cipher 32
- wlp2s0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- wlp2s0: WPA: using GTK CCMP
- wlp2s0: WPA: using PTK CCMP
- wlp2s0: WPA: using KEY_MGMT WPA-PSK
- wlp2s0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- RRM: Determining whether RRM can be used - device support: 0x0
- RRM: No RRM in network
- wlp2s0: Cancelling scan request
- wlp2s0: SME: Trying to authenticate with 00:1e:e5:46:0e:f0 (SSID='my_network_name' freq=2457 MHz)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x15274b0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:1e:e5:46:0e:f0
- wlp2s0: State: COMPLETED -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- nl80211: Authenticate (ifindex=3)
- * bssid=00:1e:e5:46:0e:f0
- * freq=2457
- * SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Event message available
- nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp2s0
- nl80211: Delete station 00:16:b6:11:39:f4
- nl80211: Event message available
- nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp2s0
- nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp2s0(74:2f:68:cd:1d:83) A1=00:16:b6:11:39:f4 A2=74:2f:68:cd:1d:83
- nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 16 b6 11 39 f4 74 2f 68 cd 1d 83 00 16 b6 11 39 f4 00 00 01 00
- nl80211: Deauthenticate event
- nl80211: Ignore deauth/disassoc event from old AP 00:16:b6:11:39:f4 when already authenticating with 00:1e:e5:46:0e:f0
- nl80211: Event message available
- nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp2s0
- nl80211: Ignore disconnect event when using userspace SME
- nl80211: Event message available
- nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
- nl80211: New station 00:1e:e5:46:0e:f0
- nl80211: Event message available
- nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
- nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:1e:e5:46:0e:f0
- nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 74 2f 68 cd 1d 83 00 1e e5 46 0e f0 00 1e e5 46 0e f0 90 69 00 00 02 00 00 00 dd 09 00 10 18 02 00 f0 00 00 00
- nl80211: Authenticate event
- wlp2s0: Event AUTH (11) received
- wlp2s0: SME: Authentication response: peer=00:1e:e5:46:0e:f0 auth_type=0 auth_transaction=2 status_code=0
- SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 00 f0 00 00 00
- wlp2s0: Trying to associate with 00:1e:e5:46:0e:f0 (SSID='my_network_name' freq=2457 MHz)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: State: AUTHENTICATING -> ASSOCIATING
- nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- nl80211: Associate (ifindex=3)
- * bssid=00:1e:e5:46:0e:f0
- * freq=2457
- * SSID - hexdump_ascii(len=11):
- 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
- * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 01 00 00 40
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac02
- * prev_bssid=00:16:b6:11:39:f4
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp2s0
- nl80211: Regulatory domain change
- * initiator=0
- * type=1
- wlp2s0: Event CHANNEL_LIST_CHANGED (28) received
- wlp2s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- nl80211: Regulatory information - country=00
- nl80211: 2402-2472 @ 40 MHz 20 mBm
- nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
- nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
- nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
- nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
- nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
- nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
- nl80211: 57240-63720 @ 2160 MHz 0 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Event message available
- nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
- nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:1e:e5:46:0e:f0
- nl80211: MLME event frame - hexdump(len=83): 30 00 3a 01 74 2f 68 cd 1d 83 00 1e e5 46 0e f0 00 1e e5 46 0e f0 a0 69 11 04 00 00 01 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 00 f0 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- nl80211: Associate event
- wlp2s0: Event ASSOC (0) received
- wlp2s0: Association info event
- resp_ies - hexdump(len=53): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 00 f0 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlp2s0: freq=2457 MHz
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- Operating frequency changed from 2432 to 2457 MHz
- nl80211: Associated on 2457 MHz
- nl80211: Associated with 00:1e:e5:46:0e:f0
- nl80211: Received scan results (3 BSSes)
- nl80211: Scan results indicate BSS status with 00:1e:e5:46:0e:f0 as associated
- wlp2s0: BSS: Start scan result update 3
- wlp2s0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlp2s0: Associated to a new BSS: BSSID=00:1e:e5:46:0e:f0
- wlp2s0: Associated with 00:1e:e5:46:0e:f0
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: WPA: Association event - clear replay counter
- wlp2s0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Set supplicant port unauthorized for 00:1e:e5:46:0e:f0
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- wlp2s0: Setting authentication timeout: 10 sec 0 usec
- wlp2s0: Cancelling scan request
- WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
- WMM AC: U-APSD queues=0x0
- WMM AC: Valid WMM association, WMM AC is enabled
- nl80211: Event message available
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- l2_packet_receive: src=00:1e:e5:46:0e:f0 len=99
- wlp2s0: RX EAPOL from 00:1e:e5:46:0e:f0
- RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp2s0: Setting authentication timeout: 10 sec 0 usec
- wlp2s0: IEEE 802.1X RX: version=2 type=3 length=95
- WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp2s0: EAPOL-Key type=2
- wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlp2s0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:1e:e5:46:0e:f0 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- Get randomness: len=32 entropy=4
- WPA: Renewed SNonce - hexdump(len=32): f4 33 36 bf 87 7d 24 5b e4 e8 7c 71 76 c6 17 91 62 f5 47 26 ed b7 d9 36 f9 f2 ec a0 34 12 cd b7
- WPA: PTK derivation - A1=74:2f:68:cd:1d:83 A2=00:1e:e5:46:0e:f0
- WPA: Nonce1 - hexdump(len=32): f4 33 36 bf 87 7d 24 5b e4 e8 7c 71 76 c6 17 91 62 f5 47 26 ed b7 d9 36 f9 f2 ec a0 34 12 cd b7
- WPA: Nonce2 - hexdump(len=32): a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: KEK - hexdump(len=16): [REMOVED]
- WPA: TK - hexdump(len=16): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- wlp2s0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 36 4a 74 26 7b 69 30 9a 02 4f 17 90 ef 75 92 00
- WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 f4 33 36 bf 87 7d 24 5b e4 e8 7c 71 76 c6 17 91 62 f5 47 26 ed b7 d9 36 f9 f2 ec a0 34 12 cd b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 4a 74 26 7b 69 30 9a 02 4f 17 90 ef 75 92 00 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- l2_packet_receive: src=00:1e:e5:46:0e:f0 len=155
- wlp2s0: RX EAPOL from 00:1e:e5:46:0e:f0
- RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 25 bd 45 64 f1 39 ba ab b1 f6 fa 90 60 15 d1 00 38 f0 9d 82 33 19 00 2e 12 65 8d 63 64 c5 bb 3a 93 74 6b 71 87 74 d7 4c 55 87 27 59 3e 2e ff 73 0d b0 47 c7 c8 55 57 e1 76 16 e8 f0 b4 fc 67 ae 69 ba 0e e4 a1 b5 f0 9f ee
- wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151
- WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 25 bd 45 64 f1 39 ba ab b1 f6 fa 90 60 15 d1 00 38 f0 9d 82 33 19 00 2e 12 65 8d 63 64 c5 bb 3a 93 74 6b 71 87 74 d7 4c 55 87 27 59 3e 2e ff 73 0d b0 47 c7 c8 55 57 e1 76 16 e8 f0 b4 fc 67 ae 69 ba 0e e4 a1 b5 f0 9f ee
- wlp2s0: EAPOL-Key type=2
- wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- wlp2s0: key_length=16 key_data_length=56
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb
- key_iv - hexdump(len=16): d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cd
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 03 25 bd 45 64 f1 39 ba ab b1 f6 fa 90 60 15 d1
- RSN: encrypted key data - hexdump(len=56): f0 9d 82 33 19 00 2e 12 65 8d 63 64 c5 bb 3a 93 74 6b 71 87 74 d7 4c 55 87 27 59 3e 2e ff 73 0d b0 47 c7 c8 55 57 e1 76 16 e8 f0 b4 fc 67 ae 69 ba 0e e4 a1 b5 f0 9f ee
- WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
- wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:1e:e5:46:0e:f0 (ver=2)
- WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 3d 0e 0f 9a 36 be d7 8f fb 16 6b d1 de d6 59 52 dd 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
- wlp2s0: WPA: Sending EAPOL-Key 4/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): c0 43 14 6e f8 07 c2 76 54 f4 55 bb d8 39 4f ca
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 43 14 6e f8 07 c2 76 54 f4 55 bb d8 39 4f ca 00 00
- wlp2s0: WPA: Installing PTK to the driver
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x1502210 key_idx=0 set_tx=1 seq_len=6 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
- nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
- addr=00:1e:e5:46:0e:f0
- EAPOL: External notification - portValid=1
- wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
- WPA: Group Key - hexdump(len=16): [REMOVED]
- wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x499201 key_idx=1 set_tx=0 seq_len=6 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
- nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
- broadcast key
- wlp2s0: WPA: Key negotiation completed with 00:1e:e5:46:0e:f0 [PTK=CCMP GTK=CCMP]
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Cancelling authentication timeout
- wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
- wlp2s0: Radio work 'sme-connect'@0x1522c60 done in 0.053257 seconds
- wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:1e:e5:46:0e:f0 completed [id=0 id_str=]
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- nl80211: Set wlp2s0 operstate 0->1 (UP)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- nl80211: Set supplicant port authorized for 00:1e:e5:46:0e:f0
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- wlp2s0: Control interface command 'STATUS'
- EAPOL: EAP Session-Id not available
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- wlp2s0: Control interface command 'LIST_NETWORKS'
- wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- wlp2s0: Control interface command 'STATUS'
- EAPOL: EAP Session-Id not available
- ^Cwlp2s0: Removing interface wlp2s0
- wlp2s0: Request to deauthenticate - bssid=00:1e:e5:46:0e:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
- wpa_driver_nl80211_deauthenticate(addr=00:1e:e5:46:0e:f0 reason_code=3)
- wlp2s0: Event DEAUTH (12) received
- wlp2s0: Deauthentication notification
- wlp2s0: * reason 3 (locally generated)
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:1e:e5:46:0e:f0 reason=3 locally_generated=1
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Auto connect disabled: do not try to re-connect
- wlp2s0: Ignore connection failure indication since interface has been put into disconnected state
- wlp2s0: WPA: Clear old PMK and PTK
- wlp2s0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x14ff948 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:1e:e5:46:0e:f0
- wlp2s0: State: COMPLETED -> DISCONNECTED
- nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WMM AC: WMM AC is disabled
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- wlp2s0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- wlp2s0: WPA: Clear old PMK and PTK
- wlp2s0: BSS: Remove id 1 BSSID 00:1e:e5:46:0e:f0 SSID 'my_network_name' due to wpa_bss_flush
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: BSS: Remove id 0 BSSID 00:16:b6:11:39:f4 SSID 'my_network_name' due to wpa_bss_flush
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: BSS: Remove id 2 BSSID 5c:49:79:07:df:46 SSID 'Privat-Flur' due to wpa_bss_flush
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- wlp2s0: Cancelling scan request
- wlp2s0: Cancelling authentication timeout
- Remove interface wlp2s0 from radio phy0
- Remove radio phy0
- nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0
- nl80211: Remove monitor interface: refcount=0
- netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x8888888889d88c09 (mode change)
- wlp2s0: CTRL-EVENT-TERMINATING
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
- CTRL_IFACE wait for attached monitors to receive messages
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement