Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v2.0-devel
- random: Trying to read entropy from /dev/random
- Initializing interface 'wlan0' conf '/var/run/wpa_supplicant-wlan0.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/var/run/wpa_supplicant-wlan0.conf' -> '/var/run/wpa_supplicant-wlan0.conf'
- Reading configuration file '/var/run/wpa_supplicant-wlan0.conf'
- ctrl_interface='/var/run/wpa_supplicant-wlan0'
- Priority group 0
- id=0 ssid='WPI-Wireless'
- nl80211: interface wlan0 in phy phy0
- nl80211: Set mode ifindex 18 iftype 2 (STATION)
- netlink: Operstate: linkmode=1, operstate=5
- nl80211: Using driver-based off-channel TX
- nl80211: TDLS supported
- nl80211: TDLS external setup
- nl80211: Register frame command failed (type=208): ret=-149 (Operation already in progress)
- nl80211: Register frame match - hexdump(len=2): 08 01
- nl80211: Failed to register Action frame processing - ignore for now
- nl80211: driver param='(null)'
- nl80211: Regulatory information - country=US
- nl80211: 2402-2472 @ 40 MHz
- nl80211: 5170-5250 @ 40 MHz
- nl80211: 5250-5330 @ 40 MHz
- nl80211: 5490-5600 @ 40 MHz
- nl80211: 5650-5710 @ 40 MHz
- nl80211: 5735-5835 @ 40 MHz
- nl80211: Added 802.11b mode based on 802.11g information
- wlan0: Own MAC address: 84:1b:5e:7a:77:77
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wlan0: RSN: flushing PMKID list in the driver
- nl80211: Flush PMKIDs
- wlan0: Setting scan request: 0 sec 100000 usec
- WPS: Set UUID for interface wlan0
- WPS: UUID based on MAC address - hexdump(len=16): 68 16 69 83 8e b0 57 9b a6 66 28 49 ff 04 59 7a
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- Using existing control interface directory.
- ctrl_iface bind(PF_UNIX) failed: Address already in use
- ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
- Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant-wlan0/wlan0'
- wlan0: Added interface wlan0
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- Scan requested (ret=0) - scan timeout 10 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Associated on 2412 MHz
- nl80211: Associated with 78:19:f7:78:ae:42
- nl80211: Received scan results (26 BSSes)
- nl80211: Scan results indicate BSS status with 78:19:f7:78:ae:42 as associated
- nl80211: Local state (not associated) does not match with BSS state
- nl80211: Clear possible state mismatch (78:19:f7:78:ae:42)
- wlan0: BSS: Start scan result update 1
- wlan0: BSS: Add new id 0 BSSID 00:23:69:5a:a7:4e SSID ''
- wlan0: BSS: Add new id 1 BSSID 78:19:f7:79:95:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 2 BSSID 78:19:f7:77:86:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 3 BSSID 78:19:f7:78:46:c2 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 4 BSSID 78:19:f7:78:ee:02 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 5 BSSID 78:19:f7:77:93:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 6 BSSID 78:19:f7:77:87:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 7 BSSID 78:19:f7:78:43:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 8 BSSID 78:19:f7:79:6d:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 9 BSSID 78:19:f7:77:84:c2 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 10 BSSID 78:19:f7:78:ae:42 SSID 'WPI-Wireless'
- wlan0: BSS: Add new id 11 BSSID 78:19:f7:79:95:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 12 BSSID 1c:7e:e5:3b:bb:de SSID 'dlink'
- wlan0: BSS: Add new id 13 BSSID 00:30:44:0a:55:8e SSID 'archieLAN'
- wlan0: BSS: Add new id 14 BSSID 78:19:f7:78:46:c0 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 15 BSSID 78:19:f7:77:86:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 16 BSSID 00:30:bd:c5:7e:28 SSID 'WLAN'
- wlan0: BSS: Add new id 17 BSSID 78:19:f7:78:ee:00 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 18 BSSID 78:19:f7:77:93:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 19 BSSID 78:19:f7:78:43:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 20 BSSID 58:6d:8f:29:ad:5f SSID 'Newton's Balls'
- wlan0: BSS: Add new id 21 BSSID 78:19:f7:77:87:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 22 BSSID 78:19:f7:79:6d:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 23 BSSID 78:19:f7:77:ee:c0 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 24 BSSID 78:19:f7:78:ae:40 SSID 'WPI-Guest'
- wlan0: BSS: Add new id 25 BSSID 78:19:f7:78:d0:80 SSID 'WPI-Guest'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
- wlan0: skip - SSID mismatch
- wlan0: 1: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-51
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:79:95:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:95:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:79:95:42
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 2
- wlan0: * address 78:19:f7:78:ae:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- Added BSSID 78:19:f7:79:95:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:79:95:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:79:95:42 reason=2
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: AUTHENTICATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: SME: Allow pending authentication to proceed after disconnection event
- wlan0: State: DISCONNECTED -> AUTHENTICATING
- EAPOL: disable timer tick
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:ae:42
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:79:95:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:79:95:42
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:79:95:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:79:95:42 status_code=1
- wlan0: SME: Association with 78:19:f7:79:95:42 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:79:95:42 reason_code=3)
- BSSID 78:19:f7:79:95:42 blacklist count incremented to 3
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:79:95:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- Added BSSID 00:00:00:00:00:00 into blacklist
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (27 BSSes)
- wlan0: BSS: Start scan result update 2
- wlan0: BSS: Add new id 26 BSSID 78:19:f7:78:d0:82 SSID 'WPI-Wireless'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:86:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:86:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:86:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:77:86:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:77:86:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: New station 78:19:f7:77:86:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2412 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:77:86:42
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:77:86:42
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:77:86:42
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=48):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 36 31 2f 31 2c 70 6f 72 74 69 64 3d 32 35 36 33 61/1,portid=2563
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:86:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:86:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 2666 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:86:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 1652 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:86:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 638 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:86:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=648) - Flags 0x80
- SSL: TLS Message Length: 3680
- TLSv1: Received content type 22 version 3.1 length 42
- TLSv1: Received ServerHello
- TLSv1: Using TLS v1.0
- TLSv1: Selected cipher suite: 0x002f
- TLSv1: Received content type 22 version 3.1 length 3278
- TLSv1: Received Certificate (certificate_list len 3274)
- TLSv1: Certificate 0 (len 1511)
- X509: Extension: extnID=2.5.29.37 critical=0
- X509: Extension: extnID=2.5.29.37 critical=0
- TLSv1: Certificate 1 (len 1754)
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- X509: Validate certificate chain
- X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Found issuer from the list of trusted certificates
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Trusted certificate found to complete the chain
- X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- X509: Certificate chain valid
- TLSv1: Received content type 22 version 3.1 length 345
- TLSv1: Received CertificateRequest
- TLSv1: Received ServerHelloDone
- TLSv1: Send Certificate
- TLSv1: Full client certificate chain not configured - validation may fail
- TLSv1: Send ClientKeyExchange
- TLSv1: Send CertificateVerify
- TLSv1: Send ChangeCipherSpec
- TLSv1: Record Layer - New write cipher suite 0x002f
- TLSv1: Send Finished
- TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
- SSL: 1117 bytes left to be sent out (of total 1117 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:86:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:86:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- wlan0: Setting authentication timeout: 2 sec 0 usec
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:77:86:42
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 1
- wlan0: * address 78:19:f7:77:86:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 78:19:f7:77:86:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:86:42 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:77:86:42 reason=1
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=78:19:f7:77:86:42
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (25 BSSes)
- wlan0: BSS: Start scan result update 3
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-41
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:46:c2 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:46:c2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:46:c2
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:78:46:c2 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:78:46:c2
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- * prev_bssid=78:19:f7:77:86:42
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:46:c2
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:46:c2 status_code=1
- wlan0: SME: Association with 78:19:f7:78:46:c2 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:46:c2 reason_code=3)
- Added BSSID 78:19:f7:78:46:c2 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:46:c2 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:78:46:c2
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (28 BSSes)
- wlan0: BSS: Start scan result update 4
- wlan0: BSS: Add new id 27 BSSID 78:19:f7:77:84:c0 SSID 'WPI-Guest'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:93:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:93:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:93:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:77:93:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:77:93:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:77:93:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:77:93:42 status_code=1
- wlan0: SME: Association with 78:19:f7:77:93:42 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:77:93:42 reason_code=3)
- Added BSSID 78:19:f7:77:93:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:93:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:77:93:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 3
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (28 BSSes)
- wlan0: BSS: Start scan result update 5
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-76
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:ee:02 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:ee:02 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:ee:02
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:78:ee:02 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:78:ee:02
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:ee:02
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:ee:02 status_code=1
- wlan0: SME: Association with 78:19:f7:78:ee:02 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:ee:02 reason_code=3)
- Added BSSID 78:19:f7:78:ee:02 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:ee:02 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:78:ee:02
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 4
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (29 BSSes)
- wlan0: BSS: Start scan result update 6
- wlan0: BSS: Add new id 28 BSSID 78:19:f7:77:ee:c2 SSID 'WPI-Wireless'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:79:6d:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:6d:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:79:6d:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:79:6d:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:79:6d:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:79:6d:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:79:6d:42 status_code=1
- wlan0: SME: Association with 78:19:f7:79:6d:42 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:79:6d:42 reason_code=3)
- Added BSSID 78:19:f7:79:6d:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:79:6d:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:79:6d:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 5
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (29 BSSes)
- wlan0: BSS: Start scan result update 7
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-43
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:43:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:43:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:43:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:78:43:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:78:43:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: New station 78:19:f7:78:43:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2437 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:78:43:42
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:78:43:42
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- TLSv1: Selected cipher suite: 0x0000
- TLSv1: Record Layer - New write cipher suite 0x0000
- TLSv1: Record Layer - New read cipher suite 0x0000
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:78:43:42
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=49):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 35 31 36 2f 31 2c 70 6f 72 74 69 64 3d 32 30 35 516/1,portid=205
- 36 6
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:43:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:43:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 2666 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:43:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 1652 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:43:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 638 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:43:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=648) - Flags 0x80
- SSL: TLS Message Length: 3680
- TLSv1: Received content type 22 version 3.1 length 42
- TLSv1: Received ServerHello
- TLSv1: Using TLS v1.0
- TLSv1: Selected cipher suite: 0x002f
- TLSv1: Received content type 22 version 3.1 length 3278
- TLSv1: Received Certificate (certificate_list len 3274)
- TLSv1: Certificate 0 (len 1511)
- X509: Extension: extnID=2.5.29.37 critical=0
- X509: Extension: extnID=2.5.29.37 critical=0
- TLSv1: Certificate 1 (len 1754)
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- X509: Validate certificate chain
- X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Found issuer from the list of trusted certificates
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Trusted certificate found to complete the chain
- X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- X509: Certificate chain valid
- TLSv1: Received content type 22 version 3.1 length 345
- TLSv1: Received CertificateRequest
- TLSv1: Received ServerHelloDone
- TLSv1: Send Certificate
- TLSv1: Full client certificate chain not configured - validation may fail
- TLSv1: Send ClientKeyExchange
- TLSv1: Send CertificateVerify
- TLSv1: Send ChangeCipherSpec
- TLSv1: Record Layer - New write cipher suite 0x002f
- TLSv1: Send Finished
- TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
- SSL: 1117 bytes left to be sent out (of total 1117 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:43:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:43:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- wlan0: Setting authentication timeout: 2 sec 0 usec
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:43:42
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 1
- wlan0: * address 78:19:f7:78:43:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 78:19:f7:78:43:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:43:42 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:78:43:42 reason=1
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=78:19:f7:78:43:42
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (29 BSSes)
- wlan0: BSS: Start scan result update 8
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-42 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:87:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:87:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:87:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:77:87:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:77:87:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- * prev_bssid=78:19:f7:78:43:42
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:77:87:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:77:87:42 status_code=1
- wlan0: SME: Association with 78:19:f7:77:87:42 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:77:87:42 reason_code=3)
- Added BSSID 78:19:f7:77:87:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:87:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:77:87:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 6
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (29 BSSes)
- wlan0: BSS: Start scan result update 9
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-42 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-76
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-81
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:84:c2 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:84:c2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:84:c2 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:84:c2
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: MLME event 37; timeout with 78:19:f7:77:84:c2
- wlan0: Event 14 received on interface wlan0
- wlan0: SME: Authentication timed out
- Added BSSID 78:19:f7:77:84:c2 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:84:c2 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (28 BSSes)
- wlan0: BSS: Start scan result update 10
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-40 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 9: 78:19:f7:77:ee:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:ee:c2 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:ee:c2 bssid: 00:00:00:00:00:00 pending: 78:19:f7:77:84:c2 wpa_state: AUTHENTICATING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:ee:c2 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: AUTHENTICATING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:ee:c2
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: MLME event 37; timeout with 78:19:f7:77:ee:c2
- wlan0: Event 14 received on interface wlan0
- wlan0: SME: Authentication timed out
- Added BSSID 78:19:f7:77:ee:c2 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:ee:c2 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: Authentication with 78:19:f7:77:ee:c2 timed out.
- BSSID 78:19:f7:77:ee:c2 blacklist count incremented to 3
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: AUTHENTICATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (28 BSSes)
- wlan0: BSS: Start scan result update 11
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-40 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-74
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 10: 78:19:f7:78:ae:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-87
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:ae:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 1 selected: 78:19:f7:78:ae:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:ae:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:ae:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37; timeout with 78:19:f7:78:ae:42
- wlan0: Event 14 received on interface wlan0
- wlan0: SME: Authentication timed out
- Added BSSID 78:19:f7:78:ae:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:ae:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (27 BSSes)
- wlan0: BSS: Start scan result update 12
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-40 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-74
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 10: 78:19:f7:78:d0:82 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-90
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:d0:82 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:d0:82 bssid: 00:00:00:00:00:00 pending: 78:19:f7:78:ae:42 wpa_state: AUTHENTICATING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:d0:82 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: AUTHENTICATING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:d0:82
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37; timeout with 78:19:f7:78:d0:82
- wlan0: Event 14 received on interface wlan0
- wlan0: SME: Authentication timed out
- Added BSSID 78:19:f7:78:d0:82 into blacklist
- wlan0: Setting scan request: 0 sec 100000 usec
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (26 BSSes)
- wlan0: BSS: Start scan result update 13
- wlan0: BSS: Expire BSS 28 due to no match in scan
- wlan0: BSS: Remove id 28 BSSID 78:19:f7:77:ee:c2 SSID 'WPI-Wireless'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
- wlan0: skip - blacklisted (count=3 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-73
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 8: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 10: 00:30:44:0a:55:8e ssid='archieLAN' wpa_ie_len=0 rsn_ie_len=0 caps=0x421 level=-59
- wlan0: skip - SSID mismatch
- wlan0: 11: 78:19:f7:77:86:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-47
- wlan0: skip - SSID mismatch
- wlan0: 12: 78:19:f7:78:46:c0 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-45
- wlan0: skip - SSID mismatch
- wlan0: 13: 1c:7e:e5:3b:bb:de ssid='dlink' wpa_ie_len=0 rsn_ie_len=0 caps=0x421 level=-52 wps
- wlan0: skip - SSID mismatch
- wlan0: 14: 78:19:f7:79:95:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-53
- wlan0: skip - SSID mismatch
- wlan0: 15: 00:30:bd:c5:7e:28 ssid='WLAN' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-33
- wlan0: skip - SSID mismatch
- wlan0: 16: 78:19:f7:78:ee:00 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-73
- wlan0: skip - SSID mismatch
- wlan0: 17: 78:19:f7:77:87:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-74
- wlan0: skip - SSID mismatch
- wlan0: 18: 58:6d:8f:29:ad:5f ssid='Newton's Balls' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-77
- wlan0: skip - SSID mismatch
- wlan0: 19: 78:19:f7:77:93:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-79
- wlan0: skip - SSID mismatch
- wlan0: 20: 78:19:f7:79:6d:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-80
- wlan0: skip - SSID mismatch
- wlan0: 21: 78:19:f7:78:43:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-84
- wlan0: skip - SSID mismatch
- wlan0: 22: 78:19:f7:77:ee:c0 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-87
- wlan0: skip - SSID mismatch
- wlan0: 23: 78:19:f7:78:d0:80 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-86
- wlan0: skip - SSID mismatch
- wlan0: 24: 78:19:f7:77:84:c0 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-88
- wlan0: skip - SSID mismatch
- wlan0: 25: 78:19:f7:78:ae:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-89
- wlan0: skip - SSID mismatch
- wlan0: No APs found - clear blacklist and try again
- Removed BSSID 78:19:f7:78:d0:82 from blacklist (clear)
- Removed BSSID 78:19:f7:78:ae:42 from blacklist (clear)
- Removed BSSID 78:19:f7:77:ee:c2 from blacklist (clear)
- Removed BSSID 78:19:f7:77:84:c2 from blacklist (clear)
- Removed BSSID 78:19:f7:77:87:42 from blacklist (clear)
- Removed BSSID 78:19:f7:78:43:42 from blacklist (clear)
- Removed BSSID 78:19:f7:79:6d:42 from blacklist (clear)
- Removed BSSID 78:19:f7:78:ee:02 from blacklist (clear)
- Removed BSSID 78:19:f7:77:93:42 from blacklist (clear)
- Removed BSSID 78:19:f7:78:46:c2 from blacklist (clear)
- Removed BSSID 78:19:f7:77:86:42 from blacklist (clear)
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 78:19:f7:79:95:42 from blacklist (clear)
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:86:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:86:42 bssid: 00:00:00:00:00:00 pending: 78:19:f7:78:d0:82 wpa_state: AUTHENTICATING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: AUTHENTICATING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:86:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:77:86:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:77:86:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:77:86:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:77:86:42 status_code=1
- wlan0: SME: Association with 78:19:f7:77:86:42 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:77:86:42 reason_code=3)
- Added BSSID 78:19:f7:77:86:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:86:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:77:86:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- Added BSSID 00:00:00:00:00:00 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (26 BSSes)
- wlan0: BSS: Start scan result update 14
- wlan0: BSS: Expire BSS 10 due to no match in scan
- wlan0: BSS: Remove id 10 BSSID 78:19:f7:78:ae:42 SSID 'WPI-Wireless'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:46:c2 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:46:c2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:46:c2
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:78:46:c2 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:78:46:c2
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:46:c2
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:46:c2 status_code=1
- wlan0: SME: Association with 78:19:f7:78:46:c2 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:46:c2 reason_code=3)
- Added BSSID 78:19:f7:78:46:c2 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:46:c2 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:78:46:c2
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 3
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (26 BSSes)
- wlan0: BSS: Start scan result update 15
- wlan0: BSS: Expire BSS 26 due to no match in scan
- wlan0: BSS: Remove id 26 BSSID 78:19:f7:78:d0:82 SSID 'WPI-Wireless'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:79:95:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:95:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:79:95:42
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:79:95:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:79:95:42
- * freq=2462
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: New station 78:19:f7:79:95:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2462 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:79:95:42
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:79:95:42
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- TLSv1: Selected cipher suite: 0x0000
- TLSv1: Record Layer - New write cipher suite 0x0000
- TLSv1: Record Layer - New read cipher suite 0x0000
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:79:95:42
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=49):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 33 35 31 2f 31 2c 70 6f 72 74 69 64 3d 32 32 35 351/1,portid=225
- 35 5
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:95:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:95:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 2666 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:95:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 1652 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:95:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 638 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:95:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=648) - Flags 0x80
- SSL: TLS Message Length: 3680
- TLSv1: Received content type 22 version 3.1 length 42
- TLSv1: Received ServerHello
- TLSv1: Using TLS v1.0
- TLSv1: Selected cipher suite: 0x002f
- TLSv1: Received content type 22 version 3.1 length 3278
- TLSv1: Received Certificate (certificate_list len 3274)
- TLSv1: Certificate 0 (len 1511)
- X509: Extension: extnID=2.5.29.37 critical=0
- X509: Extension: extnID=2.5.29.37 critical=0
- TLSv1: Certificate 1 (len 1754)
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- X509: Validate certificate chain
- X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Found issuer from the list of trusted certificates
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Trusted certificate found to complete the chain
- X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- X509: Certificate chain valid
- TLSv1: Received content type 22 version 3.1 length 345
- TLSv1: Received CertificateRequest
- TLSv1: Received ServerHelloDone
- TLSv1: Send Certificate
- TLSv1: Full client certificate chain not configured - validation may fail
- TLSv1: Send ClientKeyExchange
- TLSv1: Send CertificateVerify
- TLSv1: Send ChangeCipherSpec
- TLSv1: Record Layer - New write cipher suite 0x002f
- TLSv1: Send Finished
- TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
- SSL: 1117 bytes left to be sent out (of total 1117 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:95:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:95:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- wlan0: Setting authentication timeout: 2 sec 0 usec
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:79:95:42
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 1
- wlan0: * address 78:19:f7:79:95:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 78:19:f7:79:95:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:79:95:42 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:79:95:42 reason=1
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=78:19:f7:79:95:42
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (24 BSSes)
- wlan0: BSS: Start scan result update 16
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 4: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:43:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:43:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:43:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:78:43:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:78:43:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- * prev_bssid=78:19:f7:79:95:42
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:43:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 13 received on interface wlan0
- wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:43:42 status_code=1
- wlan0: SME: Association with 78:19:f7:78:43:42 failed: status code 1
- wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:43:42 reason_code=3)
- Added BSSID 78:19:f7:78:43:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:43:42 blacklist count incremented to 2
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: State: ASSOCIATING -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 3
- wlan0: * address 78:19:f7:78:43:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- BSSID 00:00:00:00:00:00 blacklist count incremented to 4
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=00:00:00:00:00:00
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (24 BSSes)
- wlan0: BSS: Start scan result update 17
- wlan0: BSS: Expire BSS 25 due to no match in scan
- wlan0: BSS: Remove id 25 BSSID 78:19:f7:78:d0:80 SSID 'WPI-Guest'
- wlan0: BSS: Expire BSS 24 due to no match in scan
- wlan0: BSS: Remove id 24 BSSID 78:19:f7:78:ae:40 SSID 'WPI-Guest'
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-74
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:78:ee:02 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:ee:02 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:78:ee:02
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:78:ee:02 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:78:ee:02
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: New station 78:19:f7:78:ee:02
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2412 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:78:ee:02
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:78:ee:02
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- TLSv1: Selected cipher suite: 0x0000
- TLSv1: Record Layer - New write cipher suite 0x0000
- TLSv1: Record Layer - New read cipher suite 0x0000
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:78:ee:02
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=49):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 33 35 30 2f 31 2c 70 6f 72 74 69 64 3d 32 31 36 350/1,portid=216
- 34 4
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:ee:02
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:ee:02
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 2666 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:ee:02
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 1652 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:ee:02
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 638 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:ee:02
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=648) - Flags 0x80
- SSL: TLS Message Length: 3680
- TLSv1: Received content type 22 version 3.1 length 42
- TLSv1: Received ServerHello
- TLSv1: Using TLS v1.0
- TLSv1: Selected cipher suite: 0x002f
- TLSv1: Received content type 22 version 3.1 length 3278
- TLSv1: Received Certificate (certificate_list len 3274)
- TLSv1: Certificate 0 (len 1511)
- X509: Extension: extnID=2.5.29.37 critical=0
- X509: Extension: extnID=2.5.29.37 critical=0
- TLSv1: Certificate 1 (len 1754)
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- X509: Validate certificate chain
- X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Found issuer from the list of trusted certificates
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Trusted certificate found to complete the chain
- X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- X509: Certificate chain valid
- TLSv1: Received content type 22 version 3.1 length 345
- TLSv1: Received CertificateRequest
- TLSv1: Received ServerHelloDone
- TLSv1: Send Certificate
- TLSv1: Full client certificate chain not configured - validation may fail
- TLSv1: Send ClientKeyExchange
- TLSv1: Send CertificateVerify
- TLSv1: Send ChangeCipherSpec
- TLSv1: Record Layer - New write cipher suite 0x002f
- TLSv1: Send Finished
- TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
- SSL: 1117 bytes left to be sent out (of total 1117 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:78:ee:02
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:78:ee:02
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- wlan0: Setting authentication timeout: 2 sec 0 usec
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:78:ee:02
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 1
- wlan0: * address 78:19:f7:78:ee:02
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 78:19:f7:78:ee:02 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:78:ee:02 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:78:ee:02 reason=1
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=78:19:f7:78:ee:02
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (23 BSSes)
- wlan0: BSS: Start scan result update 18
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-51
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-73
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:87:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:87:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:87:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:77:87:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:77:87:42
- * freq=2412
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- * prev_bssid=78:19:f7:78:ee:02
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: New station 78:19:f7:77:87:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2412 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:77:87:42
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:77:87:42
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- TLSv1: Selected cipher suite: 0x0000
- TLSv1: Record Layer - New write cipher suite 0x0000
- TLSv1: Record Layer - New read cipher suite 0x0000
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:77:87:42
- wlan0: RX EAPOL from 78:19:f7:77:87:42
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=48):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 36 30 2f 31 2c 70 6f 72 74 69 64 3d 32 32 31 31 60/1,portid=2211
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:87:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:87:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:87:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:87:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 2666 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:87:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:87:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 1652 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:87:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:87:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 638 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:87:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:87:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=648) - Flags 0x80
- SSL: TLS Message Length: 3680
- TLSv1: Received content type 22 version 3.1 length 42
- TLSv1: Received ServerHello
- TLSv1: Using TLS v1.0
- TLSv1: Selected cipher suite: 0x002f
- TLSv1: Received content type 22 version 3.1 length 3278
- TLSv1: Received Certificate (certificate_list len 3274)
- TLSv1: Certificate 0 (len 1511)
- X509: Extension: extnID=2.5.29.37 critical=0
- X509: Extension: extnID=2.5.29.37 critical=0
- TLSv1: Certificate 1 (len 1754)
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- X509: Validate certificate chain
- X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Found issuer from the list of trusted certificates
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Trusted certificate found to complete the chain
- X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- X509: Certificate chain valid
- TLSv1: Received content type 22 version 3.1 length 345
- TLSv1: Received CertificateRequest
- TLSv1: Received ServerHelloDone
- TLSv1: Send Certificate
- TLSv1: Full client certificate chain not configured - validation may fail
- TLSv1: Send ClientKeyExchange
- TLSv1: Send CertificateVerify
- TLSv1: Send ChangeCipherSpec
- TLSv1: Record Layer - New write cipher suite 0x002f
- TLSv1: Send Finished
- TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
- SSL: 1117 bytes left to be sent out (of total 1117 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:87:42
- EAPOL: SUPP_BE entering state RECEIVE
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:77:87:42
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 1
- wlan0: * address 78:19:f7:77:87:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 78:19:f7:77:87:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:87:42 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:77:87:42 reason=1
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=78:19:f7:77:87:42
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (21 BSSes)
- wlan0: BSS: Start scan result update 19
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
- wlan0: skip - SSID mismatch
- wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:77:93:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:93:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:77:93:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:77:93:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:77:93:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- * prev_bssid=78:19:f7:77:87:42
- nl80211: Association request send successfully
- nl80211: Event message available
- nl80211: New station 78:19:f7:77:93:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2437 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:77:93:42
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:77:93:42
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- TLSv1: Selected cipher suite: 0x0000
- TLSv1: Record Layer - New write cipher suite 0x0000
- TLSv1: Record Layer - New read cipher suite 0x0000
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:77:93:42
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=49):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 33 36 33 2f 31 2c 70 6f 72 74 69 64 3d 32 35 34 363/1,portid=254
- 30 0
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:93:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:93:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 2666 bytes more input data
- SSL: Building ACK (type=13 id=3 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:93:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 1652 bytes more input data
- SSL: Building ACK (type=13 id=4 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:93:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1024) - Flags 0xc0
- SSL: TLS Message Length: 3680
- SSL: Need 638 bytes more input data
- SSL: Building ACK (type=13 id=5 ver=0)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:93:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=648) - Flags 0x80
- SSL: TLS Message Length: 3680
- TLSv1: Received content type 22 version 3.1 length 42
- TLSv1: Received ServerHello
- TLSv1: Using TLS v1.0
- TLSv1: Selected cipher suite: 0x002f
- TLSv1: Received content type 22 version 3.1 length 3278
- TLSv1: Received Certificate (certificate_list len 3274)
- TLSv1: Certificate 0 (len 1511)
- X509: Extension: extnID=2.5.29.37 critical=0
- X509: Extension: extnID=2.5.29.37 critical=0
- TLSv1: Certificate 1 (len 1754)
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- X509: Validate certificate chain
- X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Found issuer from the list of trusted certificates
- X509: Certificate Digest matches with calculated tbsCertificate hash
- X509: Trusted certificate found to complete the chain
- X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- X509: Certificate chain valid
- TLSv1: Received content type 22 version 3.1 length 345
- TLSv1: Received CertificateRequest
- TLSv1: Received ServerHelloDone
- TLSv1: Send Certificate
- TLSv1: Full client certificate chain not configured - validation may fail
- TLSv1: Send ClientKeyExchange
- TLSv1: Send CertificateVerify
- TLSv1: Send ChangeCipherSpec
- TLSv1: Record Layer - New write cipher suite 0x002f
- TLSv1: Send Finished
- TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
- SSL: 1117 bytes left to be sent out (of total 1117 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:77:93:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:77:93:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: EAP entering state FAILURE
- wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed unsuccessfully
- wlan0: Setting authentication timeout: 2 sec 0 usec
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: Delete station 78:19:f7:77:93:42
- nl80211: Event message available
- nl80211: MLME event 39
- wlan0: Event 12 received on interface wlan0
- wlan0: Deauthentication notification
- wlan0: * reason 1
- wlan0: * address 78:19:f7:77:93:42
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 78:19:f7:77:93:42 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID 78:19:f7:77:93:42 blacklist count incremented to 2
- wlan0: Not rescheduling scan to ensure that specific SSID scans occur
- wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:77:93:42 reason=1
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=78:19:f7:77:93:42
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Event message available
- nl80211: Ignore disconnect event when using userspace SME
- wlan0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- wlan0: Include wildcard SSID in the scan request
- wlan0: Starting AP scan for specific SSID(s)
- wlan0: Optimize scan based on previously generated frequency list
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Event message available
- nl80211: Scan trigger
- nl80211: Event message available
- nl80211: New scan results available
- wlan0: Event 3 received on interface wlan0
- nl80211: Received scan results (22 BSSes)
- wlan0: BSS: Start scan result update 20
- wlan0: New scan results available
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-43
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 3: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 4: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 5: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 6: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 7: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-81
- wlan0: selected based on RSN IE
- wlan0: selected BSS 78:19:f7:79:6d:42 ssid='WPI-Wireless'
- wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:6d:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Authenticate (ifindex=18)
- * bssid=78:19:f7:79:6d:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: MLME event 37
- wlan0: Event 11 received on interface wlan0
- wlan0: SME: Authentication response: peer=78:19:f7:79:6d:42 auth_type=0 status_code=0
- wlan0: Trying to associate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- nl80211: Associate (ifindex=18)
- * bssid=78:19:f7:79:6d:42
- * freq=2437
- * SSID - hexdump_ascii(len=12):
- 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
- * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- * pairwise=0xfac04
- * group=0xfac04
- * prev_bssid=78:19:f7:77:93:42
- nl80211: Association request send successfully
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- wlan0: Event 5 received on interface wlan0
- nl80211: Event message available
- nl80211: New station 78:19:f7:79:6d:42
- nl80211: Event message available
- nl80211: MLME event 38
- wlan0: Event 0 received on interface wlan0
- wlan0: Association info event
- resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: freq=2437 MHz
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=78:19:f7:79:6d:42
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 78:19:f7:79:6d:42
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
- TLSv1: Selected cipher suite: 0x0000
- TLSv1: Record Layer - New write cipher suite 0x0000
- TLSv1: Record Layer - New read cipher suite 0x0000
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- nl80211: Event message available
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=78:19:f7:79:6d:42
- wlan0: RX EAPOL from 78:19:f7:79:6d:42
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=48):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
- 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
- 35 38 2f 31 2c 70 6f 72 74 69 64 3d 32 32 39 36 58/1,portid=2296
- EAP: using real identity - hexdump_ascii(len=19):
- 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
- 2d 30 39 -09
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:6d:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:6d:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
- EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
- TLS: using phase1 config options
- TLSv1: Converting PEM format certificate into DER format
- X509: Extension: extnID=2.5.29.14 critical=0
- X509: Extension: extnID=2.5.29.35 critical=0
- X509: Extension: extnID=2.5.29.19 critical=0
- X509: BasicConstraints - cA=255
- TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
- PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
- Trying to parse PKCS #1 encoded RSA private key
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-TLS: Start
- TLSv1: Send ClientHello
- SSL: 56 bytes left to be sent out (of total 56 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=78:19:f7:79:6d:42
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 78:19:f7:79:6d:42
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
Add Comment
Please, Sign In to add comment