Guest User

Untitled

a guest
Dec 14th, 2018
131
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 200.79 KB | None | 0 0
  1. wpa_supplicant v2.0-devel
  2. random: Trying to read entropy from /dev/random
  3. Initializing interface 'wlan0' conf '/var/run/wpa_supplicant-wlan0.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
  4. Configuration file '/var/run/wpa_supplicant-wlan0.conf' -> '/var/run/wpa_supplicant-wlan0.conf'
  5. Reading configuration file '/var/run/wpa_supplicant-wlan0.conf'
  6. ctrl_interface='/var/run/wpa_supplicant-wlan0'
  7. Priority group 0
  8. id=0 ssid='WPI-Wireless'
  9. nl80211: interface wlan0 in phy phy0
  10. nl80211: Set mode ifindex 18 iftype 2 (STATION)
  11. netlink: Operstate: linkmode=1, operstate=5
  12. nl80211: Using driver-based off-channel TX
  13. nl80211: TDLS supported
  14. nl80211: TDLS external setup
  15. nl80211: Register frame command failed (type=208): ret=-149 (Operation already in progress)
  16. nl80211: Register frame match - hexdump(len=2): 08 01
  17. nl80211: Failed to register Action frame processing - ignore for now
  18. nl80211: driver param='(null)'
  19. nl80211: Regulatory information - country=US
  20. nl80211: 2402-2472 @ 40 MHz
  21. nl80211: 5170-5250 @ 40 MHz
  22. nl80211: 5250-5330 @ 40 MHz
  23. nl80211: 5490-5600 @ 40 MHz
  24. nl80211: 5650-5710 @ 40 MHz
  25. nl80211: 5735-5835 @ 40 MHz
  26. nl80211: Added 802.11b mode based on 802.11g information
  27. wlan0: Own MAC address: 84:1b:5e:7a:77:77
  28. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  29. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  30. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  31. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  32. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  33. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  34. wlan0: RSN: flushing PMKID list in the driver
  35. nl80211: Flush PMKIDs
  36. wlan0: Setting scan request: 0 sec 100000 usec
  37. WPS: Set UUID for interface wlan0
  38. WPS: UUID based on MAC address - hexdump(len=16): 68 16 69 83 8e b0 57 9b a6 66 28 49 ff 04 59 7a
  39. EAPOL: SUPP_PAE entering state DISCONNECTED
  40. EAPOL: Supplicant port status: Unauthorized
  41. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  42. EAPOL: SUPP_BE entering state INITIALIZE
  43. EAP: EAP entering state DISABLED
  44. EAPOL: Supplicant port status: Unauthorized
  45. EAPOL: Supplicant port status: Unauthorized
  46. Using existing control interface directory.
  47. ctrl_iface bind(PF_UNIX) failed: Address already in use
  48. ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
  49. Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant-wlan0/wlan0'
  50. wlan0: Added interface wlan0
  51. wlan0: State: DISCONNECTED -> SCANNING
  52. Scan SSID - hexdump_ascii(len=12):
  53. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  54. wlan0: Include wildcard SSID in the scan request
  55. wlan0: Starting AP scan for specific SSID(s)
  56. Scan requested (ret=0) - scan timeout 10 seconds
  57. nl80211: Event message available
  58. nl80211: Scan trigger
  59. nl80211: Event message available
  60. nl80211: New scan results available
  61. wlan0: Event 3 received on interface wlan0
  62. nl80211: Associated on 2412 MHz
  63. nl80211: Associated with 78:19:f7:78:ae:42
  64. nl80211: Received scan results (26 BSSes)
  65. nl80211: Scan results indicate BSS status with 78:19:f7:78:ae:42 as associated
  66. nl80211: Local state (not associated) does not match with BSS state
  67. nl80211: Clear possible state mismatch (78:19:f7:78:ae:42)
  68. wlan0: BSS: Start scan result update 1
  69. wlan0: BSS: Add new id 0 BSSID 00:23:69:5a:a7:4e SSID ''
  70. wlan0: BSS: Add new id 1 BSSID 78:19:f7:79:95:42 SSID 'WPI-Wireless'
  71. wlan0: BSS: Add new id 2 BSSID 78:19:f7:77:86:42 SSID 'WPI-Wireless'
  72. wlan0: BSS: Add new id 3 BSSID 78:19:f7:78:46:c2 SSID 'WPI-Wireless'
  73. wlan0: BSS: Add new id 4 BSSID 78:19:f7:78:ee:02 SSID 'WPI-Wireless'
  74. wlan0: BSS: Add new id 5 BSSID 78:19:f7:77:93:42 SSID 'WPI-Wireless'
  75. wlan0: BSS: Add new id 6 BSSID 78:19:f7:77:87:42 SSID 'WPI-Wireless'
  76. wlan0: BSS: Add new id 7 BSSID 78:19:f7:78:43:42 SSID 'WPI-Wireless'
  77. wlan0: BSS: Add new id 8 BSSID 78:19:f7:79:6d:42 SSID 'WPI-Wireless'
  78. wlan0: BSS: Add new id 9 BSSID 78:19:f7:77:84:c2 SSID 'WPI-Wireless'
  79. wlan0: BSS: Add new id 10 BSSID 78:19:f7:78:ae:42 SSID 'WPI-Wireless'
  80. wlan0: BSS: Add new id 11 BSSID 78:19:f7:79:95:40 SSID 'WPI-Guest'
  81. wlan0: BSS: Add new id 12 BSSID 1c:7e:e5:3b:bb:de SSID 'dlink'
  82. wlan0: BSS: Add new id 13 BSSID 00:30:44:0a:55:8e SSID 'archieLAN'
  83. wlan0: BSS: Add new id 14 BSSID 78:19:f7:78:46:c0 SSID 'WPI-Guest'
  84. wlan0: BSS: Add new id 15 BSSID 78:19:f7:77:86:40 SSID 'WPI-Guest'
  85. wlan0: BSS: Add new id 16 BSSID 00:30:bd:c5:7e:28 SSID 'WLAN'
  86. wlan0: BSS: Add new id 17 BSSID 78:19:f7:78:ee:00 SSID 'WPI-Guest'
  87. wlan0: BSS: Add new id 18 BSSID 78:19:f7:77:93:40 SSID 'WPI-Guest'
  88. wlan0: BSS: Add new id 19 BSSID 78:19:f7:78:43:40 SSID 'WPI-Guest'
  89. wlan0: BSS: Add new id 20 BSSID 58:6d:8f:29:ad:5f SSID 'Newton's Balls'
  90. wlan0: BSS: Add new id 21 BSSID 78:19:f7:77:87:40 SSID 'WPI-Guest'
  91. wlan0: BSS: Add new id 22 BSSID 78:19:f7:79:6d:40 SSID 'WPI-Guest'
  92. wlan0: BSS: Add new id 23 BSSID 78:19:f7:77:ee:c0 SSID 'WPI-Guest'
  93. wlan0: BSS: Add new id 24 BSSID 78:19:f7:78:ae:40 SSID 'WPI-Guest'
  94. wlan0: BSS: Add new id 25 BSSID 78:19:f7:78:d0:80 SSID 'WPI-Guest'
  95. wlan0: New scan results available
  96. wlan0: Selecting BSS from priority group 0
  97. wlan0: 0: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
  98. wlan0: skip - SSID mismatch
  99. wlan0: 1: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-51
  100. wlan0: selected based on RSN IE
  101. wlan0: selected BSS 78:19:f7:79:95:42 ssid='WPI-Wireless'
  102. wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:95:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  103. wlan0: Automatic auth_alg selection: 0x1
  104. wlan0: RSN: using IEEE 802.11i/D9.0
  105. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  106. wlan0: WPA: clearing AP WPA IE
  107. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  108. wlan0: WPA: using GTK CCMP
  109. wlan0: WPA: using PTK CCMP
  110. wlan0: WPA: using KEY_MGMT 802.1X
  111. wlan0: WPA: not using MGMT group cipher
  112. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  113. wlan0: Cancelling scan request
  114. wlan0: SME: Trying to authenticate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
  115. wlan0: No keys have been configured - skip key clearing
  116. wlan0: State: SCANNING -> AUTHENTICATING
  117. EAPOL: External notification - EAP success=0
  118. EAPOL: Supplicant port status: Unauthorized
  119. EAPOL: External notification - EAP fail=0
  120. EAPOL: Supplicant port status: Unauthorized
  121. EAPOL: External notification - portControl=Auto
  122. EAPOL: Supplicant port status: Unauthorized
  123. nl80211: Authenticate (ifindex=18)
  124. * bssid=78:19:f7:79:95:42
  125. * freq=2462
  126. * SSID - hexdump_ascii(len=12):
  127. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  128. * IEs - hexdump(len=0): [NULL]
  129. * Auth Type 0
  130. nl80211: Authentication request send successfully
  131. RSN: Ignored PMKID candidate without preauth flag
  132. RSN: Ignored PMKID candidate without preauth flag
  133. RSN: Ignored PMKID candidate without preauth flag
  134. RSN: Ignored PMKID candidate without preauth flag
  135. RSN: Ignored PMKID candidate without preauth flag
  136. RSN: Ignored PMKID candidate without preauth flag
  137. RSN: Ignored PMKID candidate without preauth flag
  138. RSN: Ignored PMKID candidate without preauth flag
  139. RSN: Ignored PMKID candidate without preauth flag
  140. RSN: Ignored PMKID candidate without preauth flag
  141. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  142. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  143. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  144. wlan0: Event 5 received on interface wlan0
  145. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  146. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  147. wlan0: Event 5 received on interface wlan0
  148. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  149. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  150. wlan0: Event 5 received on interface wlan0
  151. nl80211: Event message available
  152. nl80211: MLME event 39
  153. wlan0: Event 12 received on interface wlan0
  154. wlan0: Deauthentication notification
  155. wlan0: * reason 2
  156. wlan0: * address 78:19:f7:78:ae:42
  157. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  158. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  159. Added BSSID 78:19:f7:79:95:42 into blacklist
  160. wlan0: Another BSS in this ESS has been seen; try it next
  161. BSSID 78:19:f7:79:95:42 blacklist count incremented to 2
  162. wlan0: Setting scan request: 0 sec 100000 usec
  163. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:79:95:42 reason=2
  164. wlan0: Disconnect event - remove keys
  165. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  166. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  167. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  168. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  169. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  170. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  171. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  172. addr=00:00:00:00:00:00
  173. wlan0: State: AUTHENTICATING -> DISCONNECTED
  174. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  175. netlink: Operstate: linkmode=-1, operstate=5
  176. EAPOL: External notification - portEnabled=0
  177. EAPOL: Supplicant port status: Unauthorized
  178. EAPOL: External notification - portValid=0
  179. EAPOL: Supplicant port status: Unauthorized
  180. wlan0: SME: Allow pending authentication to proceed after disconnection event
  181. wlan0: State: DISCONNECTED -> AUTHENTICATING
  182. EAPOL: disable timer tick
  183. EAPOL: Supplicant port status: Unauthorized
  184. nl80211: Event message available
  185. nl80211: Ignore disconnect event when using userspace SME
  186. nl80211: Event message available
  187. nl80211: Delete station 78:19:f7:78:ae:42
  188. nl80211: Event message available
  189. nl80211: MLME event 37
  190. wlan0: Event 11 received on interface wlan0
  191. wlan0: SME: Authentication response: peer=78:19:f7:79:95:42 auth_type=0 status_code=0
  192. wlan0: Trying to associate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
  193. wlan0: State: AUTHENTICATING -> ASSOCIATING
  194. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  195. netlink: Operstate: linkmode=-1, operstate=5
  196. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  197. nl80211: Associate (ifindex=18)
  198. * bssid=78:19:f7:79:95:42
  199. * freq=2462
  200. * SSID - hexdump_ascii(len=12):
  201. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  202. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  203. * pairwise=0xfac04
  204. * group=0xfac04
  205. nl80211: Association request send successfully
  206. nl80211: Event message available
  207. nl80211: Delete station 78:19:f7:79:95:42
  208. nl80211: Event message available
  209. nl80211: MLME event 38
  210. wlan0: Event 13 received on interface wlan0
  211. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:79:95:42 status_code=1
  212. wlan0: SME: Association with 78:19:f7:79:95:42 failed: status code 1
  213. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:79:95:42 reason_code=3)
  214. BSSID 78:19:f7:79:95:42 blacklist count incremented to 3
  215. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  216. wlan0: State: ASSOCIATING -> DISCONNECTED
  217. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  218. netlink: Operstate: linkmode=-1, operstate=5
  219. nl80211: Event message available
  220. nl80211: Ignore connect event (cmd=46) when using userspace SME
  221. nl80211: Event message available
  222. nl80211: MLME event 39
  223. wlan0: Event 12 received on interface wlan0
  224. wlan0: Deauthentication notification
  225. wlan0: * reason 3
  226. wlan0: * address 78:19:f7:79:95:42
  227. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  228. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  229. Added BSSID 00:00:00:00:00:00 into blacklist
  230. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  231. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  232. wlan0: Disconnect event - remove keys
  233. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  234. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  235. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  236. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  237. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  238. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  239. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  240. addr=00:00:00:00:00:00
  241. wlan0: State: DISCONNECTED -> DISCONNECTED
  242. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  243. netlink: Operstate: linkmode=-1, operstate=5
  244. EAPOL: External notification - portEnabled=0
  245. EAPOL: Supplicant port status: Unauthorized
  246. EAPOL: External notification - portValid=0
  247. EAPOL: Supplicant port status: Unauthorized
  248. wlan0: State: DISCONNECTED -> SCANNING
  249. Scan SSID - hexdump_ascii(len=12):
  250. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  251. wlan0: Include wildcard SSID in the scan request
  252. wlan0: Starting AP scan for specific SSID(s)
  253. wlan0: Optimize scan based on previously generated frequency list
  254. Scan requested (ret=0) - scan timeout 30 seconds
  255. nl80211: Event message available
  256. nl80211: Scan trigger
  257. nl80211: Event message available
  258. nl80211: New scan results available
  259. wlan0: Event 3 received on interface wlan0
  260. nl80211: Received scan results (27 BSSes)
  261. wlan0: BSS: Start scan result update 2
  262. wlan0: BSS: Add new id 26 BSSID 78:19:f7:78:d0:82 SSID 'WPI-Wireless'
  263. wlan0: New scan results available
  264. wlan0: Selecting BSS from priority group 0
  265. wlan0: 0: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
  266. wlan0: skip - blacklisted (count=3 limit=0)
  267. wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
  268. wlan0: selected based on RSN IE
  269. wlan0: selected BSS 78:19:f7:77:86:42 ssid='WPI-Wireless'
  270. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:86:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  271. wlan0: Automatic auth_alg selection: 0x1
  272. wlan0: RSN: using IEEE 802.11i/D9.0
  273. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  274. wlan0: WPA: clearing AP WPA IE
  275. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  276. wlan0: WPA: using GTK CCMP
  277. wlan0: WPA: using PTK CCMP
  278. wlan0: WPA: using KEY_MGMT 802.1X
  279. wlan0: WPA: not using MGMT group cipher
  280. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  281. wlan0: Cancelling scan request
  282. wlan0: SME: Trying to authenticate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
  283. wlan0: No keys have been configured - skip key clearing
  284. wlan0: State: SCANNING -> AUTHENTICATING
  285. EAPOL: External notification - EAP success=0
  286. EAPOL: Supplicant port status: Unauthorized
  287. EAPOL: External notification - EAP fail=0
  288. EAPOL: Supplicant port status: Unauthorized
  289. EAPOL: External notification - portControl=Auto
  290. EAPOL: Supplicant port status: Unauthorized
  291. nl80211: Authenticate (ifindex=18)
  292. * bssid=78:19:f7:77:86:42
  293. * freq=2412
  294. * SSID - hexdump_ascii(len=12):
  295. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  296. * IEs - hexdump(len=0): [NULL]
  297. * Auth Type 0
  298. nl80211: Authentication request send successfully
  299. RSN: Ignored PMKID candidate without preauth flag
  300. RSN: Ignored PMKID candidate without preauth flag
  301. RSN: Ignored PMKID candidate without preauth flag
  302. RSN: Ignored PMKID candidate without preauth flag
  303. RSN: Ignored PMKID candidate without preauth flag
  304. RSN: Ignored PMKID candidate without preauth flag
  305. RSN: Ignored PMKID candidate without preauth flag
  306. RSN: Ignored PMKID candidate without preauth flag
  307. RSN: Ignored PMKID candidate without preauth flag
  308. RSN: Ignored PMKID candidate without preauth flag
  309. RSN: Ignored PMKID candidate without preauth flag
  310. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  311. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  312. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  313. wlan0: Event 5 received on interface wlan0
  314. nl80211: Event message available
  315. nl80211: MLME event 37
  316. wlan0: Event 11 received on interface wlan0
  317. wlan0: SME: Authentication response: peer=78:19:f7:77:86:42 auth_type=0 status_code=0
  318. wlan0: Trying to associate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
  319. wlan0: State: AUTHENTICATING -> ASSOCIATING
  320. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  321. netlink: Operstate: linkmode=-1, operstate=5
  322. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  323. nl80211: Associate (ifindex=18)
  324. * bssid=78:19:f7:77:86:42
  325. * freq=2412
  326. * SSID - hexdump_ascii(len=12):
  327. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  328. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  329. * pairwise=0xfac04
  330. * group=0xfac04
  331. nl80211: Association request send successfully
  332. nl80211: Event message available
  333. nl80211: New station 78:19:f7:77:86:42
  334. nl80211: Event message available
  335. nl80211: MLME event 38
  336. wlan0: Event 0 received on interface wlan0
  337. wlan0: Association info event
  338. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  339. wlan0: freq=2412 MHz
  340. wlan0: State: ASSOCIATING -> ASSOCIATED
  341. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  342. netlink: Operstate: linkmode=-1, operstate=5
  343. wlan0: Associated to a new BSS: BSSID=78:19:f7:77:86:42
  344. wlan0: No keys have been configured - skip key clearing
  345. wlan0: Associated with 78:19:f7:77:86:42
  346. wlan0: WPA: Association event - clear replay counter
  347. wlan0: WPA: Clear old PTK
  348. EAPOL: External notification - portEnabled=0
  349. EAPOL: Supplicant port status: Unauthorized
  350. EAPOL: External notification - portValid=0
  351. EAPOL: Supplicant port status: Unauthorized
  352. EAPOL: External notification - portEnabled=1
  353. EAPOL: SUPP_PAE entering state CONNECTING
  354. EAPOL: enable timer tick
  355. EAPOL: SUPP_BE entering state IDLE
  356. EAP: EAP entering state INITIALIZE
  357. EAP: EAP entering state IDLE
  358. wlan0: Setting authentication timeout: 10 sec 0 usec
  359. wlan0: Cancelling scan request
  360. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  361. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  362. wlan0: Event 5 received on interface wlan0
  363. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  364. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  365. wlan0: Event 5 received on interface wlan0
  366. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  367. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  368. wlan0: Event 5 received on interface wlan0
  369. nl80211: Event message available
  370. nl80211: Ignore connect event (cmd=46) when using userspace SME
  371. EAPOL: startWhen --> 0
  372. EAPOL: SUPP_PAE entering state CONNECTING
  373. EAPOL: txStart
  374. TX EAPOL: dst=78:19:f7:77:86:42
  375. wlan0: RX EAPOL from 78:19:f7:77:86:42
  376. wlan0: Setting authentication timeout: 70 sec 0 usec
  377. EAPOL: Received EAP-Packet frame
  378. EAPOL: SUPP_PAE entering state RESTART
  379. EAP: EAP entering state INITIALIZE
  380. EAP: EAP entering state IDLE
  381. EAPOL: SUPP_PAE entering state AUTHENTICATING
  382. EAPOL: SUPP_BE entering state REQUEST
  383. EAPOL: getSuppRsp
  384. EAP: EAP entering state RECEIVED
  385. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  386. EAP: EAP entering state IDENTITY
  387. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  388. EAP: EAP-Request Identity data - hexdump_ascii(len=48):
  389. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  390. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  391. 36 31 2f 31 2c 70 6f 72 74 69 64 3d 32 35 36 33 61/1,portid=2563
  392. EAP: using real identity - hexdump_ascii(len=19):
  393. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  394. 2d 30 39 -09
  395. EAP: EAP entering state SEND_RESPONSE
  396. EAP: EAP entering state IDLE
  397. EAPOL: SUPP_BE entering state RESPONSE
  398. EAPOL: txSuppRsp
  399. TX EAPOL: dst=78:19:f7:77:86:42
  400. EAPOL: SUPP_BE entering state RECEIVE
  401. wlan0: RX EAPOL from 78:19:f7:77:86:42
  402. EAPOL: Received EAP-Packet frame
  403. EAPOL: SUPP_BE entering state REQUEST
  404. EAPOL: getSuppRsp
  405. EAP: EAP entering state RECEIVED
  406. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  407. EAP: EAP entering state GET_METHOD
  408. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  409. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  410. TLS: using phase1 config options
  411. TLSv1: Converting PEM format certificate into DER format
  412. X509: Extension: extnID=2.5.29.14 critical=0
  413. X509: Extension: extnID=2.5.29.35 critical=0
  414. X509: Extension: extnID=2.5.29.19 critical=0
  415. X509: BasicConstraints - cA=255
  416. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  417. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  418. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  419. Trying to parse PKCS #1 encoded RSA private key
  420. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  421. EAP: EAP entering state METHOD
  422. SSL: Received packet(len=6) - Flags 0x20
  423. EAP-TLS: Start
  424. TLSv1: Send ClientHello
  425. SSL: 56 bytes left to be sent out (of total 56 bytes)
  426. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  427. EAP: EAP entering state SEND_RESPONSE
  428. EAP: EAP entering state IDLE
  429. EAPOL: SUPP_BE entering state RESPONSE
  430. EAPOL: txSuppRsp
  431. TX EAPOL: dst=78:19:f7:77:86:42
  432. EAPOL: SUPP_BE entering state RECEIVE
  433. wlan0: RX EAPOL from 78:19:f7:77:86:42
  434. EAPOL: Received EAP-Packet frame
  435. EAPOL: SUPP_BE entering state REQUEST
  436. EAPOL: getSuppRsp
  437. EAP: EAP entering state RECEIVED
  438. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  439. EAP: EAP entering state METHOD
  440. SSL: Received packet(len=1024) - Flags 0xc0
  441. SSL: TLS Message Length: 3680
  442. SSL: Need 2666 bytes more input data
  443. SSL: Building ACK (type=13 id=3 ver=0)
  444. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  445. EAP: EAP entering state SEND_RESPONSE
  446. EAP: EAP entering state IDLE
  447. EAPOL: SUPP_BE entering state RESPONSE
  448. EAPOL: txSuppRsp
  449. TX EAPOL: dst=78:19:f7:77:86:42
  450. EAPOL: SUPP_BE entering state RECEIVE
  451. wlan0: RX EAPOL from 78:19:f7:77:86:42
  452. EAPOL: Received EAP-Packet frame
  453. EAPOL: SUPP_BE entering state REQUEST
  454. EAPOL: getSuppRsp
  455. EAP: EAP entering state RECEIVED
  456. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  457. EAP: EAP entering state METHOD
  458. SSL: Received packet(len=1024) - Flags 0xc0
  459. SSL: TLS Message Length: 3680
  460. SSL: Need 1652 bytes more input data
  461. SSL: Building ACK (type=13 id=4 ver=0)
  462. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  463. EAP: EAP entering state SEND_RESPONSE
  464. EAP: EAP entering state IDLE
  465. EAPOL: SUPP_BE entering state RESPONSE
  466. EAPOL: txSuppRsp
  467. TX EAPOL: dst=78:19:f7:77:86:42
  468. EAPOL: SUPP_BE entering state RECEIVE
  469. wlan0: RX EAPOL from 78:19:f7:77:86:42
  470. EAPOL: Received EAP-Packet frame
  471. EAPOL: SUPP_BE entering state REQUEST
  472. EAPOL: getSuppRsp
  473. EAP: EAP entering state RECEIVED
  474. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  475. EAP: EAP entering state METHOD
  476. SSL: Received packet(len=1024) - Flags 0xc0
  477. SSL: TLS Message Length: 3680
  478. SSL: Need 638 bytes more input data
  479. SSL: Building ACK (type=13 id=5 ver=0)
  480. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  481. EAP: EAP entering state SEND_RESPONSE
  482. EAP: EAP entering state IDLE
  483. EAPOL: SUPP_BE entering state RESPONSE
  484. EAPOL: txSuppRsp
  485. TX EAPOL: dst=78:19:f7:77:86:42
  486. EAPOL: SUPP_BE entering state RECEIVE
  487. wlan0: RX EAPOL from 78:19:f7:77:86:42
  488. EAPOL: Received EAP-Packet frame
  489. EAPOL: SUPP_BE entering state REQUEST
  490. EAPOL: getSuppRsp
  491. EAP: EAP entering state RECEIVED
  492. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  493. EAP: EAP entering state METHOD
  494. SSL: Received packet(len=648) - Flags 0x80
  495. SSL: TLS Message Length: 3680
  496. TLSv1: Received content type 22 version 3.1 length 42
  497. TLSv1: Received ServerHello
  498. TLSv1: Using TLS v1.0
  499. TLSv1: Selected cipher suite: 0x002f
  500. TLSv1: Received content type 22 version 3.1 length 3278
  501. TLSv1: Received Certificate (certificate_list len 3274)
  502. TLSv1: Certificate 0 (len 1511)
  503. X509: Extension: extnID=2.5.29.37 critical=0
  504. X509: Extension: extnID=2.5.29.37 critical=0
  505. TLSv1: Certificate 1 (len 1754)
  506. X509: Extension: extnID=2.5.29.14 critical=0
  507. X509: Extension: extnID=2.5.29.35 critical=0
  508. X509: Extension: extnID=2.5.29.19 critical=0
  509. X509: BasicConstraints - cA=255
  510. X509: Validate certificate chain
  511. X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
  512. X509: Certificate Digest matches with calculated tbsCertificate hash
  513. X509: Found issuer from the list of trusted certificates
  514. X509: Certificate Digest matches with calculated tbsCertificate hash
  515. X509: Trusted certificate found to complete the chain
  516. X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  517. X509: Certificate chain valid
  518. TLSv1: Received content type 22 version 3.1 length 345
  519. TLSv1: Received CertificateRequest
  520. TLSv1: Received ServerHelloDone
  521. TLSv1: Send Certificate
  522. TLSv1: Full client certificate chain not configured - validation may fail
  523. TLSv1: Send ClientKeyExchange
  524. TLSv1: Send CertificateVerify
  525. TLSv1: Send ChangeCipherSpec
  526. TLSv1: Record Layer - New write cipher suite 0x002f
  527. TLSv1: Send Finished
  528. TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
  529. SSL: 1117 bytes left to be sent out (of total 1117 bytes)
  530. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  531. EAP: EAP entering state SEND_RESPONSE
  532. EAP: EAP entering state IDLE
  533. EAPOL: SUPP_BE entering state RESPONSE
  534. EAPOL: txSuppRsp
  535. TX EAPOL: dst=78:19:f7:77:86:42
  536. EAPOL: SUPP_BE entering state RECEIVE
  537. wlan0: RX EAPOL from 78:19:f7:77:86:42
  538. EAPOL: Received EAP-Packet frame
  539. EAPOL: SUPP_BE entering state REQUEST
  540. EAPOL: getSuppRsp
  541. EAP: EAP entering state RECEIVED
  542. EAP: Received EAP-Failure
  543. EAP: EAP entering state FAILURE
  544. wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
  545. EAPOL: SUPP_PAE entering state HELD
  546. EAPOL: Supplicant port status: Unauthorized
  547. EAPOL: SUPP_BE entering state RECEIVE
  548. EAPOL: SUPP_BE entering state FAIL
  549. EAPOL: SUPP_BE entering state IDLE
  550. EAPOL authentication completed unsuccessfully
  551. wlan0: Setting authentication timeout: 2 sec 0 usec
  552. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  553. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  554. wlan0: Event 5 received on interface wlan0
  555. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  556. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  557. wlan0: Event 5 received on interface wlan0
  558. nl80211: Event message available
  559. nl80211: Delete station 78:19:f7:77:86:42
  560. nl80211: Event message available
  561. nl80211: MLME event 39
  562. wlan0: Event 12 received on interface wlan0
  563. wlan0: Deauthentication notification
  564. wlan0: * reason 1
  565. wlan0: * address 78:19:f7:77:86:42
  566. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  567. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  568. wlan0: Setting scan request: 0 sec 100000 usec
  569. Added BSSID 78:19:f7:77:86:42 into blacklist
  570. wlan0: Another BSS in this ESS has been seen; try it next
  571. BSSID 78:19:f7:77:86:42 blacklist count incremented to 2
  572. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  573. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:77:86:42 reason=1
  574. wlan0: Disconnect event - remove keys
  575. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  576. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  577. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  578. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  579. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  580. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  581. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  582. addr=78:19:f7:77:86:42
  583. wlan0: State: ASSOCIATED -> DISCONNECTED
  584. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  585. netlink: Operstate: linkmode=-1, operstate=5
  586. EAPOL: External notification - portEnabled=0
  587. EAPOL: SUPP_PAE entering state DISCONNECTED
  588. EAPOL: Supplicant port status: Unauthorized
  589. EAPOL: SUPP_BE entering state INITIALIZE
  590. EAP: EAP entering state DISABLED
  591. EAPOL: Supplicant port status: Unauthorized
  592. EAPOL: External notification - portValid=0
  593. EAPOL: Supplicant port status: Unauthorized
  594. nl80211: Event message available
  595. nl80211: Ignore disconnect event when using userspace SME
  596. wlan0: State: DISCONNECTED -> SCANNING
  597. Scan SSID - hexdump_ascii(len=12):
  598. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  599. wlan0: Include wildcard SSID in the scan request
  600. wlan0: Starting AP scan for specific SSID(s)
  601. wlan0: Optimize scan based on previously generated frequency list
  602. Scan requested (ret=0) - scan timeout 30 seconds
  603. nl80211: Event message available
  604. nl80211: Scan trigger
  605. nl80211: Event message available
  606. nl80211: New scan results available
  607. wlan0: Event 3 received on interface wlan0
  608. nl80211: Received scan results (25 BSSes)
  609. wlan0: BSS: Start scan result update 3
  610. wlan0: New scan results available
  611. wlan0: Selecting BSS from priority group 0
  612. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46
  613. wlan0: skip - blacklisted (count=2 limit=0)
  614. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
  615. wlan0: skip - SSID mismatch
  616. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-41
  617. wlan0: selected based on RSN IE
  618. wlan0: selected BSS 78:19:f7:78:46:c2 ssid='WPI-Wireless'
  619. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:46:c2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  620. wlan0: Automatic auth_alg selection: 0x1
  621. wlan0: RSN: using IEEE 802.11i/D9.0
  622. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  623. wlan0: WPA: clearing AP WPA IE
  624. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  625. wlan0: WPA: using GTK CCMP
  626. wlan0: WPA: using PTK CCMP
  627. wlan0: WPA: using KEY_MGMT 802.1X
  628. wlan0: WPA: not using MGMT group cipher
  629. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  630. wlan0: Cancelling scan request
  631. wlan0: SME: Trying to authenticate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
  632. wlan0: No keys have been configured - skip key clearing
  633. wlan0: State: SCANNING -> AUTHENTICATING
  634. EAPOL: External notification - EAP success=0
  635. EAPOL: Supplicant port status: Unauthorized
  636. EAPOL: External notification - EAP fail=0
  637. EAPOL: Supplicant port status: Unauthorized
  638. EAPOL: External notification - portControl=Auto
  639. EAPOL: Supplicant port status: Unauthorized
  640. nl80211: Authenticate (ifindex=18)
  641. * bssid=78:19:f7:78:46:c2
  642. * freq=2462
  643. * SSID - hexdump_ascii(len=12):
  644. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  645. * IEs - hexdump(len=0): [NULL]
  646. * Auth Type 0
  647. nl80211: Authentication request send successfully
  648. RSN: Ignored PMKID candidate without preauth flag
  649. RSN: Ignored PMKID candidate without preauth flag
  650. RSN: Ignored PMKID candidate without preauth flag
  651. RSN: Ignored PMKID candidate without preauth flag
  652. RSN: Ignored PMKID candidate without preauth flag
  653. RSN: Ignored PMKID candidate without preauth flag
  654. RSN: Ignored PMKID candidate without preauth flag
  655. RSN: Ignored PMKID candidate without preauth flag
  656. RSN: Ignored PMKID candidate without preauth flag
  657. RSN: Ignored PMKID candidate without preauth flag
  658. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  659. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  660. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  661. wlan0: Event 5 received on interface wlan0
  662. nl80211: Event message available
  663. nl80211: MLME event 37
  664. wlan0: Event 11 received on interface wlan0
  665. wlan0: SME: Authentication response: peer=78:19:f7:78:46:c2 auth_type=0 status_code=0
  666. wlan0: Trying to associate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
  667. wlan0: State: AUTHENTICATING -> ASSOCIATING
  668. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  669. netlink: Operstate: linkmode=-1, operstate=5
  670. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  671. nl80211: Associate (ifindex=18)
  672. * bssid=78:19:f7:78:46:c2
  673. * freq=2462
  674. * SSID - hexdump_ascii(len=12):
  675. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  676. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  677. * pairwise=0xfac04
  678. * group=0xfac04
  679. * prev_bssid=78:19:f7:77:86:42
  680. nl80211: Association request send successfully
  681. nl80211: Event message available
  682. nl80211: Delete station 78:19:f7:78:46:c2
  683. nl80211: Event message available
  684. nl80211: MLME event 38
  685. wlan0: Event 13 received on interface wlan0
  686. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:46:c2 status_code=1
  687. wlan0: SME: Association with 78:19:f7:78:46:c2 failed: status code 1
  688. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:46:c2 reason_code=3)
  689. Added BSSID 78:19:f7:78:46:c2 into blacklist
  690. wlan0: Another BSS in this ESS has been seen; try it next
  691. BSSID 78:19:f7:78:46:c2 blacklist count incremented to 2
  692. wlan0: Setting scan request: 0 sec 100000 usec
  693. wlan0: State: ASSOCIATING -> DISCONNECTED
  694. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  695. netlink: Operstate: linkmode=-1, operstate=5
  696. nl80211: Event message available
  697. nl80211: Ignore connect event (cmd=46) when using userspace SME
  698. nl80211: Event message available
  699. nl80211: MLME event 39
  700. wlan0: Event 12 received on interface wlan0
  701. wlan0: Deauthentication notification
  702. wlan0: * reason 3
  703. wlan0: * address 78:19:f7:78:46:c2
  704. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  705. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  706. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  707. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  708. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  709. wlan0: Disconnect event - remove keys
  710. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  711. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  712. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  713. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  714. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  715. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  716. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  717. addr=00:00:00:00:00:00
  718. wlan0: State: DISCONNECTED -> DISCONNECTED
  719. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  720. netlink: Operstate: linkmode=-1, operstate=5
  721. EAPOL: External notification - portEnabled=0
  722. EAPOL: Supplicant port status: Unauthorized
  723. EAPOL: External notification - portValid=0
  724. EAPOL: Supplicant port status: Unauthorized
  725. wlan0: State: DISCONNECTED -> SCANNING
  726. Scan SSID - hexdump_ascii(len=12):
  727. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  728. wlan0: Include wildcard SSID in the scan request
  729. wlan0: Starting AP scan for specific SSID(s)
  730. wlan0: Optimize scan based on previously generated frequency list
  731. Scan requested (ret=0) - scan timeout 30 seconds
  732. nl80211: Event message available
  733. nl80211: Scan trigger
  734. nl80211: Event message available
  735. nl80211: New scan results available
  736. wlan0: Event 3 received on interface wlan0
  737. nl80211: Received scan results (28 BSSes)
  738. wlan0: BSS: Start scan result update 4
  739. wlan0: BSS: Add new id 27 BSSID 78:19:f7:77:84:c0 SSID 'WPI-Guest'
  740. wlan0: New scan results available
  741. wlan0: Selecting BSS from priority group 0
  742. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
  743. wlan0: skip - blacklisted (count=2 limit=0)
  744. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
  745. wlan0: skip - SSID mismatch
  746. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  747. wlan0: skip - blacklisted (count=2 limit=0)
  748. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
  749. wlan0: skip - blacklisted (count=3 limit=0)
  750. wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  751. wlan0: selected based on RSN IE
  752. wlan0: selected BSS 78:19:f7:77:93:42 ssid='WPI-Wireless'
  753. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:93:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  754. wlan0: Automatic auth_alg selection: 0x1
  755. wlan0: RSN: using IEEE 802.11i/D9.0
  756. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  757. wlan0: WPA: clearing AP WPA IE
  758. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  759. wlan0: WPA: using GTK CCMP
  760. wlan0: WPA: using PTK CCMP
  761. wlan0: WPA: using KEY_MGMT 802.1X
  762. wlan0: WPA: not using MGMT group cipher
  763. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  764. wlan0: Cancelling scan request
  765. wlan0: SME: Trying to authenticate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
  766. wlan0: No keys have been configured - skip key clearing
  767. wlan0: State: SCANNING -> AUTHENTICATING
  768. EAPOL: External notification - EAP success=0
  769. EAPOL: Supplicant port status: Unauthorized
  770. EAPOL: External notification - EAP fail=0
  771. EAPOL: Supplicant port status: Unauthorized
  772. EAPOL: External notification - portControl=Auto
  773. EAPOL: Supplicant port status: Unauthorized
  774. nl80211: Authenticate (ifindex=18)
  775. * bssid=78:19:f7:77:93:42
  776. * freq=2437
  777. * SSID - hexdump_ascii(len=12):
  778. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  779. * IEs - hexdump(len=0): [NULL]
  780. * Auth Type 0
  781. nl80211: Authentication request send successfully
  782. RSN: Ignored PMKID candidate without preauth flag
  783. RSN: Ignored PMKID candidate without preauth flag
  784. RSN: Ignored PMKID candidate without preauth flag
  785. RSN: Ignored PMKID candidate without preauth flag
  786. RSN: Ignored PMKID candidate without preauth flag
  787. RSN: Ignored PMKID candidate without preauth flag
  788. RSN: Ignored PMKID candidate without preauth flag
  789. RSN: Ignored PMKID candidate without preauth flag
  790. RSN: Ignored PMKID candidate without preauth flag
  791. RSN: Ignored PMKID candidate without preauth flag
  792. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  793. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  794. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  795. wlan0: Event 5 received on interface wlan0
  796. nl80211: Event message available
  797. nl80211: MLME event 37
  798. wlan0: Event 11 received on interface wlan0
  799. wlan0: SME: Authentication response: peer=78:19:f7:77:93:42 auth_type=0 status_code=0
  800. wlan0: Trying to associate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
  801. wlan0: State: AUTHENTICATING -> ASSOCIATING
  802. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  803. netlink: Operstate: linkmode=-1, operstate=5
  804. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  805. nl80211: Associate (ifindex=18)
  806. * bssid=78:19:f7:77:93:42
  807. * freq=2437
  808. * SSID - hexdump_ascii(len=12):
  809. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  810. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  811. * pairwise=0xfac04
  812. * group=0xfac04
  813. nl80211: Association request send successfully
  814. nl80211: Event message available
  815. nl80211: Delete station 78:19:f7:77:93:42
  816. nl80211: Event message available
  817. nl80211: MLME event 38
  818. wlan0: Event 13 received on interface wlan0
  819. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:77:93:42 status_code=1
  820. wlan0: SME: Association with 78:19:f7:77:93:42 failed: status code 1
  821. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:77:93:42 reason_code=3)
  822. Added BSSID 78:19:f7:77:93:42 into blacklist
  823. wlan0: Another BSS in this ESS has been seen; try it next
  824. BSSID 78:19:f7:77:93:42 blacklist count incremented to 2
  825. wlan0: Setting scan request: 0 sec 100000 usec
  826. wlan0: State: ASSOCIATING -> DISCONNECTED
  827. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  828. netlink: Operstate: linkmode=-1, operstate=5
  829. nl80211: Event message available
  830. nl80211: Ignore connect event (cmd=46) when using userspace SME
  831. nl80211: Event message available
  832. nl80211: MLME event 39
  833. wlan0: Event 12 received on interface wlan0
  834. wlan0: Deauthentication notification
  835. wlan0: * reason 3
  836. wlan0: * address 78:19:f7:77:93:42
  837. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  838. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  839. BSSID 00:00:00:00:00:00 blacklist count incremented to 3
  840. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  841. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  842. wlan0: Disconnect event - remove keys
  843. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  844. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  845. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  846. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  847. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  848. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  849. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  850. addr=00:00:00:00:00:00
  851. wlan0: State: DISCONNECTED -> DISCONNECTED
  852. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  853. netlink: Operstate: linkmode=-1, operstate=5
  854. EAPOL: External notification - portEnabled=0
  855. EAPOL: Supplicant port status: Unauthorized
  856. EAPOL: External notification - portValid=0
  857. EAPOL: Supplicant port status: Unauthorized
  858. wlan0: State: DISCONNECTED -> SCANNING
  859. Scan SSID - hexdump_ascii(len=12):
  860. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  861. wlan0: Include wildcard SSID in the scan request
  862. wlan0: Starting AP scan for specific SSID(s)
  863. wlan0: Optimize scan based on previously generated frequency list
  864. Scan requested (ret=0) - scan timeout 30 seconds
  865. nl80211: Event message available
  866. nl80211: Scan trigger
  867. nl80211: Event message available
  868. nl80211: New scan results available
  869. wlan0: Event 3 received on interface wlan0
  870. nl80211: Received scan results (28 BSSes)
  871. wlan0: BSS: Start scan result update 5
  872. wlan0: New scan results available
  873. wlan0: Selecting BSS from priority group 0
  874. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  875. wlan0: skip - blacklisted (count=2 limit=0)
  876. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
  877. wlan0: skip - SSID mismatch
  878. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
  879. wlan0: skip - blacklisted (count=2 limit=0)
  880. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
  881. wlan0: skip - blacklisted (count=3 limit=0)
  882. wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
  883. wlan0: skip - blacklisted (count=2 limit=0)
  884. wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-76
  885. wlan0: selected based on RSN IE
  886. wlan0: selected BSS 78:19:f7:78:ee:02 ssid='WPI-Wireless'
  887. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:ee:02 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  888. wlan0: Automatic auth_alg selection: 0x1
  889. wlan0: RSN: using IEEE 802.11i/D9.0
  890. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  891. wlan0: WPA: clearing AP WPA IE
  892. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  893. wlan0: WPA: using GTK CCMP
  894. wlan0: WPA: using PTK CCMP
  895. wlan0: WPA: using KEY_MGMT 802.1X
  896. wlan0: WPA: not using MGMT group cipher
  897. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  898. wlan0: Cancelling scan request
  899. wlan0: SME: Trying to authenticate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
  900. wlan0: No keys have been configured - skip key clearing
  901. wlan0: State: SCANNING -> AUTHENTICATING
  902. EAPOL: External notification - EAP success=0
  903. EAPOL: Supplicant port status: Unauthorized
  904. EAPOL: External notification - EAP fail=0
  905. EAPOL: Supplicant port status: Unauthorized
  906. EAPOL: External notification - portControl=Auto
  907. EAPOL: Supplicant port status: Unauthorized
  908. nl80211: Authenticate (ifindex=18)
  909. * bssid=78:19:f7:78:ee:02
  910. * freq=2412
  911. * SSID - hexdump_ascii(len=12):
  912. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  913. * IEs - hexdump(len=0): [NULL]
  914. * Auth Type 0
  915. nl80211: Authentication request send successfully
  916. RSN: Ignored PMKID candidate without preauth flag
  917. RSN: Ignored PMKID candidate without preauth flag
  918. RSN: Ignored PMKID candidate without preauth flag
  919. RSN: Ignored PMKID candidate without preauth flag
  920. RSN: Ignored PMKID candidate without preauth flag
  921. RSN: Ignored PMKID candidate without preauth flag
  922. RSN: Ignored PMKID candidate without preauth flag
  923. RSN: Ignored PMKID candidate without preauth flag
  924. RSN: Ignored PMKID candidate without preauth flag
  925. RSN: Ignored PMKID candidate without preauth flag
  926. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  927. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  928. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  929. wlan0: Event 5 received on interface wlan0
  930. nl80211: Event message available
  931. nl80211: MLME event 37
  932. wlan0: Event 11 received on interface wlan0
  933. wlan0: SME: Authentication response: peer=78:19:f7:78:ee:02 auth_type=0 status_code=0
  934. wlan0: Trying to associate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
  935. wlan0: State: AUTHENTICATING -> ASSOCIATING
  936. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  937. netlink: Operstate: linkmode=-1, operstate=5
  938. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  939. nl80211: Associate (ifindex=18)
  940. * bssid=78:19:f7:78:ee:02
  941. * freq=2412
  942. * SSID - hexdump_ascii(len=12):
  943. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  944. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  945. * pairwise=0xfac04
  946. * group=0xfac04
  947. nl80211: Association request send successfully
  948. nl80211: Event message available
  949. nl80211: Delete station 78:19:f7:78:ee:02
  950. nl80211: Event message available
  951. nl80211: MLME event 38
  952. wlan0: Event 13 received on interface wlan0
  953. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:ee:02 status_code=1
  954. wlan0: SME: Association with 78:19:f7:78:ee:02 failed: status code 1
  955. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:ee:02 reason_code=3)
  956. Added BSSID 78:19:f7:78:ee:02 into blacklist
  957. wlan0: Another BSS in this ESS has been seen; try it next
  958. BSSID 78:19:f7:78:ee:02 blacklist count incremented to 2
  959. wlan0: Setting scan request: 0 sec 100000 usec
  960. wlan0: State: ASSOCIATING -> DISCONNECTED
  961. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  962. netlink: Operstate: linkmode=-1, operstate=5
  963. nl80211: Event message available
  964. nl80211: Ignore connect event (cmd=46) when using userspace SME
  965. nl80211: Event message available
  966. nl80211: MLME event 39
  967. wlan0: Event 12 received on interface wlan0
  968. wlan0: Deauthentication notification
  969. wlan0: * reason 3
  970. wlan0: * address 78:19:f7:78:ee:02
  971. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  972. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  973. BSSID 00:00:00:00:00:00 blacklist count incremented to 4
  974. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  975. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  976. wlan0: Disconnect event - remove keys
  977. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  978. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  979. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  980. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  981. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  982. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  983. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  984. addr=00:00:00:00:00:00
  985. wlan0: State: DISCONNECTED -> DISCONNECTED
  986. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  987. netlink: Operstate: linkmode=-1, operstate=5
  988. EAPOL: External notification - portEnabled=0
  989. EAPOL: Supplicant port status: Unauthorized
  990. EAPOL: External notification - portValid=0
  991. EAPOL: Supplicant port status: Unauthorized
  992. EAPOL: Supplicant port status: Unauthorized
  993. wlan0: State: DISCONNECTED -> SCANNING
  994. Scan SSID - hexdump_ascii(len=12):
  995. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  996. wlan0: Include wildcard SSID in the scan request
  997. wlan0: Starting AP scan for specific SSID(s)
  998. wlan0: Optimize scan based on previously generated frequency list
  999. Scan requested (ret=0) - scan timeout 30 seconds
  1000. nl80211: Event message available
  1001. nl80211: Scan trigger
  1002. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1003. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1004. wlan0: Event 5 received on interface wlan0
  1005. nl80211: Event message available
  1006. nl80211: New scan results available
  1007. wlan0: Event 3 received on interface wlan0
  1008. nl80211: Received scan results (29 BSSes)
  1009. wlan0: BSS: Start scan result update 6
  1010. wlan0: BSS: Add new id 28 BSSID 78:19:f7:77:ee:c2 SSID 'WPI-Wireless'
  1011. wlan0: New scan results available
  1012. wlan0: Selecting BSS from priority group 0
  1013. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  1014. wlan0: skip - blacklisted (count=2 limit=0)
  1015. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
  1016. wlan0: skip - SSID mismatch
  1017. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
  1018. wlan0: skip - blacklisted (count=2 limit=0)
  1019. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
  1020. wlan0: skip - blacklisted (count=3 limit=0)
  1021. wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1022. wlan0: skip - blacklisted (count=2 limit=0)
  1023. wlan0: 5: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1024. wlan0: selected based on RSN IE
  1025. wlan0: selected BSS 78:19:f7:79:6d:42 ssid='WPI-Wireless'
  1026. wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:6d:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  1027. wlan0: Automatic auth_alg selection: 0x1
  1028. wlan0: RSN: using IEEE 802.11i/D9.0
  1029. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1030. wlan0: WPA: clearing AP WPA IE
  1031. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1032. wlan0: WPA: using GTK CCMP
  1033. wlan0: WPA: using PTK CCMP
  1034. wlan0: WPA: using KEY_MGMT 802.1X
  1035. wlan0: WPA: not using MGMT group cipher
  1036. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1037. wlan0: Cancelling scan request
  1038. wlan0: SME: Trying to authenticate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
  1039. wlan0: No keys have been configured - skip key clearing
  1040. wlan0: State: SCANNING -> AUTHENTICATING
  1041. EAPOL: External notification - EAP success=0
  1042. EAPOL: Supplicant port status: Unauthorized
  1043. EAPOL: External notification - EAP fail=0
  1044. EAPOL: Supplicant port status: Unauthorized
  1045. EAPOL: External notification - portControl=Auto
  1046. EAPOL: Supplicant port status: Unauthorized
  1047. nl80211: Authenticate (ifindex=18)
  1048. * bssid=78:19:f7:79:6d:42
  1049. * freq=2437
  1050. * SSID - hexdump_ascii(len=12):
  1051. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1052. * IEs - hexdump(len=0): [NULL]
  1053. * Auth Type 0
  1054. nl80211: Authentication request send successfully
  1055. RSN: Ignored PMKID candidate without preauth flag
  1056. RSN: Ignored PMKID candidate without preauth flag
  1057. RSN: Ignored PMKID candidate without preauth flag
  1058. RSN: Ignored PMKID candidate without preauth flag
  1059. RSN: Ignored PMKID candidate without preauth flag
  1060. RSN: Ignored PMKID candidate without preauth flag
  1061. RSN: Ignored PMKID candidate without preauth flag
  1062. RSN: Ignored PMKID candidate without preauth flag
  1063. RSN: Ignored PMKID candidate without preauth flag
  1064. RSN: Ignored PMKID candidate without preauth flag
  1065. RSN: Ignored PMKID candidate without preauth flag
  1066. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1067. nl80211: Event message available
  1068. nl80211: MLME event 37
  1069. wlan0: Event 11 received on interface wlan0
  1070. wlan0: SME: Authentication response: peer=78:19:f7:79:6d:42 auth_type=0 status_code=0
  1071. wlan0: Trying to associate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
  1072. wlan0: State: AUTHENTICATING -> ASSOCIATING
  1073. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1074. netlink: Operstate: linkmode=-1, operstate=5
  1075. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1076. nl80211: Associate (ifindex=18)
  1077. * bssid=78:19:f7:79:6d:42
  1078. * freq=2437
  1079. * SSID - hexdump_ascii(len=12):
  1080. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1081. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1082. * pairwise=0xfac04
  1083. * group=0xfac04
  1084. nl80211: Association request send successfully
  1085. nl80211: Event message available
  1086. nl80211: Delete station 78:19:f7:79:6d:42
  1087. nl80211: Event message available
  1088. nl80211: MLME event 38
  1089. wlan0: Event 13 received on interface wlan0
  1090. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:79:6d:42 status_code=1
  1091. wlan0: SME: Association with 78:19:f7:79:6d:42 failed: status code 1
  1092. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:79:6d:42 reason_code=3)
  1093. Added BSSID 78:19:f7:79:6d:42 into blacklist
  1094. wlan0: Another BSS in this ESS has been seen; try it next
  1095. BSSID 78:19:f7:79:6d:42 blacklist count incremented to 2
  1096. wlan0: Setting scan request: 0 sec 100000 usec
  1097. wlan0: State: ASSOCIATING -> DISCONNECTED
  1098. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1099. netlink: Operstate: linkmode=-1, operstate=5
  1100. nl80211: Event message available
  1101. nl80211: Ignore connect event (cmd=46) when using userspace SME
  1102. nl80211: Event message available
  1103. nl80211: MLME event 39
  1104. wlan0: Event 12 received on interface wlan0
  1105. wlan0: Deauthentication notification
  1106. wlan0: * reason 3
  1107. wlan0: * address 78:19:f7:79:6d:42
  1108. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  1109. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  1110. BSSID 00:00:00:00:00:00 blacklist count incremented to 5
  1111. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  1112. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  1113. wlan0: Disconnect event - remove keys
  1114. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  1115. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  1116. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  1117. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  1118. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  1119. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  1120. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1121. addr=00:00:00:00:00:00
  1122. wlan0: State: DISCONNECTED -> DISCONNECTED
  1123. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1124. netlink: Operstate: linkmode=-1, operstate=5
  1125. EAPOL: External notification - portEnabled=0
  1126. EAPOL: Supplicant port status: Unauthorized
  1127. EAPOL: External notification - portValid=0
  1128. EAPOL: Supplicant port status: Unauthorized
  1129. wlan0: State: DISCONNECTED -> SCANNING
  1130. Scan SSID - hexdump_ascii(len=12):
  1131. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1132. wlan0: Include wildcard SSID in the scan request
  1133. wlan0: Starting AP scan for specific SSID(s)
  1134. wlan0: Optimize scan based on previously generated frequency list
  1135. Scan requested (ret=0) - scan timeout 30 seconds
  1136. nl80211: Event message available
  1137. nl80211: Scan trigger
  1138. nl80211: Event message available
  1139. nl80211: New scan results available
  1140. wlan0: Event 3 received on interface wlan0
  1141. nl80211: Received scan results (29 BSSes)
  1142. wlan0: BSS: Start scan result update 7
  1143. wlan0: New scan results available
  1144. wlan0: Selecting BSS from priority group 0
  1145. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-43
  1146. wlan0: skip - blacklisted (count=2 limit=0)
  1147. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-41 wps
  1148. wlan0: skip - SSID mismatch
  1149. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  1150. wlan0: skip - blacklisted (count=2 limit=0)
  1151. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
  1152. wlan0: skip - blacklisted (count=3 limit=0)
  1153. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1154. wlan0: skip - blacklisted (count=2 limit=0)
  1155. wlan0: 5: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1156. wlan0: skip - blacklisted (count=2 limit=0)
  1157. wlan0: 6: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1158. wlan0: skip - blacklisted (count=2 limit=0)
  1159. wlan0: 7: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
  1160. wlan0: selected based on RSN IE
  1161. wlan0: selected BSS 78:19:f7:78:43:42 ssid='WPI-Wireless'
  1162. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:43:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  1163. wlan0: Automatic auth_alg selection: 0x1
  1164. wlan0: RSN: using IEEE 802.11i/D9.0
  1165. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1166. wlan0: WPA: clearing AP WPA IE
  1167. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1168. wlan0: WPA: using GTK CCMP
  1169. wlan0: WPA: using PTK CCMP
  1170. wlan0: WPA: using KEY_MGMT 802.1X
  1171. wlan0: WPA: not using MGMT group cipher
  1172. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1173. wlan0: Cancelling scan request
  1174. wlan0: SME: Trying to authenticate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
  1175. wlan0: No keys have been configured - skip key clearing
  1176. wlan0: State: SCANNING -> AUTHENTICATING
  1177. EAPOL: External notification - EAP success=0
  1178. EAPOL: Supplicant port status: Unauthorized
  1179. EAPOL: External notification - EAP fail=0
  1180. EAPOL: Supplicant port status: Unauthorized
  1181. EAPOL: External notification - portControl=Auto
  1182. EAPOL: Supplicant port status: Unauthorized
  1183. nl80211: Authenticate (ifindex=18)
  1184. * bssid=78:19:f7:78:43:42
  1185. * freq=2437
  1186. * SSID - hexdump_ascii(len=12):
  1187. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1188. * IEs - hexdump(len=0): [NULL]
  1189. * Auth Type 0
  1190. nl80211: Authentication request send successfully
  1191. RSN: Ignored PMKID candidate without preauth flag
  1192. RSN: Ignored PMKID candidate without preauth flag
  1193. RSN: Ignored PMKID candidate without preauth flag
  1194. RSN: Ignored PMKID candidate without preauth flag
  1195. RSN: Ignored PMKID candidate without preauth flag
  1196. RSN: Ignored PMKID candidate without preauth flag
  1197. RSN: Ignored PMKID candidate without preauth flag
  1198. RSN: Ignored PMKID candidate without preauth flag
  1199. RSN: Ignored PMKID candidate without preauth flag
  1200. RSN: Ignored PMKID candidate without preauth flag
  1201. RSN: Ignored PMKID candidate without preauth flag
  1202. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1203. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1204. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1205. wlan0: Event 5 received on interface wlan0
  1206. nl80211: Event message available
  1207. nl80211: MLME event 37
  1208. wlan0: Event 11 received on interface wlan0
  1209. wlan0: SME: Authentication response: peer=78:19:f7:78:43:42 auth_type=0 status_code=0
  1210. wlan0: Trying to associate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
  1211. wlan0: State: AUTHENTICATING -> ASSOCIATING
  1212. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1213. netlink: Operstate: linkmode=-1, operstate=5
  1214. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1215. nl80211: Associate (ifindex=18)
  1216. * bssid=78:19:f7:78:43:42
  1217. * freq=2437
  1218. * SSID - hexdump_ascii(len=12):
  1219. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1220. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1221. * pairwise=0xfac04
  1222. * group=0xfac04
  1223. nl80211: Association request send successfully
  1224. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1225. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1226. wlan0: Event 5 received on interface wlan0
  1227. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1228. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1229. wlan0: Event 5 received on interface wlan0
  1230. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1231. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1232. wlan0: Event 5 received on interface wlan0
  1233. nl80211: Event message available
  1234. nl80211: New station 78:19:f7:78:43:42
  1235. nl80211: Event message available
  1236. nl80211: MLME event 38
  1237. wlan0: Event 0 received on interface wlan0
  1238. wlan0: Association info event
  1239. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1240. wlan0: freq=2437 MHz
  1241. wlan0: State: ASSOCIATING -> ASSOCIATED
  1242. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1243. netlink: Operstate: linkmode=-1, operstate=5
  1244. wlan0: Associated to a new BSS: BSSID=78:19:f7:78:43:42
  1245. wlan0: No keys have been configured - skip key clearing
  1246. wlan0: Associated with 78:19:f7:78:43:42
  1247. wlan0: WPA: Association event - clear replay counter
  1248. wlan0: WPA: Clear old PTK
  1249. EAPOL: External notification - portEnabled=0
  1250. EAPOL: Supplicant port status: Unauthorized
  1251. EAPOL: External notification - portValid=0
  1252. EAPOL: Supplicant port status: Unauthorized
  1253. EAPOL: External notification - portEnabled=1
  1254. EAPOL: SUPP_PAE entering state CONNECTING
  1255. EAPOL: SUPP_BE entering state IDLE
  1256. EAP: EAP entering state INITIALIZE
  1257. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  1258. TLSv1: Selected cipher suite: 0x0000
  1259. TLSv1: Record Layer - New write cipher suite 0x0000
  1260. TLSv1: Record Layer - New read cipher suite 0x0000
  1261. EAP: EAP entering state IDLE
  1262. wlan0: Setting authentication timeout: 10 sec 0 usec
  1263. wlan0: Cancelling scan request
  1264. nl80211: Event message available
  1265. nl80211: Ignore connect event (cmd=46) when using userspace SME
  1266. EAPOL: startWhen --> 0
  1267. EAPOL: SUPP_PAE entering state CONNECTING
  1268. EAPOL: txStart
  1269. TX EAPOL: dst=78:19:f7:78:43:42
  1270. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1271. wlan0: Setting authentication timeout: 70 sec 0 usec
  1272. EAPOL: Received EAP-Packet frame
  1273. EAPOL: SUPP_PAE entering state RESTART
  1274. EAP: EAP entering state INITIALIZE
  1275. EAP: EAP entering state IDLE
  1276. EAPOL: SUPP_PAE entering state AUTHENTICATING
  1277. EAPOL: SUPP_BE entering state REQUEST
  1278. EAPOL: getSuppRsp
  1279. EAP: EAP entering state RECEIVED
  1280. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  1281. EAP: EAP entering state IDENTITY
  1282. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  1283. EAP: EAP-Request Identity data - hexdump_ascii(len=49):
  1284. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  1285. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  1286. 35 31 36 2f 31 2c 70 6f 72 74 69 64 3d 32 30 35 516/1,portid=205
  1287. 36 6
  1288. EAP: using real identity - hexdump_ascii(len=19):
  1289. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  1290. 2d 30 39 -09
  1291. EAP: EAP entering state SEND_RESPONSE
  1292. EAP: EAP entering state IDLE
  1293. EAPOL: SUPP_BE entering state RESPONSE
  1294. EAPOL: txSuppRsp
  1295. TX EAPOL: dst=78:19:f7:78:43:42
  1296. EAPOL: SUPP_BE entering state RECEIVE
  1297. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1298. EAPOL: Received EAP-Packet frame
  1299. EAPOL: SUPP_BE entering state REQUEST
  1300. EAPOL: getSuppRsp
  1301. EAP: EAP entering state RECEIVED
  1302. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  1303. EAP: EAP entering state GET_METHOD
  1304. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  1305. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  1306. TLS: using phase1 config options
  1307. TLSv1: Converting PEM format certificate into DER format
  1308. X509: Extension: extnID=2.5.29.14 critical=0
  1309. X509: Extension: extnID=2.5.29.35 critical=0
  1310. X509: Extension: extnID=2.5.29.19 critical=0
  1311. X509: BasicConstraints - cA=255
  1312. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  1313. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  1314. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  1315. Trying to parse PKCS #1 encoded RSA private key
  1316. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  1317. EAP: EAP entering state METHOD
  1318. SSL: Received packet(len=6) - Flags 0x20
  1319. EAP-TLS: Start
  1320. TLSv1: Send ClientHello
  1321. SSL: 56 bytes left to be sent out (of total 56 bytes)
  1322. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  1323. EAP: EAP entering state SEND_RESPONSE
  1324. EAP: EAP entering state IDLE
  1325. EAPOL: SUPP_BE entering state RESPONSE
  1326. EAPOL: txSuppRsp
  1327. TX EAPOL: dst=78:19:f7:78:43:42
  1328. EAPOL: SUPP_BE entering state RECEIVE
  1329. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1330. EAPOL: Received EAP-Packet frame
  1331. EAPOL: SUPP_BE entering state REQUEST
  1332. EAPOL: getSuppRsp
  1333. EAP: EAP entering state RECEIVED
  1334. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  1335. EAP: EAP entering state METHOD
  1336. SSL: Received packet(len=1024) - Flags 0xc0
  1337. SSL: TLS Message Length: 3680
  1338. SSL: Need 2666 bytes more input data
  1339. SSL: Building ACK (type=13 id=3 ver=0)
  1340. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  1341. EAP: EAP entering state SEND_RESPONSE
  1342. EAP: EAP entering state IDLE
  1343. EAPOL: SUPP_BE entering state RESPONSE
  1344. EAPOL: txSuppRsp
  1345. TX EAPOL: dst=78:19:f7:78:43:42
  1346. EAPOL: SUPP_BE entering state RECEIVE
  1347. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1348. EAPOL: Received EAP-Packet frame
  1349. EAPOL: SUPP_BE entering state REQUEST
  1350. EAPOL: getSuppRsp
  1351. EAP: EAP entering state RECEIVED
  1352. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  1353. EAP: EAP entering state METHOD
  1354. SSL: Received packet(len=1024) - Flags 0xc0
  1355. SSL: TLS Message Length: 3680
  1356. SSL: Need 1652 bytes more input data
  1357. SSL: Building ACK (type=13 id=4 ver=0)
  1358. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  1359. EAP: EAP entering state SEND_RESPONSE
  1360. EAP: EAP entering state IDLE
  1361. EAPOL: SUPP_BE entering state RESPONSE
  1362. EAPOL: txSuppRsp
  1363. TX EAPOL: dst=78:19:f7:78:43:42
  1364. EAPOL: SUPP_BE entering state RECEIVE
  1365. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1366. EAPOL: Received EAP-Packet frame
  1367. EAPOL: SUPP_BE entering state REQUEST
  1368. EAPOL: getSuppRsp
  1369. EAP: EAP entering state RECEIVED
  1370. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  1371. EAP: EAP entering state METHOD
  1372. SSL: Received packet(len=1024) - Flags 0xc0
  1373. SSL: TLS Message Length: 3680
  1374. SSL: Need 638 bytes more input data
  1375. SSL: Building ACK (type=13 id=5 ver=0)
  1376. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  1377. EAP: EAP entering state SEND_RESPONSE
  1378. EAP: EAP entering state IDLE
  1379. EAPOL: SUPP_BE entering state RESPONSE
  1380. EAPOL: txSuppRsp
  1381. TX EAPOL: dst=78:19:f7:78:43:42
  1382. EAPOL: SUPP_BE entering state RECEIVE
  1383. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1384. EAPOL: Received EAP-Packet frame
  1385. EAPOL: SUPP_BE entering state REQUEST
  1386. EAPOL: getSuppRsp
  1387. EAP: EAP entering state RECEIVED
  1388. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  1389. EAP: EAP entering state METHOD
  1390. SSL: Received packet(len=648) - Flags 0x80
  1391. SSL: TLS Message Length: 3680
  1392. TLSv1: Received content type 22 version 3.1 length 42
  1393. TLSv1: Received ServerHello
  1394. TLSv1: Using TLS v1.0
  1395. TLSv1: Selected cipher suite: 0x002f
  1396. TLSv1: Received content type 22 version 3.1 length 3278
  1397. TLSv1: Received Certificate (certificate_list len 3274)
  1398. TLSv1: Certificate 0 (len 1511)
  1399. X509: Extension: extnID=2.5.29.37 critical=0
  1400. X509: Extension: extnID=2.5.29.37 critical=0
  1401. TLSv1: Certificate 1 (len 1754)
  1402. X509: Extension: extnID=2.5.29.14 critical=0
  1403. X509: Extension: extnID=2.5.29.35 critical=0
  1404. X509: Extension: extnID=2.5.29.19 critical=0
  1405. X509: BasicConstraints - cA=255
  1406. X509: Validate certificate chain
  1407. X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
  1408. X509: Certificate Digest matches with calculated tbsCertificate hash
  1409. X509: Found issuer from the list of trusted certificates
  1410. X509: Certificate Digest matches with calculated tbsCertificate hash
  1411. X509: Trusted certificate found to complete the chain
  1412. X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  1413. X509: Certificate chain valid
  1414. TLSv1: Received content type 22 version 3.1 length 345
  1415. TLSv1: Received CertificateRequest
  1416. TLSv1: Received ServerHelloDone
  1417. TLSv1: Send Certificate
  1418. TLSv1: Full client certificate chain not configured - validation may fail
  1419. TLSv1: Send ClientKeyExchange
  1420. TLSv1: Send CertificateVerify
  1421. TLSv1: Send ChangeCipherSpec
  1422. TLSv1: Record Layer - New write cipher suite 0x002f
  1423. TLSv1: Send Finished
  1424. TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
  1425. SSL: 1117 bytes left to be sent out (of total 1117 bytes)
  1426. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  1427. EAP: EAP entering state SEND_RESPONSE
  1428. EAP: EAP entering state IDLE
  1429. EAPOL: SUPP_BE entering state RESPONSE
  1430. EAPOL: txSuppRsp
  1431. TX EAPOL: dst=78:19:f7:78:43:42
  1432. EAPOL: SUPP_BE entering state RECEIVE
  1433. wlan0: RX EAPOL from 78:19:f7:78:43:42
  1434. EAPOL: Received EAP-Packet frame
  1435. EAPOL: SUPP_BE entering state REQUEST
  1436. EAPOL: getSuppRsp
  1437. EAP: EAP entering state RECEIVED
  1438. EAP: Received EAP-Failure
  1439. EAP: EAP entering state FAILURE
  1440. wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
  1441. EAPOL: SUPP_PAE entering state HELD
  1442. EAPOL: Supplicant port status: Unauthorized
  1443. EAPOL: SUPP_BE entering state RECEIVE
  1444. EAPOL: SUPP_BE entering state FAIL
  1445. EAPOL: SUPP_BE entering state IDLE
  1446. EAPOL authentication completed unsuccessfully
  1447. wlan0: Setting authentication timeout: 2 sec 0 usec
  1448. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1449. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1450. wlan0: Event 5 received on interface wlan0
  1451. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1452. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1453. wlan0: Event 5 received on interface wlan0
  1454. nl80211: Event message available
  1455. nl80211: Delete station 78:19:f7:78:43:42
  1456. nl80211: Event message available
  1457. nl80211: MLME event 39
  1458. wlan0: Event 12 received on interface wlan0
  1459. wlan0: Deauthentication notification
  1460. wlan0: * reason 1
  1461. wlan0: * address 78:19:f7:78:43:42
  1462. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  1463. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  1464. wlan0: Setting scan request: 0 sec 100000 usec
  1465. Added BSSID 78:19:f7:78:43:42 into blacklist
  1466. wlan0: Another BSS in this ESS has been seen; try it next
  1467. BSSID 78:19:f7:78:43:42 blacklist count incremented to 2
  1468. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  1469. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:78:43:42 reason=1
  1470. wlan0: Disconnect event - remove keys
  1471. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  1472. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  1473. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  1474. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  1475. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  1476. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  1477. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1478. addr=78:19:f7:78:43:42
  1479. wlan0: State: ASSOCIATED -> DISCONNECTED
  1480. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1481. netlink: Operstate: linkmode=-1, operstate=5
  1482. EAPOL: External notification - portEnabled=0
  1483. EAPOL: SUPP_PAE entering state DISCONNECTED
  1484. EAPOL: Supplicant port status: Unauthorized
  1485. EAPOL: SUPP_BE entering state INITIALIZE
  1486. EAP: EAP entering state DISABLED
  1487. EAPOL: Supplicant port status: Unauthorized
  1488. EAPOL: External notification - portValid=0
  1489. EAPOL: Supplicant port status: Unauthorized
  1490. nl80211: Event message available
  1491. nl80211: Ignore disconnect event when using userspace SME
  1492. wlan0: State: DISCONNECTED -> SCANNING
  1493. Scan SSID - hexdump_ascii(len=12):
  1494. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1495. wlan0: Include wildcard SSID in the scan request
  1496. wlan0: Starting AP scan for specific SSID(s)
  1497. wlan0: Optimize scan based on previously generated frequency list
  1498. Scan requested (ret=0) - scan timeout 30 seconds
  1499. nl80211: Event message available
  1500. nl80211: Scan trigger
  1501. nl80211: Event message available
  1502. nl80211: New scan results available
  1503. wlan0: Event 3 received on interface wlan0
  1504. nl80211: Received scan results (29 BSSes)
  1505. wlan0: BSS: Start scan result update 8
  1506. wlan0: New scan results available
  1507. wlan0: Selecting BSS from priority group 0
  1508. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
  1509. wlan0: skip - blacklisted (count=2 limit=0)
  1510. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-42 wps
  1511. wlan0: skip - SSID mismatch
  1512. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  1513. wlan0: skip - blacklisted (count=2 limit=0)
  1514. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50
  1515. wlan0: skip - blacklisted (count=3 limit=0)
  1516. wlan0: 4: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1517. wlan0: skip - blacklisted (count=2 limit=0)
  1518. wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
  1519. wlan0: skip - blacklisted (count=2 limit=0)
  1520. wlan0: 6: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1521. wlan0: selected based on RSN IE
  1522. wlan0: selected BSS 78:19:f7:77:87:42 ssid='WPI-Wireless'
  1523. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:87:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  1524. wlan0: Automatic auth_alg selection: 0x1
  1525. wlan0: RSN: using IEEE 802.11i/D9.0
  1526. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1527. wlan0: WPA: clearing AP WPA IE
  1528. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1529. wlan0: WPA: using GTK CCMP
  1530. wlan0: WPA: using PTK CCMP
  1531. wlan0: WPA: using KEY_MGMT 802.1X
  1532. wlan0: WPA: not using MGMT group cipher
  1533. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1534. wlan0: Cancelling scan request
  1535. wlan0: SME: Trying to authenticate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
  1536. wlan0: No keys have been configured - skip key clearing
  1537. wlan0: State: SCANNING -> AUTHENTICATING
  1538. EAPOL: External notification - EAP success=0
  1539. EAPOL: Supplicant port status: Unauthorized
  1540. EAPOL: External notification - EAP fail=0
  1541. EAPOL: Supplicant port status: Unauthorized
  1542. EAPOL: External notification - portControl=Auto
  1543. EAPOL: Supplicant port status: Unauthorized
  1544. nl80211: Authenticate (ifindex=18)
  1545. * bssid=78:19:f7:77:87:42
  1546. * freq=2412
  1547. * SSID - hexdump_ascii(len=12):
  1548. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1549. * IEs - hexdump(len=0): [NULL]
  1550. * Auth Type 0
  1551. nl80211: Authentication request send successfully
  1552. RSN: Ignored PMKID candidate without preauth flag
  1553. RSN: Ignored PMKID candidate without preauth flag
  1554. RSN: Ignored PMKID candidate without preauth flag
  1555. RSN: Ignored PMKID candidate without preauth flag
  1556. RSN: Ignored PMKID candidate without preauth flag
  1557. RSN: Ignored PMKID candidate without preauth flag
  1558. RSN: Ignored PMKID candidate without preauth flag
  1559. RSN: Ignored PMKID candidate without preauth flag
  1560. RSN: Ignored PMKID candidate without preauth flag
  1561. RSN: Ignored PMKID candidate without preauth flag
  1562. RSN: Ignored PMKID candidate without preauth flag
  1563. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1564. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1565. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1566. wlan0: Event 5 received on interface wlan0
  1567. nl80211: Event message available
  1568. nl80211: MLME event 37
  1569. wlan0: Event 11 received on interface wlan0
  1570. wlan0: SME: Authentication response: peer=78:19:f7:77:87:42 auth_type=0 status_code=0
  1571. wlan0: Trying to associate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
  1572. wlan0: State: AUTHENTICATING -> ASSOCIATING
  1573. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1574. netlink: Operstate: linkmode=-1, operstate=5
  1575. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1576. nl80211: Associate (ifindex=18)
  1577. * bssid=78:19:f7:77:87:42
  1578. * freq=2412
  1579. * SSID - hexdump_ascii(len=12):
  1580. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1581. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1582. * pairwise=0xfac04
  1583. * group=0xfac04
  1584. * prev_bssid=78:19:f7:78:43:42
  1585. nl80211: Association request send successfully
  1586. nl80211: Event message available
  1587. nl80211: Delete station 78:19:f7:77:87:42
  1588. nl80211: Event message available
  1589. nl80211: MLME event 38
  1590. wlan0: Event 13 received on interface wlan0
  1591. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:77:87:42 status_code=1
  1592. wlan0: SME: Association with 78:19:f7:77:87:42 failed: status code 1
  1593. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:77:87:42 reason_code=3)
  1594. Added BSSID 78:19:f7:77:87:42 into blacklist
  1595. wlan0: Another BSS in this ESS has been seen; try it next
  1596. BSSID 78:19:f7:77:87:42 blacklist count incremented to 2
  1597. wlan0: Setting scan request: 0 sec 100000 usec
  1598. wlan0: State: ASSOCIATING -> DISCONNECTED
  1599. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1600. netlink: Operstate: linkmode=-1, operstate=5
  1601. nl80211: Event message available
  1602. nl80211: Ignore connect event (cmd=46) when using userspace SME
  1603. nl80211: Event message available
  1604. nl80211: MLME event 39
  1605. wlan0: Event 12 received on interface wlan0
  1606. wlan0: Deauthentication notification
  1607. wlan0: * reason 3
  1608. wlan0: * address 78:19:f7:77:87:42
  1609. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  1610. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  1611. BSSID 00:00:00:00:00:00 blacklist count incremented to 6
  1612. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  1613. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  1614. wlan0: Disconnect event - remove keys
  1615. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  1616. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  1617. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  1618. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  1619. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  1620. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  1621. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1622. addr=00:00:00:00:00:00
  1623. wlan0: State: DISCONNECTED -> DISCONNECTED
  1624. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1625. netlink: Operstate: linkmode=-1, operstate=5
  1626. EAPOL: External notification - portEnabled=0
  1627. EAPOL: Supplicant port status: Unauthorized
  1628. EAPOL: External notification - portValid=0
  1629. EAPOL: Supplicant port status: Unauthorized
  1630. wlan0: State: DISCONNECTED -> SCANNING
  1631. Scan SSID - hexdump_ascii(len=12):
  1632. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1633. wlan0: Include wildcard SSID in the scan request
  1634. wlan0: Starting AP scan for specific SSID(s)
  1635. wlan0: Optimize scan based on previously generated frequency list
  1636. Scan requested (ret=0) - scan timeout 30 seconds
  1637. nl80211: Event message available
  1638. nl80211: Scan trigger
  1639. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1640. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1641. wlan0: Event 5 received on interface wlan0
  1642. nl80211: Event message available
  1643. nl80211: New scan results available
  1644. wlan0: Event 3 received on interface wlan0
  1645. nl80211: Received scan results (29 BSSes)
  1646. wlan0: BSS: Start scan result update 9
  1647. wlan0: New scan results available
  1648. wlan0: Selecting BSS from priority group 0
  1649. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  1650. wlan0: skip - blacklisted (count=2 limit=0)
  1651. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-42 wps
  1652. wlan0: skip - SSID mismatch
  1653. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  1654. wlan0: skip - blacklisted (count=2 limit=0)
  1655. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-54
  1656. wlan0: skip - blacklisted (count=3 limit=0)
  1657. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-76
  1658. wlan0: skip - blacklisted (count=2 limit=0)
  1659. wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
  1660. wlan0: skip - blacklisted (count=2 limit=0)
  1661. wlan0: 6: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1662. wlan0: skip - blacklisted (count=2 limit=0)
  1663. wlan0: 7: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1664. wlan0: skip - blacklisted (count=2 limit=0)
  1665. wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1666. wlan0: skip - blacklisted (count=2 limit=0)
  1667. wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-81
  1668. wlan0: selected based on RSN IE
  1669. wlan0: selected BSS 78:19:f7:77:84:c2 ssid='WPI-Wireless'
  1670. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:84:c2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  1671. wlan0: Automatic auth_alg selection: 0x1
  1672. wlan0: RSN: using IEEE 802.11i/D9.0
  1673. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1674. wlan0: WPA: clearing AP WPA IE
  1675. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1676. wlan0: WPA: using GTK CCMP
  1677. wlan0: WPA: using PTK CCMP
  1678. wlan0: WPA: using KEY_MGMT 802.1X
  1679. wlan0: WPA: not using MGMT group cipher
  1680. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1681. wlan0: Cancelling scan request
  1682. wlan0: SME: Trying to authenticate with 78:19:f7:77:84:c2 (SSID='WPI-Wireless' freq=2462 MHz)
  1683. wlan0: No keys have been configured - skip key clearing
  1684. wlan0: State: SCANNING -> AUTHENTICATING
  1685. EAPOL: External notification - EAP success=0
  1686. EAPOL: Supplicant port status: Unauthorized
  1687. EAPOL: External notification - EAP fail=0
  1688. EAPOL: Supplicant port status: Unauthorized
  1689. EAPOL: External notification - portControl=Auto
  1690. EAPOL: Supplicant port status: Unauthorized
  1691. nl80211: Authenticate (ifindex=18)
  1692. * bssid=78:19:f7:77:84:c2
  1693. * freq=2462
  1694. * SSID - hexdump_ascii(len=12):
  1695. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1696. * IEs - hexdump(len=0): [NULL]
  1697. * Auth Type 0
  1698. nl80211: Authentication request send successfully
  1699. RSN: Ignored PMKID candidate without preauth flag
  1700. RSN: Ignored PMKID candidate without preauth flag
  1701. RSN: Ignored PMKID candidate without preauth flag
  1702. RSN: Ignored PMKID candidate without preauth flag
  1703. RSN: Ignored PMKID candidate without preauth flag
  1704. RSN: Ignored PMKID candidate without preauth flag
  1705. RSN: Ignored PMKID candidate without preauth flag
  1706. RSN: Ignored PMKID candidate without preauth flag
  1707. RSN: Ignored PMKID candidate without preauth flag
  1708. RSN: Ignored PMKID candidate without preauth flag
  1709. RSN: Ignored PMKID candidate without preauth flag
  1710. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1711. EAPOL: Supplicant port status: Unauthorized
  1712. nl80211: Event message available
  1713. nl80211: MLME event 37; timeout with 78:19:f7:77:84:c2
  1714. wlan0: Event 14 received on interface wlan0
  1715. wlan0: SME: Authentication timed out
  1716. Added BSSID 78:19:f7:77:84:c2 into blacklist
  1717. wlan0: Another BSS in this ESS has been seen; try it next
  1718. BSSID 78:19:f7:77:84:c2 blacklist count incremented to 2
  1719. wlan0: Setting scan request: 0 sec 100000 usec
  1720. Scan SSID - hexdump_ascii(len=12):
  1721. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1722. wlan0: Include wildcard SSID in the scan request
  1723. wlan0: Starting AP scan for specific SSID(s)
  1724. wlan0: Optimize scan based on previously generated frequency list
  1725. Scan requested (ret=0) - scan timeout 30 seconds
  1726. nl80211: Event message available
  1727. nl80211: Scan trigger
  1728. nl80211: Event message available
  1729. nl80211: New scan results available
  1730. wlan0: Event 3 received on interface wlan0
  1731. nl80211: Received scan results (28 BSSes)
  1732. wlan0: BSS: Start scan result update 10
  1733. wlan0: New scan results available
  1734. wlan0: Selecting BSS from priority group 0
  1735. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
  1736. wlan0: skip - blacklisted (count=2 limit=0)
  1737. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-40 wps
  1738. wlan0: skip - SSID mismatch
  1739. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  1740. wlan0: skip - blacklisted (count=2 limit=0)
  1741. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-53
  1742. wlan0: skip - blacklisted (count=3 limit=0)
  1743. wlan0: 4: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1744. wlan0: skip - blacklisted (count=2 limit=0)
  1745. wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1746. wlan0: skip - blacklisted (count=2 limit=0)
  1747. wlan0: 6: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
  1748. wlan0: skip - blacklisted (count=2 limit=0)
  1749. wlan0: 7: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1750. wlan0: skip - blacklisted (count=2 limit=0)
  1751. wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1752. wlan0: skip - blacklisted (count=2 limit=0)
  1753. wlan0: 9: 78:19:f7:77:ee:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
  1754. wlan0: selected based on RSN IE
  1755. wlan0: selected BSS 78:19:f7:77:ee:c2 ssid='WPI-Wireless'
  1756. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:ee:c2 bssid: 00:00:00:00:00:00 pending: 78:19:f7:77:84:c2 wpa_state: AUTHENTICATING
  1757. wlan0: Automatic auth_alg selection: 0x1
  1758. wlan0: RSN: using IEEE 802.11i/D9.0
  1759. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1760. wlan0: WPA: clearing AP WPA IE
  1761. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1762. wlan0: WPA: using GTK CCMP
  1763. wlan0: WPA: using PTK CCMP
  1764. wlan0: WPA: using KEY_MGMT 802.1X
  1765. wlan0: WPA: not using MGMT group cipher
  1766. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1767. wlan0: Cancelling scan request
  1768. wlan0: SME: Trying to authenticate with 78:19:f7:77:ee:c2 (SSID='WPI-Wireless' freq=2412 MHz)
  1769. wlan0: No keys have been configured - skip key clearing
  1770. wlan0: State: AUTHENTICATING -> AUTHENTICATING
  1771. EAPOL: External notification - EAP success=0
  1772. EAPOL: Supplicant port status: Unauthorized
  1773. EAPOL: External notification - EAP fail=0
  1774. EAPOL: Supplicant port status: Unauthorized
  1775. EAPOL: External notification - portControl=Auto
  1776. EAPOL: Supplicant port status: Unauthorized
  1777. nl80211: Authenticate (ifindex=18)
  1778. * bssid=78:19:f7:77:ee:c2
  1779. * freq=2412
  1780. * SSID - hexdump_ascii(len=12):
  1781. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1782. * IEs - hexdump(len=0): [NULL]
  1783. * Auth Type 0
  1784. nl80211: Authentication request send successfully
  1785. RSN: Ignored PMKID candidate without preauth flag
  1786. RSN: Ignored PMKID candidate without preauth flag
  1787. RSN: Ignored PMKID candidate without preauth flag
  1788. RSN: Ignored PMKID candidate without preauth flag
  1789. RSN: Ignored PMKID candidate without preauth flag
  1790. RSN: Ignored PMKID candidate without preauth flag
  1791. RSN: Ignored PMKID candidate without preauth flag
  1792. RSN: Ignored PMKID candidate without preauth flag
  1793. RSN: Ignored PMKID candidate without preauth flag
  1794. RSN: Ignored PMKID candidate without preauth flag
  1795. RSN: Ignored PMKID candidate without preauth flag
  1796. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1797. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1798. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1799. wlan0: Event 5 received on interface wlan0
  1800. EAPOL: Supplicant port status: Unauthorized
  1801. nl80211: Event message available
  1802. nl80211: MLME event 37; timeout with 78:19:f7:77:ee:c2
  1803. wlan0: Event 14 received on interface wlan0
  1804. wlan0: SME: Authentication timed out
  1805. Added BSSID 78:19:f7:77:ee:c2 into blacklist
  1806. wlan0: Another BSS in this ESS has been seen; try it next
  1807. BSSID 78:19:f7:77:ee:c2 blacklist count incremented to 2
  1808. wlan0: Setting scan request: 0 sec 100000 usec
  1809. wlan0: Authentication with 78:19:f7:77:ee:c2 timed out.
  1810. BSSID 78:19:f7:77:ee:c2 blacklist count incremented to 3
  1811. wlan0: No keys have been configured - skip key clearing
  1812. wlan0: State: AUTHENTICATING -> DISCONNECTED
  1813. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  1814. netlink: Operstate: linkmode=-1, operstate=5
  1815. EAPOL: External notification - portEnabled=0
  1816. EAPOL: Supplicant port status: Unauthorized
  1817. EAPOL: External notification - portValid=0
  1818. EAPOL: Supplicant port status: Unauthorized
  1819. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  1820. wlan0: State: DISCONNECTED -> SCANNING
  1821. Scan SSID - hexdump_ascii(len=12):
  1822. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1823. wlan0: Include wildcard SSID in the scan request
  1824. wlan0: Starting AP scan for specific SSID(s)
  1825. wlan0: Optimize scan based on previously generated frequency list
  1826. Scan requested (ret=0) - scan timeout 30 seconds
  1827. nl80211: Event message available
  1828. nl80211: Scan trigger
  1829. nl80211: Event message available
  1830. nl80211: New scan results available
  1831. wlan0: Event 3 received on interface wlan0
  1832. nl80211: Received scan results (28 BSSes)
  1833. wlan0: BSS: Start scan result update 11
  1834. wlan0: New scan results available
  1835. wlan0: Selecting BSS from priority group 0
  1836. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  1837. wlan0: skip - blacklisted (count=2 limit=0)
  1838. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-40 wps
  1839. wlan0: skip - SSID mismatch
  1840. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  1841. wlan0: skip - blacklisted (count=2 limit=0)
  1842. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
  1843. wlan0: skip - blacklisted (count=3 limit=0)
  1844. wlan0: 4: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1845. wlan0: skip - blacklisted (count=2 limit=0)
  1846. wlan0: 5: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-74
  1847. wlan0: skip - blacklisted (count=2 limit=0)
  1848. wlan0: 6: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1849. wlan0: skip - blacklisted (count=2 limit=0)
  1850. wlan0: 7: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1851. wlan0: skip - blacklisted (count=2 limit=0)
  1852. wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1853. wlan0: skip - blacklisted (count=2 limit=0)
  1854. wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
  1855. wlan0: skip - blacklisted (count=2 limit=0)
  1856. wlan0: 10: 78:19:f7:78:ae:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-87
  1857. wlan0: selected based on RSN IE
  1858. wlan0: selected BSS 78:19:f7:78:ae:42 ssid='WPI-Wireless'
  1859. wlan0: Request association: reassociate: 1 selected: 78:19:f7:78:ae:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  1860. wlan0: Automatic auth_alg selection: 0x1
  1861. wlan0: RSN: using IEEE 802.11i/D9.0
  1862. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1863. wlan0: WPA: clearing AP WPA IE
  1864. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1865. wlan0: WPA: using GTK CCMP
  1866. wlan0: WPA: using PTK CCMP
  1867. wlan0: WPA: using KEY_MGMT 802.1X
  1868. wlan0: WPA: not using MGMT group cipher
  1869. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1870. wlan0: Cancelling scan request
  1871. wlan0: SME: Trying to authenticate with 78:19:f7:78:ae:42 (SSID='WPI-Wireless' freq=2412 MHz)
  1872. wlan0: No keys have been configured - skip key clearing
  1873. wlan0: State: SCANNING -> AUTHENTICATING
  1874. EAPOL: External notification - EAP success=0
  1875. EAPOL: Supplicant port status: Unauthorized
  1876. EAPOL: External notification - EAP fail=0
  1877. EAPOL: Supplicant port status: Unauthorized
  1878. EAPOL: External notification - portControl=Auto
  1879. EAPOL: Supplicant port status: Unauthorized
  1880. nl80211: Authenticate (ifindex=18)
  1881. * bssid=78:19:f7:78:ae:42
  1882. * freq=2412
  1883. * SSID - hexdump_ascii(len=12):
  1884. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1885. * IEs - hexdump(len=0): [NULL]
  1886. * Auth Type 0
  1887. nl80211: Authentication request send successfully
  1888. RSN: Ignored PMKID candidate without preauth flag
  1889. RSN: Ignored PMKID candidate without preauth flag
  1890. RSN: Ignored PMKID candidate without preauth flag
  1891. RSN: Ignored PMKID candidate without preauth flag
  1892. RSN: Ignored PMKID candidate without preauth flag
  1893. RSN: Ignored PMKID candidate without preauth flag
  1894. RSN: Ignored PMKID candidate without preauth flag
  1895. RSN: Ignored PMKID candidate without preauth flag
  1896. RSN: Ignored PMKID candidate without preauth flag
  1897. RSN: Ignored PMKID candidate without preauth flag
  1898. RSN: Ignored PMKID candidate without preauth flag
  1899. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1900. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1901. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1902. wlan0: Event 5 received on interface wlan0
  1903. nl80211: Event message available
  1904. nl80211: MLME event 37; timeout with 78:19:f7:78:ae:42
  1905. wlan0: Event 14 received on interface wlan0
  1906. wlan0: SME: Authentication timed out
  1907. Added BSSID 78:19:f7:78:ae:42 into blacklist
  1908. wlan0: Another BSS in this ESS has been seen; try it next
  1909. BSSID 78:19:f7:78:ae:42 blacklist count incremented to 2
  1910. wlan0: Setting scan request: 0 sec 100000 usec
  1911. Scan SSID - hexdump_ascii(len=12):
  1912. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1913. wlan0: Include wildcard SSID in the scan request
  1914. wlan0: Starting AP scan for specific SSID(s)
  1915. wlan0: Optimize scan based on previously generated frequency list
  1916. Scan requested (ret=0) - scan timeout 30 seconds
  1917. nl80211: Event message available
  1918. nl80211: Scan trigger
  1919. EAPOL: Supplicant port status: Unauthorized
  1920. nl80211: Event message available
  1921. nl80211: New scan results available
  1922. wlan0: Event 3 received on interface wlan0
  1923. nl80211: Received scan results (27 BSSes)
  1924. wlan0: BSS: Start scan result update 12
  1925. wlan0: New scan results available
  1926. wlan0: Selecting BSS from priority group 0
  1927. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  1928. wlan0: skip - blacklisted (count=2 limit=0)
  1929. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-40 wps
  1930. wlan0: skip - SSID mismatch
  1931. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  1932. wlan0: skip - blacklisted (count=2 limit=0)
  1933. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
  1934. wlan0: skip - blacklisted (count=3 limit=0)
  1935. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-74
  1936. wlan0: skip - blacklisted (count=2 limit=0)
  1937. wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1938. wlan0: skip - blacklisted (count=2 limit=0)
  1939. wlan0: 6: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  1940. wlan0: skip - blacklisted (count=2 limit=0)
  1941. wlan0: 7: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-78
  1942. wlan0: skip - blacklisted (count=2 limit=0)
  1943. wlan0: 8: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  1944. wlan0: skip - blacklisted (count=2 limit=0)
  1945. wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
  1946. wlan0: skip - blacklisted (count=2 limit=0)
  1947. wlan0: 10: 78:19:f7:78:d0:82 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-90
  1948. wlan0: selected based on RSN IE
  1949. wlan0: selected BSS 78:19:f7:78:d0:82 ssid='WPI-Wireless'
  1950. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:d0:82 bssid: 00:00:00:00:00:00 pending: 78:19:f7:78:ae:42 wpa_state: AUTHENTICATING
  1951. wlan0: Automatic auth_alg selection: 0x1
  1952. wlan0: RSN: using IEEE 802.11i/D9.0
  1953. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1954. wlan0: WPA: clearing AP WPA IE
  1955. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1956. wlan0: WPA: using GTK CCMP
  1957. wlan0: WPA: using PTK CCMP
  1958. wlan0: WPA: using KEY_MGMT 802.1X
  1959. wlan0: WPA: not using MGMT group cipher
  1960. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1961. wlan0: Cancelling scan request
  1962. wlan0: SME: Trying to authenticate with 78:19:f7:78:d0:82 (SSID='WPI-Wireless' freq=2462 MHz)
  1963. wlan0: No keys have been configured - skip key clearing
  1964. wlan0: State: AUTHENTICATING -> AUTHENTICATING
  1965. EAPOL: External notification - EAP success=0
  1966. EAPOL: Supplicant port status: Unauthorized
  1967. EAPOL: External notification - EAP fail=0
  1968. EAPOL: Supplicant port status: Unauthorized
  1969. EAPOL: External notification - portControl=Auto
  1970. EAPOL: Supplicant port status: Unauthorized
  1971. nl80211: Authenticate (ifindex=18)
  1972. * bssid=78:19:f7:78:d0:82
  1973. * freq=2462
  1974. * SSID - hexdump_ascii(len=12):
  1975. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  1976. * IEs - hexdump(len=0): [NULL]
  1977. * Auth Type 0
  1978. nl80211: Authentication request send successfully
  1979. RSN: Ignored PMKID candidate without preauth flag
  1980. RSN: Ignored PMKID candidate without preauth flag
  1981. RSN: Ignored PMKID candidate without preauth flag
  1982. RSN: Ignored PMKID candidate without preauth flag
  1983. RSN: Ignored PMKID candidate without preauth flag
  1984. RSN: Ignored PMKID candidate without preauth flag
  1985. RSN: Ignored PMKID candidate without preauth flag
  1986. RSN: Ignored PMKID candidate without preauth flag
  1987. RSN: Ignored PMKID candidate without preauth flag
  1988. RSN: Ignored PMKID candidate without preauth flag
  1989. RSN: Ignored PMKID candidate without preauth flag
  1990. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  1991. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1992. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  1993. wlan0: Event 5 received on interface wlan0
  1994. nl80211: Event message available
  1995. nl80211: MLME event 37; timeout with 78:19:f7:78:d0:82
  1996. wlan0: Event 14 received on interface wlan0
  1997. wlan0: SME: Authentication timed out
  1998. Added BSSID 78:19:f7:78:d0:82 into blacklist
  1999. wlan0: Setting scan request: 0 sec 100000 usec
  2000. Scan SSID - hexdump_ascii(len=12):
  2001. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2002. wlan0: Include wildcard SSID in the scan request
  2003. wlan0: Starting AP scan for specific SSID(s)
  2004. Scan requested (ret=0) - scan timeout 30 seconds
  2005. nl80211: Event message available
  2006. nl80211: Scan trigger
  2007. EAPOL: Supplicant port status: Unauthorized
  2008. nl80211: Event message available
  2009. nl80211: New scan results available
  2010. wlan0: Event 3 received on interface wlan0
  2011. nl80211: Received scan results (26 BSSes)
  2012. wlan0: BSS: Start scan result update 13
  2013. wlan0: BSS: Expire BSS 28 due to no match in scan
  2014. wlan0: BSS: Remove id 28 BSSID 78:19:f7:77:ee:c2 SSID 'WPI-Wireless'
  2015. wlan0: New scan results available
  2016. wlan0: Selecting BSS from priority group 0
  2017. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
  2018. wlan0: skip - blacklisted (count=2 limit=0)
  2019. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  2020. wlan0: skip - SSID mismatch
  2021. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  2022. wlan0: skip - blacklisted (count=2 limit=0)
  2023. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
  2024. wlan0: skip - blacklisted (count=3 limit=0)
  2025. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-73
  2026. wlan0: skip - blacklisted (count=2 limit=0)
  2027. wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  2028. wlan0: skip - blacklisted (count=2 limit=0)
  2029. wlan0: 6: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  2030. wlan0: skip - blacklisted (count=2 limit=0)
  2031. wlan0: 7: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
  2032. wlan0: skip - blacklisted (count=2 limit=0)
  2033. wlan0: 8: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
  2034. wlan0: skip - blacklisted (count=2 limit=0)
  2035. wlan0: 9: 78:19:f7:77:84:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-87
  2036. wlan0: skip - blacklisted (count=2 limit=0)
  2037. wlan0: 10: 00:30:44:0a:55:8e ssid='archieLAN' wpa_ie_len=0 rsn_ie_len=0 caps=0x421 level=-59
  2038. wlan0: skip - SSID mismatch
  2039. wlan0: 11: 78:19:f7:77:86:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-47
  2040. wlan0: skip - SSID mismatch
  2041. wlan0: 12: 78:19:f7:78:46:c0 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-45
  2042. wlan0: skip - SSID mismatch
  2043. wlan0: 13: 1c:7e:e5:3b:bb:de ssid='dlink' wpa_ie_len=0 rsn_ie_len=0 caps=0x421 level=-52 wps
  2044. wlan0: skip - SSID mismatch
  2045. wlan0: 14: 78:19:f7:79:95:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-53
  2046. wlan0: skip - SSID mismatch
  2047. wlan0: 15: 00:30:bd:c5:7e:28 ssid='WLAN' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-33
  2048. wlan0: skip - SSID mismatch
  2049. wlan0: 16: 78:19:f7:78:ee:00 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-73
  2050. wlan0: skip - SSID mismatch
  2051. wlan0: 17: 78:19:f7:77:87:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-74
  2052. wlan0: skip - SSID mismatch
  2053. wlan0: 18: 58:6d:8f:29:ad:5f ssid='Newton's Balls' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-77
  2054. wlan0: skip - SSID mismatch
  2055. wlan0: 19: 78:19:f7:77:93:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-79
  2056. wlan0: skip - SSID mismatch
  2057. wlan0: 20: 78:19:f7:79:6d:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-80
  2058. wlan0: skip - SSID mismatch
  2059. wlan0: 21: 78:19:f7:78:43:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-84
  2060. wlan0: skip - SSID mismatch
  2061. wlan0: 22: 78:19:f7:77:ee:c0 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-87
  2062. wlan0: skip - SSID mismatch
  2063. wlan0: 23: 78:19:f7:78:d0:80 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-86
  2064. wlan0: skip - SSID mismatch
  2065. wlan0: 24: 78:19:f7:77:84:c0 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-88
  2066. wlan0: skip - SSID mismatch
  2067. wlan0: 25: 78:19:f7:78:ae:40 ssid='WPI-Guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-89
  2068. wlan0: skip - SSID mismatch
  2069. wlan0: No APs found - clear blacklist and try again
  2070. Removed BSSID 78:19:f7:78:d0:82 from blacklist (clear)
  2071. Removed BSSID 78:19:f7:78:ae:42 from blacklist (clear)
  2072. Removed BSSID 78:19:f7:77:ee:c2 from blacklist (clear)
  2073. Removed BSSID 78:19:f7:77:84:c2 from blacklist (clear)
  2074. Removed BSSID 78:19:f7:77:87:42 from blacklist (clear)
  2075. Removed BSSID 78:19:f7:78:43:42 from blacklist (clear)
  2076. Removed BSSID 78:19:f7:79:6d:42 from blacklist (clear)
  2077. Removed BSSID 78:19:f7:78:ee:02 from blacklist (clear)
  2078. Removed BSSID 78:19:f7:77:93:42 from blacklist (clear)
  2079. Removed BSSID 78:19:f7:78:46:c2 from blacklist (clear)
  2080. Removed BSSID 78:19:f7:77:86:42 from blacklist (clear)
  2081. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  2082. Removed BSSID 78:19:f7:79:95:42 from blacklist (clear)
  2083. wlan0: Selecting BSS from priority group 0
  2084. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-47
  2085. wlan0: selected based on RSN IE
  2086. wlan0: selected BSS 78:19:f7:77:86:42 ssid='WPI-Wireless'
  2087. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:86:42 bssid: 00:00:00:00:00:00 pending: 78:19:f7:78:d0:82 wpa_state: AUTHENTICATING
  2088. wlan0: Automatic auth_alg selection: 0x1
  2089. wlan0: RSN: using IEEE 802.11i/D9.0
  2090. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  2091. wlan0: WPA: clearing AP WPA IE
  2092. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2093. wlan0: WPA: using GTK CCMP
  2094. wlan0: WPA: using PTK CCMP
  2095. wlan0: WPA: using KEY_MGMT 802.1X
  2096. wlan0: WPA: not using MGMT group cipher
  2097. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2098. wlan0: Cancelling scan request
  2099. wlan0: SME: Trying to authenticate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
  2100. wlan0: No keys have been configured - skip key clearing
  2101. wlan0: State: AUTHENTICATING -> AUTHENTICATING
  2102. EAPOL: External notification - EAP success=0
  2103. EAPOL: Supplicant port status: Unauthorized
  2104. EAPOL: External notification - EAP fail=0
  2105. EAPOL: Supplicant port status: Unauthorized
  2106. EAPOL: External notification - portControl=Auto
  2107. EAPOL: Supplicant port status: Unauthorized
  2108. nl80211: Authenticate (ifindex=18)
  2109. * bssid=78:19:f7:77:86:42
  2110. * freq=2412
  2111. * SSID - hexdump_ascii(len=12):
  2112. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2113. * IEs - hexdump(len=0): [NULL]
  2114. * Auth Type 0
  2115. nl80211: Authentication request send successfully
  2116. RSN: Ignored PMKID candidate without preauth flag
  2117. RSN: Ignored PMKID candidate without preauth flag
  2118. RSN: Ignored PMKID candidate without preauth flag
  2119. RSN: Ignored PMKID candidate without preauth flag
  2120. RSN: Ignored PMKID candidate without preauth flag
  2121. RSN: Ignored PMKID candidate without preauth flag
  2122. RSN: Ignored PMKID candidate without preauth flag
  2123. RSN: Ignored PMKID candidate without preauth flag
  2124. RSN: Ignored PMKID candidate without preauth flag
  2125. RSN: Ignored PMKID candidate without preauth flag
  2126. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  2127. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2128. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2129. wlan0: Event 5 received on interface wlan0
  2130. nl80211: Event message available
  2131. nl80211: MLME event 37
  2132. wlan0: Event 11 received on interface wlan0
  2133. wlan0: SME: Authentication response: peer=78:19:f7:77:86:42 auth_type=0 status_code=0
  2134. wlan0: Trying to associate with 78:19:f7:77:86:42 (SSID='WPI-Wireless' freq=2412 MHz)
  2135. wlan0: State: AUTHENTICATING -> ASSOCIATING
  2136. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2137. netlink: Operstate: linkmode=-1, operstate=5
  2138. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2139. nl80211: Associate (ifindex=18)
  2140. * bssid=78:19:f7:77:86:42
  2141. * freq=2412
  2142. * SSID - hexdump_ascii(len=12):
  2143. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2144. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2145. * pairwise=0xfac04
  2146. * group=0xfac04
  2147. nl80211: Association request send successfully
  2148. nl80211: Event message available
  2149. nl80211: Delete station 78:19:f7:77:86:42
  2150. nl80211: Event message available
  2151. nl80211: MLME event 38
  2152. wlan0: Event 13 received on interface wlan0
  2153. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:77:86:42 status_code=1
  2154. wlan0: SME: Association with 78:19:f7:77:86:42 failed: status code 1
  2155. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:77:86:42 reason_code=3)
  2156. Added BSSID 78:19:f7:77:86:42 into blacklist
  2157. wlan0: Another BSS in this ESS has been seen; try it next
  2158. BSSID 78:19:f7:77:86:42 blacklist count incremented to 2
  2159. wlan0: Setting scan request: 0 sec 100000 usec
  2160. wlan0: State: ASSOCIATING -> DISCONNECTED
  2161. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2162. netlink: Operstate: linkmode=-1, operstate=5
  2163. nl80211: Event message available
  2164. nl80211: Ignore connect event (cmd=46) when using userspace SME
  2165. nl80211: Event message available
  2166. nl80211: MLME event 39
  2167. wlan0: Event 12 received on interface wlan0
  2168. wlan0: Deauthentication notification
  2169. wlan0: * reason 3
  2170. wlan0: * address 78:19:f7:77:86:42
  2171. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  2172. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  2173. Added BSSID 00:00:00:00:00:00 into blacklist
  2174. wlan0: Another BSS in this ESS has been seen; try it next
  2175. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  2176. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  2177. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  2178. wlan0: Disconnect event - remove keys
  2179. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  2180. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  2181. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  2182. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  2183. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  2184. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  2185. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2186. addr=00:00:00:00:00:00
  2187. wlan0: State: DISCONNECTED -> DISCONNECTED
  2188. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2189. netlink: Operstate: linkmode=-1, operstate=5
  2190. EAPOL: External notification - portEnabled=0
  2191. EAPOL: Supplicant port status: Unauthorized
  2192. EAPOL: External notification - portValid=0
  2193. EAPOL: Supplicant port status: Unauthorized
  2194. wlan0: State: DISCONNECTED -> SCANNING
  2195. Scan SSID - hexdump_ascii(len=12):
  2196. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2197. wlan0: Include wildcard SSID in the scan request
  2198. wlan0: Starting AP scan for specific SSID(s)
  2199. wlan0: Optimize scan based on previously generated frequency list
  2200. Scan requested (ret=0) - scan timeout 30 seconds
  2201. nl80211: Event message available
  2202. nl80211: Scan trigger
  2203. nl80211: Event message available
  2204. nl80211: New scan results available
  2205. wlan0: Event 3 received on interface wlan0
  2206. nl80211: Received scan results (26 BSSes)
  2207. wlan0: BSS: Start scan result update 14
  2208. wlan0: BSS: Expire BSS 10 due to no match in scan
  2209. wlan0: BSS: Remove id 10 BSSID 78:19:f7:78:ae:42 SSID 'WPI-Wireless'
  2210. wlan0: New scan results available
  2211. wlan0: Selecting BSS from priority group 0
  2212. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  2213. wlan0: skip - blacklisted (count=2 limit=0)
  2214. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  2215. wlan0: skip - SSID mismatch
  2216. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46
  2217. wlan0: selected based on RSN IE
  2218. wlan0: selected BSS 78:19:f7:78:46:c2 ssid='WPI-Wireless'
  2219. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:46:c2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  2220. wlan0: Automatic auth_alg selection: 0x1
  2221. wlan0: RSN: using IEEE 802.11i/D9.0
  2222. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  2223. wlan0: WPA: clearing AP WPA IE
  2224. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2225. wlan0: WPA: using GTK CCMP
  2226. wlan0: WPA: using PTK CCMP
  2227. wlan0: WPA: using KEY_MGMT 802.1X
  2228. wlan0: WPA: not using MGMT group cipher
  2229. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2230. wlan0: Cancelling scan request
  2231. wlan0: SME: Trying to authenticate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
  2232. wlan0: No keys have been configured - skip key clearing
  2233. wlan0: State: SCANNING -> AUTHENTICATING
  2234. EAPOL: External notification - EAP success=0
  2235. EAPOL: Supplicant port status: Unauthorized
  2236. EAPOL: External notification - EAP fail=0
  2237. EAPOL: Supplicant port status: Unauthorized
  2238. EAPOL: External notification - portControl=Auto
  2239. EAPOL: Supplicant port status: Unauthorized
  2240. nl80211: Authenticate (ifindex=18)
  2241. * bssid=78:19:f7:78:46:c2
  2242. * freq=2462
  2243. * SSID - hexdump_ascii(len=12):
  2244. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2245. * IEs - hexdump(len=0): [NULL]
  2246. * Auth Type 0
  2247. nl80211: Authentication request send successfully
  2248. RSN: Ignored PMKID candidate without preauth flag
  2249. RSN: Ignored PMKID candidate without preauth flag
  2250. RSN: Ignored PMKID candidate without preauth flag
  2251. RSN: Ignored PMKID candidate without preauth flag
  2252. RSN: Ignored PMKID candidate without preauth flag
  2253. RSN: Ignored PMKID candidate without preauth flag
  2254. RSN: Ignored PMKID candidate without preauth flag
  2255. RSN: Ignored PMKID candidate without preauth flag
  2256. RSN: Ignored PMKID candidate without preauth flag
  2257. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  2258. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2259. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2260. wlan0: Event 5 received on interface wlan0
  2261. nl80211: Event message available
  2262. nl80211: MLME event 37
  2263. wlan0: Event 11 received on interface wlan0
  2264. wlan0: SME: Authentication response: peer=78:19:f7:78:46:c2 auth_type=0 status_code=0
  2265. wlan0: Trying to associate with 78:19:f7:78:46:c2 (SSID='WPI-Wireless' freq=2462 MHz)
  2266. wlan0: State: AUTHENTICATING -> ASSOCIATING
  2267. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2268. netlink: Operstate: linkmode=-1, operstate=5
  2269. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2270. nl80211: Associate (ifindex=18)
  2271. * bssid=78:19:f7:78:46:c2
  2272. * freq=2462
  2273. * SSID - hexdump_ascii(len=12):
  2274. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2275. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2276. * pairwise=0xfac04
  2277. * group=0xfac04
  2278. nl80211: Association request send successfully
  2279. nl80211: Event message available
  2280. nl80211: Delete station 78:19:f7:78:46:c2
  2281. nl80211: Event message available
  2282. nl80211: MLME event 38
  2283. wlan0: Event 13 received on interface wlan0
  2284. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:46:c2 status_code=1
  2285. wlan0: SME: Association with 78:19:f7:78:46:c2 failed: status code 1
  2286. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:46:c2 reason_code=3)
  2287. Added BSSID 78:19:f7:78:46:c2 into blacklist
  2288. wlan0: Another BSS in this ESS has been seen; try it next
  2289. BSSID 78:19:f7:78:46:c2 blacklist count incremented to 2
  2290. wlan0: Setting scan request: 0 sec 100000 usec
  2291. wlan0: State: ASSOCIATING -> DISCONNECTED
  2292. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2293. netlink: Operstate: linkmode=-1, operstate=5
  2294. nl80211: Event message available
  2295. nl80211: Ignore connect event (cmd=46) when using userspace SME
  2296. nl80211: Event message available
  2297. nl80211: MLME event 39
  2298. wlan0: Event 12 received on interface wlan0
  2299. wlan0: Deauthentication notification
  2300. wlan0: * reason 3
  2301. wlan0: * address 78:19:f7:78:46:c2
  2302. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  2303. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  2304. BSSID 00:00:00:00:00:00 blacklist count incremented to 3
  2305. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  2306. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  2307. wlan0: Disconnect event - remove keys
  2308. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  2309. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  2310. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  2311. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  2312. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  2313. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  2314. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2315. addr=00:00:00:00:00:00
  2316. wlan0: State: DISCONNECTED -> DISCONNECTED
  2317. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2318. netlink: Operstate: linkmode=-1, operstate=5
  2319. EAPOL: External notification - portEnabled=0
  2320. EAPOL: Supplicant port status: Unauthorized
  2321. EAPOL: External notification - portValid=0
  2322. EAPOL: Supplicant port status: Unauthorized
  2323. wlan0: State: DISCONNECTED -> SCANNING
  2324. Scan SSID - hexdump_ascii(len=12):
  2325. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2326. wlan0: Include wildcard SSID in the scan request
  2327. wlan0: Starting AP scan for specific SSID(s)
  2328. wlan0: Optimize scan based on previously generated frequency list
  2329. Scan requested (ret=0) - scan timeout 30 seconds
  2330. nl80211: Event message available
  2331. nl80211: Scan trigger
  2332. EAPOL: Supplicant port status: Unauthorized
  2333. nl80211: Event message available
  2334. nl80211: New scan results available
  2335. wlan0: Event 3 received on interface wlan0
  2336. nl80211: Received scan results (26 BSSes)
  2337. wlan0: BSS: Start scan result update 15
  2338. wlan0: BSS: Expire BSS 26 due to no match in scan
  2339. wlan0: BSS: Remove id 26 BSSID 78:19:f7:78:d0:82 SSID 'WPI-Wireless'
  2340. wlan0: New scan results available
  2341. wlan0: Selecting BSS from priority group 0
  2342. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49
  2343. wlan0: skip - blacklisted (count=2 limit=0)
  2344. wlan0: 1: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  2345. wlan0: skip - SSID mismatch
  2346. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  2347. wlan0: skip - blacklisted (count=2 limit=0)
  2348. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
  2349. wlan0: selected based on RSN IE
  2350. wlan0: selected BSS 78:19:f7:79:95:42 ssid='WPI-Wireless'
  2351. wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:95:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  2352. wlan0: Automatic auth_alg selection: 0x1
  2353. wlan0: RSN: using IEEE 802.11i/D9.0
  2354. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  2355. wlan0: WPA: clearing AP WPA IE
  2356. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2357. wlan0: WPA: using GTK CCMP
  2358. wlan0: WPA: using PTK CCMP
  2359. wlan0: WPA: using KEY_MGMT 802.1X
  2360. wlan0: WPA: not using MGMT group cipher
  2361. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2362. wlan0: Cancelling scan request
  2363. wlan0: SME: Trying to authenticate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
  2364. wlan0: No keys have been configured - skip key clearing
  2365. wlan0: State: SCANNING -> AUTHENTICATING
  2366. EAPOL: External notification - EAP success=0
  2367. EAPOL: Supplicant port status: Unauthorized
  2368. EAPOL: External notification - EAP fail=0
  2369. EAPOL: Supplicant port status: Unauthorized
  2370. EAPOL: External notification - portControl=Auto
  2371. EAPOL: Supplicant port status: Unauthorized
  2372. nl80211: Authenticate (ifindex=18)
  2373. * bssid=78:19:f7:79:95:42
  2374. * freq=2462
  2375. * SSID - hexdump_ascii(len=12):
  2376. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2377. * IEs - hexdump(len=0): [NULL]
  2378. * Auth Type 0
  2379. nl80211: Authentication request send successfully
  2380. RSN: Ignored PMKID candidate without preauth flag
  2381. RSN: Ignored PMKID candidate without preauth flag
  2382. RSN: Ignored PMKID candidate without preauth flag
  2383. RSN: Ignored PMKID candidate without preauth flag
  2384. RSN: Ignored PMKID candidate without preauth flag
  2385. RSN: Ignored PMKID candidate without preauth flag
  2386. RSN: Ignored PMKID candidate without preauth flag
  2387. RSN: Ignored PMKID candidate without preauth flag
  2388. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  2389. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2390. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2391. wlan0: Event 5 received on interface wlan0
  2392. nl80211: Event message available
  2393. nl80211: MLME event 37
  2394. wlan0: Event 11 received on interface wlan0
  2395. wlan0: SME: Authentication response: peer=78:19:f7:79:95:42 auth_type=0 status_code=0
  2396. wlan0: Trying to associate with 78:19:f7:79:95:42 (SSID='WPI-Wireless' freq=2462 MHz)
  2397. wlan0: State: AUTHENTICATING -> ASSOCIATING
  2398. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2399. netlink: Operstate: linkmode=-1, operstate=5
  2400. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2401. nl80211: Associate (ifindex=18)
  2402. * bssid=78:19:f7:79:95:42
  2403. * freq=2462
  2404. * SSID - hexdump_ascii(len=12):
  2405. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2406. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2407. * pairwise=0xfac04
  2408. * group=0xfac04
  2409. nl80211: Association request send successfully
  2410. nl80211: Event message available
  2411. nl80211: New station 78:19:f7:79:95:42
  2412. nl80211: Event message available
  2413. nl80211: MLME event 38
  2414. wlan0: Event 0 received on interface wlan0
  2415. wlan0: Association info event
  2416. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  2417. wlan0: freq=2462 MHz
  2418. wlan0: State: ASSOCIATING -> ASSOCIATED
  2419. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2420. netlink: Operstate: linkmode=-1, operstate=5
  2421. wlan0: Associated to a new BSS: BSSID=78:19:f7:79:95:42
  2422. wlan0: No keys have been configured - skip key clearing
  2423. wlan0: Associated with 78:19:f7:79:95:42
  2424. wlan0: WPA: Association event - clear replay counter
  2425. wlan0: WPA: Clear old PTK
  2426. EAPOL: External notification - portEnabled=0
  2427. EAPOL: Supplicant port status: Unauthorized
  2428. EAPOL: External notification - portValid=0
  2429. EAPOL: Supplicant port status: Unauthorized
  2430. EAPOL: External notification - portEnabled=1
  2431. EAPOL: SUPP_PAE entering state CONNECTING
  2432. EAPOL: SUPP_BE entering state IDLE
  2433. EAP: EAP entering state INITIALIZE
  2434. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  2435. TLSv1: Selected cipher suite: 0x0000
  2436. TLSv1: Record Layer - New write cipher suite 0x0000
  2437. TLSv1: Record Layer - New read cipher suite 0x0000
  2438. EAP: EAP entering state IDLE
  2439. wlan0: Setting authentication timeout: 10 sec 0 usec
  2440. wlan0: Cancelling scan request
  2441. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2442. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2443. wlan0: Event 5 received on interface wlan0
  2444. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2445. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2446. wlan0: Event 5 received on interface wlan0
  2447. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2448. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2449. wlan0: Event 5 received on interface wlan0
  2450. nl80211: Event message available
  2451. nl80211: Ignore connect event (cmd=46) when using userspace SME
  2452. EAPOL: startWhen --> 0
  2453. EAPOL: SUPP_PAE entering state CONNECTING
  2454. EAPOL: txStart
  2455. TX EAPOL: dst=78:19:f7:79:95:42
  2456. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2457. wlan0: Setting authentication timeout: 70 sec 0 usec
  2458. EAPOL: Received EAP-Packet frame
  2459. EAPOL: SUPP_PAE entering state RESTART
  2460. EAP: EAP entering state INITIALIZE
  2461. EAP: EAP entering state IDLE
  2462. EAPOL: SUPP_PAE entering state AUTHENTICATING
  2463. EAPOL: SUPP_BE entering state REQUEST
  2464. EAPOL: getSuppRsp
  2465. EAP: EAP entering state RECEIVED
  2466. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  2467. EAP: EAP entering state IDENTITY
  2468. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  2469. EAP: EAP-Request Identity data - hexdump_ascii(len=49):
  2470. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  2471. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  2472. 33 35 31 2f 31 2c 70 6f 72 74 69 64 3d 32 32 35 351/1,portid=225
  2473. 35 5
  2474. EAP: using real identity - hexdump_ascii(len=19):
  2475. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  2476. 2d 30 39 -09
  2477. EAP: EAP entering state SEND_RESPONSE
  2478. EAP: EAP entering state IDLE
  2479. EAPOL: SUPP_BE entering state RESPONSE
  2480. EAPOL: txSuppRsp
  2481. TX EAPOL: dst=78:19:f7:79:95:42
  2482. EAPOL: SUPP_BE entering state RECEIVE
  2483. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2484. EAPOL: Received EAP-Packet frame
  2485. EAPOL: SUPP_BE entering state REQUEST
  2486. EAPOL: getSuppRsp
  2487. EAP: EAP entering state RECEIVED
  2488. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  2489. EAP: EAP entering state GET_METHOD
  2490. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  2491. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  2492. TLS: using phase1 config options
  2493. TLSv1: Converting PEM format certificate into DER format
  2494. X509: Extension: extnID=2.5.29.14 critical=0
  2495. X509: Extension: extnID=2.5.29.35 critical=0
  2496. X509: Extension: extnID=2.5.29.19 critical=0
  2497. X509: BasicConstraints - cA=255
  2498. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  2499. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  2500. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  2501. Trying to parse PKCS #1 encoded RSA private key
  2502. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  2503. EAP: EAP entering state METHOD
  2504. SSL: Received packet(len=6) - Flags 0x20
  2505. EAP-TLS: Start
  2506. TLSv1: Send ClientHello
  2507. SSL: 56 bytes left to be sent out (of total 56 bytes)
  2508. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  2509. EAP: EAP entering state SEND_RESPONSE
  2510. EAP: EAP entering state IDLE
  2511. EAPOL: SUPP_BE entering state RESPONSE
  2512. EAPOL: txSuppRsp
  2513. TX EAPOL: dst=78:19:f7:79:95:42
  2514. EAPOL: SUPP_BE entering state RECEIVE
  2515. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2516. EAPOL: Received EAP-Packet frame
  2517. EAPOL: SUPP_BE entering state REQUEST
  2518. EAPOL: getSuppRsp
  2519. EAP: EAP entering state RECEIVED
  2520. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  2521. EAP: EAP entering state METHOD
  2522. SSL: Received packet(len=1024) - Flags 0xc0
  2523. SSL: TLS Message Length: 3680
  2524. SSL: Need 2666 bytes more input data
  2525. SSL: Building ACK (type=13 id=3 ver=0)
  2526. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  2527. EAP: EAP entering state SEND_RESPONSE
  2528. EAP: EAP entering state IDLE
  2529. EAPOL: SUPP_BE entering state RESPONSE
  2530. EAPOL: txSuppRsp
  2531. TX EAPOL: dst=78:19:f7:79:95:42
  2532. EAPOL: SUPP_BE entering state RECEIVE
  2533. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2534. EAPOL: Received EAP-Packet frame
  2535. EAPOL: SUPP_BE entering state REQUEST
  2536. EAPOL: getSuppRsp
  2537. EAP: EAP entering state RECEIVED
  2538. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  2539. EAP: EAP entering state METHOD
  2540. SSL: Received packet(len=1024) - Flags 0xc0
  2541. SSL: TLS Message Length: 3680
  2542. SSL: Need 1652 bytes more input data
  2543. SSL: Building ACK (type=13 id=4 ver=0)
  2544. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  2545. EAP: EAP entering state SEND_RESPONSE
  2546. EAP: EAP entering state IDLE
  2547. EAPOL: SUPP_BE entering state RESPONSE
  2548. EAPOL: txSuppRsp
  2549. TX EAPOL: dst=78:19:f7:79:95:42
  2550. EAPOL: SUPP_BE entering state RECEIVE
  2551. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2552. EAPOL: Received EAP-Packet frame
  2553. EAPOL: SUPP_BE entering state REQUEST
  2554. EAPOL: getSuppRsp
  2555. EAP: EAP entering state RECEIVED
  2556. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  2557. EAP: EAP entering state METHOD
  2558. SSL: Received packet(len=1024) - Flags 0xc0
  2559. SSL: TLS Message Length: 3680
  2560. SSL: Need 638 bytes more input data
  2561. SSL: Building ACK (type=13 id=5 ver=0)
  2562. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  2563. EAP: EAP entering state SEND_RESPONSE
  2564. EAP: EAP entering state IDLE
  2565. EAPOL: SUPP_BE entering state RESPONSE
  2566. EAPOL: txSuppRsp
  2567. TX EAPOL: dst=78:19:f7:79:95:42
  2568. EAPOL: SUPP_BE entering state RECEIVE
  2569. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2570. EAPOL: Received EAP-Packet frame
  2571. EAPOL: SUPP_BE entering state REQUEST
  2572. EAPOL: getSuppRsp
  2573. EAP: EAP entering state RECEIVED
  2574. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  2575. EAP: EAP entering state METHOD
  2576. SSL: Received packet(len=648) - Flags 0x80
  2577. SSL: TLS Message Length: 3680
  2578. TLSv1: Received content type 22 version 3.1 length 42
  2579. TLSv1: Received ServerHello
  2580. TLSv1: Using TLS v1.0
  2581. TLSv1: Selected cipher suite: 0x002f
  2582. TLSv1: Received content type 22 version 3.1 length 3278
  2583. TLSv1: Received Certificate (certificate_list len 3274)
  2584. TLSv1: Certificate 0 (len 1511)
  2585. X509: Extension: extnID=2.5.29.37 critical=0
  2586. X509: Extension: extnID=2.5.29.37 critical=0
  2587. TLSv1: Certificate 1 (len 1754)
  2588. X509: Extension: extnID=2.5.29.14 critical=0
  2589. X509: Extension: extnID=2.5.29.35 critical=0
  2590. X509: Extension: extnID=2.5.29.19 critical=0
  2591. X509: BasicConstraints - cA=255
  2592. X509: Validate certificate chain
  2593. X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
  2594. X509: Certificate Digest matches with calculated tbsCertificate hash
  2595. X509: Found issuer from the list of trusted certificates
  2596. X509: Certificate Digest matches with calculated tbsCertificate hash
  2597. X509: Trusted certificate found to complete the chain
  2598. X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  2599. X509: Certificate chain valid
  2600. TLSv1: Received content type 22 version 3.1 length 345
  2601. TLSv1: Received CertificateRequest
  2602. TLSv1: Received ServerHelloDone
  2603. TLSv1: Send Certificate
  2604. TLSv1: Full client certificate chain not configured - validation may fail
  2605. TLSv1: Send ClientKeyExchange
  2606. TLSv1: Send CertificateVerify
  2607. TLSv1: Send ChangeCipherSpec
  2608. TLSv1: Record Layer - New write cipher suite 0x002f
  2609. TLSv1: Send Finished
  2610. TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
  2611. SSL: 1117 bytes left to be sent out (of total 1117 bytes)
  2612. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  2613. EAP: EAP entering state SEND_RESPONSE
  2614. EAP: EAP entering state IDLE
  2615. EAPOL: SUPP_BE entering state RESPONSE
  2616. EAPOL: txSuppRsp
  2617. TX EAPOL: dst=78:19:f7:79:95:42
  2618. EAPOL: SUPP_BE entering state RECEIVE
  2619. wlan0: RX EAPOL from 78:19:f7:79:95:42
  2620. EAPOL: Received EAP-Packet frame
  2621. EAPOL: SUPP_BE entering state REQUEST
  2622. EAPOL: getSuppRsp
  2623. EAP: EAP entering state RECEIVED
  2624. EAP: Received EAP-Failure
  2625. EAP: EAP entering state FAILURE
  2626. wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
  2627. EAPOL: SUPP_PAE entering state HELD
  2628. EAPOL: Supplicant port status: Unauthorized
  2629. EAPOL: SUPP_BE entering state RECEIVE
  2630. EAPOL: SUPP_BE entering state FAIL
  2631. EAPOL: SUPP_BE entering state IDLE
  2632. EAPOL authentication completed unsuccessfully
  2633. wlan0: Setting authentication timeout: 2 sec 0 usec
  2634. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2635. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2636. wlan0: Event 5 received on interface wlan0
  2637. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2638. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2639. wlan0: Event 5 received on interface wlan0
  2640. nl80211: Event message available
  2641. nl80211: Delete station 78:19:f7:79:95:42
  2642. nl80211: Event message available
  2643. nl80211: MLME event 39
  2644. wlan0: Event 12 received on interface wlan0
  2645. wlan0: Deauthentication notification
  2646. wlan0: * reason 1
  2647. wlan0: * address 78:19:f7:79:95:42
  2648. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  2649. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  2650. wlan0: Setting scan request: 0 sec 100000 usec
  2651. Added BSSID 78:19:f7:79:95:42 into blacklist
  2652. wlan0: Another BSS in this ESS has been seen; try it next
  2653. BSSID 78:19:f7:79:95:42 blacklist count incremented to 2
  2654. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  2655. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:79:95:42 reason=1
  2656. wlan0: Disconnect event - remove keys
  2657. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  2658. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  2659. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  2660. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  2661. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  2662. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  2663. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2664. addr=78:19:f7:79:95:42
  2665. wlan0: State: ASSOCIATED -> DISCONNECTED
  2666. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2667. netlink: Operstate: linkmode=-1, operstate=5
  2668. EAPOL: External notification - portEnabled=0
  2669. EAPOL: SUPP_PAE entering state DISCONNECTED
  2670. EAPOL: Supplicant port status: Unauthorized
  2671. EAPOL: SUPP_BE entering state INITIALIZE
  2672. EAP: EAP entering state DISABLED
  2673. EAPOL: Supplicant port status: Unauthorized
  2674. EAPOL: External notification - portValid=0
  2675. EAPOL: Supplicant port status: Unauthorized
  2676. nl80211: Event message available
  2677. nl80211: Ignore disconnect event when using userspace SME
  2678. wlan0: State: DISCONNECTED -> SCANNING
  2679. Scan SSID - hexdump_ascii(len=12):
  2680. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2681. wlan0: Include wildcard SSID in the scan request
  2682. wlan0: Starting AP scan for specific SSID(s)
  2683. wlan0: Optimize scan based on previously generated frequency list
  2684. Scan requested (ret=0) - scan timeout 30 seconds
  2685. nl80211: Event message available
  2686. nl80211: Scan trigger
  2687. nl80211: Event message available
  2688. nl80211: New scan results available
  2689. wlan0: Event 3 received on interface wlan0
  2690. nl80211: Received scan results (24 BSSes)
  2691. wlan0: BSS: Start scan result update 16
  2692. wlan0: New scan results available
  2693. wlan0: Selecting BSS from priority group 0
  2694. wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
  2695. wlan0: skip - blacklisted (count=2 limit=0)
  2696. wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48
  2697. wlan0: skip - blacklisted (count=2 limit=0)
  2698. wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  2699. wlan0: skip - SSID mismatch
  2700. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-55
  2701. wlan0: skip - blacklisted (count=2 limit=0)
  2702. wlan0: 4: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  2703. wlan0: selected based on RSN IE
  2704. wlan0: selected BSS 78:19:f7:78:43:42 ssid='WPI-Wireless'
  2705. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:43:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  2706. wlan0: Automatic auth_alg selection: 0x1
  2707. wlan0: RSN: using IEEE 802.11i/D9.0
  2708. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  2709. wlan0: WPA: clearing AP WPA IE
  2710. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2711. wlan0: WPA: using GTK CCMP
  2712. wlan0: WPA: using PTK CCMP
  2713. wlan0: WPA: using KEY_MGMT 802.1X
  2714. wlan0: WPA: not using MGMT group cipher
  2715. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2716. wlan0: Cancelling scan request
  2717. wlan0: SME: Trying to authenticate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
  2718. wlan0: No keys have been configured - skip key clearing
  2719. wlan0: State: SCANNING -> AUTHENTICATING
  2720. EAPOL: External notification - EAP success=0
  2721. EAPOL: Supplicant port status: Unauthorized
  2722. EAPOL: External notification - EAP fail=0
  2723. EAPOL: Supplicant port status: Unauthorized
  2724. EAPOL: External notification - portControl=Auto
  2725. EAPOL: Supplicant port status: Unauthorized
  2726. nl80211: Authenticate (ifindex=18)
  2727. * bssid=78:19:f7:78:43:42
  2728. * freq=2437
  2729. * SSID - hexdump_ascii(len=12):
  2730. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2731. * IEs - hexdump(len=0): [NULL]
  2732. * Auth Type 0
  2733. nl80211: Authentication request send successfully
  2734. RSN: Ignored PMKID candidate without preauth flag
  2735. RSN: Ignored PMKID candidate without preauth flag
  2736. RSN: Ignored PMKID candidate without preauth flag
  2737. RSN: Ignored PMKID candidate without preauth flag
  2738. RSN: Ignored PMKID candidate without preauth flag
  2739. RSN: Ignored PMKID candidate without preauth flag
  2740. RSN: Ignored PMKID candidate without preauth flag
  2741. RSN: Ignored PMKID candidate without preauth flag
  2742. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  2743. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2744. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2745. wlan0: Event 5 received on interface wlan0
  2746. nl80211: Event message available
  2747. nl80211: MLME event 37
  2748. wlan0: Event 11 received on interface wlan0
  2749. wlan0: SME: Authentication response: peer=78:19:f7:78:43:42 auth_type=0 status_code=0
  2750. wlan0: Trying to associate with 78:19:f7:78:43:42 (SSID='WPI-Wireless' freq=2437 MHz)
  2751. wlan0: State: AUTHENTICATING -> ASSOCIATING
  2752. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2753. netlink: Operstate: linkmode=-1, operstate=5
  2754. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2755. nl80211: Associate (ifindex=18)
  2756. * bssid=78:19:f7:78:43:42
  2757. * freq=2437
  2758. * SSID - hexdump_ascii(len=12):
  2759. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2760. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2761. * pairwise=0xfac04
  2762. * group=0xfac04
  2763. * prev_bssid=78:19:f7:79:95:42
  2764. nl80211: Association request send successfully
  2765. nl80211: Event message available
  2766. nl80211: Delete station 78:19:f7:78:43:42
  2767. nl80211: Event message available
  2768. nl80211: MLME event 38
  2769. wlan0: Event 13 received on interface wlan0
  2770. wlan0: CTRL-EVENT-ASSOC-REJECT bssid=78:19:f7:78:43:42 status_code=1
  2771. wlan0: SME: Association with 78:19:f7:78:43:42 failed: status code 1
  2772. wpa_driver_nl80211_deauthenticate(addr=78:19:f7:78:43:42 reason_code=3)
  2773. Added BSSID 78:19:f7:78:43:42 into blacklist
  2774. wlan0: Another BSS in this ESS has been seen; try it next
  2775. BSSID 78:19:f7:78:43:42 blacklist count incremented to 2
  2776. wlan0: Setting scan request: 0 sec 100000 usec
  2777. wlan0: State: ASSOCIATING -> DISCONNECTED
  2778. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2779. netlink: Operstate: linkmode=-1, operstate=5
  2780. nl80211: Event message available
  2781. nl80211: Ignore connect event (cmd=46) when using userspace SME
  2782. nl80211: Event message available
  2783. nl80211: MLME event 39
  2784. wlan0: Event 12 received on interface wlan0
  2785. wlan0: Deauthentication notification
  2786. wlan0: * reason 3
  2787. wlan0: * address 78:19:f7:78:43:42
  2788. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  2789. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  2790. BSSID 00:00:00:00:00:00 blacklist count incremented to 4
  2791. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  2792. wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
  2793. wlan0: Disconnect event - remove keys
  2794. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  2795. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  2796. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  2797. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  2798. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  2799. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  2800. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2801. addr=00:00:00:00:00:00
  2802. wlan0: State: DISCONNECTED -> DISCONNECTED
  2803. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2804. netlink: Operstate: linkmode=-1, operstate=5
  2805. EAPOL: External notification - portEnabled=0
  2806. EAPOL: Supplicant port status: Unauthorized
  2807. EAPOL: External notification - portValid=0
  2808. EAPOL: Supplicant port status: Unauthorized
  2809. wlan0: State: DISCONNECTED -> SCANNING
  2810. Scan SSID - hexdump_ascii(len=12):
  2811. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2812. wlan0: Include wildcard SSID in the scan request
  2813. wlan0: Starting AP scan for specific SSID(s)
  2814. wlan0: Optimize scan based on previously generated frequency list
  2815. Scan requested (ret=0) - scan timeout 30 seconds
  2816. nl80211: Event message available
  2817. nl80211: Scan trigger
  2818. nl80211: Event message available
  2819. nl80211: New scan results available
  2820. wlan0: Event 3 received on interface wlan0
  2821. nl80211: Received scan results (24 BSSes)
  2822. wlan0: BSS: Start scan result update 17
  2823. wlan0: BSS: Expire BSS 25 due to no match in scan
  2824. wlan0: BSS: Remove id 25 BSSID 78:19:f7:78:d0:80 SSID 'WPI-Guest'
  2825. wlan0: BSS: Expire BSS 24 due to no match in scan
  2826. wlan0: BSS: Remove id 24 BSSID 78:19:f7:78:ae:40 SSID 'WPI-Guest'
  2827. wlan0: New scan results available
  2828. wlan0: Selecting BSS from priority group 0
  2829. wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  2830. wlan0: skip - blacklisted (count=2 limit=0)
  2831. wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
  2832. wlan0: skip - blacklisted (count=2 limit=0)
  2833. wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  2834. wlan0: skip - SSID mismatch
  2835. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
  2836. wlan0: skip - blacklisted (count=2 limit=0)
  2837. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-74
  2838. wlan0: selected based on RSN IE
  2839. wlan0: selected BSS 78:19:f7:78:ee:02 ssid='WPI-Wireless'
  2840. wlan0: Request association: reassociate: 0 selected: 78:19:f7:78:ee:02 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  2841. wlan0: Automatic auth_alg selection: 0x1
  2842. wlan0: RSN: using IEEE 802.11i/D9.0
  2843. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  2844. wlan0: WPA: clearing AP WPA IE
  2845. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2846. wlan0: WPA: using GTK CCMP
  2847. wlan0: WPA: using PTK CCMP
  2848. wlan0: WPA: using KEY_MGMT 802.1X
  2849. wlan0: WPA: not using MGMT group cipher
  2850. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2851. wlan0: Cancelling scan request
  2852. wlan0: SME: Trying to authenticate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
  2853. wlan0: No keys have been configured - skip key clearing
  2854. wlan0: State: SCANNING -> AUTHENTICATING
  2855. EAPOL: External notification - EAP success=0
  2856. EAPOL: Supplicant port status: Unauthorized
  2857. EAPOL: External notification - EAP fail=0
  2858. EAPOL: Supplicant port status: Unauthorized
  2859. EAPOL: External notification - portControl=Auto
  2860. EAPOL: Supplicant port status: Unauthorized
  2861. nl80211: Authenticate (ifindex=18)
  2862. * bssid=78:19:f7:78:ee:02
  2863. * freq=2412
  2864. * SSID - hexdump_ascii(len=12):
  2865. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2866. * IEs - hexdump(len=0): [NULL]
  2867. * Auth Type 0
  2868. nl80211: Authentication request send successfully
  2869. RSN: Ignored PMKID candidate without preauth flag
  2870. RSN: Ignored PMKID candidate without preauth flag
  2871. RSN: Ignored PMKID candidate without preauth flag
  2872. RSN: Ignored PMKID candidate without preauth flag
  2873. RSN: Ignored PMKID candidate without preauth flag
  2874. RSN: Ignored PMKID candidate without preauth flag
  2875. RSN: Ignored PMKID candidate without preauth flag
  2876. RSN: Ignored PMKID candidate without preauth flag
  2877. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  2878. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2879. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2880. wlan0: Event 5 received on interface wlan0
  2881. nl80211: Event message available
  2882. nl80211: MLME event 37
  2883. wlan0: Event 11 received on interface wlan0
  2884. wlan0: SME: Authentication response: peer=78:19:f7:78:ee:02 auth_type=0 status_code=0
  2885. wlan0: Trying to associate with 78:19:f7:78:ee:02 (SSID='WPI-Wireless' freq=2412 MHz)
  2886. wlan0: State: AUTHENTICATING -> ASSOCIATING
  2887. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2888. netlink: Operstate: linkmode=-1, operstate=5
  2889. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2890. nl80211: Associate (ifindex=18)
  2891. * bssid=78:19:f7:78:ee:02
  2892. * freq=2412
  2893. * SSID - hexdump_ascii(len=12):
  2894. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  2895. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2896. * pairwise=0xfac04
  2897. * group=0xfac04
  2898. nl80211: Association request send successfully
  2899. nl80211: Event message available
  2900. nl80211: New station 78:19:f7:78:ee:02
  2901. nl80211: Event message available
  2902. nl80211: MLME event 38
  2903. wlan0: Event 0 received on interface wlan0
  2904. wlan0: Association info event
  2905. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  2906. wlan0: freq=2412 MHz
  2907. wlan0: State: ASSOCIATING -> ASSOCIATED
  2908. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  2909. netlink: Operstate: linkmode=-1, operstate=5
  2910. wlan0: Associated to a new BSS: BSSID=78:19:f7:78:ee:02
  2911. wlan0: No keys have been configured - skip key clearing
  2912. wlan0: Associated with 78:19:f7:78:ee:02
  2913. wlan0: WPA: Association event - clear replay counter
  2914. wlan0: WPA: Clear old PTK
  2915. EAPOL: External notification - portEnabled=0
  2916. EAPOL: Supplicant port status: Unauthorized
  2917. EAPOL: External notification - portValid=0
  2918. EAPOL: Supplicant port status: Unauthorized
  2919. EAPOL: External notification - portEnabled=1
  2920. EAPOL: SUPP_PAE entering state CONNECTING
  2921. EAPOL: SUPP_BE entering state IDLE
  2922. EAP: EAP entering state INITIALIZE
  2923. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  2924. TLSv1: Selected cipher suite: 0x0000
  2925. TLSv1: Record Layer - New write cipher suite 0x0000
  2926. TLSv1: Record Layer - New read cipher suite 0x0000
  2927. EAP: EAP entering state IDLE
  2928. wlan0: Setting authentication timeout: 10 sec 0 usec
  2929. wlan0: Cancelling scan request
  2930. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2931. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2932. wlan0: Event 5 received on interface wlan0
  2933. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2934. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2935. wlan0: Event 5 received on interface wlan0
  2936. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2937. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  2938. wlan0: Event 5 received on interface wlan0
  2939. nl80211: Event message available
  2940. nl80211: Ignore connect event (cmd=46) when using userspace SME
  2941. EAPOL: startWhen --> 0
  2942. EAPOL: SUPP_PAE entering state CONNECTING
  2943. EAPOL: txStart
  2944. TX EAPOL: dst=78:19:f7:78:ee:02
  2945. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  2946. wlan0: Setting authentication timeout: 70 sec 0 usec
  2947. EAPOL: Received EAP-Packet frame
  2948. EAPOL: SUPP_PAE entering state RESTART
  2949. EAP: EAP entering state INITIALIZE
  2950. EAP: EAP entering state IDLE
  2951. EAPOL: SUPP_PAE entering state AUTHENTICATING
  2952. EAPOL: SUPP_BE entering state REQUEST
  2953. EAPOL: getSuppRsp
  2954. EAP: EAP entering state RECEIVED
  2955. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  2956. EAP: EAP entering state IDENTITY
  2957. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  2958. EAP: EAP-Request Identity data - hexdump_ascii(len=49):
  2959. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  2960. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  2961. 33 35 30 2f 31 2c 70 6f 72 74 69 64 3d 32 31 36 350/1,portid=216
  2962. 34 4
  2963. EAP: using real identity - hexdump_ascii(len=19):
  2964. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  2965. 2d 30 39 -09
  2966. EAP: EAP entering state SEND_RESPONSE
  2967. EAP: EAP entering state IDLE
  2968. EAPOL: SUPP_BE entering state RESPONSE
  2969. EAPOL: txSuppRsp
  2970. TX EAPOL: dst=78:19:f7:78:ee:02
  2971. EAPOL: SUPP_BE entering state RECEIVE
  2972. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  2973. EAPOL: Received EAP-Packet frame
  2974. EAPOL: SUPP_BE entering state REQUEST
  2975. EAPOL: getSuppRsp
  2976. EAP: EAP entering state RECEIVED
  2977. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  2978. EAP: EAP entering state GET_METHOD
  2979. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  2980. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  2981. TLS: using phase1 config options
  2982. TLSv1: Converting PEM format certificate into DER format
  2983. X509: Extension: extnID=2.5.29.14 critical=0
  2984. X509: Extension: extnID=2.5.29.35 critical=0
  2985. X509: Extension: extnID=2.5.29.19 critical=0
  2986. X509: BasicConstraints - cA=255
  2987. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  2988. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  2989. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  2990. Trying to parse PKCS #1 encoded RSA private key
  2991. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  2992. EAP: EAP entering state METHOD
  2993. SSL: Received packet(len=6) - Flags 0x20
  2994. EAP-TLS: Start
  2995. TLSv1: Send ClientHello
  2996. SSL: 56 bytes left to be sent out (of total 56 bytes)
  2997. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  2998. EAP: EAP entering state SEND_RESPONSE
  2999. EAP: EAP entering state IDLE
  3000. EAPOL: SUPP_BE entering state RESPONSE
  3001. EAPOL: txSuppRsp
  3002. TX EAPOL: dst=78:19:f7:78:ee:02
  3003. EAPOL: SUPP_BE entering state RECEIVE
  3004. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  3005. EAPOL: Received EAP-Packet frame
  3006. EAPOL: SUPP_BE entering state REQUEST
  3007. EAPOL: getSuppRsp
  3008. EAP: EAP entering state RECEIVED
  3009. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  3010. EAP: EAP entering state METHOD
  3011. SSL: Received packet(len=1024) - Flags 0xc0
  3012. SSL: TLS Message Length: 3680
  3013. SSL: Need 2666 bytes more input data
  3014. SSL: Building ACK (type=13 id=3 ver=0)
  3015. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3016. EAP: EAP entering state SEND_RESPONSE
  3017. EAP: EAP entering state IDLE
  3018. EAPOL: SUPP_BE entering state RESPONSE
  3019. EAPOL: txSuppRsp
  3020. TX EAPOL: dst=78:19:f7:78:ee:02
  3021. EAPOL: SUPP_BE entering state RECEIVE
  3022. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  3023. EAPOL: Received EAP-Packet frame
  3024. EAPOL: SUPP_BE entering state REQUEST
  3025. EAPOL: getSuppRsp
  3026. EAP: EAP entering state RECEIVED
  3027. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  3028. EAP: EAP entering state METHOD
  3029. SSL: Received packet(len=1024) - Flags 0xc0
  3030. SSL: TLS Message Length: 3680
  3031. SSL: Need 1652 bytes more input data
  3032. SSL: Building ACK (type=13 id=4 ver=0)
  3033. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3034. EAP: EAP entering state SEND_RESPONSE
  3035. EAP: EAP entering state IDLE
  3036. EAPOL: SUPP_BE entering state RESPONSE
  3037. EAPOL: txSuppRsp
  3038. TX EAPOL: dst=78:19:f7:78:ee:02
  3039. EAPOL: SUPP_BE entering state RECEIVE
  3040. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  3041. EAPOL: Received EAP-Packet frame
  3042. EAPOL: SUPP_BE entering state REQUEST
  3043. EAPOL: getSuppRsp
  3044. EAP: EAP entering state RECEIVED
  3045. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  3046. EAP: EAP entering state METHOD
  3047. SSL: Received packet(len=1024) - Flags 0xc0
  3048. SSL: TLS Message Length: 3680
  3049. SSL: Need 638 bytes more input data
  3050. SSL: Building ACK (type=13 id=5 ver=0)
  3051. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3052. EAP: EAP entering state SEND_RESPONSE
  3053. EAP: EAP entering state IDLE
  3054. EAPOL: SUPP_BE entering state RESPONSE
  3055. EAPOL: txSuppRsp
  3056. TX EAPOL: dst=78:19:f7:78:ee:02
  3057. EAPOL: SUPP_BE entering state RECEIVE
  3058. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  3059. EAPOL: Received EAP-Packet frame
  3060. EAPOL: SUPP_BE entering state REQUEST
  3061. EAPOL: getSuppRsp
  3062. EAP: EAP entering state RECEIVED
  3063. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  3064. EAP: EAP entering state METHOD
  3065. SSL: Received packet(len=648) - Flags 0x80
  3066. SSL: TLS Message Length: 3680
  3067. TLSv1: Received content type 22 version 3.1 length 42
  3068. TLSv1: Received ServerHello
  3069. TLSv1: Using TLS v1.0
  3070. TLSv1: Selected cipher suite: 0x002f
  3071. TLSv1: Received content type 22 version 3.1 length 3278
  3072. TLSv1: Received Certificate (certificate_list len 3274)
  3073. TLSv1: Certificate 0 (len 1511)
  3074. X509: Extension: extnID=2.5.29.37 critical=0
  3075. X509: Extension: extnID=2.5.29.37 critical=0
  3076. TLSv1: Certificate 1 (len 1754)
  3077. X509: Extension: extnID=2.5.29.14 critical=0
  3078. X509: Extension: extnID=2.5.29.35 critical=0
  3079. X509: Extension: extnID=2.5.29.19 critical=0
  3080. X509: BasicConstraints - cA=255
  3081. X509: Validate certificate chain
  3082. X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
  3083. X509: Certificate Digest matches with calculated tbsCertificate hash
  3084. X509: Found issuer from the list of trusted certificates
  3085. X509: Certificate Digest matches with calculated tbsCertificate hash
  3086. X509: Trusted certificate found to complete the chain
  3087. X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  3088. X509: Certificate chain valid
  3089. TLSv1: Received content type 22 version 3.1 length 345
  3090. TLSv1: Received CertificateRequest
  3091. TLSv1: Received ServerHelloDone
  3092. TLSv1: Send Certificate
  3093. TLSv1: Full client certificate chain not configured - validation may fail
  3094. TLSv1: Send ClientKeyExchange
  3095. TLSv1: Send CertificateVerify
  3096. TLSv1: Send ChangeCipherSpec
  3097. TLSv1: Record Layer - New write cipher suite 0x002f
  3098. TLSv1: Send Finished
  3099. TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
  3100. SSL: 1117 bytes left to be sent out (of total 1117 bytes)
  3101. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3102. EAP: EAP entering state SEND_RESPONSE
  3103. EAP: EAP entering state IDLE
  3104. EAPOL: SUPP_BE entering state RESPONSE
  3105. EAPOL: txSuppRsp
  3106. TX EAPOL: dst=78:19:f7:78:ee:02
  3107. EAPOL: SUPP_BE entering state RECEIVE
  3108. wlan0: RX EAPOL from 78:19:f7:78:ee:02
  3109. EAPOL: Received EAP-Packet frame
  3110. EAPOL: SUPP_BE entering state REQUEST
  3111. EAPOL: getSuppRsp
  3112. EAP: EAP entering state RECEIVED
  3113. EAP: Received EAP-Failure
  3114. EAP: EAP entering state FAILURE
  3115. wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
  3116. EAPOL: SUPP_PAE entering state HELD
  3117. EAPOL: Supplicant port status: Unauthorized
  3118. EAPOL: SUPP_BE entering state RECEIVE
  3119. EAPOL: SUPP_BE entering state FAIL
  3120. EAPOL: SUPP_BE entering state IDLE
  3121. EAPOL authentication completed unsuccessfully
  3122. wlan0: Setting authentication timeout: 2 sec 0 usec
  3123. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3124. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3125. wlan0: Event 5 received on interface wlan0
  3126. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3127. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3128. wlan0: Event 5 received on interface wlan0
  3129. nl80211: Event message available
  3130. nl80211: Delete station 78:19:f7:78:ee:02
  3131. nl80211: Event message available
  3132. nl80211: MLME event 39
  3133. wlan0: Event 12 received on interface wlan0
  3134. wlan0: Deauthentication notification
  3135. wlan0: * reason 1
  3136. wlan0: * address 78:19:f7:78:ee:02
  3137. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  3138. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  3139. wlan0: Setting scan request: 0 sec 100000 usec
  3140. Added BSSID 78:19:f7:78:ee:02 into blacklist
  3141. wlan0: Another BSS in this ESS has been seen; try it next
  3142. BSSID 78:19:f7:78:ee:02 blacklist count incremented to 2
  3143. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  3144. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:78:ee:02 reason=1
  3145. wlan0: Disconnect event - remove keys
  3146. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  3147. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  3148. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  3149. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  3150. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  3151. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  3152. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  3153. addr=78:19:f7:78:ee:02
  3154. wlan0: State: ASSOCIATED -> DISCONNECTED
  3155. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3156. netlink: Operstate: linkmode=-1, operstate=5
  3157. EAPOL: External notification - portEnabled=0
  3158. EAPOL: SUPP_PAE entering state DISCONNECTED
  3159. EAPOL: Supplicant port status: Unauthorized
  3160. EAPOL: SUPP_BE entering state INITIALIZE
  3161. EAP: EAP entering state DISABLED
  3162. EAPOL: Supplicant port status: Unauthorized
  3163. EAPOL: External notification - portValid=0
  3164. EAPOL: Supplicant port status: Unauthorized
  3165. nl80211: Event message available
  3166. nl80211: Ignore disconnect event when using userspace SME
  3167. wlan0: State: DISCONNECTED -> SCANNING
  3168. Scan SSID - hexdump_ascii(len=12):
  3169. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3170. wlan0: Include wildcard SSID in the scan request
  3171. wlan0: Starting AP scan for specific SSID(s)
  3172. wlan0: Optimize scan based on previously generated frequency list
  3173. Scan requested (ret=0) - scan timeout 30 seconds
  3174. nl80211: Event message available
  3175. nl80211: Scan trigger
  3176. nl80211: Event message available
  3177. nl80211: New scan results available
  3178. wlan0: Event 3 received on interface wlan0
  3179. nl80211: Received scan results (23 BSSes)
  3180. wlan0: BSS: Start scan result update 18
  3181. wlan0: New scan results available
  3182. wlan0: Selecting BSS from priority group 0
  3183. wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44
  3184. wlan0: skip - blacklisted (count=2 limit=0)
  3185. wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  3186. wlan0: skip - blacklisted (count=2 limit=0)
  3187. wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  3188. wlan0: skip - SSID mismatch
  3189. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-51
  3190. wlan0: skip - blacklisted (count=2 limit=0)
  3191. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72
  3192. wlan0: skip - blacklisted (count=2 limit=0)
  3193. wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-73
  3194. wlan0: selected based on RSN IE
  3195. wlan0: selected BSS 78:19:f7:77:87:42 ssid='WPI-Wireless'
  3196. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:87:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  3197. wlan0: Automatic auth_alg selection: 0x1
  3198. wlan0: RSN: using IEEE 802.11i/D9.0
  3199. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  3200. wlan0: WPA: clearing AP WPA IE
  3201. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3202. wlan0: WPA: using GTK CCMP
  3203. wlan0: WPA: using PTK CCMP
  3204. wlan0: WPA: using KEY_MGMT 802.1X
  3205. wlan0: WPA: not using MGMT group cipher
  3206. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3207. wlan0: Cancelling scan request
  3208. wlan0: SME: Trying to authenticate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
  3209. wlan0: No keys have been configured - skip key clearing
  3210. wlan0: State: SCANNING -> AUTHENTICATING
  3211. EAPOL: External notification - EAP success=0
  3212. EAPOL: Supplicant port status: Unauthorized
  3213. EAPOL: External notification - EAP fail=0
  3214. EAPOL: Supplicant port status: Unauthorized
  3215. EAPOL: External notification - portControl=Auto
  3216. EAPOL: Supplicant port status: Unauthorized
  3217. nl80211: Authenticate (ifindex=18)
  3218. * bssid=78:19:f7:77:87:42
  3219. * freq=2412
  3220. * SSID - hexdump_ascii(len=12):
  3221. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3222. * IEs - hexdump(len=0): [NULL]
  3223. * Auth Type 0
  3224. nl80211: Authentication request send successfully
  3225. RSN: Ignored PMKID candidate without preauth flag
  3226. RSN: Ignored PMKID candidate without preauth flag
  3227. RSN: Ignored PMKID candidate without preauth flag
  3228. RSN: Ignored PMKID candidate without preauth flag
  3229. RSN: Ignored PMKID candidate without preauth flag
  3230. RSN: Ignored PMKID candidate without preauth flag
  3231. RSN: Ignored PMKID candidate without preauth flag
  3232. RSN: Ignored PMKID candidate without preauth flag
  3233. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  3234. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3235. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3236. wlan0: Event 5 received on interface wlan0
  3237. nl80211: Event message available
  3238. nl80211: MLME event 37
  3239. wlan0: Event 11 received on interface wlan0
  3240. wlan0: SME: Authentication response: peer=78:19:f7:77:87:42 auth_type=0 status_code=0
  3241. wlan0: Trying to associate with 78:19:f7:77:87:42 (SSID='WPI-Wireless' freq=2412 MHz)
  3242. wlan0: State: AUTHENTICATING -> ASSOCIATING
  3243. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3244. netlink: Operstate: linkmode=-1, operstate=5
  3245. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3246. nl80211: Associate (ifindex=18)
  3247. * bssid=78:19:f7:77:87:42
  3248. * freq=2412
  3249. * SSID - hexdump_ascii(len=12):
  3250. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3251. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3252. * pairwise=0xfac04
  3253. * group=0xfac04
  3254. * prev_bssid=78:19:f7:78:ee:02
  3255. nl80211: Association request send successfully
  3256. nl80211: Event message available
  3257. nl80211: New station 78:19:f7:77:87:42
  3258. nl80211: Event message available
  3259. nl80211: MLME event 38
  3260. wlan0: Event 0 received on interface wlan0
  3261. wlan0: Association info event
  3262. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  3263. wlan0: freq=2412 MHz
  3264. wlan0: State: ASSOCIATING -> ASSOCIATED
  3265. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3266. netlink: Operstate: linkmode=-1, operstate=5
  3267. wlan0: Associated to a new BSS: BSSID=78:19:f7:77:87:42
  3268. wlan0: No keys have been configured - skip key clearing
  3269. wlan0: Associated with 78:19:f7:77:87:42
  3270. wlan0: WPA: Association event - clear replay counter
  3271. wlan0: WPA: Clear old PTK
  3272. EAPOL: External notification - portEnabled=0
  3273. EAPOL: Supplicant port status: Unauthorized
  3274. EAPOL: External notification - portValid=0
  3275. EAPOL: Supplicant port status: Unauthorized
  3276. EAPOL: External notification - portEnabled=1
  3277. EAPOL: SUPP_PAE entering state CONNECTING
  3278. EAPOL: SUPP_BE entering state IDLE
  3279. EAP: EAP entering state INITIALIZE
  3280. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  3281. TLSv1: Selected cipher suite: 0x0000
  3282. TLSv1: Record Layer - New write cipher suite 0x0000
  3283. TLSv1: Record Layer - New read cipher suite 0x0000
  3284. EAP: EAP entering state IDLE
  3285. wlan0: Setting authentication timeout: 10 sec 0 usec
  3286. wlan0: Cancelling scan request
  3287. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3288. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3289. wlan0: Event 5 received on interface wlan0
  3290. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3291. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3292. wlan0: Event 5 received on interface wlan0
  3293. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3294. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3295. wlan0: Event 5 received on interface wlan0
  3296. nl80211: Event message available
  3297. nl80211: Ignore connect event (cmd=46) when using userspace SME
  3298. EAPOL: startWhen --> 0
  3299. EAPOL: SUPP_PAE entering state CONNECTING
  3300. EAPOL: txStart
  3301. TX EAPOL: dst=78:19:f7:77:87:42
  3302. wlan0: RX EAPOL from 78:19:f7:77:87:42
  3303. wlan0: Setting authentication timeout: 70 sec 0 usec
  3304. EAPOL: Received EAP-Packet frame
  3305. EAPOL: SUPP_PAE entering state RESTART
  3306. EAP: EAP entering state INITIALIZE
  3307. EAP: EAP entering state IDLE
  3308. EAPOL: SUPP_PAE entering state AUTHENTICATING
  3309. EAPOL: SUPP_BE entering state REQUEST
  3310. EAPOL: getSuppRsp
  3311. EAP: EAP entering state RECEIVED
  3312. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  3313. EAP: EAP entering state IDENTITY
  3314. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  3315. EAP: EAP-Request Identity data - hexdump_ascii(len=48):
  3316. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  3317. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  3318. 36 30 2f 31 2c 70 6f 72 74 69 64 3d 32 32 31 31 60/1,portid=2211
  3319. EAP: using real identity - hexdump_ascii(len=19):
  3320. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  3321. 2d 30 39 -09
  3322. EAP: EAP entering state SEND_RESPONSE
  3323. EAP: EAP entering state IDLE
  3324. EAPOL: SUPP_BE entering state RESPONSE
  3325. EAPOL: txSuppRsp
  3326. TX EAPOL: dst=78:19:f7:77:87:42
  3327. EAPOL: SUPP_BE entering state RECEIVE
  3328. wlan0: RX EAPOL from 78:19:f7:77:87:42
  3329. EAPOL: Received EAP-Packet frame
  3330. EAPOL: SUPP_BE entering state REQUEST
  3331. EAPOL: getSuppRsp
  3332. EAP: EAP entering state RECEIVED
  3333. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  3334. EAP: EAP entering state GET_METHOD
  3335. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  3336. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  3337. TLS: using phase1 config options
  3338. TLSv1: Converting PEM format certificate into DER format
  3339. X509: Extension: extnID=2.5.29.14 critical=0
  3340. X509: Extension: extnID=2.5.29.35 critical=0
  3341. X509: Extension: extnID=2.5.29.19 critical=0
  3342. X509: BasicConstraints - cA=255
  3343. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  3344. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  3345. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  3346. Trying to parse PKCS #1 encoded RSA private key
  3347. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  3348. EAP: EAP entering state METHOD
  3349. SSL: Received packet(len=6) - Flags 0x20
  3350. EAP-TLS: Start
  3351. TLSv1: Send ClientHello
  3352. SSL: 56 bytes left to be sent out (of total 56 bytes)
  3353. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3354. EAP: EAP entering state SEND_RESPONSE
  3355. EAP: EAP entering state IDLE
  3356. EAPOL: SUPP_BE entering state RESPONSE
  3357. EAPOL: txSuppRsp
  3358. TX EAPOL: dst=78:19:f7:77:87:42
  3359. EAPOL: SUPP_BE entering state RECEIVE
  3360. wlan0: RX EAPOL from 78:19:f7:77:87:42
  3361. EAPOL: Received EAP-Packet frame
  3362. EAPOL: SUPP_BE entering state REQUEST
  3363. EAPOL: getSuppRsp
  3364. EAP: EAP entering state RECEIVED
  3365. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  3366. EAP: EAP entering state METHOD
  3367. SSL: Received packet(len=1024) - Flags 0xc0
  3368. SSL: TLS Message Length: 3680
  3369. SSL: Need 2666 bytes more input data
  3370. SSL: Building ACK (type=13 id=3 ver=0)
  3371. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3372. EAP: EAP entering state SEND_RESPONSE
  3373. EAP: EAP entering state IDLE
  3374. EAPOL: SUPP_BE entering state RESPONSE
  3375. EAPOL: txSuppRsp
  3376. TX EAPOL: dst=78:19:f7:77:87:42
  3377. EAPOL: SUPP_BE entering state RECEIVE
  3378. wlan0: RX EAPOL from 78:19:f7:77:87:42
  3379. EAPOL: Received EAP-Packet frame
  3380. EAPOL: SUPP_BE entering state REQUEST
  3381. EAPOL: getSuppRsp
  3382. EAP: EAP entering state RECEIVED
  3383. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  3384. EAP: EAP entering state METHOD
  3385. SSL: Received packet(len=1024) - Flags 0xc0
  3386. SSL: TLS Message Length: 3680
  3387. SSL: Need 1652 bytes more input data
  3388. SSL: Building ACK (type=13 id=4 ver=0)
  3389. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3390. EAP: EAP entering state SEND_RESPONSE
  3391. EAP: EAP entering state IDLE
  3392. EAPOL: SUPP_BE entering state RESPONSE
  3393. EAPOL: txSuppRsp
  3394. TX EAPOL: dst=78:19:f7:77:87:42
  3395. EAPOL: SUPP_BE entering state RECEIVE
  3396. wlan0: RX EAPOL from 78:19:f7:77:87:42
  3397. EAPOL: Received EAP-Packet frame
  3398. EAPOL: SUPP_BE entering state REQUEST
  3399. EAPOL: getSuppRsp
  3400. EAP: EAP entering state RECEIVED
  3401. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  3402. EAP: EAP entering state METHOD
  3403. SSL: Received packet(len=1024) - Flags 0xc0
  3404. SSL: TLS Message Length: 3680
  3405. SSL: Need 638 bytes more input data
  3406. SSL: Building ACK (type=13 id=5 ver=0)
  3407. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3408. EAP: EAP entering state SEND_RESPONSE
  3409. EAP: EAP entering state IDLE
  3410. EAPOL: SUPP_BE entering state RESPONSE
  3411. EAPOL: txSuppRsp
  3412. TX EAPOL: dst=78:19:f7:77:87:42
  3413. EAPOL: SUPP_BE entering state RECEIVE
  3414. wlan0: RX EAPOL from 78:19:f7:77:87:42
  3415. EAPOL: Received EAP-Packet frame
  3416. EAPOL: SUPP_BE entering state REQUEST
  3417. EAPOL: getSuppRsp
  3418. EAP: EAP entering state RECEIVED
  3419. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  3420. EAP: EAP entering state METHOD
  3421. SSL: Received packet(len=648) - Flags 0x80
  3422. SSL: TLS Message Length: 3680
  3423. TLSv1: Received content type 22 version 3.1 length 42
  3424. TLSv1: Received ServerHello
  3425. TLSv1: Using TLS v1.0
  3426. TLSv1: Selected cipher suite: 0x002f
  3427. TLSv1: Received content type 22 version 3.1 length 3278
  3428. TLSv1: Received Certificate (certificate_list len 3274)
  3429. TLSv1: Certificate 0 (len 1511)
  3430. X509: Extension: extnID=2.5.29.37 critical=0
  3431. X509: Extension: extnID=2.5.29.37 critical=0
  3432. TLSv1: Certificate 1 (len 1754)
  3433. X509: Extension: extnID=2.5.29.14 critical=0
  3434. X509: Extension: extnID=2.5.29.35 critical=0
  3435. X509: Extension: extnID=2.5.29.19 critical=0
  3436. X509: BasicConstraints - cA=255
  3437. X509: Validate certificate chain
  3438. X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
  3439. X509: Certificate Digest matches with calculated tbsCertificate hash
  3440. X509: Found issuer from the list of trusted certificates
  3441. X509: Certificate Digest matches with calculated tbsCertificate hash
  3442. X509: Trusted certificate found to complete the chain
  3443. X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  3444. X509: Certificate chain valid
  3445. TLSv1: Received content type 22 version 3.1 length 345
  3446. TLSv1: Received CertificateRequest
  3447. TLSv1: Received ServerHelloDone
  3448. TLSv1: Send Certificate
  3449. TLSv1: Full client certificate chain not configured - validation may fail
  3450. TLSv1: Send ClientKeyExchange
  3451. TLSv1: Send CertificateVerify
  3452. TLSv1: Send ChangeCipherSpec
  3453. TLSv1: Record Layer - New write cipher suite 0x002f
  3454. TLSv1: Send Finished
  3455. TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
  3456. SSL: 1117 bytes left to be sent out (of total 1117 bytes)
  3457. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3458. EAP: EAP entering state SEND_RESPONSE
  3459. EAP: EAP entering state IDLE
  3460. EAPOL: SUPP_BE entering state RESPONSE
  3461. EAPOL: txSuppRsp
  3462. TX EAPOL: dst=78:19:f7:77:87:42
  3463. EAPOL: SUPP_BE entering state RECEIVE
  3464. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3465. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3466. wlan0: Event 5 received on interface wlan0
  3467. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3468. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3469. wlan0: Event 5 received on interface wlan0
  3470. nl80211: Event message available
  3471. nl80211: Delete station 78:19:f7:77:87:42
  3472. nl80211: Event message available
  3473. nl80211: MLME event 39
  3474. wlan0: Event 12 received on interface wlan0
  3475. wlan0: Deauthentication notification
  3476. wlan0: * reason 1
  3477. wlan0: * address 78:19:f7:77:87:42
  3478. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  3479. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  3480. wlan0: Setting scan request: 0 sec 100000 usec
  3481. Added BSSID 78:19:f7:77:87:42 into blacklist
  3482. wlan0: Another BSS in this ESS has been seen; try it next
  3483. BSSID 78:19:f7:77:87:42 blacklist count incremented to 2
  3484. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  3485. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:77:87:42 reason=1
  3486. wlan0: Disconnect event - remove keys
  3487. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  3488. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  3489. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  3490. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  3491. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  3492. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  3493. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  3494. addr=78:19:f7:77:87:42
  3495. wlan0: State: ASSOCIATED -> DISCONNECTED
  3496. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3497. netlink: Operstate: linkmode=-1, operstate=5
  3498. EAPOL: External notification - portEnabled=0
  3499. EAPOL: SUPP_PAE entering state DISCONNECTED
  3500. EAPOL: Supplicant port status: Unauthorized
  3501. EAPOL: SUPP_BE entering state INITIALIZE
  3502. EAP: EAP entering state DISABLED
  3503. EAPOL: Supplicant port status: Unauthorized
  3504. EAPOL: External notification - portValid=0
  3505. EAPOL: Supplicant port status: Unauthorized
  3506. nl80211: Event message available
  3507. nl80211: Ignore disconnect event when using userspace SME
  3508. wlan0: State: DISCONNECTED -> SCANNING
  3509. Scan SSID - hexdump_ascii(len=12):
  3510. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3511. wlan0: Include wildcard SSID in the scan request
  3512. wlan0: Starting AP scan for specific SSID(s)
  3513. wlan0: Optimize scan based on previously generated frequency list
  3514. Scan requested (ret=0) - scan timeout 30 seconds
  3515. nl80211: Event message available
  3516. nl80211: Scan trigger
  3517. nl80211: Event message available
  3518. nl80211: New scan results available
  3519. wlan0: Event 3 received on interface wlan0
  3520. nl80211: Received scan results (21 BSSes)
  3521. wlan0: BSS: Start scan result update 19
  3522. wlan0: New scan results available
  3523. wlan0: Selecting BSS from priority group 0
  3524. wlan0: 0: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-42
  3525. wlan0: skip - blacklisted (count=2 limit=0)
  3526. wlan0: 1: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  3527. wlan0: skip - blacklisted (count=2 limit=0)
  3528. wlan0: 2: 00:23:69:5a:a7:4e ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-39 wps
  3529. wlan0: skip - SSID mismatch
  3530. wlan0: 3: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-52
  3531. wlan0: skip - blacklisted (count=2 limit=0)
  3532. wlan0: 4: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72
  3533. wlan0: skip - blacklisted (count=2 limit=0)
  3534. wlan0: 5: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  3535. wlan0: skip - blacklisted (count=2 limit=0)
  3536. wlan0: 6: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-77
  3537. wlan0: selected based on RSN IE
  3538. wlan0: selected BSS 78:19:f7:77:93:42 ssid='WPI-Wireless'
  3539. wlan0: Request association: reassociate: 0 selected: 78:19:f7:77:93:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  3540. wlan0: Automatic auth_alg selection: 0x1
  3541. wlan0: RSN: using IEEE 802.11i/D9.0
  3542. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  3543. wlan0: WPA: clearing AP WPA IE
  3544. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3545. wlan0: WPA: using GTK CCMP
  3546. wlan0: WPA: using PTK CCMP
  3547. wlan0: WPA: using KEY_MGMT 802.1X
  3548. wlan0: WPA: not using MGMT group cipher
  3549. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3550. wlan0: Cancelling scan request
  3551. wlan0: SME: Trying to authenticate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
  3552. wlan0: No keys have been configured - skip key clearing
  3553. wlan0: State: SCANNING -> AUTHENTICATING
  3554. EAPOL: External notification - EAP success=0
  3555. EAPOL: Supplicant port status: Unauthorized
  3556. EAPOL: External notification - EAP fail=0
  3557. EAPOL: Supplicant port status: Unauthorized
  3558. EAPOL: External notification - portControl=Auto
  3559. EAPOL: Supplicant port status: Unauthorized
  3560. nl80211: Authenticate (ifindex=18)
  3561. * bssid=78:19:f7:77:93:42
  3562. * freq=2437
  3563. * SSID - hexdump_ascii(len=12):
  3564. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3565. * IEs - hexdump(len=0): [NULL]
  3566. * Auth Type 0
  3567. nl80211: Authentication request send successfully
  3568. RSN: Ignored PMKID candidate without preauth flag
  3569. RSN: Ignored PMKID candidate without preauth flag
  3570. RSN: Ignored PMKID candidate without preauth flag
  3571. RSN: Ignored PMKID candidate without preauth flag
  3572. RSN: Ignored PMKID candidate without preauth flag
  3573. RSN: Ignored PMKID candidate without preauth flag
  3574. RSN: Ignored PMKID candidate without preauth flag
  3575. RSN: Ignored PMKID candidate without preauth flag
  3576. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  3577. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3578. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3579. wlan0: Event 5 received on interface wlan0
  3580. nl80211: Event message available
  3581. nl80211: MLME event 37
  3582. wlan0: Event 11 received on interface wlan0
  3583. wlan0: SME: Authentication response: peer=78:19:f7:77:93:42 auth_type=0 status_code=0
  3584. wlan0: Trying to associate with 78:19:f7:77:93:42 (SSID='WPI-Wireless' freq=2437 MHz)
  3585. wlan0: State: AUTHENTICATING -> ASSOCIATING
  3586. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3587. netlink: Operstate: linkmode=-1, operstate=5
  3588. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3589. nl80211: Associate (ifindex=18)
  3590. * bssid=78:19:f7:77:93:42
  3591. * freq=2437
  3592. * SSID - hexdump_ascii(len=12):
  3593. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3594. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3595. * pairwise=0xfac04
  3596. * group=0xfac04
  3597. * prev_bssid=78:19:f7:77:87:42
  3598. nl80211: Association request send successfully
  3599. nl80211: Event message available
  3600. nl80211: New station 78:19:f7:77:93:42
  3601. nl80211: Event message available
  3602. nl80211: MLME event 38
  3603. wlan0: Event 0 received on interface wlan0
  3604. wlan0: Association info event
  3605. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  3606. wlan0: freq=2437 MHz
  3607. wlan0: State: ASSOCIATING -> ASSOCIATED
  3608. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3609. netlink: Operstate: linkmode=-1, operstate=5
  3610. wlan0: Associated to a new BSS: BSSID=78:19:f7:77:93:42
  3611. wlan0: No keys have been configured - skip key clearing
  3612. wlan0: Associated with 78:19:f7:77:93:42
  3613. wlan0: WPA: Association event - clear replay counter
  3614. wlan0: WPA: Clear old PTK
  3615. EAPOL: External notification - portEnabled=0
  3616. EAPOL: Supplicant port status: Unauthorized
  3617. EAPOL: External notification - portValid=0
  3618. EAPOL: Supplicant port status: Unauthorized
  3619. EAPOL: External notification - portEnabled=1
  3620. EAPOL: SUPP_PAE entering state CONNECTING
  3621. EAPOL: SUPP_BE entering state IDLE
  3622. EAP: EAP entering state INITIALIZE
  3623. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  3624. TLSv1: Selected cipher suite: 0x0000
  3625. TLSv1: Record Layer - New write cipher suite 0x0000
  3626. TLSv1: Record Layer - New read cipher suite 0x0000
  3627. EAP: EAP entering state IDLE
  3628. wlan0: Setting authentication timeout: 10 sec 0 usec
  3629. wlan0: Cancelling scan request
  3630. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3631. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3632. wlan0: Event 5 received on interface wlan0
  3633. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3634. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3635. wlan0: Event 5 received on interface wlan0
  3636. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3637. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3638. wlan0: Event 5 received on interface wlan0
  3639. nl80211: Event message available
  3640. nl80211: Ignore connect event (cmd=46) when using userspace SME
  3641. EAPOL: startWhen --> 0
  3642. EAPOL: SUPP_PAE entering state CONNECTING
  3643. EAPOL: txStart
  3644. TX EAPOL: dst=78:19:f7:77:93:42
  3645. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3646. wlan0: Setting authentication timeout: 70 sec 0 usec
  3647. EAPOL: Received EAP-Packet frame
  3648. EAPOL: SUPP_PAE entering state RESTART
  3649. EAP: EAP entering state INITIALIZE
  3650. EAP: EAP entering state IDLE
  3651. EAPOL: SUPP_PAE entering state AUTHENTICATING
  3652. EAPOL: SUPP_BE entering state REQUEST
  3653. EAPOL: getSuppRsp
  3654. EAP: EAP entering state RECEIVED
  3655. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  3656. EAP: EAP entering state IDENTITY
  3657. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  3658. EAP: EAP-Request Identity data - hexdump_ascii(len=49):
  3659. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  3660. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  3661. 33 36 33 2f 31 2c 70 6f 72 74 69 64 3d 32 35 34 363/1,portid=254
  3662. 30 0
  3663. EAP: using real identity - hexdump_ascii(len=19):
  3664. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  3665. 2d 30 39 -09
  3666. EAP: EAP entering state SEND_RESPONSE
  3667. EAP: EAP entering state IDLE
  3668. EAPOL: SUPP_BE entering state RESPONSE
  3669. EAPOL: txSuppRsp
  3670. TX EAPOL: dst=78:19:f7:77:93:42
  3671. EAPOL: SUPP_BE entering state RECEIVE
  3672. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3673. EAPOL: Received EAP-Packet frame
  3674. EAPOL: SUPP_BE entering state REQUEST
  3675. EAPOL: getSuppRsp
  3676. EAP: EAP entering state RECEIVED
  3677. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  3678. EAP: EAP entering state GET_METHOD
  3679. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  3680. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  3681. TLS: using phase1 config options
  3682. TLSv1: Converting PEM format certificate into DER format
  3683. X509: Extension: extnID=2.5.29.14 critical=0
  3684. X509: Extension: extnID=2.5.29.35 critical=0
  3685. X509: Extension: extnID=2.5.29.19 critical=0
  3686. X509: BasicConstraints - cA=255
  3687. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  3688. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  3689. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  3690. Trying to parse PKCS #1 encoded RSA private key
  3691. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  3692. EAP: EAP entering state METHOD
  3693. SSL: Received packet(len=6) - Flags 0x20
  3694. EAP-TLS: Start
  3695. TLSv1: Send ClientHello
  3696. SSL: 56 bytes left to be sent out (of total 56 bytes)
  3697. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3698. EAP: EAP entering state SEND_RESPONSE
  3699. EAP: EAP entering state IDLE
  3700. EAPOL: SUPP_BE entering state RESPONSE
  3701. EAPOL: txSuppRsp
  3702. TX EAPOL: dst=78:19:f7:77:93:42
  3703. EAPOL: SUPP_BE entering state RECEIVE
  3704. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3705. EAPOL: Received EAP-Packet frame
  3706. EAPOL: SUPP_BE entering state REQUEST
  3707. EAPOL: getSuppRsp
  3708. EAP: EAP entering state RECEIVED
  3709. EAP: Received EAP-Request id=3 method=13 vendor=0 vendorMethod=0
  3710. EAP: EAP entering state METHOD
  3711. SSL: Received packet(len=1024) - Flags 0xc0
  3712. SSL: TLS Message Length: 3680
  3713. SSL: Need 2666 bytes more input data
  3714. SSL: Building ACK (type=13 id=3 ver=0)
  3715. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3716. EAP: EAP entering state SEND_RESPONSE
  3717. EAP: EAP entering state IDLE
  3718. EAPOL: SUPP_BE entering state RESPONSE
  3719. EAPOL: txSuppRsp
  3720. TX EAPOL: dst=78:19:f7:77:93:42
  3721. EAPOL: SUPP_BE entering state RECEIVE
  3722. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3723. EAPOL: Received EAP-Packet frame
  3724. EAPOL: SUPP_BE entering state REQUEST
  3725. EAPOL: getSuppRsp
  3726. EAP: EAP entering state RECEIVED
  3727. EAP: Received EAP-Request id=4 method=13 vendor=0 vendorMethod=0
  3728. EAP: EAP entering state METHOD
  3729. SSL: Received packet(len=1024) - Flags 0xc0
  3730. SSL: TLS Message Length: 3680
  3731. SSL: Need 1652 bytes more input data
  3732. SSL: Building ACK (type=13 id=4 ver=0)
  3733. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3734. EAP: EAP entering state SEND_RESPONSE
  3735. EAP: EAP entering state IDLE
  3736. EAPOL: SUPP_BE entering state RESPONSE
  3737. EAPOL: txSuppRsp
  3738. TX EAPOL: dst=78:19:f7:77:93:42
  3739. EAPOL: SUPP_BE entering state RECEIVE
  3740. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3741. EAPOL: Received EAP-Packet frame
  3742. EAPOL: SUPP_BE entering state REQUEST
  3743. EAPOL: getSuppRsp
  3744. EAP: EAP entering state RECEIVED
  3745. EAP: Received EAP-Request id=5 method=13 vendor=0 vendorMethod=0
  3746. EAP: EAP entering state METHOD
  3747. SSL: Received packet(len=1024) - Flags 0xc0
  3748. SSL: TLS Message Length: 3680
  3749. SSL: Need 638 bytes more input data
  3750. SSL: Building ACK (type=13 id=5 ver=0)
  3751. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3752. EAP: EAP entering state SEND_RESPONSE
  3753. EAP: EAP entering state IDLE
  3754. EAPOL: SUPP_BE entering state RESPONSE
  3755. EAPOL: txSuppRsp
  3756. TX EAPOL: dst=78:19:f7:77:93:42
  3757. EAPOL: SUPP_BE entering state RECEIVE
  3758. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3759. EAPOL: Received EAP-Packet frame
  3760. EAPOL: SUPP_BE entering state REQUEST
  3761. EAPOL: getSuppRsp
  3762. EAP: EAP entering state RECEIVED
  3763. EAP: Received EAP-Request id=6 method=13 vendor=0 vendorMethod=0
  3764. EAP: EAP entering state METHOD
  3765. SSL: Received packet(len=648) - Flags 0x80
  3766. SSL: TLS Message Length: 3680
  3767. TLSv1: Received content type 22 version 3.1 length 42
  3768. TLSv1: Received ServerHello
  3769. TLSv1: Using TLS v1.0
  3770. TLSv1: Selected cipher suite: 0x002f
  3771. TLSv1: Received content type 22 version 3.1 length 3278
  3772. TLSv1: Received Certificate (certificate_list len 3274)
  3773. TLSv1: Certificate 0 (len 1511)
  3774. X509: Extension: extnID=2.5.29.37 critical=0
  3775. X509: Extension: extnID=2.5.29.37 critical=0
  3776. TLSv1: Certificate 1 (len 1754)
  3777. X509: Extension: extnID=2.5.29.14 critical=0
  3778. X509: Extension: extnID=2.5.29.35 critical=0
  3779. X509: Extension: extnID=2.5.29.19 critical=0
  3780. X509: BasicConstraints - cA=255
  3781. X509: Validate certificate chain
  3782. X509: 0: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps Radius Server (2012)/emailAddress=netops@wpi.e
  3783. X509: Certificate Digest matches with calculated tbsCertificate hash
  3784. X509: Found issuer from the list of trusted certificates
  3785. X509: Certificate Digest matches with calculated tbsCertificate hash
  3786. X509: Trusted certificate found to complete the chain
  3787. X509: 1: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  3788. X509: Certificate chain valid
  3789. TLSv1: Received content type 22 version 3.1 length 345
  3790. TLSv1: Received CertificateRequest
  3791. TLSv1: Received ServerHelloDone
  3792. TLSv1: Send Certificate
  3793. TLSv1: Full client certificate chain not configured - validation may fail
  3794. TLSv1: Send ClientKeyExchange
  3795. TLSv1: Send CertificateVerify
  3796. TLSv1: Send ChangeCipherSpec
  3797. TLSv1: Record Layer - New write cipher suite 0x002f
  3798. TLSv1: Send Finished
  3799. TLSv1: verify_data (client) - hexdump(len=12): [REMOVED]
  3800. SSL: 1117 bytes left to be sent out (of total 1117 bytes)
  3801. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  3802. EAP: EAP entering state SEND_RESPONSE
  3803. EAP: EAP entering state IDLE
  3804. EAPOL: SUPP_BE entering state RESPONSE
  3805. EAPOL: txSuppRsp
  3806. TX EAPOL: dst=78:19:f7:77:93:42
  3807. EAPOL: SUPP_BE entering state RECEIVE
  3808. wlan0: RX EAPOL from 78:19:f7:77:93:42
  3809. EAPOL: Received EAP-Packet frame
  3810. EAPOL: SUPP_BE entering state REQUEST
  3811. EAPOL: getSuppRsp
  3812. EAP: EAP entering state RECEIVED
  3813. EAP: Received EAP-Failure
  3814. EAP: EAP entering state FAILURE
  3815. wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
  3816. EAPOL: SUPP_PAE entering state HELD
  3817. EAPOL: Supplicant port status: Unauthorized
  3818. EAPOL: SUPP_BE entering state RECEIVE
  3819. EAPOL: SUPP_BE entering state FAIL
  3820. EAPOL: SUPP_BE entering state IDLE
  3821. EAPOL authentication completed unsuccessfully
  3822. wlan0: Setting authentication timeout: 2 sec 0 usec
  3823. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3824. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3825. wlan0: Event 5 received on interface wlan0
  3826. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3827. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3828. wlan0: Event 5 received on interface wlan0
  3829. nl80211: Event message available
  3830. nl80211: Delete station 78:19:f7:77:93:42
  3831. nl80211: Event message available
  3832. nl80211: MLME event 39
  3833. wlan0: Event 12 received on interface wlan0
  3834. wlan0: Deauthentication notification
  3835. wlan0: * reason 1
  3836. wlan0: * address 78:19:f7:77:93:42
  3837. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  3838. wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
  3839. wlan0: Setting scan request: 0 sec 100000 usec
  3840. Added BSSID 78:19:f7:77:93:42 into blacklist
  3841. wlan0: Another BSS in this ESS has been seen; try it next
  3842. BSSID 78:19:f7:77:93:42 blacklist count incremented to 2
  3843. wlan0: Not rescheduling scan to ensure that specific SSID scans occur
  3844. wlan0: CTRL-EVENT-DISCONNECTED bssid=78:19:f7:77:93:42 reason=1
  3845. wlan0: Disconnect event - remove keys
  3846. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  3847. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  3848. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  3849. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  3850. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  3851. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  3852. wpa_driver_nl80211_set_key: ifindex=18 alg=0 addr=0x4e5694 key_idx=0 set_tx=0 seq_len=0 key_len=0
  3853. addr=78:19:f7:77:93:42
  3854. wlan0: State: ASSOCIATED -> DISCONNECTED
  3855. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3856. netlink: Operstate: linkmode=-1, operstate=5
  3857. EAPOL: External notification - portEnabled=0
  3858. EAPOL: SUPP_PAE entering state DISCONNECTED
  3859. EAPOL: Supplicant port status: Unauthorized
  3860. EAPOL: SUPP_BE entering state INITIALIZE
  3861. EAP: EAP entering state DISABLED
  3862. EAPOL: Supplicant port status: Unauthorized
  3863. EAPOL: External notification - portValid=0
  3864. EAPOL: Supplicant port status: Unauthorized
  3865. nl80211: Event message available
  3866. nl80211: Ignore disconnect event when using userspace SME
  3867. wlan0: State: DISCONNECTED -> SCANNING
  3868. Scan SSID - hexdump_ascii(len=12):
  3869. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3870. wlan0: Include wildcard SSID in the scan request
  3871. wlan0: Starting AP scan for specific SSID(s)
  3872. wlan0: Optimize scan based on previously generated frequency list
  3873. Scan requested (ret=0) - scan timeout 30 seconds
  3874. nl80211: Event message available
  3875. nl80211: Scan trigger
  3876. nl80211: Event message available
  3877. nl80211: New scan results available
  3878. wlan0: Event 3 received on interface wlan0
  3879. nl80211: Received scan results (22 BSSes)
  3880. wlan0: BSS: Start scan result update 20
  3881. wlan0: New scan results available
  3882. wlan0: Selecting BSS from priority group 0
  3883. wlan0: 0: 78:19:f7:77:86:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45
  3884. wlan0: skip - blacklisted (count=2 limit=0)
  3885. wlan0: 1: 78:19:f7:79:95:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-50
  3886. wlan0: skip - blacklisted (count=2 limit=0)
  3887. wlan0: 2: 78:19:f7:78:46:c2 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-43
  3888. wlan0: skip - blacklisted (count=2 limit=0)
  3889. wlan0: 3: 78:19:f7:78:ee:02 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72
  3890. wlan0: skip - blacklisted (count=2 limit=0)
  3891. wlan0: 4: 78:19:f7:77:87:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-75
  3892. wlan0: skip - blacklisted (count=2 limit=0)
  3893. wlan0: 5: 78:19:f7:77:93:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-79
  3894. wlan0: skip - blacklisted (count=2 limit=0)
  3895. wlan0: 6: 78:19:f7:78:43:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-80
  3896. wlan0: skip - blacklisted (count=2 limit=0)
  3897. wlan0: 7: 78:19:f7:79:6d:42 ssid='WPI-Wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-81
  3898. wlan0: selected based on RSN IE
  3899. wlan0: selected BSS 78:19:f7:79:6d:42 ssid='WPI-Wireless'
  3900. wlan0: Request association: reassociate: 0 selected: 78:19:f7:79:6d:42 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  3901. wlan0: Automatic auth_alg selection: 0x1
  3902. wlan0: RSN: using IEEE 802.11i/D9.0
  3903. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  3904. wlan0: WPA: clearing AP WPA IE
  3905. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3906. wlan0: WPA: using GTK CCMP
  3907. wlan0: WPA: using PTK CCMP
  3908. wlan0: WPA: using KEY_MGMT 802.1X
  3909. wlan0: WPA: not using MGMT group cipher
  3910. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3911. wlan0: Cancelling scan request
  3912. wlan0: SME: Trying to authenticate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
  3913. wlan0: No keys have been configured - skip key clearing
  3914. wlan0: State: SCANNING -> AUTHENTICATING
  3915. EAPOL: External notification - EAP success=0
  3916. EAPOL: Supplicant port status: Unauthorized
  3917. EAPOL: External notification - EAP fail=0
  3918. EAPOL: Supplicant port status: Unauthorized
  3919. EAPOL: External notification - portControl=Auto
  3920. EAPOL: Supplicant port status: Unauthorized
  3921. nl80211: Authenticate (ifindex=18)
  3922. * bssid=78:19:f7:79:6d:42
  3923. * freq=2437
  3924. * SSID - hexdump_ascii(len=12):
  3925. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3926. * IEs - hexdump(len=0): [NULL]
  3927. * Auth Type 0
  3928. nl80211: Authentication request send successfully
  3929. RSN: Ignored PMKID candidate without preauth flag
  3930. RSN: Ignored PMKID candidate without preauth flag
  3931. RSN: Ignored PMKID candidate without preauth flag
  3932. RSN: Ignored PMKID candidate without preauth flag
  3933. RSN: Ignored PMKID candidate without preauth flag
  3934. RSN: Ignored PMKID candidate without preauth flag
  3935. RSN: Ignored PMKID candidate without preauth flag
  3936. RSN: Ignored PMKID candidate without preauth flag
  3937. wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
  3938. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  3939. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3940. wlan0: Event 5 received on interface wlan0
  3941. nl80211: Event message available
  3942. nl80211: MLME event 37
  3943. wlan0: Event 11 received on interface wlan0
  3944. wlan0: SME: Authentication response: peer=78:19:f7:79:6d:42 auth_type=0 status_code=0
  3945. wlan0: Trying to associate with 78:19:f7:79:6d:42 (SSID='WPI-Wireless' freq=2437 MHz)
  3946. wlan0: State: AUTHENTICATING -> ASSOCIATING
  3947. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3948. netlink: Operstate: linkmode=-1, operstate=5
  3949. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3950. nl80211: Associate (ifindex=18)
  3951. * bssid=78:19:f7:79:6d:42
  3952. * freq=2437
  3953. * SSID - hexdump_ascii(len=12):
  3954. 57 50 49 2d 57 69 72 65 6c 65 73 73 WPI-Wireless
  3955. * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3956. * pairwise=0xfac04
  3957. * group=0xfac04
  3958. * prev_bssid=78:19:f7:77:93:42
  3959. nl80211: Association request send successfully
  3960. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3961. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3962. wlan0: Event 5 received on interface wlan0
  3963. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3964. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3965. wlan0: Event 5 received on interface wlan0
  3966. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  3967. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  3968. wlan0: Event 5 received on interface wlan0
  3969. nl80211: Event message available
  3970. nl80211: New station 78:19:f7:79:6d:42
  3971. nl80211: Event message available
  3972. nl80211: MLME event 38
  3973. wlan0: Event 0 received on interface wlan0
  3974. wlan0: Association info event
  3975. resp_ies - hexdump(len=92): 01 08 8b 0c 12 96 18 24 30 48 32 02 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8c 41 03 ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  3976. wlan0: freq=2437 MHz
  3977. wlan0: State: ASSOCIATING -> ASSOCIATED
  3978. wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
  3979. netlink: Operstate: linkmode=-1, operstate=5
  3980. wlan0: Associated to a new BSS: BSSID=78:19:f7:79:6d:42
  3981. wlan0: No keys have been configured - skip key clearing
  3982. wlan0: Associated with 78:19:f7:79:6d:42
  3983. wlan0: WPA: Association event - clear replay counter
  3984. wlan0: WPA: Clear old PTK
  3985. EAPOL: External notification - portEnabled=0
  3986. EAPOL: Supplicant port status: Unauthorized
  3987. EAPOL: External notification - portValid=0
  3988. EAPOL: Supplicant port status: Unauthorized
  3989. EAPOL: External notification - portEnabled=1
  3990. EAPOL: SUPP_PAE entering state CONNECTING
  3991. EAPOL: SUPP_BE entering state IDLE
  3992. EAP: EAP entering state INITIALIZE
  3993. EAP: deinitialize previously used EAP method (13, TLS) at INITIALIZE
  3994. TLSv1: Selected cipher suite: 0x0000
  3995. TLSv1: Record Layer - New write cipher suite 0x0000
  3996. TLSv1: Record Layer - New read cipher suite 0x0000
  3997. EAP: EAP entering state IDLE
  3998. wlan0: Setting authentication timeout: 10 sec 0 usec
  3999. wlan0: Cancelling scan request
  4000. nl80211: Event message available
  4001. nl80211: Ignore connect event (cmd=46) when using userspace SME
  4002. EAPOL: startWhen --> 0
  4003. EAPOL: SUPP_PAE entering state CONNECTING
  4004. EAPOL: txStart
  4005. TX EAPOL: dst=78:19:f7:79:6d:42
  4006. wlan0: RX EAPOL from 78:19:f7:79:6d:42
  4007. wlan0: Setting authentication timeout: 70 sec 0 usec
  4008. EAPOL: Received EAP-Packet frame
  4009. EAPOL: SUPP_PAE entering state RESTART
  4010. EAP: EAP entering state INITIALIZE
  4011. EAP: EAP entering state IDLE
  4012. EAPOL: SUPP_PAE entering state AUTHENTICATING
  4013. EAPOL: SUPP_BE entering state REQUEST
  4014. EAPOL: getSuppRsp
  4015. EAP: EAP entering state RECEIVED
  4016. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  4017. EAP: EAP entering state IDENTITY
  4018. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  4019. EAP: EAP-Request Identity data - hexdump_ascii(len=48):
  4020. 00 6e 65 74 77 6f 72 6b 69 64 3d 57 50 49 2d 57 _networkid=WPI-W
  4021. 69 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 41 50 ireless,nasid=AP
  4022. 35 38 2f 31 2c 70 6f 72 74 69 64 3d 32 32 39 36 58/1,portid=2296
  4023. EAP: using real identity - hexdump_ascii(len=19):
  4024. 57 69 72 65 6c 65 73 73 20 55 73 65 72 20 30 38 Wireless User 08
  4025. 2d 30 39 -09
  4026. EAP: EAP entering state SEND_RESPONSE
  4027. EAP: EAP entering state IDLE
  4028. EAPOL: SUPP_BE entering state RESPONSE
  4029. EAPOL: txSuppRsp
  4030. TX EAPOL: dst=78:19:f7:79:6d:42
  4031. EAPOL: SUPP_BE entering state RECEIVE
  4032. wlan0: RX EAPOL from 78:19:f7:79:6d:42
  4033. EAPOL: Received EAP-Packet frame
  4034. EAPOL: SUPP_BE entering state REQUEST
  4035. EAPOL: getSuppRsp
  4036. EAP: EAP entering state RECEIVED
  4037. EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
  4038. EAP: EAP entering state GET_METHOD
  4039. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
  4040. EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
  4041. TLS: using phase1 config options
  4042. TLSv1: Converting PEM format certificate into DER format
  4043. X509: Extension: extnID=2.5.29.14 critical=0
  4044. X509: Extension: extnID=2.5.29.35 critical=0
  4045. X509: Extension: extnID=2.5.29.19 critical=0
  4046. X509: BasicConstraints - cA=255
  4047. TLSv1: Added certificate: C=US, ST=Massachusetts, L=Worcester, O=WPI, OU=Network Operations, CN=WPI NetOps CA (2011)/emailAddress=netops@wpi.edu
  4048. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume PKCS #8 not used
  4049. PKCS #8: Expected SEQUENCE (AlgorithmIdentifier) - found class 0 tag 0x2; assume encrypted PKCS #8 not used
  4050. Trying to parse PKCS #1 encoded RSA private key
  4051. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
  4052. EAP: EAP entering state METHOD
  4053. SSL: Received packet(len=6) - Flags 0x20
  4054. EAP-TLS: Start
  4055. TLSv1: Send ClientHello
  4056. SSL: 56 bytes left to be sent out (of total 56 bytes)
  4057. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  4058. EAP: EAP entering state SEND_RESPONSE
  4059. EAP: EAP entering state IDLE
  4060. EAPOL: SUPP_BE entering state RESPONSE
  4061. EAPOL: txSuppRsp
  4062. TX EAPOL: dst=78:19:f7:79:6d:42
  4063. EAPOL: SUPP_BE entering state RECEIVE
  4064. wlan0: RX EAPOL from 78:19:f7:79:6d:42
  4065. EAPOL: Received EAP-Packet frame
  4066. EAPOL: SUPP_BE entering state REQUEST
Add Comment
Please, Sign In to add comment