Guest User

wpa_supplicant log

a guest
Feb 9th, 2021
94
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Event message available
  2. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
  3. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: New station 6e:95:7c:a0:99:3d
  4. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Assoc Req IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  5. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Event ASSOC (0) received
  6. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Add randomness: count=421 entropy=133
  7. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  8. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=16): [REMOVED]
  9. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=6): [REMOVED]
  10. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  11. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - associated
  12. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: STA included RSN IE in (Re)AssocReq
  13. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:   New STA
  14. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: ap_sta_add: register ap_handle_timer timeout for 6e:95:7c:a0:99:3d (300 seconds - ap_max_inactivity)
  15. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
  16. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - event 1 notification
  17. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  18. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  19. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: P2P: First non-P2P device connected
  20. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
  21. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - start authentication
  22. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITIALIZE
  23. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  24. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  25. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
  26. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - unauthorizing port
  27. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK_GROUP entering state IDLE
  28. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state AUTHENTICATION
  29. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state AUTHENTICATION2
  30. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Get randomness: len=32 entropy=134
  31. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from os_get_random - hexdump(len=32): [REMOVED]
  32. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=20): [REMOVED]
  33. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from internal pool - hexdump(len=16): [REMOVED]
  34. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=20): [REMOVED]
  35. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from internal pool - hexdump(len=16): [REMOVED]
  36. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: mixed random - hexdump(len=32): [REMOVED]
  37. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Assign ANonce - hexdump(len=32): fe 41 2e fe 75 34 67 4d 5f 84 5a e0 cd 3b 66 c0 63 fc 50 be 86 f3 22 43 55 c3 6e 2d 3d 7c 47 93
  38. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITPSK
  39. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
  40. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
  41. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKSTART
  42. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - sending 1/4 msg of 4-Way Handshake
  43. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
  44. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  45. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
  46. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:95:7c:a0:99:3d (300 seconds - ap_max_inactivity)
  47. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  48. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: l2_packet_receive: src=6e:95:7c:a0:99:3d len=121
  49. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: RX EAPOL from 6e:95:7c:a0:99:3d
  50. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: RX EAPOL - hexdump(len=121): 02 03 00 75 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  51. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: 121 bytes from 6e:95:7c:a0:99:3d
  52. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    IEEE 802.1X: version=2 type=3 length=117
  53. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: RX EAPOL data - hexdump(len=121): 02 03 00 75 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  54. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received EAPOL-Key from 6e:95:7c:a0:99:3d key_info=0x10a type=2 mic_len=16 key_data_length=22
  55. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  56. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key Key MIC - hexdump(len=16): c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60
  57. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received Key Nonce - hexdump(len=32): 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3
  58. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  59. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Add randomness: count=422 entropy=102
  60. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  61. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=16): [REMOVED]
  62. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=32): [REMOVED]
  63. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  64. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - received EAPOL-Key frame (2/4 Pairwise)
  65. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKCALCNEGOTIATING
  66. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
  67. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK derivation using PRF(SHA1)
  68. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK derivation - A1=74:4c:a1:ff:dc:fd A2=6e:95:7c:a0:99:3d
  69. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Nonce1 - hexdump(len=32): fe 41 2e fe 75 34 67 4d 5f 84 5a e0 cd 3b 66 c0 63 fc 50 be 86 f3 22 43 55 c3 6e 2d 3d 7c 47 93
  70. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Nonce2 - hexdump(len=32): 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3
  71. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PMK - hexdump(len=32): [REMOVED]
  72. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK - hexdump(len=48): [REMOVED]
  73. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: KCK - hexdump(len=16): [REMOVED]
  74. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: KEK - hexdump(len=16): [REMOVED]
  75. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: TK - hexdump(len=16): [REMOVED]
  76. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key MIC using HMAC-SHA1
  77. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKCALCNEGOTIATING2
  78. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKINITNEGOTIATING
  79. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - sending 3/4 msg of 4-Way Handshake
  80. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=50 keyidx=1 encr=1)
  81. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  82. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Plaintext EAPOL-Key Key Data - hexdump(len=64): [REMOVED]
  83. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
  84. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key MIC using HMAC-SHA1
  85. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
  86. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Event message available
  87. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
  88. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Delete station 6e:95:7c:a0:99:3d
  89. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Event DISASSOC (1) received
  90. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Disassociation notification
  91. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0:  * reason 0 (UNKNOWN)
  92. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0:  * address 6e:95:7c:a0:99:3d
  93. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Disassociation frame IE(s) - hexdump(len=0): [NULL]
  94. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - disassociated
  95. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - event 2 notification
  96. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  97. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  98. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state DISCONNECTED
  99. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITIALIZE
  100. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  101. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  102. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
  103. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - unauthorizing port
  104. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: sta_remove -> DEL_STATION wlan0 6e:95:7c:a0:99:3d --> 0 (Success)
  105. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: P2P: Last non-P2P device disconnected
  106. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_ht_operation_update current operation mode=0x0
  107. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_ht_operation_update new operation mode=0x0 changes=0
  108. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: ap_free_sta: cancel ap_handle_timer for 6e:95:7c:a0:99:3d
  109. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Event message available
  110. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
  111. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
  112. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 20 32 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  113. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Frame event
  114. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3220 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
  115. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
  116. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  117. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
  118. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
  119. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
  120. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
  121. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
  122. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
  123. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
  124. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
  125. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
  126. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
  127. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
  128. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
  129. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
  130. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
  131. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
  132. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
  133. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
  134. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
  135. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
  136. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
  137. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
  138. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
  139. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Event message available
  140. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
  141. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
  142. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 60 32 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  143. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Frame event
  144. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3260 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
  145. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
  146. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  147. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
  148. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
  149. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
  150. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
  151. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
  152. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
  153. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
  154. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
  155. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
  156. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
  157. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
  158. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
  159. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
  160. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
  161. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
  162. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
  163. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
  164. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
  165. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
  166. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
  167. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
  168. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
  169. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Event message available
  170. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
  171. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
  172. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 50 35 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  173. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Frame event
  174. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3550 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
  175. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
  176. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  177. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
  178. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
  179. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
  180. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
  181. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
  182. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
  183. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
  184. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
  185. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
  186. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
  187. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
  188. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
  189. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
  190. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
  191. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
  192. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
  193. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
  194. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
  195. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
  196. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
  197. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
  198. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×