Guest User

wpa_supplicant log

a guest
Feb 9th, 2021
96
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Event message available
  2. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
  3. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: New station 6e:95:7c:a0:99:3d
  4. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Assoc Req IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  5. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Event ASSOC (0) received
  6. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Add randomness: count=421 entropy=133
  7. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  8. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=16): [REMOVED]
  9. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=6): [REMOVED]
  10. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  11. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - associated
  12. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: STA included RSN IE in (Re)AssocReq
  13. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:   New STA
  14. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: ap_sta_add: register ap_handle_timer timeout for 6e:95:7c:a0:99:3d (300 seconds - ap_max_inactivity)
  15. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
  16. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - event 1 notification
  17. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  18. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  19. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: P2P: First non-P2P device connected
  20. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
  21. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - start authentication
  22. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITIALIZE
  23. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  24. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  25. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
  26. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - unauthorizing port
  27. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK_GROUP entering state IDLE
  28. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state AUTHENTICATION
  29. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state AUTHENTICATION2
  30. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Get randomness: len=32 entropy=134
  31. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from os_get_random - hexdump(len=32): [REMOVED]
  32. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=20): [REMOVED]
  33. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from internal pool - hexdump(len=16): [REMOVED]
  34. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=20): [REMOVED]
  35. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from internal pool - hexdump(len=16): [REMOVED]
  36. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: mixed random - hexdump(len=32): [REMOVED]
  37. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Assign ANonce - hexdump(len=32): fe 41 2e fe 75 34 67 4d 5f 84 5a e0 cd 3b 66 c0 63 fc 50 be 86 f3 22 43 55 c3 6e 2d 3d 7c 47 93
  38. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITPSK
  39. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
  40. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
  41. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKSTART
  42. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - sending 1/4 msg of 4-Way Handshake
  43. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
  44. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  45. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
  46. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:95:7c:a0:99:3d (300 seconds - ap_max_inactivity)
  47. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  48. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: l2_packet_receive: src=6e:95:7c:a0:99:3d len=121
  49. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: RX EAPOL from 6e:95:7c:a0:99:3d
  50. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: RX EAPOL - hexdump(len=121): 02 03 00 75 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  51. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: 121 bytes from 6e:95:7c:a0:99:3d
  52. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    IEEE 802.1X: version=2 type=3 length=117
  53. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: RX EAPOL data - hexdump(len=121): 02 03 00 75 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  54. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received EAPOL-Key from 6e:95:7c:a0:99:3d key_info=0x10a type=2 mic_len=16 key_data_length=22
  55. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  56. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key Key MIC - hexdump(len=16): c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60
  57. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received Key Nonce - hexdump(len=32): 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3
  58. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  59. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Add randomness: count=422 entropy=102
  60. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  61. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=16): [REMOVED]
  62. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=32): [REMOVED]
  63. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
  64. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - received EAPOL-Key frame (2/4 Pairwise)
  65. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKCALCNEGOTIATING
  66. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
  67. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK derivation using PRF(SHA1)
  68. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK derivation - A1=74:4c:a1:ff:dc:fd A2=6e:95:7c:a0:99:3d
  69. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Nonce1 - hexdump(len=32): fe 41 2e fe 75 34 67 4d 5f 84 5a e0 cd 3b 66 c0 63 fc 50 be 86 f3 22 43 55 c3 6e 2d 3d 7c 47 93
  70. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Nonce2 - hexdump(len=32): 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3
  71. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PMK - hexdump(len=32): [REMOVED]
  72. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK - hexdump(len=48): [REMOVED]
  73. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: KCK - hexdump(len=16): [REMOVED]
  74. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: KEK - hexdump(len=16): [REMOVED]
  75. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: TK - hexdump(len=16): [REMOVED]
  76. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key MIC using HMAC-SHA1
  77. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKCALCNEGOTIATING2
  78. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKINITNEGOTIATING
  79. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - sending 3/4 msg of 4-Way Handshake
  80. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=50 keyidx=1 encr=1)
  81. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  82. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Plaintext EAPOL-Key Key Data - hexdump(len=64): [REMOVED]
  83. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
  84. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key MIC using HMAC-SHA1
  85. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
  86. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Event message available
  87. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
  88. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Delete station 6e:95:7c:a0:99:3d
  89. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Event DISASSOC (1) received
  90. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Disassociation notification
  91. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0:  * reason 0 (UNKNOWN)
  92. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0:  * address 6e:95:7c:a0:99:3d
  93. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Disassociation frame IE(s) - hexdump(len=0): [NULL]
  94. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - disassociated
  95. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - event 2 notification
  96. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  97. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  98. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state DISCONNECTED
  99. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITIALIZE
  100. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
  101. Feb 10 01:18:14 px30-64 wpa_supplicant[243]:    addr=6e:95:7c:a0:99:3d
  102. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
  103. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - unauthorizing port
  104. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: sta_remove -> DEL_STATION wlan0 6e:95:7c:a0:99:3d --> 0 (Success)
  105. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: P2P: Last non-P2P device disconnected
  106. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_ht_operation_update current operation mode=0x0
  107. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_ht_operation_update new operation mode=0x0 changes=0
  108. Feb 10 01:18:14 px30-64 wpa_supplicant[243]: ap_free_sta: cancel ap_handle_timer for 6e:95:7c:a0:99:3d
  109. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Event message available
  110. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
  111. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
  112. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 20 32 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  113. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Frame event
  114. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3220 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
  115. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
  116. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  117. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
  118. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
  119. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
  120. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
  121. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
  122. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
  123. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
  124. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
  125. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
  126. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
  127. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
  128. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
  129. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
  130. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
  131. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
  132. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
  133. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
  134. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
  135. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
  136. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
  137. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
  138. Feb 10 01:18:18 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
  139. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Event message available
  140. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
  141. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
  142. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 60 32 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  143. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Frame event
  144. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3260 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
  145. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
  146. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  147. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
  148. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
  149. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
  150. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
  151. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
  152. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
  153. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
  154. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
  155. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
  156. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
  157. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
  158. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
  159. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
  160. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
  161. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
  162. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
  163. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
  164. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
  165. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
  166. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
  167. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
  168. Feb 10 01:18:19 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
  169. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Event message available
  170. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
  171. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
  172. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 50 35 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  173. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Frame event
  174. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3550 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
  175. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
  176. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
  177. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
  178. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
  179. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
  180. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
  181. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
  182. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
  183. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
  184. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
  185. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
  186. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
  187. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
  188. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
  189. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
  190. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
  191. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
  192. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
  193. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
  194. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
  195. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
  196. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
  197. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
  198. Feb 10 01:18:40 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
RAW Paste Data