Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v2.7
- Successfully initialized wpa_supplicant
- Initializing interface 'athn0' conf '/etc/wpa_supplicant.conf' driver 'bsd' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant.conf'
- ctrl_interface='/var/run/wpa_supplicant'
- ctrl_interface_group='wheel'
- update_config=1
- Line: 11 - start of a new network block
- ssid - hexdump_ascii(len=8):
- 62 6c 75 65 5f 75 66 6f SSID
- PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
- scan_ssid=1 (0x1)
- PSK (from passphrase) - hexdump(len=32): [REMOVED]
- Line: 20 - start of a new network block
- ssid - hexdump_ascii(len=8):
- 62 6c 75 65 5f 75 66 6f SSID
- PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
- scan_ssid=1 (0x1)
- PSK (from passphrase) - hexdump(len=32): [REMOVED]
- Line: 29 - start of a new network block
- ssid - hexdump_ascii(len=8):
- 62 6c 75 65 5f 75 66 6f SSID
- PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
- scan_ssid=1 (0x1)
- PSK (from passphrase) - hexdump(len=32): [REMOVED]
- Priority group 0
- id=0 ssid='SSID'
- id=1 ssid='SSID'
- id=2 ssid='SSID'
- Add interface athn0 to a new radio N/A
- athn0: Failed to attach pkt_type filter
- athn0: Own MAC address: 7c:e9:d3:2e:81:4d
- bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=0
- bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=1
- bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=2
- bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=3
- wpa_driver_bsd_set_countermeasures: enabled=0
- athn0: RSN: flushing PMKID list in the driver
- athn0: Setting scan request: 0.100000 sec
- ENGINE: Loading dynamic engine
- ENGINE: Loading dynamic engine
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- ctrl_interface_group=0 (from group name 'wheel')
- athn0: Added interface athn0
- athn0: State: DISCONNECTED -> DISCONNECTED
- athn0: State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=8):
- 62 6c 75 65 5f 75 66 6f SSID
- athn0: Starting AP scan for wildcard SSID (Interleave with specific)
- athn0: Add radio work 'scan'@0x6fd386cd90c0
- athn0: First radio work item in the queue - schedule start immediately
- athn0: Starting radio work 'scan'@0x6fd386cd90c0 after 0.000024 second wait
- wpa_driver_bsd_set_wpa: enabled=1
- wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
- EAPOL: disable timer tick
- athn0: Event SCAN_RESULTS (3) received
- Received 200 bytes of scan results (2 BSSes)
- athn0: BSS: Start scan result update 1
- athn0: BSS: Add new id 0 BSSID 78:45:58:d5:19:5b SSID 'SSID' freq 2412
- athn0: BSS: Add new id 1 BSSID 34:21:09:45:67:c9 SSID 'Omni_785F10' freq 2437
- BSS: last_scan_res_used=2/32
- athn0: New scan results available (own=0 ext=0)
- athn0: Radio work 'scan'@0x6fd386cd90c0 done in 2.831495 seconds
- athn0: radio_work_free('scan'@0x6fd386cd90c0): num_active_works --> 0
- athn0: Selecting BSS from priority group 0
- athn0: 0: 78:45:58:d5:19:5b ssid='SSID' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=21 freq=2412
- athn0: selected based on RSN IE
- athn0: selected BSS 78:45:58:d5:19:5b ssid='SSID'
- athn0: Considering connect request: reassociate: 0 selected: 78:45:58:d5:19:5b bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x6fd386ddb000 current_ssid=0x0
- athn0: Request association with 78:45:58:d5:19:5b
- athn0: No ongoing scan/p2p-scan found to abort
- athn0: Add radio work 'connect'@0x6fd386cd90c0
- athn0: First radio work item in the queue - schedule start immediately
- RSN: Ignored PMKID candidate without preauth flag
- athn0: Starting radio work 'connect'@0x6fd386cd90c0 after 0.000012 second wait
- athn0: Trying to associate with 78:45:58:d5:19:5b (SSID='SSID' freq=2412 MHz)
- athn0: Cancelling scan request
- athn0: WPA: clearing own WPA/RSN IE
- RSN: PMKSA cache search - network_ctx=0x6fd386ddb000 try_opportunistic=0 akmp=0x0
- RSN: Search for BSSID 78:45:58:d5:19:5b
- RSN: No PMKSA cache entry found
- athn0: RSN: using IEEE 802.11i/D9.0
- athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
- athn0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- athn0: WPA: using GTK CCMP
- athn0: WPA: using PTK CCMP
- athn0: WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- PSK (set in config) - hexdump(len=32): [REMOVED]
- WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
- athn0: Automatic auth_alg selection: 0x1
- Failed to add supported operating classes IE
- athn0: State: SCANNING -> ASSOCIATING
- Limit connection to BSSID 78:45:58:d5:19:5b freq=2412 MHz based on scan results (bssid_set=0 wps=0)
- wpa_driver_bsd_associate: ssid 'SSID' wpa ie len 22 pairwise 16 group 16 key mgmt 2
- wpa_driver_bsd_set_drop_unencrypted: enabled=1
- wpa_driver_bsd_associate: set PRIVACY 1
- athn0: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- athn0: Event ASSOC (0) received
- athn0: State: ASSOCIATING -> ASSOCIATED
- athn0: Associated to a new BSS: BSSID=78:45:58:d5:19:5b
- athn0: Associated with 78:45:58:d5:19:5b
- athn0: WPA: Association event - clear replay counter
- athn0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- athn0: Setting authentication timeout: 10 sec 0 usec
- athn0: Cancelling scan request
- athn0: RX EAPOL from 78:45:58:d5:19:5b
- RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- athn0: Setting authentication timeout: 10 sec 0 usec
- athn0: IEEE 802.1X RX: version=2 type=3 length=95
- WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- athn0: EAPOL-Key type=2
- athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- athn0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- athn0: WPA: RX message 1 of 4-Way Handshake from 78:45:58:d5:19:5b (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- Get randomness: len=32 entropy=3
- WPA: Renewed SNonce - hexdump(len=32): fe c8 46 a3 ce 29 27 f5 7f 36 97 c2 e2 b0 f3 8d 86 68 bc 43 b6 0a 53 0a 80 fa fa ee 27 c2 c3 ed
- WPA: PTK derivation using PRF(SHA1)
- WPA: PTK derivation - A1=7c:e9:d3:2e:81:4d A2=78:45:58:d5:19:5b
- WPA: Nonce1 - hexdump(len=32): fe c8 46 a3 ce 29 27 f5 7f 36 97 c2 e2 b0 f3 8d 86 68 bc 43 b6 0a 53 0a 80 fa fa ee 27 c2 c3 ed
- WPA: Nonce2 - hexdump(len=32): a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: KEK - hexdump(len=16): [REMOVED]
- WPA: TK - hexdump(len=16): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- athn0: WPA: Sending EAPOL-Key 2/4
- WPA: Send EAPOL-Key frame to 78:45:58:d5:19:5b ver=2 mic_len=16 key_mgmt=0x2
- WPA: EAPOL-Key MIC using HMAC-SHA1
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 23 b9 1f cb f5 96 91 e7 09 e2 c6 16 42 3a 0b 17
- WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 fe c8 46 a3 ce 29 27 f5 7f 36 97 c2 e2 b0 f3 8d 86 68 bc 43 b6 0a 53 0a 80 fa fa ee 27 c2 c3 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 b9 1f cb f5 96 91 e7 09 e2 c6 16 42 3a 0b 17 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- athn0: RX EAPOL from 78:45:58:d5:19:5b
- RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 ba 4f 8f 40 29 a7 33 7a 19 9a 2f 8f 91 19 6a 00 38 73 90 3a 9f 1e 5c 0a 7d 32 9d a7 fc 0e 41 dd eb 57 85 fc 59 99 f6 f8 6f 67 b0 53 99 ee e1 b9 bc 0d 90 04 f2 c6 65 ed 07 13 e7 1c 0b 19 69 ff 6c 5c dd 39 bb 12 0f 4e a8
- athn0: IEEE 802.1X RX: version=2 type=3 length=151
- WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 ba 4f 8f 40 29 a7 33 7a 19 9a 2f 8f 91 19 6a 00 38 73 90 3a 9f 1e 5c 0a 7d 32 9d a7 fc 0e 41 dd eb 57 85 fc 59 99 f6 f8 6f 67 b0 53 99 ee e1 b9 bc 0d 90 04 f2 c6 65 ed 07 13 e7 1c 0b 19 69 ff 6c 5c dd 39 bb 12 0f 4e a8
- athn0: EAPOL-Key type=2
- athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- athn0: key_length=16 key_data_length=56
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 75 ba 4f 8f 40 29 a7 33 7a 19 9a 2f 8f 91 19 6a
- WPA: EAPOL-Key MIC using HMAC-SHA1
- RSN: encrypted key data - hexdump(len=56): 73 90 3a 9f 1e 5c 0a 7d 32 9d a7 fc 0e 41 dd eb 57 85 fc 59 99 f6 f8 6f 67 b0 53 99 ee e1 b9 bc 0d 90 04 f2 c6 65 ed 07 13 e7 1c 0b 19 69 ff 6c 5c dd 39 bb 12 0f 4e a8
- WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
- WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
- athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- athn0: WPA: RX message 3 of 4-Way Handshake from 78:45:58:d5:19:5b (ver=2)
- WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 3b 44 19 c4 98 72 dc ef 0e a4 ce df 55 50 32 65 dd 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
- athn0: WPA: Sending EAPOL-Key 4/4
- WPA: Send EAPOL-Key frame to 78:45:58:d5:19:5b ver=2 mic_len=16 key_mgmt=0x2
- WPA: EAPOL-Key MIC using HMAC-SHA1
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): f3 95 aa cf 73 81 2a d6 ff 16 62 0b 67 28 0a 4a
- WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 95 aa cf 73 81 2a d6 ff 16 62 0b 67 28 0a 4a 00 00
- athn0: WPA: Installing PTK to the driver
- bsd_set_key: alg=3 addr=0x6fd386ddc2f8 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- athn0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
- WPA: Group Key - hexdump(len=16): [REMOVED]
- athn0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- bsd_set_key: alg=3 addr=0x1c4c72c81 key_idx=1 set_tx=0 seq_len=6 key_len=16
- athn0: WPA: Key negotiation completed with 78:45:58:d5:19:5b [PTK=CCMP GTK=CCMP]
- athn0: Cancelling authentication timeout
- athn0: State: GROUP_HANDSHAKE -> COMPLETED
- athn0: Radio work 'connect'@0x6fd386cd90c0 done in 0.021677 seconds
- athn0: radio_work_free('connect'@0x6fd386cd90c0): num_active_works --> 0
- athn0: CTRL-EVENT-CONNECTED - Connection to 78:45:58:d5:19:5b completed [id=0 id_str=]
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- athn0: Removing interface athn0
- athn0: Request to deauthenticate - bssid=78:45:58:d5:19:5b pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
- bsd_send_mlme_param: op=3 reason=3 addr=78:45:58:d5:19:5b
- athn0: Event DEAUTH (11) received
- athn0: Deauthentication notification
- athn0: * reason 3 (locally generated)
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- athn0: CTRL-EVENT-DISCONNECTED bssid=78:45:58:d5:19:5b reason=3 locally_generated=1
- athn0: Auto connect disabled: do not try to re-connect
- athn0: Ignore connection failure indication since interface has been put into disconnected state
- athn0: WPA: Clear old PMK and PTK
- athn0: Disconnect event - remove keys
- bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=0
- bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: key_idx=1
- bsd_set_key: alg=0 addr=0x6fd386def100 key_idx=0 set_tx=0 seq_len=0 key_len=0
- bsd_del_key: addr=78:45:58:d5:19:5b
- ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Can't assign requested address
- athn0: State: COMPLETED -> DISCONNECTED
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- athn0: State: DISCONNECTED -> DISCONNECTED
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- wpa_driver_bsd_set_countermeasures: enabled=0
- athn0: WPA: Clear old PMK and PTK
- athn0: BSS: Remove id 0 BSSID 78:45:58:d5:19:5b SSID 'SSID' due to wpa_bss_flush
- athn0: BSS: Remove id 1 BSSID 34:21:09:45:67:c9 SSID 'Omni_785F10' due to wpa_bss_flush
- athn0: Cancelling scan request
- athn0: Cancelling authentication timeout
- Remove interface athn0 from radio
- Remove radio
- wpa_driver_bsd_set_wpa: enabled=0
- wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
- wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
- athn0: CTRL-EVENT-TERMINATING
Add Comment
Please, Sign In to add comment