Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v2.0
- Successfully initialized wpa_supplicant
- Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file 'wpa_networkers.conf' -> '/home/jwidel/wpa_networkers.conf'
- Reading configuration file '/home/jwidel/wpa_networkers.conf'
- Line: 2 - start of a new network block
- ssid - hexdump_ascii(len=10):
- 6e 65 74 77 6f 72 6b 65 72 73 networkers
- key_mgmt: 0x1
- eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
- identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- password - hexdump_ascii(len=10): [REMOVED]
- ca_cert - hexdump_ascii(len=38):
- 2f 68 6f 6d 65 2f 6a 77 69 64 65 6c 2f 74 6d 70 /home/jwidel/tmp
- 2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65 /rootca-networke
- 72 73 2e 70 65 6d rs.pem
- phase1 - hexdump_ascii(len=11):
- 70 65 61 70 6c 61 62 65 6c 3d 30 peaplabel=0
- phase2 - hexdump_ascii(len=13):
- 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
- priority=10 (0xa)
- Priority group 10
- id=0 ssid='networkers'
- WEXT: cfg80211-based driver detected
- wext: interface wlan0 phy: phy0
- rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
- rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
- rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0x1f flags 0x0
- netlink: Operstate: linkmode=1, operstate=5
- wlan0: Own MAC address: 20:68:9d:d0:49:25
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- wlan0: RSN: flushing PMKID list in the driver
- wlan0: Setting scan request: 0 sec 100000 usec
- WPS: Set UUID for interface wlan0
- WPS: UUID based on MAC address - hexdump(len=16): 2f 09 dc a4 48 dd 58 bd 9f ba 5e 5e c0 f2 ea c8
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- wlan0: Added interface wlan0
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 10 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=16
- wlan0: Event SCAN_RESULTS (3) received
- Scan results did not fit - trying larger buffer (8192 bytes)
- Received 5146 bytes of scan results (9 BSSes)
- wlan0: BSS: Start scan result update 1
- wlan0: BSS: Add new id 0 BSSID 20:3a:07:97:15:72 SSID 'networkers'
- wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:71 SSID '\x00'
- wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:70 SSID 'networkers-data'
- wlan0: BSS: Add new id 3 BSSID 00:18:39:a1:f7:c9 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
- wlan0: BSS: Add new id 4 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42'
- wlan0: BSS: Add new id 5 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0'
- wlan0: BSS: Add new id 6 BSSID c8:3a:35:27:59:70 SSID 'mani'
- wlan0: BSS: Add new id 7 BSSID f0:7d:68:8e:10:ce SSID ''
- wlan0: BSS: Add new id 8 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET'
- BSS: last_scan_res_used=9/32 last_scan_full=0
- wlan0: New scan results available
- WPS: AP 90:94:e4:35:57:ba type 0 added
- WPS: AP 00:12:2a:98:72:d8 type 0 added
- WPS: AP f0:7d:68:8e:10:ce type 0 added
- WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wlan0: Selecting BSS from priority group 10
- wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-56
- wlan0: selected based on RSN IE
- wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers'
- wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- wlan0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 20:3a:07:97:15:72
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wlan0: Association request to the driver failed
- wlan0: Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=26
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8c08 len=110
- AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 20:3a:07:97:15:72
- wlan0: Event ASSOCINFO (4) received
- wlan0: Association info event
- resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlan0: Event ASSOC (0) received
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 20:3a:07:97:15:72
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=4): 01 01 00 00
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 02 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 02 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=26): 02 00 00 16 01 03 00 16 04 10 3f be a0 98 13 2f f5 bf 38 c1 6d 3a 4e 5f e1 94
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=4 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 4
- EAP: vendor 0 method 4 not allowed
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
- EAP: Status notification: refuse proposed method (param=MD5)
- EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 19
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 03 19
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=10): 02 00 00 06 01 04 00 06 19 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-PEAP: Start (server ver=0, own ver=1)
- EAP-PEAP: Using PEAP version 0
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 223 bytes pending from ssl_out
- SSL: 223 bytes left to be sent out (of total 223 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=237): 01 00 00 e9 02 04 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 03 a8 ee 8e 10 2e 5c e3 31 c8 eb e2 c4 5a 02 98 d2 f5 85 04 aa be d1 02 ad 70 ef 45 2e 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: startWhen --> 0
- EAPOL: authWhile --> 0
- EAPOL: SUPP_BE entering state TIMEOUT
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=4): 01 01 00 00
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 07 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
- ENGINE: engine deinit
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 07 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=26): 02 00 00 16 01 08 00 16 04 10 a2 49 b1 32 a8 99 e5 5e 2c ec 71 a0 fe 00 38 c4
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=4 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 4
- EAP: vendor 0 method 4 not allowed
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
- EAP: Status notification: refuse proposed method (param=MD5)
- EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 19
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 03 19
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=10): 02 00 00 06 01 09 00 06 19 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-PEAP: Start (server ver=0, own ver=1)
- EAP-PEAP: Using PEAP version 0
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 223 bytes pending from ssl_out
- SSL: 223 bytes left to be sent out (of total 223 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=237): 01 00 00 e9 02 09 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 24 6e b8 62 b1 d0 b3 fc 6e 98 ae 86 2f 23 a0 f8 b8 43 51 71 ce 40 84 4d 3b a7 25 f0 9d 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
- EAPOL: SUPP_BE entering state RECEIVE
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:00:00:00:00:00
- wlan0: Event DISASSOC (1) received
- wlan0: Disassociation notification
- wlan0: CTRL-EVENT-DISCONNECTED bssid=20:3a:07:97:15:72 reason=0
- wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=6)
- wlan0: Setting scan request: 0 sec 100000 usec
- Added BSSID 20:3a:07:97:15:72 into blacklist
- wlan0: Blacklist count 1 --> request scan in 100 ms
- wlan0: Setting scan request: 0 sec 100000 usec
- wlan0: Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=16
- wlan0: Event SCAN_RESULTS (3) received
- Scan results did not fit - trying larger buffer (8192 bytes)
- Received 5544 bytes of scan results (10 BSSes)
- wlan0: BSS: Start scan result update 2
- wlan0: BSS: Add new id 9 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279'
- wlan0: BSS: Add new id 10 BSSID 54:e6:fc:e8:c6:02 SSID 'Ukasz'
- wlan0: BSS: Add new id 11 BSSID e2:b9:c8:62:78:38 SSID '500_JoikuSpot_943AF04AD3F5'
- BSS: last_scan_res_used=10/32 last_scan_full=0
- wlan0: New scan results available
- WPS: AP 00:19:70:79:97:c8 type 0 added
- WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wlan0: Selecting BSS from priority group 10
- wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
- wlan0: skip - blacklisted (count=1 limit=0)
- wlan0: 1: 20:3a:07:97:15:71 ssid='\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-70
- wlan0: skip - SSID mismatch
- wlan0: 2: 20:3a:07:97:15:70 ssid='networkers-data' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74
- wlan0: skip - SSID mismatch
- wlan0: 3: 90:94:e4:35:57:ba ssid='konarskiego 42' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-74 wps
- wlan0: skip - SSID mismatch
- wlan0: 4: 00:12:2a:98:72:d8 ssid='NETIASPOT-9872D0' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-75 wps
- wlan0: skip - SSID mismatch
- wlan0: 5: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-76
- wlan0: skip - SSID mismatch
- wlan0: 6: 00:19:70:79:97:c8 ssid='FAST3764-4279' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-78 wps
- wlan0: skip - SSID mismatch
- wlan0: 7: 54:e6:fc:e8:c6:02 ssid='Ukasz' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=-95
- wlan0: skip - SSID mismatch
- wlan0: 8: e2:b9:c8:62:78:38 ssid='500_JoikuSpot_943AF04AD3F5' wpa_ie_len=0 rsn_ie_len=0 caps=0x12 level=-91
- wlan0: skip - SSID mismatch
- wlan0: 9: 00:12:2a:98:72:da ssid='FON_NETIA_FREE_INTERNET' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-81
- wlan0: skip - SSID mismatch
- wlan0: No APs found - clear blacklist and try again
- Removed BSSID 20:3a:07:97:15:72 from blacklist (clear)
- wlan0: Selecting BSS from priority group 10
- wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
- wlan0: selected based on RSN IE
- wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers'
- wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- wlan0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 20:3a:07:97:15:72
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wlan0: Association request to the driver failed
- wlan0: Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=26
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8c08 len=110
- AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 20:3a:07:97:15:72
- wlan0: Event ASSOCINFO (4) received
- wlan0: Association info event
- resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlan0: Event ASSOC (0) received
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 20:3a:07:97:15:72
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
- ENGINE: engine deinit
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 38 75 15 e9 3e 8d 75 c0 65 4f 03 ce 96 2e 8a e2
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 4
- EAP: vendor 0 method 4 not allowed
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
- EAP: Status notification: refuse proposed method (param=MD5)
- EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 19
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-PEAP: Start (server ver=0, own ver=1)
- EAP-PEAP: Using PEAP version 0
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 223 bytes pending from ssl_out
- SSL: 223 bytes left to be sent out (of total 223 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 28 e4 b8 50 54 ba 28 d4 32 0d c1 f2 55 18 2e 2f a7 40 c3 39 9e 90 c8 dd 85 32 d0 b9 b8 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: startWhen --> 0
- EAPOL: authWhile --> 0
- EAPOL: SUPP_BE entering state TIMEOUT
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=4): 01 01 00 00
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 06 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
- ENGINE: engine deinit
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 06 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=26): 02 00 00 16 01 07 00 16 04 10 65 31 12 25 0f b6 9a c1 de db 22 8c 77 25 9e 6d
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=4 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 4
- EAP: vendor 0 method 4 not allowed
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
- EAP: Status notification: refuse proposed method (param=MD5)
- EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 19
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 03 19
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=10): 02 00 00 06 01 08 00 06 19 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-PEAP: Start (server ver=0, own ver=1)
- EAP-PEAP: Using PEAP version 0
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 223 bytes pending from ssl_out
- SSL: 223 bytes left to be sent out (of total 223 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=237): 01 00 00 e9 02 08 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 48 db b5 8e 82 2d ce 2d 48 e3 76 96 00 63 73 a2 f2 19 7c 1e 36 50 4e c5 0c 99 6b ff dd 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: startWhen --> 0
- EAPOL: authWhile --> 0
- EAPOL: SUPP_BE entering state TIMEOUT
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAPOL: startWhen --> 0
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: txStart
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=4): 01 01 00 00
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 0b 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
- ENGINE: engine deinit
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=11 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 0b 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=26): 02 00 00 16 01 0c 00 16 04 10 8f 64 c4 83 f0 c3 78 1e 4b 01 ba 05 f5 03 0d 87
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=12 method=4 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow: vendor 0 method 4
- EAP: vendor 0 method 4 not allowed
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
- EAP: Status notification: refuse proposed method (param=MD5)
- EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
- EAP: allowed methods - hexdump(len=1): 19
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=10): 01 00 00 06 02 0c 00 06 03 19
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=10): 02 00 00 06 01 0d 00 06 19 20
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
- TLS: using phase1 config options
- TLS: Trusted root certificate(s) loaded
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x20
- EAP-PEAP: Start (server ver=0, own ver=1)
- EAP-PEAP: Using PEAP version 0
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before/connect initialization
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3 write client hello A
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3 read server hello A
- SSL: SSL_connect - want more data
- SSL: 223 bytes pending from ssl_out
- SSL: 223 bytes left to be sent out (of total 223 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=237): 01 00 00 e9 02 0d 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 57 69 6f 8e a0 f4 61 2a 0e 36 c2 6f a5 0e 12 6d 5c 4b cf 60 ec 50 52 13 6c 81 36 b3 c0 3b 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: Authentication with 20:3a:07:97:15:72 timed out.
- Added BSSID 20:3a:07:97:15:72 into blacklist
- wlan0: Request to deauthenticate - bssid=20:3a:07:97:15:72 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
- wpa_driver_wext_deauthenticate
- wlan0: Event DEAUTH (12) received
- wlan0: Deauthentication notification
- wlan0: * reason 3 (locally generated)
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: CTRL-EVENT-DISCONNECTED bssid=20:3a:07:97:15:72 reason=3 locally_generated=1
- wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=6)
- wlan0: Setting scan request: 0 sec 100000 usec
- BSSID 20:3a:07:97:15:72 blacklist count incremented to 2
- wlan0: Blacklist count 3 --> request scan in 1000 ms
- wlan0: Setting scan request: 1 sec 0 usec
- wlan0: Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wlan0: State: ASSOCIATED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- wlan0: Setting scan request: 1 sec 0 usec
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 00:00:00:00:00:00
- wlan0: Event DISASSOC (1) received
- wlan0: Disassociation notification
- wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=0)
- wlan0: Do not request new immediate scan
- wlan0: Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wlan0: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- EAPOL: Supplicant port status: Unauthorized
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=16
- wlan0: Event SCAN_RESULTS (3) received
- Scan results did not fit - trying larger buffer (8192 bytes)
- Received 6123 bytes of scan results (11 BSSes)
- wlan0: BSS: Start scan result update 3
- wlan0: BSS: Add new id 12 BSSID c8:7b:5b:b9:3a:7d SSID 'lampart'
- wlan0: BSS: Remove id 6 BSSID c8:3a:35:27:59:70 SSID 'mani' due to no match in scan
- BSS: last_scan_res_used=11/32 last_scan_full=0
- wlan0: New scan results available
- WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wlan0: Selecting BSS from priority group 10
- wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: 20:3a:07:97:15:71 ssid='\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-59
- wlan0: skip - SSID mismatch
- wlan0: 2: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-60
- wlan0: skip - SSID mismatch
- wlan0: 3: 20:3a:07:97:15:70 ssid='networkers-data' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-65
- wlan0: skip - SSID mismatch
- wlan0: 4: 00:12:2a:98:72:d8 ssid='NETIASPOT-9872D0' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-77 wps
- wlan0: skip - SSID mismatch
- wlan0: 5: 00:19:70:79:97:c8 ssid='FAST3764-4279' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-82 wps
- wlan0: skip - SSID mismatch
- wlan0: 6: 90:94:e4:35:57:ba ssid='konarskiego 42' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-83 wps
- wlan0: skip - SSID mismatch
- wlan0: 7: c8:7b:5b:b9:3a:7d ssid='lampart' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-88
- wlan0: skip - SSID mismatch
- wlan0: 8: f0:7d:68:8e:10:ce ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-89 wps
- wlan0: skip - SSID not known
- wlan0: 9: e2:b9:c8:62:78:38 ssid='500_JoikuSpot_943AF04AD3F5' wpa_ie_len=0 rsn_ie_len=0 caps=0x12 level=-89
- wlan0: skip - SSID mismatch
- wlan0: 10: 00:12:2a:98:72:da ssid='FON_NETIA_FREE_INTERNET' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-80
- wlan0: skip - SSID mismatch
- wlan0: No APs found - clear blacklist and try again
- Removed BSSID 20:3a:07:97:15:72 from blacklist (clear)
- wlan0: Selecting BSS from priority group 10
- wlan0: 0: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-58
- wlan0: selected based on RSN IE
- wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers'
- wlan0: Request association: reassociate: 1 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- wlan0: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 20:3a:07:97:15:72
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- wlan0: No keys have been configured - skip key clearing
- wlan0: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wlan0: Association request to the driver failed
- wlan0: Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=26
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8c08 len=110
- AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 20:3a:07:97:15:72
- wlan0: Event ASSOCINFO (4) received
- wlan0: Association info event
- resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlan0: Event ASSOC (0) received
- wlan0: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
- wlan0: No keys have been configured - skip key clearing
- wlan0: Associated with 20:3a:07:97:15:72
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE
- ENGINE: engine deinit
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: EAP-Request Identity data - hexdump_ascii(len=57):
- 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo
- 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC-
- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1
- 2c 70 6f 72 74 69 64 3d 31 ,portid=1
- EAP: using real identity - hexdump_ascii(len=6):
- 6a 77 69 64 65 6c jwidel
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=20:3a:07:97:15:72
- TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: RX EAPOL from 20:3a:07:97:15:72
- RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 e4 67 45 93 73 e2 48 33 83 2e 65 99 6a df df 4c
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- EAP: configuration does not allow:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement