SHARE
TWEET

Untitled

a guest Jan 26th, 2019 83 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
  2. nl80211: New station 1c:67:58:c0:a2:58
  3. nl80211: Assoc Req IEs - hexdump(len=152): 00 05 4d 55 44 50 49 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 12 24 02 01 0b 30 26 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 80 00 01 00 ed 63 9e e1 fb 02 2b 5c cc d9 b4 f6 27 24 55 91 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 dd 1e 00 90 4c 33 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 10 10 00 00
  4. wlan0: Event ASSOC (0) received
  5. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.11: associated
  6. STA included RSN IE in (Re)AssocReq
  7.   New STA
  8. ap_sta_add: register ap_handle_timer timeout for 1c:67:58:c0:a2:58 (300 seconds - ap_max_inactivity)
  9. RSN IE: STA PMKID - hexdump(len=16): ed 63 9e e1 fb 02 2b 5c cc d9 b4 f6 27 24 55 91
  10. nl80211: Set STA flags - ifname=wlan0 addr=1c:67:58:c0:a2:58 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
  11. wlan0: STA 1c:67:58:c0:a2:58 WPA: event 1 notification
  12. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  13.    addr=1c:67:58:c0:a2:58
  14. nl80211: set_key failed; err=-22 Invalid argument)
  15. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: start authentication
  16. EAP: Server state machine created
  17. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state IDLE
  18. IEEE 802.1X: 1c:67:58:c0:a2:58 CTRL_DIR entering state FORCE_BOTH
  19. wlan0: STA 1c:67:58:c0:a2:58 WPA: start authentication
  20. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state INITIALIZE
  21. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  22.    addr=1c:67:58:c0:a2:58
  23. nl80211: set_key failed; err=-22 Invalid argument)
  24. WPA: 1c:67:58:c0:a2:58 WPA_PTK_GROUP entering state IDLE
  25. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state AUTHENTICATION
  26. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state AUTHENTICATION2
  27. WPA: Re-initialize GMK/Counter on first station
  28. GMK - hexdump(len=32): [REMOVED]
  29. Key Counter - hexdump(len=32): [REMOVED]
  30. GTK - hexdump(len=16): [REMOVED]
  31. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0xc7868 key_idx=1 set_tx=1 seq_len=0 key_len=16
  32. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  33.    broadcast key
  34. WPA: Assign ANonce - hexdump(len=32): b6 28 22 79 9f f2 44 f6 07 b6 11 49 5e ea 4b 39 42 2c 8e 70 15 a3 aa a0 26 af 1e 87 fe 95 18 2b
  35. hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 1c:67:58:c0:a2:58 (300 seconds - ap_max_inactivity)
  36. IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state DISCONNECTED
  37. nl80211: Set STA flags - ifname=wlan0 addr=1c:67:58:c0:a2:58 total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
  38. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: unauthorizing port
  39. IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state RESTART
  40. EAP: EAP entering state INITIALIZE
  41. wlan0: CTRL-EVENT-EAP-STARTED 1c:67:58:c0:a2:58
  42. EAP: EAP entering state SELECT_ACTION
  43. EAP: getDecision: no identity known yet -> CONTINUE
  44. EAP: EAP entering state PROPOSE_METHOD
  45. EAP: getNextMethod: vendor 0 type 1
  46. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
  47. EAP: EAP entering state METHOD_REQUEST
  48. EAP: building EAP-Request: Identifier 174
  49. EAP: EAP entering state SEND_REQUEST
  50. EAP: EAP entering state IDLE
  51. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  52. IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state CONNECTING
  53. IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state AUTHENTICATING
  54. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  55. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 174)
  56. wlan0: Event EAPOL_RX (24) received
  57. IEEE 802.1X: 15 bytes from 1c:67:58:c0:a2:58
  58.    IEEE 802.1X: version=1 type=0 length=11
  59. EAP: code=2 identifier=174 length=11
  60.  (response)
  61. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=174 len=11) from STA: EAP Response-Identity (1)
  62. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  63. EAP: EAP entering state RECEIVED
  64. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=174 respMethod=1 respVendor=0 respVendorMethod=0
  65. EAP: EAP entering state INTEGRITY_CHECK
  66. EAP: EAP entering state METHOD_RESPONSE
  67. EAP-Identity: Peer identity - hexdump_ascii(len=6):
  68.      74 65 73 74 31 30                                 test10
  69. EAP: EAP entering state SELECT_ACTION
  70. EAP: getDecision: -> PASSTHROUGH
  71. EAP: EAP entering state INITIALIZE_PASSTHROUGH
  72. EAP: EAP entering state AAA_REQUEST
  73. EAP: EAP entering state AAA_IDLE
  74. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: STA identity 'test10'
  75. Encapsulating EAP message into a RADIUS packet
  76. wlan0: RADIUS Sending RADIUS message to authentication server
  77. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  78. wlan0: RADIUS Received 80 bytes from RADIUS server
  79. wlan0: RADIUS Received RADIUS message
  80. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  81. RADIUS packet matching with station 1c:67:58:c0:a2:58
  82. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=175 len=22) from RADIUS server: EAP-Request-MD5 (4)
  83. EAP: EAP entering state AAA_RESPONSE
  84. EAP: getId: id=175
  85. EAP: EAP entering state SEND_REQUEST2
  86. EAP: EAP entering state IDLE2
  87. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  88. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  89. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 175)
  90. wlan0: Event EAPOL_RX (24) received
  91. IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
  92.    IEEE 802.1X: version=1 type=0 length=6
  93. EAP: code=2 identifier=175 length=6
  94.  (response)
  95. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=175 len=6) from STA: EAP Response-unknown (3)
  96. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  97. EAP: EAP entering state RECEIVED2
  98. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=175 respMethod=3 respVendor=0 respVendorMethod=0
  99. EAP: EAP entering state AAA_REQUEST
  100. EAP: EAP entering state AAA_IDLE
  101. Encapsulating EAP message into a RADIUS packet
  102. Copied RADIUS State Attribute
  103. wlan0: RADIUS Sending RADIUS message to authentication server
  104. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  105. wlan0: RADIUS Received 64 bytes from RADIUS server
  106. wlan0: RADIUS Received RADIUS message
  107. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  108. RADIUS packet matching with station 1c:67:58:c0:a2:58
  109. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=176 len=6) from RADIUS server: EAP-Request-PEAP (25)
  110. EAP: EAP entering state AAA_RESPONSE
  111. EAP: getId: id=176
  112. EAP: EAP entering state SEND_REQUEST2
  113. EAP: EAP entering state IDLE2
  114. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  115. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  116. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 176)
  117. wlan0: Event EAPOL_RX (24) received
  118. IEEE 802.1X: 179 bytes from 1c:67:58:c0:a2:58
  119.    IEEE 802.1X: version=1 type=0 length=175
  120. EAP: code=2 identifier=176 length=175
  121.  (response)
  122. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=176 len=175) from STA: EAP Response-PEAP (25)
  123. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  124. EAP: EAP entering state RECEIVED2
  125. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=176 respMethod=25 respVendor=0 respVendorMethod=0
  126. EAP: EAP entering state AAA_REQUEST
  127. EAP: EAP entering state AAA_IDLE
  128. Encapsulating EAP message into a RADIUS packet
  129. Copied RADIUS State Attribute
  130. wlan0: RADIUS Sending RADIUS message to authentication server
  131. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  132. wlan0: RADIUS Received 1068 bytes from RADIUS server
  133. wlan0: RADIUS Received RADIUS message
  134. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.07 sec
  135. RADIUS packet matching with station 1c:67:58:c0:a2:58
  136. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=177 len=1004) from RADIUS server: EAP-Request-PEAP (25)
  137. EAP: EAP entering state AAA_RESPONSE
  138. EAP: getId: id=177
  139. EAP: EAP entering state SEND_REQUEST2
  140. EAP: EAP entering state IDLE2
  141. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  142. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  143. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 177)
  144. wlan0: Event EAPOL_RX (24) received
  145. IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
  146.    IEEE 802.1X: version=1 type=0 length=6
  147. EAP: code=2 identifier=177 length=6
  148.  (response)
  149. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=177 len=6) from STA: EAP Response-PEAP (25)
  150. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  151. EAP: EAP entering state RECEIVED2
  152. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=177 respMethod=25 respVendor=0 respVendorMethod=0
  153. EAP: EAP entering state AAA_REQUEST
  154. EAP: EAP entering state AAA_IDLE
  155. Encapsulating EAP message into a RADIUS packet
  156. Copied RADIUS State Attribute
  157. wlan0: RADIUS Sending RADIUS message to authentication server
  158. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  159. wlan0: RADIUS Received 1064 bytes from RADIUS server
  160. wlan0: RADIUS Received RADIUS message
  161. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  162. RADIUS packet matching with station 1c:67:58:c0:a2:58
  163. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=178 len=1000) from RADIUS server: EAP-Request-PEAP (25)
  164. EAP: EAP entering state AAA_RESPONSE
  165. EAP: getId: id=178
  166. EAP: EAP entering state SEND_REQUEST2
  167. EAP: EAP entering state IDLE2
  168. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  169. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  170. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 178)
  171. wlan0: Event EAPOL_RX (24) received
  172. IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
  173.    IEEE 802.1X: version=1 type=0 length=6
  174. EAP: code=2 identifier=178 length=6
  175.  (response)
  176. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=178 len=6) from STA: EAP Response-PEAP (25)
  177. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  178. EAP: EAP entering state RECEIVED2
  179. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=178 respMethod=25 respVendor=0 respVendorMethod=0
  180. EAP: EAP entering state AAA_REQUEST
  181. EAP: EAP entering state AAA_IDLE
  182. Encapsulating EAP message into a RADIUS packet
  183. Copied RADIUS State Attribute
  184. wlan0: RADIUS Sending RADIUS message to authentication server
  185. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  186. wlan0: RADIUS Received 757 bytes from RADIUS server
  187. wlan0: RADIUS Received RADIUS message
  188. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  189. RADIUS packet matching with station 1c:67:58:c0:a2:58
  190. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=179 len=695) from RADIUS server: EAP-Request-PEAP (25)
  191. EAP: EAP entering state AAA_RESPONSE
  192. EAP: getId: id=179
  193. EAP: EAP entering state SEND_REQUEST2
  194. EAP: EAP entering state IDLE2
  195. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  196. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  197. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 179)
  198. wlan0: Event EAPOL_RX (24) received
  199. IEEE 802.1X: 140 bytes from 1c:67:58:c0:a2:58
  200.    IEEE 802.1X: version=1 type=0 length=136
  201. EAP: code=2 identifier=179 length=136
  202.  (response)
  203. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=179 len=136) from STA: EAP Response-PEAP (25)
  204. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  205. EAP: EAP entering state RECEIVED2
  206. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=179 respMethod=25 respVendor=0 respVendorMethod=0
  207. EAP: EAP entering state AAA_REQUEST
  208. EAP: EAP entering state AAA_IDLE
  209. Encapsulating EAP message into a RADIUS packet
  210. Copied RADIUS State Attribute
  211. wlan0: RADIUS Sending RADIUS message to authentication server
  212. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  213. wlan0: RADIUS Received 115 bytes from RADIUS server
  214. wlan0: RADIUS Received RADIUS message
  215. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  216. RADIUS packet matching with station 1c:67:58:c0:a2:58
  217. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=180 len=57) from RADIUS server: EAP-Request-PEAP (25)
  218. EAP: EAP entering state AAA_RESPONSE
  219. EAP: getId: id=180
  220. EAP: EAP entering state SEND_REQUEST2
  221. EAP: EAP entering state IDLE2
  222. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  223. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  224. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 180)
  225. wlan0: Event EAPOL_RX (24) received
  226. IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
  227.    IEEE 802.1X: version=1 type=0 length=6
  228. EAP: code=2 identifier=180 length=6
  229.  (response)
  230. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=180 len=6) from STA: EAP Response-PEAP (25)
  231. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  232. EAP: EAP entering state RECEIVED2
  233. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=180 respMethod=25 respVendor=0 respVendorMethod=0
  234. EAP: EAP entering state AAA_REQUEST
  235. EAP: EAP entering state AAA_IDLE
  236. Encapsulating EAP message into a RADIUS packet
  237. Copied RADIUS State Attribute
  238. wlan0: RADIUS Sending RADIUS message to authentication server
  239. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  240. wlan0: RADIUS Received 98 bytes from RADIUS server
  241. wlan0: RADIUS Received RADIUS message
  242. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  243. RADIUS packet matching with station 1c:67:58:c0:a2:58
  244. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=181 len=40) from RADIUS server: EAP-Request-PEAP (25)
  245. EAP: EAP entering state AAA_RESPONSE
  246. EAP: getId: id=181
  247. EAP: EAP entering state SEND_REQUEST2
  248. EAP: EAP entering state IDLE2
  249. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  250. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  251. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 181)
  252. wlan0: Event EAPOL_RX (24) received
  253. IEEE 802.1X: 46 bytes from 1c:67:58:c0:a2:58
  254.    IEEE 802.1X: version=1 type=0 length=42
  255. EAP: code=2 identifier=181 length=42
  256.  (response)
  257. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=181 len=42) from STA: EAP Response-PEAP (25)
  258. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  259. EAP: EAP entering state RECEIVED2
  260. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=181 respMethod=25 respVendor=0 respVendorMethod=0
  261. EAP: EAP entering state AAA_REQUEST
  262. EAP: EAP entering state AAA_IDLE
  263. Encapsulating EAP message into a RADIUS packet
  264. Copied RADIUS State Attribute
  265. wlan0: RADIUS Sending RADIUS message to authentication server
  266. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  267. wlan0: RADIUS Received 132 bytes from RADIUS server
  268. wlan0: RADIUS Received RADIUS message
  269. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  270. RADIUS packet matching with station 1c:67:58:c0:a2:58
  271. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=182 len=74) from RADIUS server: EAP-Request-PEAP (25)
  272. EAP: EAP entering state AAA_RESPONSE
  273. EAP: getId: id=182
  274. EAP: EAP entering state SEND_REQUEST2
  275. EAP: EAP entering state IDLE2
  276. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  277. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  278. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 182)
  279. wlan0: Event EAPOL_RX (24) received
  280. IEEE 802.1X: 100 bytes from 1c:67:58:c0:a2:58
  281.    IEEE 802.1X: version=1 type=0 length=96
  282. EAP: code=2 identifier=182 length=96
  283.  (response)
  284. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=182 len=96) from STA: EAP Response-PEAP (25)
  285. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  286. EAP: EAP entering state RECEIVED2
  287. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=182 respMethod=25 respVendor=0 respVendorMethod=0
  288. EAP: EAP entering state AAA_REQUEST
  289. EAP: EAP entering state AAA_IDLE
  290. Encapsulating EAP message into a RADIUS packet
  291. Copied RADIUS State Attribute
  292. wlan0: RADIUS Sending RADIUS message to authentication server
  293. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  294. wlan0: RADIUS Received 140 bytes from RADIUS server
  295. wlan0: RADIUS Received RADIUS message
  296. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  297. RADIUS packet matching with station 1c:67:58:c0:a2:58
  298. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=183 len=82) from RADIUS server: EAP-Request-PEAP (25)
  299. EAP: EAP entering state AAA_RESPONSE
  300. EAP: getId: id=183
  301. EAP: EAP entering state SEND_REQUEST2
  302. EAP: EAP entering state IDLE2
  303. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  304. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  305. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 183)
  306. wlan0: Event EAPOL_RX (24) received
  307. IEEE 802.1X: 41 bytes from 1c:67:58:c0:a2:58
  308.    IEEE 802.1X: version=1 type=0 length=37
  309. EAP: code=2 identifier=183 length=37
  310.  (response)
  311. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=183 len=37) from STA: EAP Response-PEAP (25)
  312. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  313. EAP: EAP entering state RECEIVED2
  314. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=183 respMethod=25 respVendor=0 respVendorMethod=0
  315. EAP: EAP entering state AAA_REQUEST
  316. EAP: EAP entering state AAA_IDLE
  317. Encapsulating EAP message into a RADIUS packet
  318. Copied RADIUS State Attribute
  319. wlan0: RADIUS Sending RADIUS message to authentication server
  320. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  321. wlan0: RADIUS Received 104 bytes from RADIUS server
  322. wlan0: RADIUS Received RADIUS message
  323. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  324. RADIUS packet matching with station 1c:67:58:c0:a2:58
  325. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=184 len=46) from RADIUS server: EAP-Request-PEAP (25)
  326. EAP: EAP entering state AAA_RESPONSE
  327. EAP: getId: id=184
  328. EAP: EAP entering state SEND_REQUEST2
  329. EAP: EAP entering state IDLE2
  330. EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
  331. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
  332. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 184)
  333. wlan0: Event EAPOL_RX (24) received
  334. IEEE 802.1X: 50 bytes from 1c:67:58:c0:a2:58
  335.    IEEE 802.1X: version=1 type=0 length=46
  336. EAP: code=2 identifier=184 length=46
  337.  (response)
  338. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=184 len=46) from STA: EAP Response-PEAP (25)
  339. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
  340. EAP: EAP entering state RECEIVED2
  341. EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=184 respMethod=25 respVendor=0 respVendorMethod=0
  342. EAP: EAP entering state AAA_REQUEST
  343. EAP: EAP entering state AAA_IDLE
  344. Encapsulating EAP message into a RADIUS packet
  345. Copied RADIUS State Attribute
  346. wlan0: RADIUS Sending RADIUS message to authentication server
  347. wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
  348. wlan0: RADIUS Received 168 bytes from RADIUS server
  349. wlan0: RADIUS Received RADIUS message
  350. wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
  351. RADIUS packet matching with station 1c:67:58:c0:a2:58
  352. MS-MPPE-Send-Key - hexdump(len=32): [REMOVED]
  353. MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED]
  354. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: old identity 'test10' updated with User-Name from Access-Accept 'test10'
  355. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=3 id=184 len=4) from RADIUS server: EAP Success
  356. EAP: EAP entering state SUCCESS2
  357. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state SUCCESS
  358. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 184)
  359. IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state IDLE
  360. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state INITPMK
  361. WPA: PMK from EAPOL state machine (len=64)
  362. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKSTART
  363. wlan0: STA 1c:67:58:c0:a2:58 WPA: sending 1/4 msg of 4-Way Handshake
  364. WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=22 keyidx=0 encr=0)
  365. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  366. WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
  367. wlan0: Event EAPOL_RX (24) received
  368. IEEE 802.1X: 139 bytes from 1c:67:58:c0:a2:58
  369.    IEEE 802.1X: version=1 type=3 length=135
  370. WPA: Received EAPOL-Key from 1c:67:58:c0:a2:58 key_info=0x10a type=2 key_data_length=40
  371. WPA: Received Key Nonce - hexdump(len=32): 92 23 12 03 6e d3 81 f2 1e a4 6a 7d 7f 99 34 f5 f0 bc 06 12 24 fc ad 5b 0d 35 84 60 75 a0 eb 3c
  372. WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  373. wlan0: STA 1c:67:58:c0:a2:58 WPA: received EAPOL-Key frame (2/4 Pairwise)
  374. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKCALCNEGOTIATING
  375. WPA: PTK derivation - A1=b8:27:eb:36:a8:1e A2=1c:67:58:c0:a2:58
  376. WPA: Nonce1 - hexdump(len=32): b6 28 22 79 9f f2 44 f6 07 b6 11 49 5e ea 4b 39 42 2c 8e 70 15 a3 aa a0 26 af 1e 87 fe 95 18 2b
  377. WPA: Nonce2 - hexdump(len=32): 92 23 12 03 6e d3 81 f2 1e a4 6a 7d 7f 99 34 f5 f0 bc 06 12 24 fc ad 5b 0d 35 84 60 75 a0 eb 3c
  378. WPA: PMK - hexdump(len=32): [REMOVED]
  379. WPA: PTK - hexdump(len=48): [REMOVED]
  380. WPA: KCK - hexdump(len=16): [REMOVED]
  381. WPA: KEK - hexdump(len=16): [REMOVED]
  382. WPA: TK - hexdump(len=16): [REMOVED]
  383. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKCALCNEGOTIATING2
  384. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKINITNEGOTIATING
  385. wlan0: STA 1c:67:58:c0:a2:58 WPA: sending 3/4 msg of 4-Way Handshake
  386. WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=1 encr=1)
  387. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  388. Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
  389. WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
  390. nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
  391. nl80211: Delete station 1c:67:58:c0:a2:58
  392. wlan0: Event DISASSOC (1) received
  393. wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.11: disassociated
  394. wlan0: STA 1c:67:58:c0:a2:58 WPA: event 2 notification
  395. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  396.    addr=1c:67:58:c0:a2:58
  397. nl80211: set_key failed; err=-22 Invalid argument)
  398. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state DISCONNECTED
  399. WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state INITIALIZE
  400. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
  401.    addr=1c:67:58:c0:a2:58
  402. nl80211: set_key failed; err=-22 Invalid argument)
  403. nl80211: sta_remove -> DEL_STATION wlan0 1c:67:58:c0:a2:58 --> 0 (Success)
  404. ap_free_sta: cancel ap_handle_timer for 1c:67:58:c0:a2:58
  405. EAP: Server state machine removed
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top