Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
- nl80211: New station 1c:67:58:c0:a2:58
- nl80211: Assoc Req IEs - hexdump(len=152): 00 05 4d 55 44 50 49 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 21 02 03 12 24 02 01 0b 30 26 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 80 00 01 00 ed 63 9e e1 fb 02 2b 5c cc d9 b4 f6 27 24 55 91 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 dd 1e 00 90 4c 33 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 10 10 00 00
- wlan0: Event ASSOC (0) received
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.11: associated
- STA included RSN IE in (Re)AssocReq
- New STA
- ap_sta_add: register ap_handle_timer timeout for 1c:67:58:c0:a2:58 (300 seconds - ap_max_inactivity)
- RSN IE: STA PMKID - hexdump(len=16): ed 63 9e e1 fb 02 2b 5c cc d9 b4 f6 27 24 55 91
- nl80211: Set STA flags - ifname=wlan0 addr=1c:67:58:c0:a2:58 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
- wlan0: STA 1c:67:58:c0:a2:58 WPA: event 1 notification
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
- addr=1c:67:58:c0:a2:58
- nl80211: set_key failed; err=-22 Invalid argument)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: start authentication
- EAP: Server state machine created
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state IDLE
- IEEE 802.1X: 1c:67:58:c0:a2:58 CTRL_DIR entering state FORCE_BOTH
- wlan0: STA 1c:67:58:c0:a2:58 WPA: start authentication
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state INITIALIZE
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
- addr=1c:67:58:c0:a2:58
- nl80211: set_key failed; err=-22 Invalid argument)
- WPA: 1c:67:58:c0:a2:58 WPA_PTK_GROUP entering state IDLE
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state AUTHENTICATION
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state AUTHENTICATION2
- WPA: Re-initialize GMK/Counter on first station
- GMK - hexdump(len=32): [REMOVED]
- Key Counter - hexdump(len=32): [REMOVED]
- GTK - hexdump(len=16): [REMOVED]
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=3 addr=0xc7868 key_idx=1 set_tx=1 seq_len=0 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
- broadcast key
- WPA: Assign ANonce - hexdump(len=32): b6 28 22 79 9f f2 44 f6 07 b6 11 49 5e ea 4b 39 42 2c 8e 70 15 a3 aa a0 26 af 1e 87 fe 95 18 2b
- hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 1c:67:58:c0:a2:58 (300 seconds - ap_max_inactivity)
- IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state DISCONNECTED
- nl80211: Set STA flags - ifname=wlan0 addr=1c:67:58:c0:a2:58 total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: unauthorizing port
- IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- wlan0: CTRL-EVENT-EAP-STARTED 1c:67:58:c0:a2:58
- EAP: EAP entering state SELECT_ACTION
- EAP: getDecision: no identity known yet -> CONTINUE
- EAP: EAP entering state PROPOSE_METHOD
- EAP: getNextMethod: vendor 0 type 1
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
- EAP: EAP entering state METHOD_REQUEST
- EAP: building EAP-Request: Identifier 174
- EAP: EAP entering state SEND_REQUEST
- EAP: EAP entering state IDLE
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state CONNECTING
- IEEE 802.1X: 1c:67:58:c0:a2:58 AUTH_PAE entering state AUTHENTICATING
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 174)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 15 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=11
- EAP: code=2 identifier=174 length=11
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=174 len=11) from STA: EAP Response-Identity (1)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=174 respMethod=1 respVendor=0 respVendorMethod=0
- EAP: EAP entering state INTEGRITY_CHECK
- EAP: EAP entering state METHOD_RESPONSE
- EAP-Identity: Peer identity - hexdump_ascii(len=6):
- 74 65 73 74 31 30 test10
- EAP: EAP entering state SELECT_ACTION
- EAP: getDecision: -> PASSTHROUGH
- EAP: EAP entering state INITIALIZE_PASSTHROUGH
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: STA identity 'test10'
- Encapsulating EAP message into a RADIUS packet
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 80 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=175 len=22) from RADIUS server: EAP-Request-MD5 (4)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=175
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 175)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=6
- EAP: code=2 identifier=175 length=6
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=175 len=6) from STA: EAP Response-unknown (3)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=175 respMethod=3 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 64 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=176 len=6) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=176
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 176)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 179 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=175
- EAP: code=2 identifier=176 length=175
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=176 len=175) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=176 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 1068 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.07 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=177 len=1004) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=177
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 177)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=6
- EAP: code=2 identifier=177 length=6
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=177 len=6) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=177 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 1064 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=178 len=1000) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=178
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 178)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=6
- EAP: code=2 identifier=178 length=6
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=178 len=6) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=178 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 757 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=179 len=695) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=179
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 179)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 140 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=136
- EAP: code=2 identifier=179 length=136
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=179 len=136) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=179 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 115 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=180 len=57) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=180
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 180)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 10 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=6
- EAP: code=2 identifier=180 length=6
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=180 len=6) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=180 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 98 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=181 len=40) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=181
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 181)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 46 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=42
- EAP: code=2 identifier=181 length=42
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=181 len=42) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=181 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 132 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=182 len=74) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=182
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 182)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 100 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=96
- EAP: code=2 identifier=182 length=96
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=182 len=96) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=182 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 140 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=183 len=82) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=183
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 183)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 41 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=37
- EAP: code=2 identifier=183 length=37
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=183 len=37) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=183 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 104 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=1 id=184 len=46) from RADIUS server: EAP-Request-PEAP (25)
- EAP: EAP entering state AAA_RESPONSE
- EAP: getId: id=184
- EAP: EAP entering state SEND_REQUEST2
- EAP: EAP entering state IDLE2
- EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state REQUEST
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 184)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 50 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=0 length=46
- EAP: code=2 identifier=184 length=46
- (response)
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: received EAP packet (code=2 id=184 len=46) from STA: EAP Response-PEAP (25)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state RESPONSE
- EAP: EAP entering state RECEIVED2
- EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=184 respMethod=25 respVendor=0 respVendorMethod=0
- EAP: EAP entering state AAA_REQUEST
- EAP: EAP entering state AAA_IDLE
- Encapsulating EAP message into a RADIUS packet
- Copied RADIUS State Attribute
- wlan0: RADIUS Sending RADIUS message to authentication server
- wlan0: RADIUS Next RADIUS client retransmit in 3 seconds
- wlan0: RADIUS Received 168 bytes from RADIUS server
- wlan0: RADIUS Received RADIUS message
- wlan0: STA 1c:67:58:c0:a2:58 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
- RADIUS packet matching with station 1c:67:58:c0:a2:58
- MS-MPPE-Send-Key - hexdump(len=32): [REMOVED]
- MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED]
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: old identity 'test10' updated with User-Name from Access-Accept 'test10'
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: decapsulated EAP packet (code=3 id=184 len=4) from RADIUS server: EAP Success
- EAP: EAP entering state SUCCESS2
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state SUCCESS
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.1X: Sending EAP Packet (identifier 184)
- IEEE 802.1X: 1c:67:58:c0:a2:58 BE_AUTH entering state IDLE
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state INITPMK
- WPA: PMK from EAPOL state machine (len=64)
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKSTART
- wlan0: STA 1c:67:58:c0:a2:58 WPA: sending 1/4 msg of 4-Way Handshake
- WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=22 keyidx=0 encr=0)
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
- wlan0: Event EAPOL_RX (24) received
- IEEE 802.1X: 139 bytes from 1c:67:58:c0:a2:58
- IEEE 802.1X: version=1 type=3 length=135
- WPA: Received EAPOL-Key from 1c:67:58:c0:a2:58 key_info=0x10a type=2 key_data_length=40
- WPA: Received Key Nonce - hexdump(len=32): 92 23 12 03 6e d3 81 f2 1e a4 6a 7d 7f 99 34 f5 f0 bc 06 12 24 fc ad 5b 0d 35 84 60 75 a0 eb 3c
- WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- wlan0: STA 1c:67:58:c0:a2:58 WPA: received EAPOL-Key frame (2/4 Pairwise)
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKCALCNEGOTIATING
- WPA: PTK derivation - A1=b8:27:eb:36:a8:1e A2=1c:67:58:c0:a2:58
- WPA: Nonce1 - hexdump(len=32): b6 28 22 79 9f f2 44 f6 07 b6 11 49 5e ea 4b 39 42 2c 8e 70 15 a3 aa a0 26 af 1e 87 fe 95 18 2b
- WPA: Nonce2 - hexdump(len=32): 92 23 12 03 6e d3 81 f2 1e a4 6a 7d 7f 99 34 f5 f0 bc 06 12 24 fc ad 5b 0d 35 84 60 75 a0 eb 3c
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: KEK - hexdump(len=16): [REMOVED]
- WPA: TK - hexdump(len=16): [REMOVED]
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKCALCNEGOTIATING2
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state PTKINITNEGOTIATING
- wlan0: STA 1c:67:58:c0:a2:58 WPA: sending 3/4 msg of 4-Way Handshake
- WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=1 encr=1)
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
- WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
- nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
- nl80211: Delete station 1c:67:58:c0:a2:58
- wlan0: Event DISASSOC (1) received
- wlan0: STA 1c:67:58:c0:a2:58 IEEE 802.11: disassociated
- wlan0: STA 1c:67:58:c0:a2:58 WPA: event 2 notification
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
- addr=1c:67:58:c0:a2:58
- nl80211: set_key failed; err=-22 Invalid argument)
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state DISCONNECTED
- WPA: 1c:67:58:c0:a2:58 WPA_PTK entering state INITIALIZE
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0xdc1ba0 key_idx=0 set_tx=1 seq_len=0 key_len=0
- addr=1c:67:58:c0:a2:58
- nl80211: set_key failed; err=-22 Invalid argument)
- nl80211: sta_remove -> DEL_STATION wlan0 1c:67:58:c0:a2:58 --> 0 (Success)
- ap_free_sta: cancel ap_handle_timer for 1c:67:58:c0:a2:58
- EAP: Server state machine removed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement