Guest User

Untitled

a guest
Feb 23rd, 2016
165
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. # wpa_supplicant -dd -c/etc/wpa_supplicant/wpa_supplicant.conf -iwlp2s0
  2. wpa_supplicant v2.4
  3. random: Trying to read entropy from /dev/random
  4. Successfully initialized wpa_supplicant
  5. Initializing interface 'wlp2s0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  6. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  7. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  8. ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=wheel'
  9. update_config=1
  10. Line: 4 - start of a new network block
  11. ssid - hexdump_ascii(len=11):
  12. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  13. scan_ssid=1 (0x1)
  14. bgscan - hexdump_ascii(len=17):
  15. 73 69 6d 70 6c 65 3a 33 30 3a 2d 36 30 3a 36 30 simple:30:-60:60
  16. 30 0
  17. PSK (ASCII passphrase) - hexdump_ascii(len=12): [REMOVED]
  18. priority=9 (0x9)
  19. PSK (from passphrase) - hexdump(len=32): [REMOVED]
  20. key_mgmt: 0x4
  21. auth_alg: 0x1
  22. Priority group 9
  23. id=0 ssid='my_network_name'
  24. Priority group 0
  25. id=1 ssid='AndroidAP'
  26. id=2 ssid='eduroam'
  27. id=3 ssid='webauth'
  28. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  29. nl80211: TDLS supported
  30. nl80211: TDLS external setup
  31. nl80211: Supported cipher 00-0f-ac:1
  32. nl80211: Supported cipher 00-0f-ac:5
  33. nl80211: Supported cipher 00-0f-ac:2
  34. nl80211: Supported cipher 00-0f-ac:4
  35. nl80211: Supported cipher 00-0f-ac:10
  36. nl80211: Supported cipher 00-0f-ac:8
  37. nl80211: Supported cipher 00-0f-ac:9
  38. nl80211: Supported cipher 00-0f-ac:6
  39. nl80211: Supported cipher 00-0f-ac:13
  40. nl80211: Supported cipher 00-0f-ac:11
  41. nl80211: Supported cipher 00-0f-ac:12
  42. nl80211: Using driver-based off-channel TX
  43. nl80211: Use separate P2P group interface (driver advertised support)
  44. nl80211: interface wlp2s0 in phy phy0
  45. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  46. nl80211: Subscribe to mgmt frames with non-AP handle 0x1500480
  47. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0104
  48. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040a
  49. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040b
  50. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040c
  51. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=040d
  52. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090a
  53. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090b
  54. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090c
  55. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=090d
  56. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0801
  57. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=06
  58. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0a07
  59. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0a11
  60. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0a1a
  61. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=1101
  62. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=1102
  63. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1500480 match=0505
  64. netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
  65. nl80211: driver param='(null)'
  66. Add interface wlp2s0 to a new radio phy0
  67. nl80211: Regulatory information - country=00
  68. nl80211: 2402-2472 @ 40 MHz 20 mBm
  69. nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
  70. nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
  71. nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
  72. nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
  73. nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
  74. nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
  75. nl80211: 57240-63720 @ 2160 MHz 0 mBm
  76. nl80211: Added 802.11b mode based on 802.11g information
  77. wlp2s0: Own MAC address: 74:2f:68:cd:1d:83
  78. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  79. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  80. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  81. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  82. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  83. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  84. wlp2s0: RSN: flushing PMKID list in the driver
  85. nl80211: Flush PMKIDs
  86. wlp2s0: Setting scan request: 0.100000 sec
  87. ENGINE: Loading dynamic engine
  88. ENGINE: Loading dynamic engine
  89. EAPOL: SUPP_PAE entering state DISCONNECTED
  90. EAPOL: Supplicant port status: Unauthorized
  91. nl80211: Skip set_supp_port(unauthorized) while not associated
  92. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  93. EAPOL: SUPP_BE entering state INITIALIZE
  94. EAP: EAP entering state DISABLED
  95. ctrl_interface_group=10 (from group name 'wheel')
  96. wlp2s0: Added interface wlp2s0
  97. wlp2s0: State: DISCONNECTED -> DISCONNECTED
  98. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  99. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  100. random: Got 20/20 bytes from /dev/random
  101. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
  102. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  103. wlp2s0: State: DISCONNECTED -> SCANNING
  104. Scan SSID - hexdump_ascii(len=11):
  105. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  106. Scan SSID - hexdump_ascii(len=7):
  107. 65 64 75 72 6f 61 6d eduroam
  108. wlp2s0: Starting AP scan for wildcard SSID
  109. wlp2s0: Add radio work 'scan'@0x15230d0
  110. wlp2s0: First radio work item in the queue - schedule start immediately
  111. wlp2s0: Starting radio work 'scan'@0x15230d0 after 0.000059 second wait
  112. wlp2s0: nl80211: scan request
  113. nl80211: Scan SSID - hexdump_ascii(len=11):
  114. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  115. nl80211: Scan SSID - hexdump_ascii(len=7):
  116. 65 64 75 72 6f 61 6d eduroam
  117. nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
  118. Scan requested (ret=0) - scan timeout 10 seconds
  119. nl80211: Event message available
  120. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
  121. wlp2s0: nl80211: Scan trigger
  122. wlp2s0: Event SCAN_STARTED (47) received
  123. wlp2s0: Own scan request started a scan in 0.000142 seconds
  124. CTRL_IFACE monitor attached /tmp/wpa_ctrl_2851-15\x00
  125. wlp2s0: Control interface command 'INTERFACES'
  126. wlp2s0: Control interface command 'GET_CAPABILITY eap'
  127. CTRL_IFACE: GET_CAPABILITY 'eap'
  128. wlp2s0: Control interface command 'STATUS'
  129. EAPOL: EAP Session-Id not available
  130. wlp2s0: Control interface command 'LIST_NETWORKS'
  131. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  132. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  133. EAPOL: disable timer tick
  134. nl80211: Event message available
  135. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
  136. wlp2s0: nl80211: New scan results available
  137. nl80211: Scan probed for SSID 'my_network_name'
  138. nl80211: Scan probed for SSID 'eduroam'
  139. nl80211: Scan probed for SSID ''
  140. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484
  141. wlp2s0: Event SCAN_RESULTS (3) received
  142. wlp2s0: Scan completed in 1.012722 seconds
  143. nl80211: Received scan results (2 BSSes)
  144. wlp2s0: BSS: Start scan result update 1
  145. wlp2s0: BSS: Add new id 0 BSSID 00:16:b6:11:39:f4 SSID 'my_network_name'
  146. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  147. wlp2s0: BSS: Add new id 1 BSSID 00:1e:e5:46:0e:f0 SSID 'my_network_name'
  148. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  149. BSS: last_scan_res_used=2/32
  150. wlp2s0: New scan results available (own=1 ext=0)
  151. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  152. wlp2s0: Radio work 'scan'@0x15230d0 done in 1.025107 seconds
  153. wlp2s0: Selecting BSS from priority group 9
  154. wlp2s0: 0: 00:16:b6:11:39:f4 ssid='my_network_name' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-29
  155. wlp2s0: selected based on RSN IE
  156. wlp2s0: selected BSS 00:16:b6:11:39:f4 ssid='my_network_name'
  157. wlp2s0: Considering connect request: reassociate: 0 selected: 00:16:b6:11:39:f4 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1500660 current_ssid=(nil)
  158. wlp2s0: Request association with 00:16:b6:11:39:f4
  159. wlp2s0: Add radio work 'sme-connect'@0x1523020
  160. wlp2s0: First radio work item in the queue - schedule start immediately
  161. wlp2s0: Starting radio work 'sme-connect'@0x1523020 after 0.000040 second wait
  162. wlp2s0: Automatic auth_alg selection: 0x1
  163. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  164. RSN: Search for BSSID 00:16:b6:11:39:f4
  165. RSN: No PMKSA cache entry found
  166. wlp2s0: RSN: using IEEE 802.11i/D9.0
  167. wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  168. wlp2s0: WPA: Selected mgmt group cipher 32
  169. wlp2s0: WPA: clearing AP WPA IE
  170. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  171. wlp2s0: WPA: using GTK CCMP
  172. wlp2s0: WPA: using PTK CCMP
  173. wlp2s0: WPA: using KEY_MGMT WPA-PSK
  174. wlp2s0: WPA: not using MGMT group cipher
  175. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  176. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  177. RRM: Determining whether RRM can be used - device support: 0x0
  178. RRM: No RRM in network
  179. wlp2s0: Cancelling scan request
  180. wlp2s0: SME: Trying to authenticate with 00:16:b6:11:39:f4 (SSID='my_network_name' freq=2432 MHz)
  181. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  182. wlp2s0: State: SCANNING -> AUTHENTICATING
  183. EAPOL: External notification - EAP success=0
  184. EAPOL: External notification - EAP fail=0
  185. EAPOL: External notification - portControl=Auto
  186. nl80211: Authenticate (ifindex=3)
  187. * bssid=00:16:b6:11:39:f4
  188. * freq=2432
  189. * SSID - hexdump_ascii(len=11):
  190. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  191. * IEs - hexdump(len=0): [NULL]
  192. * Auth Type 0
  193. nl80211: Authentication request send successfully
  194. nl80211: Event message available
  195. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
  196. nl80211: New station 00:16:b6:11:39:f4
  197. nl80211: Event message available
  198. nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
  199. nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:16:b6:11:39:f4
  200. nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 74 2f 68 cd 1d 83 00 16 b6 11 39 f4 00 16 b6 11 39 f4 10 fe 00 00 02 00 00 00 dd 09 00 10 18 02 01 f1 00 00 00
  201. nl80211: Authenticate event
  202. wlp2s0: Event AUTH (11) received
  203. wlp2s0: SME: Authentication response: peer=00:16:b6:11:39:f4 auth_type=0 auth_transaction=2 status_code=0
  204. SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 01 f1 00 00 00
  205. wlp2s0: Trying to associate with 00:16:b6:11:39:f4 (SSID='my_network_name' freq=2432 MHz)
  206. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  207. wlp2s0: State: AUTHENTICATING -> ASSOCIATING
  208. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  209. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  210. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  211. nl80211: Associate (ifindex=3)
  212. * bssid=00:16:b6:11:39:f4
  213. * freq=2432
  214. * SSID - hexdump_ascii(len=11):
  215. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  216. * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 01 00 00 40
  217. * WPA Versions 0x2
  218. * pairwise=0xfac04
  219. * group=0xfac04
  220. * akm=0xfac02
  221. nl80211: Association request send successfully
  222. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  223. nl80211: Event message available
  224. nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
  225. nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:16:b6:11:39:f4
  226. nl80211: MLME event frame - hexdump(len=57): 10 00 3a 01 74 2f 68 cd 1d 83 00 16 b6 11 39 f4 00 16 b6 11 39 f4 20 fe 11 04 00 00 02 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00
  227. nl80211: Associate event
  228. wlp2s0: Event ASSOC (0) received
  229. wlp2s0: Association info event
  230. resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00
  231. wlp2s0: freq=2432 MHz
  232. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  233. wlp2s0: State: ASSOCIATING -> ASSOCIATED
  234. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  235. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  236. wlp2s0: Associated to a new BSS: BSSID=00:16:b6:11:39:f4
  237. wlp2s0: Associated with 00:16:b6:11:39:f4
  238. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  239. wlp2s0: WPA: Association event - clear replay counter
  240. wlp2s0: WPA: Clear old PTK
  241. EAPOL: External notification - portEnabled=0
  242. EAPOL: External notification - portValid=0
  243. EAPOL: External notification - EAP success=0
  244. EAPOL: External notification - portEnabled=1
  245. EAPOL: SUPP_PAE entering state CONNECTING
  246. EAPOL: enable timer tick
  247. EAPOL: SUPP_BE entering state IDLE
  248. wlp2s0: Setting authentication timeout: 10 sec 0 usec
  249. wlp2s0: Cancelling scan request
  250. WMM AC: No WMM IE
  251. nl80211: Event message available
  252. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
  253. nl80211: Ignore connect event (cmd=46) when using userspace SME
  254. l2_packet_receive: src=00:16:b6:11:39:f4 len=99
  255. wlp2s0: RX EAPOL from 00:16:b6:11:39:f4
  256. RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 19 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  257. wlp2s0: Setting authentication timeout: 10 sec 0 usec
  258. wlp2s0: IEEE 802.1X RX: version=2 type=3 length=95
  259. WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 19 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  260. wlp2s0: EAPOL-Key type=2
  261. wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  262. wlp2s0: key_length=16 key_data_length=0
  263. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 19
  264. key_nonce - hexdump(len=32): 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64
  265. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  266. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  267. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  268. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  269. wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  270. wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:16:b6:11:39:f4 (ver=2)
  271. RSN: msg 1/4 key data - hexdump(len=0):
  272. Get randomness: len=32 entropy=3
  273. WPA: Renewed SNonce - hexdump(len=32): 94 84 be 51 5c 2d 42 de 23 bf 4f 68 3c 04 b5 42 f6 6c f7 ff 8a b3 71 98 d7 b0 e3 00 12 62 e1 d3
  274. WPA: PTK derivation - A1=74:2f:68:cd:1d:83 A2=00:16:b6:11:39:f4
  275. WPA: Nonce1 - hexdump(len=32): 94 84 be 51 5c 2d 42 de 23 bf 4f 68 3c 04 b5 42 f6 6c f7 ff 8a b3 71 98 d7 b0 e3 00 12 62 e1 d3
  276. WPA: Nonce2 - hexdump(len=32): 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64
  277. WPA: PMK - hexdump(len=32): [REMOVED]
  278. WPA: PTK - hexdump(len=48): [REMOVED]
  279. WPA: KCK - hexdump(len=16): [REMOVED]
  280. WPA: KEK - hexdump(len=16): [REMOVED]
  281. WPA: TK - hexdump(len=16): [REMOVED]
  282. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  283. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 19
  284. wlp2s0: WPA: Sending EAPOL-Key 2/4
  285. WPA: KCK - hexdump(len=16): [REMOVED]
  286. WPA: Derived Key MIC - hexdump(len=16): 6d 50 b9 be a9 80 df 39 49 9e 62 25 80 24 84 32
  287. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 19 94 84 be 51 5c 2d 42 de 23 bf 4f 68 3c 04 b5 42 f6 6c f7 ff 8a b3 71 98 d7 b0 e3 00 12 62 e1 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 50 b9 be a9 80 df 39 49 9e 62 25 80 24 84 32 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  288. l2_packet_receive: src=00:16:b6:11:39:f4 len=155
  289. wlp2s0: RX EAPOL from 00:16:b6:11:39:f4
  290. RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 1a 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 65 b4 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 50 09 40 c1 9f 58 ed c9 e1 bb ff 02 1f f2 ad 00 38 2d 89 09 06 8f a1 9c 76 bc 89 59 24 66 47 e7 c5 b2 1d 58 ab 51 db ba ce cd 3c cd 46 72 7a 9c a7 d3 6f 93 b8 8a e5 97 ca 67 4d a3 d7 47 6a 71 8e 24 c9 7c 5a da 17 0c ee
  291. wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151
  292. WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 1a 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 65 b4 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 50 09 40 c1 9f 58 ed c9 e1 bb ff 02 1f f2 ad 00 38 2d 89 09 06 8f a1 9c 76 bc 89 59 24 66 47 e7 c5 b2 1d 58 ab 51 db ba ce cd 3c cd 46 72 7a 9c a7 d3 6f 93 b8 8a e5 97 ca 67 4d a3 d7 47 6a 71 8e 24 c9 7c 5a da 17 0c ee
  293. wlp2s0: EAPOL-Key type=2
  294. wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  295. wlp2s0: key_length=16 key_data_length=56
  296. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 1a
  297. key_nonce - hexdump(len=32): 5d 37 08 3b 93 2a dc 7a 04 87 61 b7 68 76 bc 78 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 64
  298. key_iv - hexdump(len=16): 61 08 43 78 66 ff 64 8c 99 13 34 d7 65 73 a6 65
  299. key_rsc - hexdump(len=8): b4 a2 00 00 00 00 00 00
  300. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  301. key_mic - hexdump(len=16): 26 50 09 40 c1 9f 58 ed c9 e1 bb ff 02 1f f2 ad
  302. RSN: encrypted key data - hexdump(len=56): 2d 89 09 06 8f a1 9c 76 bc 89 59 24 66 47 e7 c5 b2 1d 58 ab 51 db ba ce cd 3c cd 46 72 7a 9c a7 d3 6f 93 b8 8a e5 97 ca 67 4d a3 d7 47 6a 71 8e 24 c9 7c 5a da 17 0c ee
  303. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  304. wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  305. wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:16:b6:11:39:f4 (ver=2)
  306. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 1b fd d9 30 6b 94 21 cf 8f 5e a2 53 02 8a 7b 9d dd 00
  307. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  308. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  309. wlp2s0: WPA: Sending EAPOL-Key 4/4
  310. WPA: KCK - hexdump(len=16): [REMOVED]
  311. WPA: Derived Key MIC - hexdump(len=16): b4 8c 94 ce bd 77 9b 9f 05 26 68 02 06 a9 0f 9f
  312. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 8c 94 ce bd 77 9b 9f 05 26 68 02 06 a9 0f 9f 00 00
  313. wlp2s0: WPA: Installing PTK to the driver
  314. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x1502210 key_idx=0 set_tx=1 seq_len=6 key_len=16
  315. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  316. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  317. addr=00:16:b6:11:39:f4
  318. EAPOL: External notification - portValid=1
  319. wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  320. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  321. WPA: Group Key - hexdump(len=16): [REMOVED]
  322. wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
  323. WPA: RSC - hexdump(len=6): b4 a2 00 00 00 00
  324. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x499201 key_idx=2 set_tx=0 seq_len=6 key_len=16
  325. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  326. nl80211: KEY_SEQ - hexdump(len=6): b4 a2 00 00 00 00
  327. broadcast key
  328. wlp2s0: WPA: Key negotiation completed with 00:16:b6:11:39:f4 [PTK=CCMP GTK=CCMP]
  329. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  330. wlp2s0: Cancelling authentication timeout
  331. wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
  332. wlp2s0: Radio work 'sme-connect'@0x1523020 done in 0.044553 seconds
  333. wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:16:b6:11:39:f4 completed [id=0 id_str=]
  334. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  335. nl80211: Set wlp2s0 operstate 0->1 (UP)
  336. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  337. EAPOL: External notification - portValid=1
  338. EAPOL: External notification - EAP success=1
  339. EAPOL: SUPP_PAE entering state AUTHENTICATING
  340. EAPOL: SUPP_BE entering state SUCCESS
  341. EAP: EAP entering state DISABLED
  342. EAPOL: SUPP_PAE entering state AUTHENTICATED
  343. EAPOL: Supplicant port status: Authorized
  344. nl80211: Set supplicant port authorized for 00:16:b6:11:39:f4
  345. EAPOL: SUPP_BE entering state IDLE
  346. EAPOL authentication completed - result=SUCCESS
  347. nl80211: Set rekey offload
  348. nl80211: Driver does not support rekey offload
  349. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  350. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  351. EAPOL: startWhen --> 0
  352. EAPOL: disable timer tick
  353. CTRL_IFACE monitor attached /tmp/wpa_ctrl_3676-8\x00
  354. wlp2s0: Control interface command 'STATUS'
  355. EAPOL: EAP Session-Id not available
  356. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  357. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  358. wlp2s0: Control interface command 'LIST_NETWORKS'
  359. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  360. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  361. wlp2s0: Control interface command 'STATUS'
  362. EAPOL: EAP Session-Id not available
  363. wlp2s0: Control interface command 'SIGNAL_POLL'
  364. wlp2s0: Control interface command 'SIGNAL_POLL'
  365. wlp2s0: Control interface command 'SCAN'
  366. wlp2s0: Setting scan request: 0.000000 sec
  367. Scan SSID - hexdump_ascii(len=11):
  368. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  369. Scan SSID - hexdump_ascii(len=7):
  370. 65 64 75 72 6f 61 6d eduroam
  371. wlp2s0: Starting AP scan for wildcard SSID
  372. wlp2s0: Add radio work 'scan'@0x1522c60
  373. wlp2s0: First radio work item in the queue - schedule start immediately
  374. wlp2s0: Starting radio work 'scan'@0x1522c60 after 0.000028 second wait
  375. wlp2s0: nl80211: scan request
  376. nl80211: Scan SSID - hexdump_ascii(len=11):
  377. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  378. nl80211: Scan SSID - hexdump_ascii(len=7):
  379. 65 64 75 72 6f 61 6d eduroam
  380. nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
  381. Scan requested (ret=0) - scan timeout 30 seconds
  382. nl80211: Event message available
  383. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
  384. wlp2s0: nl80211: Scan trigger
  385. wlp2s0: Event SCAN_STARTED (47) received
  386. wlp2s0: Own scan request started a scan in 0.000054 seconds
  387. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  388. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  389. wlp2s0: Control interface command 'STATUS'
  390. EAPOL: EAP Session-Id not available
  391. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  392. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  393. wlp2s0: Control interface command 'LIST_NETWORKS'
  394. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  395. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  396. nl80211: Event message available
  397. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
  398. wlp2s0: nl80211: New scan results available
  399. nl80211: Scan probed for SSID 'my_network_name'
  400. nl80211: Scan probed for SSID 'eduroam'
  401. nl80211: Scan probed for SSID ''
  402. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484
  403. wlp2s0: Event SCAN_RESULTS (3) received
  404. wlp2s0: Scan completed in 2.690065 seconds
  405. nl80211: Associated on 2432 MHz
  406. nl80211: Associated with 00:16:b6:11:39:f4
  407. nl80211: Received scan results (3 BSSes)
  408. nl80211: Scan results indicate BSS status with 00:16:b6:11:39:f4 as associated
  409. wlp2s0: BSS: Start scan result update 2
  410. wlp2s0: BSS: Add new id 2 BSSID 5c:49:79:07:df:46 SSID 'Privat-Flur'
  411. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  412. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  413. BSS: last_scan_res_used=3/32
  414. wlp2s0: New scan results available (own=1 ext=0)
  415. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  416. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  417. wlp2s0: Radio work 'scan'@0x1522c60 done in 2.695871 seconds
  418. wlp2s0: Selecting BSS from priority group 9
  419. wlp2s0: 0: 00:1e:e5:46:0e:f0 ssid='my_network_name' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-36
  420. wlp2s0: selected based on RSN IE
  421. wlp2s0: selected BSS 00:1e:e5:46:0e:f0 ssid='my_network_name'
  422. wlp2s0: Considering within-ESS reassociation
  423. wlp2s0: Current BSS: 00:16:b6:11:39:f4 level=-79 snr=3 est_throughput=2000
  424. wlp2s0: Selected BSS: 00:1e:e5:46:0e:f0 level=-36 snr=48 est_throughput=54000
  425. wlp2s0: Allow reassociation - selected BSS has better estimated throughput
  426. wlp2s0: Considering connect request: reassociate: 0 selected: 00:1e:e5:46:0e:f0 bssid: 00:16:b6:11:39:f4 pending: 00:00:00:00:00:00 wpa_state: COMPLETED ssid=0x1500660 current_ssid=0x1500660
  427. wlp2s0: Request association with 00:1e:e5:46:0e:f0
  428. wlp2s0: Re-association to the same ESS
  429. wlp2s0: Add radio work 'sme-connect'@0x1522c60
  430. wlp2s0: First radio work item in the queue - schedule start immediately
  431. RSN: Ignored PMKID candidate without preauth flag
  432. wlp2s0: Starting radio work 'sme-connect'@0x1522c60 after 0.000067 second wait
  433. wlp2s0: Automatic auth_alg selection: 0x1
  434. RSN: PMKSA cache search - network_ctx=0x1500660 try_opportunistic=0
  435. RSN: Search for BSSID 00:1e:e5:46:0e:f0
  436. RSN: No PMKSA cache entry found
  437. wlp2s0: RSN: using IEEE 802.11i/D9.0
  438. wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  439. wlp2s0: WPA: Selected mgmt group cipher 32
  440. wlp2s0: WPA: clearing AP WPA IE
  441. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  442. wlp2s0: WPA: using GTK CCMP
  443. wlp2s0: WPA: using PTK CCMP
  444. wlp2s0: WPA: using KEY_MGMT WPA-PSK
  445. wlp2s0: WPA: not using MGMT group cipher
  446. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  447. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  448. RRM: Determining whether RRM can be used - device support: 0x0
  449. RRM: No RRM in network
  450. wlp2s0: Cancelling scan request
  451. wlp2s0: SME: Trying to authenticate with 00:1e:e5:46:0e:f0 (SSID='my_network_name' freq=2457 MHz)
  452. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  453. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  454. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  455. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  456. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x15274b0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  457. addr=00:1e:e5:46:0e:f0
  458. wlp2s0: State: COMPLETED -> AUTHENTICATING
  459. EAPOL: External notification - EAP success=0
  460. EAPOL: External notification - EAP fail=0
  461. EAPOL: External notification - portControl=Auto
  462. nl80211: Authenticate (ifindex=3)
  463. * bssid=00:1e:e5:46:0e:f0
  464. * freq=2457
  465. * SSID - hexdump_ascii(len=11):
  466. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  467. * IEs - hexdump(len=0): [NULL]
  468. * Auth Type 0
  469. nl80211: Authentication request send successfully
  470. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  471. nl80211: Event message available
  472. nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp2s0
  473. nl80211: Delete station 00:16:b6:11:39:f4
  474. nl80211: Event message available
  475. nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp2s0
  476. nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp2s0(74:2f:68:cd:1d:83) A1=00:16:b6:11:39:f4 A2=74:2f:68:cd:1d:83
  477. nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 16 b6 11 39 f4 74 2f 68 cd 1d 83 00 16 b6 11 39 f4 00 00 01 00
  478. nl80211: Deauthenticate event
  479. nl80211: Ignore deauth/disassoc event from old AP 00:16:b6:11:39:f4 when already authenticating with 00:1e:e5:46:0e:f0
  480. nl80211: Event message available
  481. nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp2s0
  482. nl80211: Ignore disconnect event when using userspace SME
  483. nl80211: Event message available
  484. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
  485. nl80211: New station 00:1e:e5:46:0e:f0
  486. nl80211: Event message available
  487. nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
  488. nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:1e:e5:46:0e:f0
  489. nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 74 2f 68 cd 1d 83 00 1e e5 46 0e f0 00 1e e5 46 0e f0 90 69 00 00 02 00 00 00 dd 09 00 10 18 02 00 f0 00 00 00
  490. nl80211: Authenticate event
  491. wlp2s0: Event AUTH (11) received
  492. wlp2s0: SME: Authentication response: peer=00:1e:e5:46:0e:f0 auth_type=0 auth_transaction=2 status_code=0
  493. SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 00 f0 00 00 00
  494. wlp2s0: Trying to associate with 00:1e:e5:46:0e:f0 (SSID='my_network_name' freq=2457 MHz)
  495. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  496. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  497. wlp2s0: State: AUTHENTICATING -> ASSOCIATING
  498. nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
  499. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  500. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  501. nl80211: Associate (ifindex=3)
  502. * bssid=00:1e:e5:46:0e:f0
  503. * freq=2457
  504. * SSID - hexdump_ascii(len=11):
  505. 4b 61 6d 70 73 63 68 75 6c 74 65 my_network_name
  506. * IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 08 00 00 00 00 01 00 00 40
  507. * WPA Versions 0x2
  508. * pairwise=0xfac04
  509. * group=0xfac04
  510. * akm=0xfac02
  511. * prev_bssid=00:16:b6:11:39:f4
  512. nl80211: Association request send successfully
  513. nl80211: Event message available
  514. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlp2s0
  515. nl80211: Regulatory domain change
  516. * initiator=0
  517. * type=1
  518. wlp2s0: Event CHANNEL_LIST_CHANGED (28) received
  519. wlp2s0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
  520. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  521. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  522. nl80211: Regulatory information - country=00
  523. nl80211: 2402-2472 @ 40 MHz 20 mBm
  524. nl80211: 2457-2482 @ 40 MHz 20 mBm (no IR)
  525. nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
  526. nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
  527. nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
  528. nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
  529. nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
  530. nl80211: 57240-63720 @ 2160 MHz 0 mBm
  531. nl80211: Added 802.11b mode based on 802.11g information
  532. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  533. nl80211: Event message available
  534. nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
  535. nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(74:2f:68:cd:1d:83) A1=74:2f:68:cd:1d:83 A2=00:1e:e5:46:0e:f0
  536. nl80211: MLME event frame - hexdump(len=83): 30 00 3a 01 74 2f 68 cd 1d 83 00 1e e5 46 0e f0 00 1e e5 46 0e f0 a0 69 11 04 00 00 01 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 00 f0 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  537. nl80211: Associate event
  538. wlp2s0: Event ASSOC (0) received
  539. wlp2s0: Association info event
  540. resp_ies - hexdump(len=53): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 00 f0 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  541. wlp2s0: freq=2457 MHz
  542. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  543. Operating frequency changed from 2432 to 2457 MHz
  544. nl80211: Associated on 2457 MHz
  545. nl80211: Associated with 00:1e:e5:46:0e:f0
  546. nl80211: Received scan results (3 BSSes)
  547. nl80211: Scan results indicate BSS status with 00:1e:e5:46:0e:f0 as associated
  548. wlp2s0: BSS: Start scan result update 3
  549. wlp2s0: State: ASSOCIATING -> ASSOCIATED
  550. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  551. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  552. wlp2s0: Associated to a new BSS: BSSID=00:1e:e5:46:0e:f0
  553. wlp2s0: Associated with 00:1e:e5:46:0e:f0
  554. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  555. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  556. wlp2s0: WPA: Association event - clear replay counter
  557. wlp2s0: WPA: Clear old PTK
  558. EAPOL: External notification - portEnabled=0
  559. EAPOL: SUPP_PAE entering state DISCONNECTED
  560. EAPOL: Supplicant port status: Unauthorized
  561. nl80211: Set supplicant port unauthorized for 00:1e:e5:46:0e:f0
  562. EAPOL: SUPP_BE entering state INITIALIZE
  563. EAPOL: External notification - portValid=0
  564. EAPOL: External notification - EAP success=0
  565. EAPOL: External notification - portEnabled=1
  566. EAPOL: SUPP_PAE entering state CONNECTING
  567. EAPOL: enable timer tick
  568. EAPOL: SUPP_BE entering state IDLE
  569. wlp2s0: Setting authentication timeout: 10 sec 0 usec
  570. wlp2s0: Cancelling scan request
  571. WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
  572. WMM AC: U-APSD queues=0x0
  573. WMM AC: Valid WMM association, WMM AC is enabled
  574. nl80211: Event message available
  575. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
  576. nl80211: Ignore connect event (cmd=46) when using userspace SME
  577. l2_packet_receive: src=00:1e:e5:46:0e:f0 len=99
  578. wlp2s0: RX EAPOL from 00:1e:e5:46:0e:f0
  579. RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  580. wlp2s0: Setting authentication timeout: 10 sec 0 usec
  581. wlp2s0: IEEE 802.1X RX: version=2 type=3 length=95
  582. WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  583. wlp2s0: EAPOL-Key type=2
  584. wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  585. wlp2s0: key_length=16 key_data_length=0
  586. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  587. key_nonce - hexdump(len=32): a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb
  588. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  589. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  590. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  591. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  592. wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  593. wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:1e:e5:46:0e:f0 (ver=2)
  594. RSN: msg 1/4 key data - hexdump(len=0):
  595. Get randomness: len=32 entropy=4
  596. WPA: Renewed SNonce - hexdump(len=32): f4 33 36 bf 87 7d 24 5b e4 e8 7c 71 76 c6 17 91 62 f5 47 26 ed b7 d9 36 f9 f2 ec a0 34 12 cd b7
  597. WPA: PTK derivation - A1=74:2f:68:cd:1d:83 A2=00:1e:e5:46:0e:f0
  598. WPA: Nonce1 - hexdump(len=32): f4 33 36 bf 87 7d 24 5b e4 e8 7c 71 76 c6 17 91 62 f5 47 26 ed b7 d9 36 f9 f2 ec a0 34 12 cd b7
  599. WPA: Nonce2 - hexdump(len=32): a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb
  600. WPA: PMK - hexdump(len=32): [REMOVED]
  601. WPA: PTK - hexdump(len=48): [REMOVED]
  602. WPA: KCK - hexdump(len=16): [REMOVED]
  603. WPA: KEK - hexdump(len=16): [REMOVED]
  604. WPA: TK - hexdump(len=16): [REMOVED]
  605. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  606. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  607. wlp2s0: WPA: Sending EAPOL-Key 2/4
  608. WPA: KCK - hexdump(len=16): [REMOVED]
  609. WPA: Derived Key MIC - hexdump(len=16): 36 4a 74 26 7b 69 30 9a 02 4f 17 90 ef 75 92 00
  610. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 f4 33 36 bf 87 7d 24 5b e4 e8 7c 71 76 c6 17 91 62 f5 47 26 ed b7 d9 36 f9 f2 ec a0 34 12 cd b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 4a 74 26 7b 69 30 9a 02 4f 17 90 ef 75 92 00 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  611. l2_packet_receive: src=00:1e:e5:46:0e:f0 len=155
  612. wlp2s0: RX EAPOL from 00:1e:e5:46:0e:f0
  613. RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 25 bd 45 64 f1 39 ba ab b1 f6 fa 90 60 15 d1 00 38 f0 9d 82 33 19 00 2e 12 65 8d 63 64 c5 bb 3a 93 74 6b 71 87 74 d7 4c 55 87 27 59 3e 2e ff 73 0d b0 47 c7 c8 55 57 e1 76 16 e8 f0 b4 fc 67 ae 69 ba 0e e4 a1 b5 f0 9f ee
  614. wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151
  615. WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 25 bd 45 64 f1 39 ba ab b1 f6 fa 90 60 15 d1 00 38 f0 9d 82 33 19 00 2e 12 65 8d 63 64 c5 bb 3a 93 74 6b 71 87 74 d7 4c 55 87 27 59 3e 2e ff 73 0d b0 47 c7 c8 55 57 e1 76 16 e8 f0 b4 fc 67 ae 69 ba 0e e4 a1 b5 f0 9f ee
  616. wlp2s0: EAPOL-Key type=2
  617. wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  618. wlp2s0: key_length=16 key_data_length=56
  619. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  620. key_nonce - hexdump(len=32): a1 97 06 df d0 44 c2 25 90 21 f7 ad 62 5c 2a c6 d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cb
  621. key_iv - hexdump(len=16): d0 f9 0a 1f ec db e7 87 c3 a0 20 78 bd 5c 16 cd
  622. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  623. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  624. key_mic - hexdump(len=16): 03 25 bd 45 64 f1 39 ba ab b1 f6 fa 90 60 15 d1
  625. RSN: encrypted key data - hexdump(len=56): f0 9d 82 33 19 00 2e 12 65 8d 63 64 c5 bb 3a 93 74 6b 71 87 74 d7 4c 55 87 27 59 3e 2e ff 73 0d b0 47 c7 c8 55 57 e1 76 16 e8 f0 b4 fc 67 ae 69 ba 0e e4 a1 b5 f0 9f ee
  626. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  627. wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  628. wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:1e:e5:46:0e:f0 (ver=2)
  629. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 3d 0e 0f 9a 36 be d7 8f fb 16 6b d1 de d6 59 52 dd 00
  630. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  631. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  632. wlp2s0: WPA: Sending EAPOL-Key 4/4
  633. WPA: KCK - hexdump(len=16): [REMOVED]
  634. WPA: Derived Key MIC - hexdump(len=16): c0 43 14 6e f8 07 c2 76 54 f4 55 bb d8 39 4f ca
  635. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 43 14 6e f8 07 c2 76 54 f4 55 bb d8 39 4f ca 00 00
  636. wlp2s0: WPA: Installing PTK to the driver
  637. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x1502210 key_idx=0 set_tx=1 seq_len=6 key_len=16
  638. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  639. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  640. addr=00:1e:e5:46:0e:f0
  641. EAPOL: External notification - portValid=1
  642. wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  643. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  644. WPA: Group Key - hexdump(len=16): [REMOVED]
  645. wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  646. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  647. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x499201 key_idx=1 set_tx=0 seq_len=6 key_len=16
  648. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  649. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  650. broadcast key
  651. wlp2s0: WPA: Key negotiation completed with 00:1e:e5:46:0e:f0 [PTK=CCMP GTK=CCMP]
  652. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  653. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  654. wlp2s0: Cancelling authentication timeout
  655. wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
  656. wlp2s0: Radio work 'sme-connect'@0x1522c60 done in 0.053257 seconds
  657. wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:1e:e5:46:0e:f0 completed [id=0 id_str=]
  658. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  659. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  660. nl80211: Set wlp2s0 operstate 0->1 (UP)
  661. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  662. EAPOL: External notification - portValid=1
  663. EAPOL: External notification - EAP success=1
  664. EAPOL: SUPP_PAE entering state AUTHENTICATING
  665. EAPOL: SUPP_BE entering state SUCCESS
  666. EAP: EAP entering state DISABLED
  667. EAPOL: SUPP_PAE entering state AUTHENTICATED
  668. EAPOL: Supplicant port status: Authorized
  669. nl80211: Set supplicant port authorized for 00:1e:e5:46:0e:f0
  670. EAPOL: SUPP_BE entering state IDLE
  671. EAPOL authentication completed - result=SUCCESS
  672. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  673. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  674. EAPOL: startWhen --> 0
  675. EAPOL: disable timer tick
  676. wlp2s0: Control interface command 'STATUS'
  677. EAPOL: EAP Session-Id not available
  678. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  679. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  680. wlp2s0: Control interface command 'LIST_NETWORKS'
  681. wlp2s0: Control interface command 'GET_NETWORK 0 disabled'
  682. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  683. wlp2s0: Control interface command 'STATUS'
  684. EAPOL: EAP Session-Id not available
  685. ^Cwlp2s0: Removing interface wlp2s0
  686. wlp2s0: Request to deauthenticate - bssid=00:1e:e5:46:0e:f0 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
  687. wpa_driver_nl80211_deauthenticate(addr=00:1e:e5:46:0e:f0 reason_code=3)
  688. wlp2s0: Event DEAUTH (12) received
  689. wlp2s0: Deauthentication notification
  690. wlp2s0: * reason 3 (locally generated)
  691. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  692. wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:1e:e5:46:0e:f0 reason=3 locally_generated=1
  693. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  694. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  695. wlp2s0: Auto connect disabled: do not try to re-connect
  696. wlp2s0: Ignore connection failure indication since interface has been put into disconnected state
  697. wlp2s0: WPA: Clear old PMK and PTK
  698. wlp2s0: Disconnect event - remove keys
  699. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  700. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  701. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x14ff948 key_idx=0 set_tx=0 seq_len=0 key_len=0
  702. addr=00:1e:e5:46:0e:f0
  703. wlp2s0: State: COMPLETED -> DISCONNECTED
  704. nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
  705. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  706. WMM AC: WMM AC is disabled
  707. EAPOL: External notification - portEnabled=0
  708. EAPOL: SUPP_PAE entering state DISCONNECTED
  709. EAPOL: Supplicant port status: Unauthorized
  710. nl80211: Skip set_supp_port(unauthorized) while not associated
  711. EAPOL: SUPP_BE entering state INITIALIZE
  712. EAPOL: External notification - portValid=0
  713. EAPOL: External notification - EAP success=0
  714. wlp2s0: State: DISCONNECTED -> DISCONNECTED
  715. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  716. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  717. EAPOL: External notification - portEnabled=0
  718. EAPOL: External notification - portValid=0
  719. wlp2s0: WPA: Clear old PMK and PTK
  720. wlp2s0: BSS: Remove id 1 BSSID 00:1e:e5:46:0e:f0 SSID 'my_network_name' due to wpa_bss_flush
  721. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  722. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  723. wlp2s0: BSS: Remove id 0 BSSID 00:16:b6:11:39:f4 SSID 'my_network_name' due to wpa_bss_flush
  724. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  725. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  726. wlp2s0: BSS: Remove id 2 BSSID 5c:49:79:07:df:46 SSID 'Privat-Flur' due to wpa_bss_flush
  727. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  728. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  729. wlp2s0: Cancelling scan request
  730. wlp2s0: Cancelling authentication timeout
  731. Remove interface wlp2s0 from radio phy0
  732. Remove radio phy0
  733. nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0
  734. nl80211: Remove monitor interface: refcount=0
  735. netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  736. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  737. nl80211: Unsubscribe mgmt frames handle 0x8888888889d88c09 (mode change)
  738. wlp2s0: CTRL-EVENT-TERMINATING
  739. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_3676-8\x00
  740. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_2851-15\x00
  741. CTRL_IFACE wait for attached monitors to receive messages
RAW Paste Data