Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Wireless event: cmd=0x8c03 len=20
- +rtl871x_get_sta_wpaie, IP:Hm:ac:AD:DR:ES is sta's address
- Add randomness: count=1 entropy=0
- wlan0: STA IP:Hm:ac:AD:DR:ES IEEE 802.11: associated
- STA included RSN IE in (Re)AssocReq
- New STA
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: event 1 notification
- rtl871x_set_key_ops
- IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: start authentication
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state INITIALIZE
- rtl871x_set_key_ops
- wlan0: STA IP:Hm:ac:AD:DR:ES IEEE 802.1X: unauthorizing port
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK_GROUP entering state IDLE
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state AUTHENTICATION
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state AUTHENTICATION2
- WPA: Re-initialize GMK/Counter on first station
- Get randomness: len=32 entropy=1
- GMK - hexdump(len=32): [REMOVED]
- Get randomness: len=32 entropy=0
- Key Counter - hexdump(len=32): [REMOVED]
- Get randomness: len=16 entropy=0
- GTK - hexdump(len=16): [REMOVED]
- rtl871x_set_key_ops
- WPA: Assign ANonce - hexdump(len=32): ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state INITPSK
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKSTART
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: sending 1/4 msg of 4-Way Handshake
- WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
- +rtl871x_send_eapol
- TX EAPOL - hexdump(len=113): ac 29 3a 11 45 54 f4 f2 6d 09 06 6b 88 8e 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
- IEEE 802.1X: 121 bytes from IP:Hm:ac:AD:DR:ES
- IEEE 802.1X: version=2 type=3 length=117
- WPA: Received Key Nonce - hexdump(len=32): 70 f0 f0 fe f0 11 7f 73 08 c0 b9 fe 30 0f 00 f5 07 ac 7a c1 ac 11 9f 74 08 b5 8b 55 5a aa aa a2
- WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- Add randomness: count=2 entropy=0
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: received EAPOL-Key frame (2/4 Pairwise)
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKCALCNEGOTIATING
- WPA: PTK derivation - A1=AP:MA:Ca:dd:rr:es A2=IP:Hm:ac:AD:DR:ES
- WPA: Nonce1 - hexdump(len=32): ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d
- WPA: Nonce2 - hexdump(len=32): 70 f0 f0 fe f0 11 7f 73 08 c0 b9 fe 30 0f 00 f5 07 ac 7a c1 ac 11 9f 74 08 b5 8b 55 5a aa aa a2
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: invalid MIC in msg 2/4 of 4-Way Handshake
- IEEE 802.1X: 99 bytes from IP:Hm:ac:AD:DR:ES
- IEEE 802.1X: version=2 type=3 length=95
- WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
- received replay counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: EAPOL-Key timeout
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKSTART
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: sending 1/4 msg of 4-Way Handshake
- WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
- +rtl871x_send_eapol
- TX EAPOL - hexdump(len=113): ac 29 3a 11 45 54 f4 f2 6d 09 06 6b 88 8e 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: EAPOL-Key timeout
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKSTART
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: sending 1/4 msg of 4-Way Handshake
- WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
- +rtl871x_send_eapol
- TX EAPOL - hexdump(len=113): ac 29 3a 11 45 54 f4 f2 6d 09 06 6b 88 8e 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
- IEEE 802.1X: 121 bytes from IP:Hm:ac:AD:DR:ES
- IEEE 802.1X: version=2 type=3 length=117
- WPA: Received Key Nonce - hexdump(len=32): a1 b5 0d ad 92 92 d6 d1 b6 8c 97 3e 73 e0 9f 04 f0 4a fb 52 da 91 56 e9 6e 90 74 81 b7 ed 40 96
- WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
- Add randomness: count=3 entropy=1
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: received EAPOL-Key frame (2/4 Pairwise)
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKCALCNEGOTIATING
- WPA: PTK derivation - A1=AP:MA:Ca:dd:rr:es A2=IP:Hm:ac:AD:DR:ES
- WPA: Nonce1 - hexdump(len=32): ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d
- WPA: Nonce2 - hexdump(len=32): a1 b5 0d ad 92 92 d6 d1 b6 8c 97 3e 73 e0 9f 04 f0 4a fb 52 da 91 56 e9 6e 90 74 81 b7 ed 40 96
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKCALCNEGOTIATING2
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKINITNEGOTIATING
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: sending 3/4 msg of 4-Way Handshake
- WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
- Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
- +rtl871x_send_eapol
- TX EAPOL - hexdump(len=169): ac 29 3a 11 45 54 f4 f2 6d 09 06 6b 88 8e 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 ad 3b 58 26 e8 e3 8b fc f5 7e d8 d4 0f 4e 11 bc f1 30 02 8c 93 c8 c3 40 c9 69 98 24 1f 8f 10 5d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae d9 46 c3 59 ee 9e ec a2 c5 93 56 55 d5 b5 a7 00 38 d9 77 93 89 7c 39 bb 0a 0f 17 c7 5f 33 f8 37 7a 7b 0d ea aa 74 46 b2 48 2b 3f ef fb 69 ab 82 fb e3 13 b8 bd 7a bd b6 d4 3b 80 5b 2c 61 ff 3d ee e3 18 2a b3 7c 46 5c f4
- WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
- IEEE 802.1X: 99 bytes from IP:Hm:ac:AD:DR:ES
- IEEE 802.1X: version=2 type=3 length=95
- WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: received EAPOL-Key frame (4/4 Pairwise)
- WPA: IP:Hm:ac:AD:DR:ES WPA_PTK entering state PTKINITDONE
- rtl871x_set_key_ops
- wlan0: AP-STA-CONNECTED IP:Hm:ac:AD:DR:ES
- wlan0: STA IP:Hm:ac:AD:DR:ES IEEE 802.1X: authorizing port
- wlan0: STA IP:Hm:ac:AD:DR:ES RADIUS: starting accounting session 59C179D7-00000000
- wlan0: STA IP:Hm:ac:AD:DR:ES WPA: pairwise key handshake completed (RSN)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement