ubuntuusers.de

🛈 Aktuell gibt es im Wiki ca. 550 Artikel, die nur für Xenial getestet sind. Dies entspricht ca. 7 % aller Wikiartikel. Damit diese im nächsten Frühjahr nicht alle archiviert werden müssen, ist eure Mithilfe gefragt!

Titel:
Output WLAN_con_debug ra0
Datum:
26. Februar 2013 23:49
Aktionen:
Code:
  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'ra0' conf 'wpa_supplicant.tmp' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa_supplicant.tmp' -> '/home/bambam/wpa_supplicant.tmp'
Reading configuration file '/home/bambam/wpa_supplicant.tmp'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
Priority group 0
   id=0 ssid='bambamnet'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
ra0: Own MAC address: 24:65:11:40:0a:c6
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
ra0: RSN: flushing PMKID list in the driver
ra0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface ra0
WPS: UUID based on MAC address - hexdump(len=16): 65 55 1b 67 8b 1e 51 4e ac 02 0c 44 7b 64 e3 20
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
ra0: Added interface ra0
random: Got 18/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
ra0: State: DISCONNECTED -> SCANNING
ra0: Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
random: Got 2/2 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
ra0: Event SCAN_RESULTS (3) received
Received 444 bytes of scan results (3 BSSes)
ra0: BSS: Start scan result update 1
ra0: BSS: Add new id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet'
ra0: BSS: Add new id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network'
ra0: BSS: Add new id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933'
ra0: New scan results available
ra0: Selecting BSS from priority group 0
ra0: 0: 00:24:fe:b3:e8:69 ssid='bambamnet' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 level=-38
ra0:    selected based on WPA IE
ra0:    selected BSS 00:24:fe:b3:e8:69 ssid='bambamnet'
ra0: Request association: reassociate: 0  selected: 00:24:fe:b3:e8:69  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
ra0: Trying to associate with 00:24:fe:b3:e8:69 (SSID='bambamnet' freq=2412 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
ra0: Cancelling scan request
ra0: WPA: clearing own WPA/RSN IE
ra0: Automatic auth_alg selection: 0x1
ra0: WPA: using IEEE 802.11i/D3.0
ra0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
ra0: WPA: clearing AP RSN IE
ra0: WPA: using GTK TKIP
ra0: WPA: using PTK TKIP
ra0: WPA: using KEY_MGMT WPA-PSK
ra0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
ra0: No keys have been configured - skip key clearing
ra0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
ra0: Association request to the driver failed
ra0: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=17
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c07 len=49
AssocReq IE wireless event - hexdump(len=41): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:24:00:00:e8:69
ra0: Event ASSOCINFO (4) received
ra0: Association info event
req_ies - hexdump(len=41): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
ra0: Event ASSOC (0) received
ra0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
ra0: Associated to a new BSS: BSSID=00:24:fe:b3:e8:69
ra0: No keys have been configured - skip key clearing
ra0: Associated with 00:24:fe:b3:e8:69
ra0: WPA: Association event - clear replay counter
ra0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
ra0: Setting authentication timeout: 10 sec 0 usec
ra0: Cancelling scan request
ra0: RX EAPOL from 00:24:fe:b3:e8:69
ra0: Setting authentication timeout: 10 sec 0 usec
ra0: IEEE 802.1X RX: version=1 type=3 length=95
ra0:   EAPOL-Key type=254
ra0:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
ra0:   key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ra0: State: ASSOCIATED -> 4WAY_HANDSHAKE
ra0: WPA: RX message 1 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 7f 96 db 9c 04 a9 31 b6 c4 fc c5 53 2e a4 a8 ea b9 19 cb 57 98 24 e3 0f 7c b1 cf 75 ea 18 5f 71
WPA: PTK derivation - A1=24:65:11:40:0a:c6 A2=00:24:fe:b3:e8:69
WPA: Nonce1 - hexdump(len=32): 7f 96 db 9c 04 a9 31 b6 c4 fc c5 53 2e a4 a8 ea b9 19 cb 57 98 24 e3 0f 7c b1 cf 75 ea 18 5f 71
WPA: Nonce2 - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
ra0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): d2 af 25 22 31 0f e8 bd 20 c6 88 45 37 0e 08 ca
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
ra0: RX EAPOL from 00:24:fe:b3:e8:69
ra0: IEEE 802.1X RX: version=1 type=3 length=121
ra0:   EAPOL-Key type=254
ra0:   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
ra0:   key_length=32 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): c5 18 d3 a7 a1 9a 69 1f c4 1e 01 bc c9 cc 87 42
ra0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
ra0: WPA: RX message 3 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
ra0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): af 0d 4f 80 2c 26 65 4b 3c 37 7c c7 88 f0 a7 ed
ra0: WPA: Installing PTK to the driver
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
ra0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
ra0: RX EAPOL from 00:24:fe:b3:e8:69
ra0: IEEE 802.1X RX: version=1 type=3 length=127
ra0:   EAPOL-Key type=254
ra0:   key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
ra0:   key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1c
  key_iv - hexdump(len=16): 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1f
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 43 1d cc 7b 89 b3 76 a8 de 58 ea 64 1a 37 ae 87
ra0: WPA: RX message 1 of Group Key Handshake from 00:24:fe:b3:e8:69 (ver=1)
ra0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
ra0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
ra0: WPA: Sending EAPOL-Key 2/2
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): e1 8c 98 c7 b8 90 4e 27 d6 f1 02 d8 2c de bd 62
ra0: WPA: Key negotiation completed with 00:24:fe:b3:e8:69 [PTK=TKIP GTK=TKIP]
ra0: Cancelling authentication timeout
ra0: State: GROUP_HANDSHAKE -> COMPLETED
ra0: CTRL-EVENT-CONNECTED - Connection to 00:24:fe:b3:e8:69 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
ra0: CTRL-EVENT-TERMINATING - signal 15 received
ra0: Removing interface ra0
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
ra0: State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wpa_driver_wext_set_countermeasures
ra0: No keys have been configured - skip key clearing
ra0: BSS: Remove id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet'
ra0: BSS: Remove id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network'
ra0: BSS: Remove id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933'
ra0: Cancelling scan request
ra0: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6