🛈 Aktuell gibt es im Wiki ca. 550 Artikel, die nur für Xenial getestet sind. Dies entspricht ca. 7 % aller Wikiartikel. Damit diese im nächsten Frühjahr nicht alle archiviert werden müssen, ist eure Mithilfe gefragt!
- Titel:
- Output WLAN_con_debug ra0
- Datum:
- 26. Februar 2013 23:49
- Aktionen:
- Code:
-
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263
wpa_supplicant v1.0 random: Trying to read entropy from /dev/random Initializing interface 'ra0' conf 'wpa_supplicant.tmp' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_supplicant.tmp' -> '/home/bambam/wpa_supplicant.tmp' Reading configuration file '/home/bambam/wpa_supplicant.tmp' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=1 Priority group 0 id=0 ssid='bambamnet' SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 ra0: Own MAC address: 24:65:11:40:0a:c6 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures ra0: RSN: flushing PMKID list in the driver ra0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface ra0 WPS: UUID based on MAC address - hexdump(len=16): 65 55 1b 67 8b 1e 51 4e ac 02 0c 44 7b 64 e3 20 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized ra0: Added interface ra0 random: Got 18/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event ra0: State: DISCONNECTED -> SCANNING ra0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized random: Got 2/2 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=8 ra0: Event SCAN_RESULTS (3) received Received 444 bytes of scan results (3 BSSes) ra0: BSS: Start scan result update 1 ra0: BSS: Add new id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet' ra0: BSS: Add new id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network' ra0: BSS: Add new id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933' ra0: New scan results available ra0: Selecting BSS from priority group 0 ra0: 0: 00:24:fe:b3:e8:69 ssid='bambamnet' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 level=-38 ra0: selected based on WPA IE ra0: selected BSS 00:24:fe:b3:e8:69 ssid='bambamnet' ra0: Request association: reassociate: 0 selected: 00:24:fe:b3:e8:69 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ra0: Trying to associate with 00:24:fe:b3:e8:69 (SSID='bambamnet' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): ra0: Cancelling scan request ra0: WPA: clearing own WPA/RSN IE ra0: Automatic auth_alg selection: 0x1 ra0: WPA: using IEEE 802.11i/D3.0 ra0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 ra0: WPA: clearing AP RSN IE ra0: WPA: using GTK TKIP ra0: WPA: using PTK TKIP ra0: WPA: using KEY_MGMT WPA-PSK ra0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 ra0: No keys have been configured - skip key clearing ra0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk ra0: Association request to the driver failed ra0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=17 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c07 len=49 AssocReq IE wireless event - hexdump(len=41): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:24:00:00:e8:69 ra0: Event ASSOCINFO (4) received ra0: Association info event req_ies - hexdump(len=41): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): ra0: Event ASSOC (0) received ra0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 ra0: Associated to a new BSS: BSSID=00:24:fe:b3:e8:69 ra0: No keys have been configured - skip key clearing ra0: Associated with 00:24:fe:b3:e8:69 ra0: WPA: Association event - clear replay counter ra0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE ra0: Setting authentication timeout: 10 sec 0 usec ra0: Cancelling scan request ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: Setting authentication timeout: 10 sec 0 usec ra0: IEEE 802.1X RX: version=1 type=3 length=95 ra0: EAPOL-Key type=254 ra0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) ra0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ra0: State: ASSOCIATED -> 4WAY_HANDSHAKE ra0: WPA: RX message 1 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 7f 96 db 9c 04 a9 31 b6 c4 fc c5 53 2e a4 a8 ea b9 19 cb 57 98 24 e3 0f 7c b1 cf 75 ea 18 5f 71 WPA: PTK derivation - A1=24:65:11:40:0a:c6 A2=00:24:fe:b3:e8:69 WPA: Nonce1 - hexdump(len=32): 7f 96 db 9c 04 a9 31 b6 c4 fc c5 53 2e a4 a8 ea b9 19 cb 57 98 24 e3 0f 7c b1 cf 75 ea 18 5f 71 WPA: Nonce2 - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 ra0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): d2 af 25 22 31 0f e8 bd 20 c6 88 45 37 0e 08 ca EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: IEEE 802.1X RX: version=1 type=3 length=121 ra0: EAPOL-Key type=254 ra0: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) ra0: key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): c5 18 d3 a7 a1 9a 69 1f c4 1e 01 bc c9 cc 87 42 ra0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE ra0: WPA: RX message 3 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 ra0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): af 0d 4f 80 2c 26 65 4b 3c 37 7c c7 88 f0 a7 ed ra0: WPA: Installing PTK to the driver WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 ra0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: IEEE 802.1X RX: version=1 type=3 length=127 ra0: EAPOL-Key type=254 ra0: key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) ra0: key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1c key_iv - hexdump(len=16): 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1f key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 43 1d cc 7b 89 b3 76 a8 de 58 ea 64 1a 37 ae 87 ra0: WPA: RX message 1 of Group Key Handshake from 00:24:fe:b3:e8:69 (ver=1) ra0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] ra0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 ra0: WPA: Sending EAPOL-Key 2/2 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): e1 8c 98 c7 b8 90 4e 27 d6 f1 02 d8 2c de bd 62 ra0: WPA: Key negotiation completed with 00:24:fe:b3:e8:69 [PTK=TKIP GTK=TKIP] ra0: Cancelling authentication timeout ra0: State: GROUP_HANDSHAKE -> COMPLETED ra0: CTRL-EVENT-CONNECTED - Connection to 00:24:fe:b3:e8:69 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event EAPOL: startWhen --> 0 EAPOL: disable timer tick ra0: CTRL-EVENT-TERMINATING - signal 15 received ra0: Removing interface ra0 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 ra0: State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wpa_driver_wext_set_countermeasures ra0: No keys have been configured - skip key clearing ra0: BSS: Remove id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet' ra0: BSS: Remove id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network' ra0: BSS: Remove id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933' ra0: Cancelling scan request ra0: Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6