ubuntuusers.de

WLAN script rt5572 WPA2 ohne compat

Autor:
bambam-0815
Datum:
28. Februar 2013 20:23
Code:
  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'ra0' conf 'wpa_supplicant.tmp' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa_supplicant.tmp' -> '/home/bambam/wpa_supplicant.tmp'
Reading configuration file '/home/bambam/wpa_supplicant.tmp'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
Priority group 0
   id=0 ssid='bambamnet'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
ra0: Own MAC address: 24:65:11:40:0a:c6
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
ra0: RSN: flushing PMKID list in the driver
ra0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface ra0
WPS: UUID based on MAC address - hexdump(len=16): 65 55 1b 67 8b 1e 51 4e ac 02 0c 44 7b 64 e3 20
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
ra0: Added interface ra0
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
ra0: State: DISCONNECTED -> SCANNING
ra0: Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
Scan timeout - try to get results
ra0: Event SCAN_RESULTS (3) received
Received 464 bytes of scan results (3 BSSes)
ra0: BSS: Start scan result update 1
ra0: BSS: Add new id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet'
ra0: BSS: Add new id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network'
ra0: BSS: Add new id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933'
ra0: New scan results available
ra0: Selecting BSS from priority group 0
ra0: 0: 00:24:fe:b3:e8:69 ssid='bambamnet' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-36
ra0:    selected based on RSN IE
ra0:    selected BSS 00:24:fe:b3:e8:69 ssid='bambamnet'
ra0: Request association: reassociate: 0  selected: 00:24:fe:b3:e8:69  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
ra0: Trying to associate with 00:24:fe:b3:e8:69 (SSID='bambamnet' freq=2447 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
ra0: Cancelling scan request
ra0: WPA: clearing own WPA/RSN IE
ra0: Automatic auth_alg selection: 0x1
ra0: RSN: using IEEE 802.11i/D9.0
ra0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
ra0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
ra0: WPA: using GTK CCMP
ra0: WPA: using PTK CCMP
ra0: WPA: using KEY_MGMT WPA-PSK
ra0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
ra0: No keys have been configured - skip key clearing
ra0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
ra0: Association request to the driver failed
ra0: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=17
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c07 len=47
AssocReq IE wireless event - hexdump(len=39): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:24:00:00:e8:69
ra0: Event ASSOCINFO (4) received
ra0: Association info event
req_ies - hexdump(len=39): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
ra0: Event ASSOC (0) received
ra0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
ra0: Associated to a new BSS: BSSID=00:24:fe:b3:e8:69
ra0: No keys have been configured - skip key clearing
ra0: Associated with 00:24:fe:b3:e8:69
ra0: WPA: Association event - clear replay counter
ra0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
ra0: Setting authentication timeout: 10 sec 0 usec
ra0: Cancelling scan request
ra0: RX EAPOL from 00:24:fe:b3:e8:69
ra0: Setting authentication timeout: 10 sec 0 usec
ra0: IEEE 802.1X RX: version=1 type=3 length=95
ra0:   EAPOL-Key type=2
ra0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
ra0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 1b 0e 06 17 23 89 f2 03 ef 7a 3e 0b 9b e1 bf 97 71 2c f0 84 5d f9 8c 6e df 30 54 93 1e 28 86 40
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ra0: State: ASSOCIATED -> 4WAY_HANDSHAKE
ra0: WPA: RX message 1 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): b4 6a f5 b3 dc cb 03 0d a3 6f 01 70 8e 9b d3 5d 36 1f a1 47 f4 94 bf 6d 69 40 53 cb 04 b4 51 62
WPA: PTK derivation - A1=24:65:11:40:0a:c6 A2=00:24:fe:b3:e8:69
WPA: Nonce1 - hexdump(len=32): b4 6a f5 b3 dc cb 03 0d a3 6f 01 70 8e 9b d3 5d 36 1f a1 47 f4 94 bf 6d 69 40 53 cb 04 b4 51 62
WPA: Nonce2 - hexdump(len=32): 1b 0e 06 17 23 89 f2 03 ef 7a 3e 0b 9b e1 bf 97 71 2c f0 84 5d f9 8c 6e df 30 54 93 1e 28 86 40
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
ra0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): e7 ac 74 09 52 88 69 c8 27 35 99 79 67 8b 06 af
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
ra0: RX EAPOL from 00:24:fe:b3:e8:69
ra0: IEEE 802.1X RX: version=1 type=3 length=151
ra0:   EAPOL-Key type=2
ra0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
ra0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 1b 0e 06 17 23 89 f2 03 ef 7a 3e 0b 9b e1 bf 97 71 2c f0 84 5d f9 8c 6e df 30 54 93 1e 28 86 40
  key_iv - hexdump(len=16): a6 a6 a6 a6 a6 a6 a6 a6 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): a4 d2 ac f1 3f 2d aa ec 1b 14 85 3a cd 37 09 c3
RSN: encrypted key data - hexdump(len=56): 9c 9e 3c 21 40 82 73 8c ba 72 26 5c 17 2b 59 8f 9b 64 3e 7d fb aa 70 83 65 91 50 7e 19 7d c3 af f0 19 d4 8b 70 de c7 23 e2 40 23 e1 20 8f 50 ec 68 64 8a 5d 55 7a 89 7a
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
ra0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
ra0: WPA: RX message 3 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 49 97 23 5c a8 5d 07 eb 25 45 9b 39 1e cd 5f ca dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
ra0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): bf 6e 0f 47 ff 43 d9 f1 59 d2 85 81 2c e2 03 24
ra0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
ra0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
ra0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
ra0: WPA: Key negotiation completed with 00:24:fe:b3:e8:69 [PTK=CCMP GTK=CCMP]
ra0: Cancelling authentication timeout
ra0: State: GROUP_HANDSHAKE -> COMPLETED
ra0: CTRL-EVENT-CONNECTED - Connection to 00:24:fe:b3:e8:69 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
WEXT: if_removed already cleared - ignore event
ra0: CTRL-EVENT-TERMINATING - signal 15 received
ra0: Removing interface ra0
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
ra0: State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wpa_driver_wext_set_countermeasures
ra0: No keys have been configured - skip key clearing
ra0: BSS: Remove id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet'
ra0: BSS: Remove id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network'
ra0: BSS: Remove id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933'
ra0: Cancelling scan request
ra0: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6