Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' Line: 1 - start of a new network block ssid - hexdump_ascii(len=13): 6a 6f 73 65 6e 6b 6f 77 69 74 73 63 68 josenkowitsch PSK - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='josenkowitsch' Initializing interface (2) 'wlan0' WEXT: cfg80211-based driver detected Interface wlan0 set UP - waiting a second for the driver to complete initialization SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:1f:3f:0b:1d:45 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): 96 28 94 ba cb df 58 b7 a6 b9 b3 b8 3a cb 4f e0 WPS: Build Beacon and Probe Response IEs WPS: * Version WPS: * Wi-Fi Protected Setup State (0) WPS: * Version WPS: * Wi-Fi Protected Setup State (0) WPS: * Response Type (2) WPS: * UUID-E WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Serial Number WPS: * Primary Device Type WPS: * Device Name WPS: * Config Methods (0) WPS: * RF Bands (3) EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 1530 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d8 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: No SSID info found (msg 1 of 4). RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 5 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 4a 55 a1 67 4a 6d dd 1f a8 db cb 3d 6b 91 65 58 29 dc 78 6e 3d 25 fe d4 ab ed 7d 63 f4 66 af 69 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 4a 55 a1 67 4a 6d dd 1f a8 db cb 3d 6b 91 65 58 29 dc 78 6e 3d 25 fe d4 ab ed 7d 63 f4 66 af 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 30 88 51 09 00 50 6c 85 15 3d 07 a5 5d 6d ee 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af e6 59 2d 34 bf 1b b7 73 2b 13 63 4a 60 2a c7 00 68 7c 78 13 a8 66 3d 0b 21 eb 33 4a f1 53 57 c5 6c db f3 a8 f2 e4 e6 52 27 73 10 24 13 6c b9 5b ad 26 ba 0d e7 c7 be 21 fb 6d 03 ce 62 99 ba 78 0a f2 86 e7 54 d1 59 d6 5b 3a 55 1b e6 0f 02 74 89 04 d9 57 d7 5f 05 ec 5f 1a 92 e9 28 f9 ca ae ed 9c 6a cb 99 e4 da 76 a5 78 87 10 0e bb a5 bb a7 13 82 a3 e1 56 8f 52 0a IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): af e6 59 2d 34 bf 1b b7 73 2b 13 63 4a 60 2a c7 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 d9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af e6 59 2d 34 bf 1b b7 73 2b 13 63 4a 60 2a c7 00 68 7c 78 13 a8 66 3d 0b 21 eb 33 4a f1 53 57 c5 6c db f3 a8 f2 e4 e6 52 27 73 10 24 13 6c b9 5b ad 26 ba 0d e7 c7 be 21 fb 6d 03 ce 62 99 ba 78 0a f2 86 e7 54 d1 59 d6 5b 3a 55 1b e6 0f 02 74 89 04 d9 57 d7 5f 05 ec 5f 1a 92 e9 28 f9 ca ae ed 9c 6a cb 99 e4 da 76 a5 78 87 10 0e bb a5 bb a7 13 82 a3 e1 56 8f 52 0a RSN: encrypted key data - hexdump(len=104): 7c 78 13 a8 66 3d 0b 21 eb 33 4a f1 53 57 c5 6c db f3 a8 f2 e4 e6 52 27 73 10 24 13 6c b9 5b ad 26 ba 0d e7 c7 be 21 fb 6d 03 ce 62 99 ba 78 0a f2 86 e7 54 d1 59 d6 5b 3a 55 1b e6 0f 02 74 89 04 d9 57 d7 5f 05 ec 5f 1a 92 e9 28 f9 ca ae ed 9c 6a cb 99 e4 da 76 a5 78 87 10 0e bb a5 bb a7 13 82 a3 e1 56 8f 52 0a WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 f8 d0 7e 8f 70 aa 7c 5e 5b c8 f7 d4 0f d7 e8 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): c1 82 cf 67 a8 99 4f a4 4c 06 c7 7b da 99 76 a9 f3 e8 25 d4 98 81 e2 41 a2 f1 74 1e ee 17 c9 9d WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 c1 82 cf 67 a8 99 4f a4 4c 06 c7 7b da 99 76 a9 f3 e8 25 d4 98 81 e2 41 a2 f1 74 1e ee 17 c9 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 62 aa be b4 d4 48 7f 77 97 f0 52 a5 e3 8d aa 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bd 6b 81 a1 6f 63 c7 11 ab 8a 85 b6 db d7 52 fb 00 68 3f 46 0e 4d 49 8a 0b b3 bc 7f 1a e3 1e 95 6f a9 05 3f 86 a5 c3 68 41 f6 d2 41 39 d9 a1 83 75 aa 9e 4f 07 f3 a8 74 15 30 09 37 64 21 e7 d0 6a 81 e1 45 7d 55 fd 22 8f 03 d5 9e 5a 58 90 d3 a1 d2 10 ad 1b e6 bc 21 77 b8 3d 9e f5 e8 b0 13 74 3c 31 ed ed d2 f5 29 66 6e 1f f4 8e ec 37 49 cd a8 88 5d 5b 9f f1 8e a8 ae IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): bd 6b 81 a1 6f 63 c7 11 ab 8a 85 b6 db d7 52 fb WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bd 6b 81 a1 6f 63 c7 11 ab 8a 85 b6 db d7 52 fb 00 68 3f 46 0e 4d 49 8a 0b b3 bc 7f 1a e3 1e 95 6f a9 05 3f 86 a5 c3 68 41 f6 d2 41 39 d9 a1 83 75 aa 9e 4f 07 f3 a8 74 15 30 09 37 64 21 e7 d0 6a 81 e1 45 7d 55 fd 22 8f 03 d5 9e 5a 58 90 d3 a1 d2 10 ad 1b e6 bc 21 77 b8 3d 9e f5 e8 b0 13 74 3c 31 ed ed d2 f5 29 66 6e 1f f4 8e ec 37 49 cd a8 88 5d 5b 9f f1 8e a8 ae RSN: encrypted key data - hexdump(len=104): 3f 46 0e 4d 49 8a 0b b3 bc 7f 1a e3 1e 95 6f a9 05 3f 86 a5 c3 68 41 f6 d2 41 39 d9 a1 83 75 aa 9e 4f 07 f3 a8 74 15 30 09 37 64 21 e7 d0 6a 81 e1 45 7d 55 fd 22 8f 03 d5 9e 5a 58 90 d3 a1 d2 10 ad 1b e6 bc 21 77 b8 3d 9e f5 e8 b0 13 74 3c 31 ed ed d2 f5 29 66 6e 1f f4 8e ec 37 49 cd a8 88 5d 5b 9f f1 8e a8 ae WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 56 2b 9f ae f6 f5 af 67 b1 76 ad c3 f6 d3 1d 23 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1526 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 45 79 13 f7 60 2d e9 2a 05 ac c4 95 c6 81 c4 13 c6 ba 19 68 b1 c9 9b 95 45 a3 32 82 e5 8f ab 9a WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 45 79 13 f7 60 2d e9 2a 05 ac c4 95 c6 81 c4 13 c6 ba 19 68 b1 c9 9b 95 45 a3 32 82 e5 8f ab 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 d5 d6 9e 11 21 b8 20 49 a3 2d 2d 68 3b d3 a7 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 02 18 01 9f 87 79 f9 1b 12 8e 29 cd 30 08 c7 00 68 55 86 24 3e 7f 7f f0 c5 f5 be 16 33 cc 52 c4 07 e0 35 ea b8 f2 8e 04 1d 4a 71 50 9b 85 9e 0c ae 9f d2 47 87 cd f9 5b 0c f1 9c 8c 75 b8 4b 9e 2f d6 09 6b 14 5d d7 e2 74 6d 9b 77 25 69 1d ee 26 68 13 ef c3 d4 b9 0b 6f f4 35 5b aa 9c 0b 97 3b be 84 2a 06 04 c0 27 6a 41 17 d9 52 e5 fc b2 94 61 b6 40 a1 21 41 40 4c IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 33 02 18 01 9f 87 79 f9 1b 12 8e 29 cd 30 08 c7 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 02 18 01 9f 87 79 f9 1b 12 8e 29 cd 30 08 c7 00 68 55 86 24 3e 7f 7f f0 c5 f5 be 16 33 cc 52 c4 07 e0 35 ea b8 f2 8e 04 1d 4a 71 50 9b 85 9e 0c ae 9f d2 47 87 cd f9 5b 0c f1 9c 8c 75 b8 4b 9e 2f d6 09 6b 14 5d d7 e2 74 6d 9b 77 25 69 1d ee 26 68 13 ef c3 d4 b9 0b 6f f4 35 5b aa 9c 0b 97 3b be 84 2a 06 04 c0 27 6a 41 17 d9 52 e5 fc b2 94 61 b6 40 a1 21 41 40 4c RSN: encrypted key data - hexdump(len=104): 55 86 24 3e 7f 7f f0 c5 f5 be 16 33 cc 52 c4 07 e0 35 ea b8 f2 8e 04 1d 4a 71 50 9b 85 9e 0c ae 9f d2 47 87 cd f9 5b 0c f1 9c 8c 75 b8 4b 9e 2f d6 09 6b 14 5d d7 e2 74 6d 9b 77 25 69 1d ee 26 68 13 ef c3 d4 b9 0b 6f f4 35 5b aa 9c 0b 97 3b be 84 2a 06 04 c0 27 6a 41 17 d9 52 e5 fc b2 94 61 b6 40 a1 21 41 40 4c WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 54 bd 18 a6 a7 df f0 d9 ff 7f 72 33 f4 0e 8b 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 95 42 ed 8b 3c 39 a1 95 f2 41 ef 38 4d d9 14 5f d5 93 e2 ef f4 7f 18 0f 50 70 5c 08 10 60 2b 5c WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 95 42 ed 8b 3c 39 a1 95 f2 41 ef 38 4d d9 14 5f d5 93 e2 ef f4 7f 18 0f 50 70 5c 08 10 60 2b 5c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 56 75 db 76 c6 8d 4e 5a 29 2d 22 8a ec e7 bc 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 ea 0e 66 f3 f1 ff a7 9b 59 82 f1 2f 48 dc 8f 00 68 b1 f3 6a e1 ba c2 e2 78 b4 8b 7a e8 a5 67 40 68 d4 09 eb 07 b7 5b 54 af c2 b2 46 73 d3 8b 02 37 7b 14 61 a0 23 21 31 41 c6 95 1d aa 72 72 5c 27 c0 a8 8c 06 66 6a c5 78 6d fa 28 ba f5 18 bd ed fd 12 5c 4d dd bd 99 20 09 ab 4f 3f 2a 99 8d 04 33 66 32 de 03 17 f5 45 c1 87 47 c7 2e f1 ec 37 9d 56 3e d6 09 41 a6 c5 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 60 ea 0e 66 f3 f1 ff a7 9b 59 82 f1 2f 48 dc 8f WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 ea 0e 66 f3 f1 ff a7 9b 59 82 f1 2f 48 dc 8f 00 68 b1 f3 6a e1 ba c2 e2 78 b4 8b 7a e8 a5 67 40 68 d4 09 eb 07 b7 5b 54 af c2 b2 46 73 d3 8b 02 37 7b 14 61 a0 23 21 31 41 c6 95 1d aa 72 72 5c 27 c0 a8 8c 06 66 6a c5 78 6d fa 28 ba f5 18 bd ed fd 12 5c 4d dd bd 99 20 09 ab 4f 3f 2a 99 8d 04 33 66 32 de 03 17 f5 45 c1 87 47 c7 2e f1 ec 37 9d 56 3e d6 09 41 a6 c5 RSN: encrypted key data - hexdump(len=104): b1 f3 6a e1 ba c2 e2 78 b4 8b 7a e8 a5 67 40 68 d4 09 eb 07 b7 5b 54 af c2 b2 46 73 d3 8b 02 37 7b 14 61 a0 23 21 31 41 c6 95 1d aa 72 72 5c 27 c0 a8 8c 06 66 6a c5 78 6d fa 28 ba f5 18 bd ed fd 12 5c 4d dd bd 99 20 09 ab 4f 3f 2a 99 8d 04 33 66 32 de 03 17 f5 45 c1 87 47 c7 2e f1 ec 37 9d 56 3e d6 09 41 a6 c5 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8e b7 e5 21 45 1f 3c 57 d8 ea 2b b5 0f b4 0b 72 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 df 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e0 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): ba 3b 4d 7f af 13 8f 18 7f e5 bb 85 32 1c 35 17 6f e4 38 d0 98 2e 50 2d 68 6e fa fa 67 13 7b 94 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ba 3b 4d 7f af 13 8f 18 7f e5 bb 85 32 1c 35 17 6f e4 38 d0 98 2e 50 2d 68 6e fa fa 67 13 7b 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 38 81 7d b6 2b af 16 51 70 9c e7 98 c3 e3 1e 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): de 02 f5 a2 a2 eb 9a d9 2b 7c 57 2e 6b 09 09 6e d2 f4 06 8f 09 69 44 99 56 df e2 da c7 bd d1 31 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 de 02 f5 a2 a2 eb 9a d9 2b 7c 57 2e 6b 09 09 6e d2 f4 06 8f 09 69 44 99 56 df e2 da c7 bd d1 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 c2 44 78 ee f7 fe d8 4c 04 93 cf 56 78 0b 3e 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 3b 06 4c 0c 83 dd 02 08 b9 28 60 85 15 a4 c2 00 68 67 49 ab 8d 71 bb c4 fc 36 76 a1 ec 23 97 d8 c8 c1 8c e8 03 8b 91 e2 62 de 12 df 65 68 26 1e d3 fb 92 12 be 1f 65 12 7e 08 19 f6 82 76 ab dc 27 c8 77 87 74 9c 91 f7 9c 8e 78 fd 2f 48 d0 a9 77 a4 9e d4 ff 11 12 78 a5 6f de b9 6c 48 32 78 7c 76 fb e3 6c 5a 49 87 b2 65 00 7e 8d 47 9f 01 4b 97 27 11 6d 32 bd 2a 21 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 27 3b 06 4c 0c 83 dd 02 08 b9 28 60 85 15 a4 c2 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 3b 06 4c 0c 83 dd 02 08 b9 28 60 85 15 a4 c2 00 68 67 49 ab 8d 71 bb c4 fc 36 76 a1 ec 23 97 d8 c8 c1 8c e8 03 8b 91 e2 62 de 12 df 65 68 26 1e d3 fb 92 12 be 1f 65 12 7e 08 19 f6 82 76 ab dc 27 c8 77 87 74 9c 91 f7 9c 8e 78 fd 2f 48 d0 a9 77 a4 9e d4 ff 11 12 78 a5 6f de b9 6c 48 32 78 7c 76 fb e3 6c 5a 49 87 b2 65 00 7e 8d 47 9f 01 4b 97 27 11 6d 32 bd 2a 21 RSN: encrypted key data - hexdump(len=104): 67 49 ab 8d 71 bb c4 fc 36 76 a1 ec 23 97 d8 c8 c1 8c e8 03 8b 91 e2 62 de 12 df 65 68 26 1e d3 fb 92 12 be 1f 65 12 7e 08 19 f6 82 76 ab dc 27 c8 77 87 74 9c 91 f7 9c 8e 78 fd 2f 48 d0 a9 77 a4 9e d4 ff 11 12 78 a5 6f de b9 6c 48 32 78 7c 76 fb e3 6c 5a 49 87 b2 65 00 7e 8d 47 9f 01 4b 97 27 11 6d 32 bd 2a 21 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fb ee f1 35 c9 3d c6 32 2b 1e 09 61 a8 00 45 3d 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): dc c1 92 96 2b 4e be 6a 10 7f 0e f9 63 9e a1 e7 3d 69 b9 b5 9a 4f 22 db 17 2e 42 1e 68 ad 0c 87 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 dc c1 92 96 2b 4e be 6a 10 7f 0e f9 63 9e a1 e7 3d 69 b9 b5 9a 4f 22 db 17 2e 42 1e 68 ad 0c 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 c9 15 d1 fc ff 24 02 f6 f0 9c a0 59 26 78 bc 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 89 ce 07 15 b0 52 22 9f 8d fa 35 de 28 53 75 00 68 b8 db 34 ec 26 d7 8b 7f 3d a9 51 ea 22 2e 98 12 3a 42 d3 c3 ad c0 8d 8e fa 0f 2a 27 97 cc e7 ff 38 04 a3 2d 01 05 b0 26 01 88 7c 43 f3 5b 0e a0 f5 6a 64 a7 5a cc a0 6c 9d 09 ba 57 d6 28 bb ec e7 43 f0 98 6a fa be f6 4f d6 6e 2a 0a 97 d1 db 8e 51 82 7d b3 cd d7 03 ff cd 3d 12 2e 5c 3e 5d db 6b 73 40 2c 7b 94 29 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): eb 89 ce 07 15 b0 52 22 9f 8d fa 35 de 28 53 75 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 89 ce 07 15 b0 52 22 9f 8d fa 35 de 28 53 75 00 68 b8 db 34 ec 26 d7 8b 7f 3d a9 51 ea 22 2e 98 12 3a 42 d3 c3 ad c0 8d 8e fa 0f 2a 27 97 cc e7 ff 38 04 a3 2d 01 05 b0 26 01 88 7c 43 f3 5b 0e a0 f5 6a 64 a7 5a cc a0 6c 9d 09 ba 57 d6 28 bb ec e7 43 f0 98 6a fa be f6 4f d6 6e 2a 0a 97 d1 db 8e 51 82 7d b3 cd d7 03 ff cd 3d 12 2e 5c 3e 5d db 6b 73 40 2c 7b 94 29 RSN: encrypted key data - hexdump(len=104): b8 db 34 ec 26 d7 8b 7f 3d a9 51 ea 22 2e 98 12 3a 42 d3 c3 ad c0 8d 8e fa 0f 2a 27 97 cc e7 ff 38 04 a3 2d 01 05 b0 26 01 88 7c 43 f3 5b 0e a0 f5 6a 64 a7 5a cc a0 6c 9d 09 ba 57 d6 28 bb ec e7 43 f0 98 6a fa be f6 4f d6 6e 2a 0a 97 d1 db 8e 51 82 7d b3 cd d7 03 ff cd 3d 12 2e 5c 3e 5d db 6b 73 40 2c 7b 94 29 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 27 0d ff db 0d 63 6f bf 82 88 a2 9b 56 13 94 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1526 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 9c 01 e0 4c 67 9c a8 17 c0 13 d7 a0 72 34 e4 3d 6c d9 67 ed 2b 04 80 c6 3e 5e a3 20 6d 61 eb 0e WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 9c 01 e0 4c 67 9c a8 17 c0 13 d7 a0 72 34 e4 3d 6c d9 67 ed 2b 04 80 c6 3e 5e a3 20 6d 61 eb 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 2f 3f 2a a4 be c7 6c 92 77 0e ef b1 02 f9 f4 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 67 5d f8 c6 ce 0f 61 c4 74 09 00 ee 5a 5b 81 00 68 a1 03 0b b0 9d 2b 4e 27 9e 09 54 ab cc 4f a6 da 8c dd dc 4d 7d 77 79 83 03 09 ff 79 1c 6c 49 d1 b5 ac 2a f3 89 77 dc ad 33 7f 2c 94 d2 cf f7 37 91 9c 2b f0 f2 4a 0f 8a e0 2e 80 13 0c 90 92 10 8a a5 01 9b e9 ea b2 52 5f b4 bf ed bb cb ed 48 e7 51 84 b1 18 e1 6f 0e 74 ed c3 29 00 20 7a c8 ce 41 c4 2e d8 c2 2e 55 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 6c 67 5d f8 c6 ce 0f 61 c4 74 09 00 ee 5a 5b 81 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 67 5d f8 c6 ce 0f 61 c4 74 09 00 ee 5a 5b 81 00 68 a1 03 0b b0 9d 2b 4e 27 9e 09 54 ab cc 4f a6 da 8c dd dc 4d 7d 77 79 83 03 09 ff 79 1c 6c 49 d1 b5 ac 2a f3 89 77 dc ad 33 7f 2c 94 d2 cf f7 37 91 9c 2b f0 f2 4a 0f 8a e0 2e 80 13 0c 90 92 10 8a a5 01 9b e9 ea b2 52 5f b4 bf ed bb cb ed 48 e7 51 84 b1 18 e1 6f 0e 74 ed c3 29 00 20 7a c8 ce 41 c4 2e d8 c2 2e 55 RSN: encrypted key data - hexdump(len=104): a1 03 0b b0 9d 2b 4e 27 9e 09 54 ab cc 4f a6 da 8c dd dc 4d 7d 77 79 83 03 09 ff 79 1c 6c 49 d1 b5 ac 2a f3 89 77 dc ad 33 7f 2c 94 d2 cf f7 37 91 9c 2b f0 f2 4a 0f 8a e0 2e 80 13 0c 90 92 10 8a a5 01 9b e9 ea b2 52 5f b4 bf ed bb cb ed 48 e7 51 84 b1 18 e1 6f 0e 74 ed c3 29 00 20 7a c8 ce 41 c4 2e d8 c2 2e 55 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9d bb fe d7 3d 6d 98 f9 2e 24 b5 6e e1 d7 1b 88 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 8c 3d a9 e9 01 bb 4b 9f 59 da 50 44 3d 68 8e 91 5b 79 d5 c8 ae 2d 50 e0 45 87 df ea cf f6 e9 19 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 8c 3d a9 e9 01 bb 4b 9f 59 da 50 44 3d 68 8e 91 5b 79 d5 c8 ae 2d 50 e0 45 87 df ea cf f6 e9 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 cc 3f 25 ab 6d 5a 4c ad 8b eb d4 61 7e c9 d3 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 70 06 54 17 7c 5f b6 45 48 66 73 ae 7c 70 4f 00 68 5d 49 32 76 bd f5 ee d4 4c 9d bf ab b4 19 26 b8 aa 79 64 b4 d1 d5 0f 92 d0 0d 2c 38 cd e7 a8 69 dc aa d0 67 5d d4 fe 99 9c 2c 73 ab 19 46 bf a2 d4 01 c2 3b 19 69 a5 7e 46 7a 19 f1 17 79 f2 e8 35 0c 64 45 de a2 3a 24 f4 b3 3b 3f 6c 14 4b ed 60 87 64 a0 c0 25 a5 9a f1 01 96 6d bd 1c d7 29 5d d7 1d e7 2a cd ec 51 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 0d 70 06 54 17 7c 5f b6 45 48 66 73 ae 7c 70 4f WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 70 06 54 17 7c 5f b6 45 48 66 73 ae 7c 70 4f 00 68 5d 49 32 76 bd f5 ee d4 4c 9d bf ab b4 19 26 b8 aa 79 64 b4 d1 d5 0f 92 d0 0d 2c 38 cd e7 a8 69 dc aa d0 67 5d d4 fe 99 9c 2c 73 ab 19 46 bf a2 d4 01 c2 3b 19 69 a5 7e 46 7a 19 f1 17 79 f2 e8 35 0c 64 45 de a2 3a 24 f4 b3 3b 3f 6c 14 4b ed 60 87 64 a0 c0 25 a5 9a f1 01 96 6d bd 1c d7 29 5d d7 1d e7 2a cd ec 51 RSN: encrypted key data - hexdump(len=104): 5d 49 32 76 bd f5 ee d4 4c 9d bf ab b4 19 26 b8 aa 79 64 b4 d1 d5 0f 92 d0 0d 2c 38 cd e7 a8 69 dc aa d0 67 5d d4 fe 99 9c 2c 73 ab 19 46 bf a2 d4 01 c2 3b 19 69 a5 7e 46 7a 19 f1 17 79 f2 e8 35 0c 64 45 de a2 3a 24 f4 b3 3b 3f 6c 14 4b ed 60 87 64 a0 c0 25 a5 9a f1 01 96 6d bd 1c d7 29 5d d7 1d e7 2a cd ec 51 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ee 60 fb 53 53 96 22 5b 1e 14 e8 ff 69 9c ec a7 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): a2 b6 6b a8 cc 4b b1 96 ee 43 53 a3 ae 7c e3 2a 3e fb d7 f9 6c e6 71 e0 d7 e9 db 45 d0 36 cf 1d WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 a2 b6 6b a8 cc 4b b1 96 ee 43 53 a3 ae 7c e3 2a 3e fb d7 f9 6c e6 71 e0 d7 e9 db 45 d0 36 cf 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 b5 49 ac 35 b4 b3 db f8 63 0c 88 69 6a 09 1c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b f0 e4 3a 53 4d a6 cf 23 ec f2 56 38 de cd 6b 00 68 d4 47 fe 4a d9 29 da bb 8d 3b 71 65 16 ba 04 7f 67 cc 9b 62 a8 e8 e4 4d ca 30 13 6f 11 f1 5f 8e d4 66 a3 07 98 0a 84 22 25 d3 51 8f 3a 19 f0 c1 a1 64 f0 89 9f 83 eb db a8 68 29 69 e5 55 03 e0 cb 4f da 31 43 8a 36 34 0c 99 47 b8 e4 2c ff 22 7b c3 83 77 58 17 3f aa 01 26 35 c3 7e ad 7c 0a b9 f0 00 bb 51 5c da 87 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 7b f0 e4 3a 53 4d a6 cf 23 ec f2 56 38 de cd 6b WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b f0 e4 3a 53 4d a6 cf 23 ec f2 56 38 de cd 6b 00 68 d4 47 fe 4a d9 29 da bb 8d 3b 71 65 16 ba 04 7f 67 cc 9b 62 a8 e8 e4 4d ca 30 13 6f 11 f1 5f 8e d4 66 a3 07 98 0a 84 22 25 d3 51 8f 3a 19 f0 c1 a1 64 f0 89 9f 83 eb db a8 68 29 69 e5 55 03 e0 cb 4f da 31 43 8a 36 34 0c 99 47 b8 e4 2c ff 22 7b c3 83 77 58 17 3f aa 01 26 35 c3 7e ad 7c 0a b9 f0 00 bb 51 5c da 87 RSN: encrypted key data - hexdump(len=104): d4 47 fe 4a d9 29 da bb 8d 3b 71 65 16 ba 04 7f 67 cc 9b 62 a8 e8 e4 4d ca 30 13 6f 11 f1 5f 8e d4 66 a3 07 98 0a 84 22 25 d3 51 8f 3a 19 f0 c1 a1 64 f0 89 9f 83 eb db a8 68 29 69 e5 55 03 e0 cb 4f da 31 43 8a 36 34 0c 99 47 b8 e4 2c ff 22 7b c3 83 77 58 17 3f aa 01 26 35 c3 7e ad 7c 0a b9 f0 00 bb 51 5c da 87 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6e 0d b6 53 35 59 c7 6c 0b 52 a4 a0 e5 25 8f 4a 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e6 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 00 06 59 2d 0e 25 56 b6 4c 74 26 6c 5b ab 60 ca c7 a8 f2 6f 28 21 17 2a 01 39 b4 d3 66 0d 74 34 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 00 06 59 2d 0e 25 56 b6 4c 74 26 6c 5b ab 60 ca c7 a8 f2 6f 28 21 17 2a 01 39 b4 d3 66 0d 74 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 53 f6 c9 7b c5 3b 54 fd 1f e8 bb 49 59 73 df 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1526 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): b2 76 55 16 37 b3 8d 52 1e a6 72 af 07 c1 5f 02 f9 6d a1 f7 44 ef b5 87 d8 c2 46 00 17 02 6d 67 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 b2 76 55 16 37 b3 8d 52 1e a6 72 af 07 c1 5f 02 f9 6d a1 f7 44 ef b5 87 d8 c2 46 00 17 02 6d 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 15 7c f2 d6 2c 07 3b eb 02 94 af b8 49 26 36 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 91 62 c1 13 25 f8 ac d6 a9 0a aa c2 fa b6 45 84 00 68 2e 75 94 3a c2 b2 6d f4 14 0a 09 5a 7a 91 86 1b 81 3d 20 1f 2e 59 1c db fa 04 9b f2 05 14 c8 93 1f e1 d8 22 25 6b 0e 1f 89 86 96 f7 52 76 a6 c0 b2 08 d1 21 f8 d7 aa 48 c5 64 32 f8 15 be 55 bb 71 3f 35 60 23 eb 1a 66 f8 e6 cc 1a af 64 84 c7 66 8d 5b 7b f2 51 d7 ca 53 d0 3a 63 0f e4 16 b0 92 ec 39 92 e5 79 33 50 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 91 62 c1 13 25 f8 ac d6 a9 0a aa c2 fa b6 45 84 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 91 62 c1 13 25 f8 ac d6 a9 0a aa c2 fa b6 45 84 00 68 2e 75 94 3a c2 b2 6d f4 14 0a 09 5a 7a 91 86 1b 81 3d 20 1f 2e 59 1c db fa 04 9b f2 05 14 c8 93 1f e1 d8 22 25 6b 0e 1f 89 86 96 f7 52 76 a6 c0 b2 08 d1 21 f8 d7 aa 48 c5 64 32 f8 15 be 55 bb 71 3f 35 60 23 eb 1a 66 f8 e6 cc 1a af 64 84 c7 66 8d 5b 7b f2 51 d7 ca 53 d0 3a 63 0f e4 16 b0 92 ec 39 92 e5 79 33 50 RSN: encrypted key data - hexdump(len=104): 2e 75 94 3a c2 b2 6d f4 14 0a 09 5a 7a 91 86 1b 81 3d 20 1f 2e 59 1c db fa 04 9b f2 05 14 c8 93 1f e1 d8 22 25 6b 0e 1f 89 86 96 f7 52 76 a6 c0 b2 08 d1 21 f8 d7 aa 48 c5 64 32 f8 15 be 55 bb 71 3f 35 60 23 eb 1a 66 f8 e6 cc 1a af 64 84 c7 66 8d 5b 7b f2 51 d7 ca 53 d0 3a 63 0f e4 16 b0 92 ec 39 92 e5 79 33 50 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e a0 01 02 25 91 1f e7 67 10 aa 2d f2 dd 64 f0 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): ba 34 52 83 4f c7 b5 31 53 a2 76 2e 00 06 02 82 5f e7 56 8b 1d 5b fb 24 d1 2d ec 26 98 29 98 82 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ba 34 52 83 4f c7 b5 31 53 a2 76 2e 00 06 02 82 5f e7 56 8b 1d 5b fb 24 d1 2d ec 26 98 29 98 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db 33 b8 d2 02 7a cc aa 73 8c 3c b5 b5 c4 bd fc 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a4 fa c2 15 08 0a 13 e0 8a 2c 72 c3 68 0d 7a 68 00 68 36 8e cc a9 b0 bb f3 b3 9f fa 35 83 05 4c 22 c8 2e de d9 37 df be 95 ff fa c5 48 36 0e 6e 65 06 28 cd 29 3a 68 12 1d d0 e8 5f f0 8e be 8c 18 67 02 ba 26 1a 7d 98 fe e1 2a 38 f9 46 48 f4 ab 7a 7c 8d 86 11 84 98 f7 48 eb fd b2 ae c4 0d 77 1e f6 33 72 f4 c8 84 23 df f0 71 b7 91 fc 43 eb c3 de b2 fd e1 ec 99 40 07 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): a4 fa c2 15 08 0a 13 e0 8a 2c 72 c3 68 0d 7a 68 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a4 fa c2 15 08 0a 13 e0 8a 2c 72 c3 68 0d 7a 68 00 68 36 8e cc a9 b0 bb f3 b3 9f fa 35 83 05 4c 22 c8 2e de d9 37 df be 95 ff fa c5 48 36 0e 6e 65 06 28 cd 29 3a 68 12 1d d0 e8 5f f0 8e be 8c 18 67 02 ba 26 1a 7d 98 fe e1 2a 38 f9 46 48 f4 ab 7a 7c 8d 86 11 84 98 f7 48 eb fd b2 ae c4 0d 77 1e f6 33 72 f4 c8 84 23 df f0 71 b7 91 fc 43 eb c3 de b2 fd e1 ec 99 40 07 RSN: encrypted key data - hexdump(len=104): 36 8e cc a9 b0 bb f3 b3 9f fa 35 83 05 4c 22 c8 2e de d9 37 df be 95 ff fa c5 48 36 0e 6e 65 06 28 cd 29 3a 68 12 1d d0 e8 5f f0 8e be 8c 18 67 02 ba 26 1a 7d 98 fe e1 2a 38 f9 46 48 f4 ab 7a 7c 8d 86 11 84 98 f7 48 eb fd b2 ae c4 0d 77 1e f6 33 72 f4 c8 84 23 df f0 71 b7 91 fc 43 eb c3 de b2 fd e1 ec 99 40 07 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 89 cf 31 46 59 35 ec a2 f4 13 9f f6 ca ee 65 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e9 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 e9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 17 ad 94 24 4b 17 76 55 54 2f 25 d4 5d 54 d4 08 39 3d b8 b6 4e d3 cc 29 0c 32 44 23 82 6e 2f 0a WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 17 ad 94 24 4b 17 76 55 54 2f 25 d4 5d 54 d4 08 39 3d b8 b6 4e d3 cc 29 0c 32 44 23 82 6e 2f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c2 9b de 7c 7b d6 c1 3f 9b fc 0b 1c ec f8 62 8f 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 31 ea d9 92 0f 34 11 01 37 08 fe 81 bf 54 c4 d8 02 f5 fc 6b 07 f3 95 06 30 1a 1c f5 dc 7a 04 6a WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 31 ea d9 92 0f 34 11 01 37 08 fe 81 bf 54 c4 d8 02 f5 fc 6b 07 f3 95 06 30 1a 1c f5 dc 7a 04 6a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 ea 34 13 39 07 a6 99 fc 25 4f 60 20 ec 0a 0f 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 43 b2 00 34 b2 28 47 74 06 9d 89 23 b8 67 77 00 68 56 dd 49 2b 08 22 c4 cb c2 86 80 d3 c6 d5 67 99 0b f8 25 cb b2 0b 68 21 fb 14 d1 d7 98 e1 52 c4 20 fd bd 7e b4 ee b7 18 70 58 96 a6 71 25 65 bb 53 bb b7 4c 66 8a c4 6c d5 e2 3b 41 04 37 dd d0 e0 cd c3 77 65 9a 5b 6a f5 ae c1 67 27 5f 28 4e 35 6d 6b 86 3c 06 23 66 b3 34 25 0a 7f 91 c0 e7 de fe 72 c2 f4 9a 35 b5 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 46 43 b2 00 34 b2 28 47 74 06 9d 89 23 b8 67 77 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 43 b2 00 34 b2 28 47 74 06 9d 89 23 b8 67 77 00 68 56 dd 49 2b 08 22 c4 cb c2 86 80 d3 c6 d5 67 99 0b f8 25 cb b2 0b 68 21 fb 14 d1 d7 98 e1 52 c4 20 fd bd 7e b4 ee b7 18 70 58 96 a6 71 25 65 bb 53 bb b7 4c 66 8a c4 6c d5 e2 3b 41 04 37 dd d0 e0 cd c3 77 65 9a 5b 6a f5 ae c1 67 27 5f 28 4e 35 6d 6b 86 3c 06 23 66 b3 34 25 0a 7f 91 c0 e7 de fe 72 c2 f4 9a 35 b5 RSN: encrypted key data - hexdump(len=104): 56 dd 49 2b 08 22 c4 cb c2 86 80 d3 c6 d5 67 99 0b f8 25 cb b2 0b 68 21 fb 14 d1 d7 98 e1 52 c4 20 fd bd 7e b4 ee b7 18 70 58 96 a6 71 25 65 bb 53 bb b7 4c 66 8a c4 6c d5 e2 3b 41 04 37 dd d0 e0 cd c3 77 65 9a 5b 6a f5 ae c1 67 27 5f 28 4e 35 6d 6b 86 3c 06 23 66 b3 34 25 0a 7f 91 c0 e7 de fe 72 c2 f4 9a 35 b5 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 5b 6a 17 34 3c 1a 62 ea ac 18 a4 b3 10 8d 48 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 eb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 eb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 eb key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 eb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 53 d0 8c 45 cb 5d 2c 2c 25 97 5c 47 df 02 f5 8b a2 98 e1 e1 44 48 1a d6 d7 8d bb e1 87 89 f5 90 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 53 d0 8c 45 cb 5d 2c 2c 25 97 5c 47 df 02 f5 8b a2 98 e1 e1 44 48 1a d6 d7 8d bb e1 87 89 f5 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 95 15 ad 47 af 74 b9 eb 6e 4d 61 48 50 3a ce 03 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1528 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): c4 a3 dc fa 0f c8 b4 22 b9 11 25 e1 e6 c4 35 66 f9 7b 91 19 1d 32 8b 02 28 dd 50 18 a2 6d 32 ce WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 c4 a3 dc fa 0f c8 b4 22 b9 11 25 e1 e6 c4 35 66 f9 7b 91 19 1d 32 8b 02 28 dd 50 18 a2 6d 32 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 8c 48 a9 68 ca 7e e5 c4 dd 66 53 81 c3 be c8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ee 32 e5 76 9d 75 c5 28 1c 1f ef 22 64 48 55 eb 00 68 e4 28 bc 16 04 51 95 d5 8b 06 60 36 d9 45 86 75 ae 79 ef d4 10 c8 07 8f 85 c3 af 46 63 6e ef 91 2d bd 7b 4f 7d 12 08 b3 f4 8f 12 64 6a 28 ea b3 e8 ff 2b 5c c0 2a 73 20 00 0b 3f 55 bc b5 8d 62 93 40 e2 1a ea 2a 98 08 65 a2 bd cb 3a d5 18 8a a7 23 ce 32 97 a6 46 d9 3e 0f 90 44 a0 ad df c8 90 b6 25 67 81 90 ea 4a IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ee 32 e5 76 9d 75 c5 28 1c 1f ef 22 64 48 55 eb WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ee 32 e5 76 9d 75 c5 28 1c 1f ef 22 64 48 55 eb 00 68 e4 28 bc 16 04 51 95 d5 8b 06 60 36 d9 45 86 75 ae 79 ef d4 10 c8 07 8f 85 c3 af 46 63 6e ef 91 2d bd 7b 4f 7d 12 08 b3 f4 8f 12 64 6a 28 ea b3 e8 ff 2b 5c c0 2a 73 20 00 0b 3f 55 bc b5 8d 62 93 40 e2 1a ea 2a 98 08 65 a2 bd cb 3a d5 18 8a a7 23 ce 32 97 a6 46 d9 3e 0f 90 44 a0 ad df c8 90 b6 25 67 81 90 ea 4a RSN: encrypted key data - hexdump(len=104): e4 28 bc 16 04 51 95 d5 8b 06 60 36 d9 45 86 75 ae 79 ef d4 10 c8 07 8f 85 c3 af 46 63 6e ef 91 2d bd 7b 4f 7d 12 08 b3 f4 8f 12 64 6a 28 ea b3 e8 ff 2b 5c c0 2a 73 20 00 0b 3f 55 bc b5 8d 62 93 40 e2 1a ea 2a 98 08 65 a2 bd cb 3a d5 18 8a a7 23 ce 32 97 a6 46 d9 3e 0f 90 44 a0 ad df c8 90 b6 25 67 81 90 ea 4a WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 f2 20 9e 8d b6 1a cc 13 39 84 d4 6e 52 ea ab 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 0c 75 8f 58 a8 b8 d1 f2 4e c6 50 df 91 fb 58 00 a7 07 4f 0e 69 30 d2 39 bd ca 33 4c 4a 51 86 db WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 0c 75 8f 58 a8 b8 d1 f2 4e c6 50 df 91 fb 58 00 a7 07 4f 0e 69 30 d2 39 bd ca 33 4c 4a 51 86 db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 05 b2 f4 5a 51 f1 48 39 5f 7e 5b a7 05 73 43 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 73 7c 91 8b e5 3c f7 f7 fb 34 80 14 3d f2 84 00 68 18 2c 93 ef fa 25 ba 82 ef f2 8e a3 ac 43 d9 af c3 59 cd 04 5c 13 de 20 0f 60 4c da d8 f1 90 f2 b3 8f ce 1b 9e 41 0f 6a d1 9d 52 23 9e 3e 6b 1d 9e 48 12 31 ca 6d 49 51 d7 25 0a cd a3 d5 31 71 36 59 74 65 eb 0c 5d 83 b1 bc 48 bf b5 1d 44 70 f9 1b c2 3f d2 17 c7 3a 9d f0 9c 10 cf 9c ef 94 f0 53 a8 74 ce a6 e6 e2 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 55 73 7c 91 8b e5 3c f7 f7 fb 34 80 14 3d f2 84 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ee 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 73 7c 91 8b e5 3c f7 f7 fb 34 80 14 3d f2 84 00 68 18 2c 93 ef fa 25 ba 82 ef f2 8e a3 ac 43 d9 af c3 59 cd 04 5c 13 de 20 0f 60 4c da d8 f1 90 f2 b3 8f ce 1b 9e 41 0f 6a d1 9d 52 23 9e 3e 6b 1d 9e 48 12 31 ca 6d 49 51 d7 25 0a cd a3 d5 31 71 36 59 74 65 eb 0c 5d 83 b1 bc 48 bf b5 1d 44 70 f9 1b c2 3f d2 17 c7 3a 9d f0 9c 10 cf 9c ef 94 f0 53 a8 74 ce a6 e6 e2 RSN: encrypted key data - hexdump(len=104): 18 2c 93 ef fa 25 ba 82 ef f2 8e a3 ac 43 d9 af c3 59 cd 04 5c 13 de 20 0f 60 4c da d8 f1 90 f2 b3 8f ce 1b 9e 41 0f 6a d1 9d 52 23 9e 3e 6b 1d 9e 48 12 31 ca 6d 49 51 d7 25 0a cd a3 d5 31 71 36 59 74 65 eb 0c 5d 83 b1 bc 48 bf b5 1d 44 70 f9 1b c2 3f d2 17 c7 3a 9d f0 9c 10 cf 9c ef 94 f0 53 a8 74 ce a6 e6 e2 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 dd 1a 42 1a a8 f0 8a c5 8d 9f 33 d3 97 5a e7 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 91 28 85 da df 67 6c ca 9e 0d 01 31 05 59 93 72 db bf 2d 87 7a f5 1d 3c 3f 70 95 59 43 e5 67 95 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 91 28 85 da df 67 6c ca 9e 0d 01 31 05 59 93 72 db bf 2d 87 7a f5 1d 3c 3f 70 95 59 43 e5 67 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d f9 e3 e1 75 f8 10 73 2e b1 ab c6 c4 3c cb 56 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 4b 8b 2b 34 45 6b 49 2a 76 5b 3b 5e 14 ce 4d 00 68 61 e1 93 f7 2b df 62 bf 95 cf ab a8 85 0c f4 e8 64 d3 0b 8d c8 62 da 58 c3 78 2b 43 83 35 62 98 12 0f 2b 32 6f 50 b1 b8 ad 80 22 c8 71 8a 40 9f f9 20 c4 40 ce c0 64 17 70 44 06 ce 28 fe d9 dd eb 61 42 f8 f8 8c ba 01 b9 77 d6 21 c3 3e a3 e3 e1 6c 28 6b db 92 81 77 26 b8 3a 43 15 df 96 a0 77 c5 36 50 2d 76 27 48 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): f4 4b 8b 2b 34 45 6b 49 2a 76 5b 3b 5e 14 ce 4d WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 4b 8b 2b 34 45 6b 49 2a 76 5b 3b 5e 14 ce 4d 00 68 61 e1 93 f7 2b df 62 bf 95 cf ab a8 85 0c f4 e8 64 d3 0b 8d c8 62 da 58 c3 78 2b 43 83 35 62 98 12 0f 2b 32 6f 50 b1 b8 ad 80 22 c8 71 8a 40 9f f9 20 c4 40 ce c0 64 17 70 44 06 ce 28 fe d9 dd eb 61 42 f8 f8 8c ba 01 b9 77 d6 21 c3 3e a3 e3 e1 6c 28 6b db 92 81 77 26 b8 3a 43 15 df 96 a0 77 c5 36 50 2d 76 27 48 RSN: encrypted key data - hexdump(len=104): 61 e1 93 f7 2b df 62 bf 95 cf ab a8 85 0c f4 e8 64 d3 0b 8d c8 62 da 58 c3 78 2b 43 83 35 62 98 12 0f 2b 32 6f 50 b1 b8 ad 80 22 c8 71 8a 40 9f f9 20 c4 40 ce c0 64 17 70 44 06 ce 28 fe d9 dd eb 61 42 f8 f8 8c ba 01 b9 77 d6 21 c3 3e a3 e3 e1 6c 28 6b db 92 81 77 26 b8 3a 43 15 df 96 a0 77 c5 36 50 2d 76 27 48 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 f3 ca b9 f1 be f2 e0 f7 7c a5 bd cc 42 97 a7 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1526 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): cb 63 40 4f d0 11 22 76 5c 6f cc d7 c9 e9 12 c6 b5 b2 6d 6d 0c cf d4 ea ed 04 e3 dd 81 5e 1b 03 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 cb 63 40 4f d0 11 22 76 5c 6f cc d7 c9 e9 12 c6 b5 b2 6d 6d 0c cf d4 ea ed 04 e3 dd 81 5e 1b 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 37 d6 fe 9d e3 f9 2a a2 73 5b f7 95 79 f2 e5 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 45 16 6f 6e fd 58 8d 04 d0 33 d9 00 f7 1b 97 00 68 60 a7 29 40 0b 14 76 fb fa f2 40 84 f3 02 c4 87 42 98 2b da e2 b9 39 51 1c 31 67 76 f9 de 85 e4 a5 9f 74 e4 24 a0 b5 cf 7b a6 da 1b 0c c0 ea b3 d8 32 a6 1b 3e 01 fd a9 6a 0e 54 f0 13 88 58 27 df 7e 0e 8e 97 7b 67 41 01 21 f6 ef dd 0e 26 20 7a a8 02 3c f1 3a 95 85 e6 e8 ab 3e 05 d5 20 a0 7d b6 3c da 7d f1 de 96 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 7f 45 16 6f 6e fd 58 8d 04 d0 33 d9 00 f7 1b 97 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 45 16 6f 6e fd 58 8d 04 d0 33 d9 00 f7 1b 97 00 68 60 a7 29 40 0b 14 76 fb fa f2 40 84 f3 02 c4 87 42 98 2b da e2 b9 39 51 1c 31 67 76 f9 de 85 e4 a5 9f 74 e4 24 a0 b5 cf 7b a6 da 1b 0c c0 ea b3 d8 32 a6 1b 3e 01 fd a9 6a 0e 54 f0 13 88 58 27 df 7e 0e 8e 97 7b 67 41 01 21 f6 ef dd 0e 26 20 7a a8 02 3c f1 3a 95 85 e6 e8 ab 3e 05 d5 20 a0 7d b6 3c da 7d f1 de 96 RSN: encrypted key data - hexdump(len=104): 60 a7 29 40 0b 14 76 fb fa f2 40 84 f3 02 c4 87 42 98 2b da e2 b9 39 51 1c 31 67 76 f9 de 85 e4 a5 9f 74 e4 24 a0 b5 cf 7b a6 da 1b 0c c0 ea b3 d8 32 a6 1b 3e 01 fd a9 6a 0e 54 f0 13 88 58 27 df 7e 0e 8e 97 7b 67 41 01 21 f6 ef dd 0e 26 20 7a a8 02 3c f1 3a 95 85 e6 e8 ab 3e 05 d5 20 a0 7d b6 3c da 7d f1 de 96 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 c4 ca 98 7d 41 da fb 79 bd b0 44 22 3c 1e a3 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f2 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 81 d4 07 47 62 51 ca 00 54 3d 0a d6 01 3a 3e 8b 27 a9 5e fa 48 0f f3 ec ef cd 56 d2 dd a8 a0 c8 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 81 d4 07 47 62 51 ca 00 54 3d 0a d6 01 3a 3e 8b 27 a9 5e fa 48 0f f3 ec ef cd 56 d2 dd a8 a0 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e 30 89 72 18 9f b7 fa 62 fd a9 cf c2 42 b3 a0 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1528 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: No SSID info found (msg 1 of 4). RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1528 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): ad ab dc 0e 95 f8 04 5e a8 0a 9c 72 f6 00 18 8f a7 f3 e5 2b 86 30 05 40 93 e4 1f f6 35 1f 47 11 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ad ab dc 0e 95 f8 04 5e a8 0a 9c 72 f6 00 18 8f a7 f3 e5 2b 86 30 05 40 93 e4 1f f6 35 1f 47 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 da 39 4a 06 62 68 00 ca 6e 98 86 02 48 4e 58 9b 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4b f5 5d a3 a4 64 75 1a 55 b5 ff 6e 73 7c 36 b8 00 68 de e0 d3 19 88 8d 69 c5 cd 25 44 d2 e5 d7 35 62 ef fb 3b 3d 72 29 ef 96 d0 f7 ea 76 0c 0a 77 17 11 ca df 7b 9c 23 a7 90 00 65 0d f4 33 81 5c 8b 62 32 5f c1 c9 b6 88 26 b8 c2 e8 af 65 ab d2 f8 92 84 ea f5 de 19 5e b0 f9 8a 7a 48 a0 f6 13 b3 7f fa 0d 62 ed f6 b5 96 31 1b af 1b 25 40 b4 1b a0 43 55 34 91 ff e3 77 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 4b f5 5d a3 a4 64 75 1a 55 b5 ff 6e 73 7c 36 b8 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4b f5 5d a3 a4 64 75 1a 55 b5 ff 6e 73 7c 36 b8 00 68 de e0 d3 19 88 8d 69 c5 cd 25 44 d2 e5 d7 35 62 ef fb 3b 3d 72 29 ef 96 d0 f7 ea 76 0c 0a 77 17 11 ca df 7b 9c 23 a7 90 00 65 0d f4 33 81 5c 8b 62 32 5f c1 c9 b6 88 26 b8 c2 e8 af 65 ab d2 f8 92 84 ea f5 de 19 5e b0 f9 8a 7a 48 a0 f6 13 b3 7f fa 0d 62 ed f6 b5 96 31 1b af 1b 25 40 b4 1b a0 43 55 34 91 ff e3 77 RSN: encrypted key data - hexdump(len=104): de e0 d3 19 88 8d 69 c5 cd 25 44 d2 e5 d7 35 62 ef fb 3b 3d 72 29 ef 96 d0 f7 ea 76 0c 0a 77 17 11 ca df 7b 9c 23 a7 90 00 65 0d f4 33 81 5c 8b 62 32 5f c1 c9 b6 88 26 b8 c2 e8 af 65 ab d2 f8 92 84 ea f5 de 19 5e b0 f9 8a 7a 48 a0 f6 13 b3 7f fa 0d 62 ed f6 b5 96 31 1b af 1b 25 40 b4 1b a0 43 55 34 91 ff e3 77 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 49 44 e4 5a 34 5b 25 ad dd c9 7c 40 78 5c b7 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1526 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 6c eb f6 2e 9b 47 12 d4 b6 97 58 6c 24 64 48 ab 54 2e c7 f1 bd 31 7e 9c 20 5e fd f1 a7 7b cd a9 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6c eb f6 2e 9b 47 12 d4 b6 97 58 6c 24 64 48 ab 54 2e c7 f1 bd 31 7e 9c 20 5e fd f1 a7 7b cd a9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c a9 cd c2 3a 29 38 fa 67 14 95 d4 88 f0 8d aa 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 30 21 27 5d ca b5 aa 34 66 bf 78 cc f7 e8 fd 00 68 3e f9 d6 2c 6e 63 6b 47 88 03 3c ba b1 4d 8d 1f e7 ed 10 00 0d 08 26 90 90 2d 1d c3 a7 cf 18 53 4a 90 ff 9d 36 7c 95 a8 e8 86 74 d1 37 cb 8b f2 e9 95 d5 de 47 e9 a0 5f 40 e0 e7 46 29 2c 6b 96 3b 41 a2 e9 81 be 6e ee 03 a4 9a 56 08 61 40 76 77 ad 7b 0f 95 9c db 0f 02 9e ed 16 97 db a4 e1 fe ae 3b 61 97 67 35 e2 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 46 30 21 27 5d ca b5 aa 34 66 bf 78 cc f7 e8 fd WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 30 21 27 5d ca b5 aa 34 66 bf 78 cc f7 e8 fd 00 68 3e f9 d6 2c 6e 63 6b 47 88 03 3c ba b1 4d 8d 1f e7 ed 10 00 0d 08 26 90 90 2d 1d c3 a7 cf 18 53 4a 90 ff 9d 36 7c 95 a8 e8 86 74 d1 37 cb 8b f2 e9 95 d5 de 47 e9 a0 5f 40 e0 e7 46 29 2c 6b 96 3b 41 a2 e9 81 be 6e ee 03 a4 9a 56 08 61 40 76 77 ad 7b 0f 95 9c db 0f 02 9e ed 16 97 db a4 e1 fe ae 3b 61 97 67 35 e2 RSN: encrypted key data - hexdump(len=104): 3e f9 d6 2c 6e 63 6b 47 88 03 3c ba b1 4d 8d 1f e7 ed 10 00 0d 08 26 90 90 2d 1d c3 a7 cf 18 53 4a 90 ff 9d 36 7c 95 a8 e8 86 74 d1 37 cb 8b f2 e9 95 d5 de 47 e9 a0 5f 40 e0 e7 46 29 2c 6b 96 3b 41 a2 e9 81 be 6e ee 03 a4 9a 56 08 61 40 76 77 ad 7b 0f 95 9c db 0f 02 9e ed 16 97 db a4 e1 fe ae 3b 61 97 67 35 e2 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1d db 90 79 06 3a 8b e5 ff 3f 2b a2 cc 7d a8 ef 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): fb 22 8e 96 ae b4 d3 fe 13 fb c3 f6 92 4b a9 eb 7f c1 43 bf 62 9d 14 60 91 bb 6e db 4b 72 4d 0c WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 fb 22 8e 96 ae b4 d3 fe 13 fb c3 f6 92 4b a9 eb 7f c1 43 bf 62 9d 14 60 91 bb 6e db 4b 72 4d 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 d9 c6 9b a6 bc 21 64 47 3b c1 19 df 87 24 fb 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e cd d2 31 77 e1 bf ef 59 59 ac 25 6a 12 d3 c8 00 68 b4 0c eb 82 f3 17 10 50 54 c2 84 21 41 d0 0e cc af a3 70 34 c7 0f e8 19 b8 c0 f3 59 47 b7 ae 1d 82 15 10 47 ba 1c 08 14 18 5d 86 38 f0 0f 36 6b ab 2f 9b fa 7b d7 1a 68 3e 9e 0c 75 b6 78 3a f5 b4 0e 44 5d 1d f8 e0 38 a5 47 5a 61 53 bd 42 7e ab 29 09 ee 90 3f d7 76 df f4 b4 ee 84 74 d9 f9 56 d3 1a 4b 01 69 ce 94 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 3e cd d2 31 77 e1 bf ef 59 59 ac 25 6a 12 d3 c8 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e cd d2 31 77 e1 bf ef 59 59 ac 25 6a 12 d3 c8 00 68 b4 0c eb 82 f3 17 10 50 54 c2 84 21 41 d0 0e cc af a3 70 34 c7 0f e8 19 b8 c0 f3 59 47 b7 ae 1d 82 15 10 47 ba 1c 08 14 18 5d 86 38 f0 0f 36 6b ab 2f 9b fa 7b d7 1a 68 3e 9e 0c 75 b6 78 3a f5 b4 0e 44 5d 1d f8 e0 38 a5 47 5a 61 53 bd 42 7e ab 29 09 ee 90 3f d7 76 df f4 b4 ee 84 74 d9 f9 56 d3 1a 4b 01 69 ce 94 RSN: encrypted key data - hexdump(len=104): b4 0c eb 82 f3 17 10 50 54 c2 84 21 41 d0 0e cc af a3 70 34 c7 0f e8 19 b8 c0 f3 59 47 b7 ae 1d 82 15 10 47 ba 1c 08 14 18 5d 86 38 f0 0f 36 6b ab 2f 9b fa 7b d7 1a 68 3e 9e 0c 75 b6 78 3a f5 b4 0e 44 5d 1d f8 e0 38 a5 47 5a 61 53 bd 42 7e ab 29 09 ee 90 3f d7 76 df f4 b4 ee 84 74 d9 f9 56 d3 1a 4b 01 69 ce 94 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 2a f3 6a c4 6c 03 08 3b 53 d6 23 c5 db 6a 3c 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 f9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fa key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: No SSID info found (msg 1 of 4). RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fb key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 21 2a 2e e2 ca d4 07 35 61 9b d8 0d 80 f5 dc ab bc 65 81 31 59 be 3f 96 fb bf e4 ea 24 c6 3d 75 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 21 2a 2e e2 ca d4 07 35 61 9b d8 0d 80 f5 dc ab bc 65 81 31 59 be 3f 96 fb bf e4 ea 24 c6 3d 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 d1 42 bf bd e9 d4 6b 30 4a 71 72 9d 51 21 3f 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 7b 12 9a b4 0b e3 cd 12 be 3c 5f aa 38 a8 e4 5e a3 c1 20 c1 f5 b9 c1 b9 b1 06 0f b7 04 f0 29 f1 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 7b 12 9a b4 0b e3 cd 12 be 3c 5f aa 38 a8 e4 5e a3 c1 20 c1 f5 b9 c1 b9 b1 06 0f b7 04 f0 29 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e ae 8b 70 70 91 dd df bf 28 5c 08 2f 13 0a 2a 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 53 ea e3 a7 81 6f bd c1 80 53 3d 5f ae 52 e9 00 68 d4 af a5 23 1e 33 ab 07 89 1e 9d d5 a8 9b c3 9b 93 c4 14 f7 8c a8 0d eb ec 11 bd df 91 0f 99 c6 ad 96 30 a8 c2 a5 17 bf 93 e1 ef ae 42 60 b1 ec ac ff d0 13 66 16 f8 d1 7c 7d 37 66 e7 2b 90 d5 9d 4f 08 92 95 55 54 63 10 f8 81 94 a0 ac 56 85 22 d4 96 f2 d8 ff c1 27 9c 51 40 d8 27 15 6d c0 84 c8 6a 7f 1d 32 ca 51 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 3b 53 ea e3 a7 81 6f bd c1 80 53 3d 5f ae 52 e9 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 53 ea e3 a7 81 6f bd c1 80 53 3d 5f ae 52 e9 00 68 d4 af a5 23 1e 33 ab 07 89 1e 9d d5 a8 9b c3 9b 93 c4 14 f7 8c a8 0d eb ec 11 bd df 91 0f 99 c6 ad 96 30 a8 c2 a5 17 bf 93 e1 ef ae 42 60 b1 ec ac ff d0 13 66 16 f8 d1 7c 7d 37 66 e7 2b 90 d5 9d 4f 08 92 95 55 54 63 10 f8 81 94 a0 ac 56 85 22 d4 96 f2 d8 ff c1 27 9c 51 40 d8 27 15 6d c0 84 c8 6a 7f 1d 32 ca 51 RSN: encrypted key data - hexdump(len=104): d4 af a5 23 1e 33 ab 07 89 1e 9d d5 a8 9b c3 9b 93 c4 14 f7 8c a8 0d eb ec 11 bd df 91 0f 99 c6 ad 96 30 a8 c2 a5 17 bf 93 e1 ef ae 42 60 b1 ec ac ff d0 13 66 16 f8 d1 7c 7d 37 66 e7 2b 90 d5 9d 4f 08 92 95 55 54 63 10 f8 81 94 a0 ac 56 85 22 d4 96 f2 d8 ff c1 27 9c 51 40 d8 27 15 6d c0 84 c8 6a 7f 1d 32 ca 51 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 56 69 e8 c6 74 24 96 1e c2 b0 93 61 89 b8 97 fe 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): ac 50 cf 11 59 11 d5 6d ad 64 df 15 af a9 d7 64 11 a7 df 96 37 cd f5 48 3a be fa a2 c4 96 54 3b WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ac 50 cf 11 59 11 d5 6d ad 64 df 15 af a9 d7 64 11 a7 df 96 37 cd f5 48 3a be fa a2 c4 96 54 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 9e e4 c7 9b af c2 74 cd ae 1b 35 d9 f1 2e 0e 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d 21 89 b2 f2 25 2f 8b 5b 7c 50 28 9c 61 04 81 00 68 d1 22 56 a2 a5 e6 3c 2c cb ca 0a 8e 41 7d 1d f2 c9 e4 f2 63 9f e2 8b 68 84 5a 42 45 c4 b3 c7 ba c9 fc 55 85 2f 54 aa 00 e7 74 6b ec 99 79 e1 2d 1f 43 77 77 7c 95 0d a9 89 fc 22 98 53 87 1b 42 03 58 68 6b 39 ec 0f a6 cd d3 6f 23 0d a8 17 1b b1 7c 44 67 42 78 f5 e1 39 6d c6 a7 b5 53 f5 81 db f9 2c e7 80 37 e4 ce IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 8d 21 89 b2 f2 25 2f 8b 5b 7c 50 28 9c 61 04 81 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d 21 89 b2 f2 25 2f 8b 5b 7c 50 28 9c 61 04 81 00 68 d1 22 56 a2 a5 e6 3c 2c cb ca 0a 8e 41 7d 1d f2 c9 e4 f2 63 9f e2 8b 68 84 5a 42 45 c4 b3 c7 ba c9 fc 55 85 2f 54 aa 00 e7 74 6b ec 99 79 e1 2d 1f 43 77 77 7c 95 0d a9 89 fc 22 98 53 87 1b 42 03 58 68 6b 39 ec 0f a6 cd d3 6f 23 0d a8 17 1b b1 7c 44 67 42 78 f5 e1 39 6d c6 a7 b5 53 f5 81 db f9 2c e7 80 37 e4 ce RSN: encrypted key data - hexdump(len=104): d1 22 56 a2 a5 e6 3c 2c cb ca 0a 8e 41 7d 1d f2 c9 e4 f2 63 9f e2 8b 68 84 5a 42 45 c4 b3 c7 ba c9 fc 55 85 2f 54 aa 00 e7 74 6b ec 99 79 e1 2d 1f 43 77 77 7c 95 0d a9 89 fc 22 98 53 87 1b 42 03 58 68 6b 39 ec 0f a6 cd d3 6f 23 0d a8 17 1b b1 7c 44 67 42 78 f5 e1 39 6d c6 a7 b5 53 f5 81 db f9 2c e7 80 37 e4 ce WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 e8 85 19 a8 29 bc ff dc 33 fe f2 56 1b df 6c 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 8d 18 a9 85 9a 39 3a a6 60 f2 40 a5 84 0f 64 33 04 6b 20 2f 28 a9 5c 6d 00 f3 e2 53 1d 30 40 81 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 8d 18 a9 85 9a 39 3a a6 60 f2 40 a5 84 0f 64 33 04 6b 20 2f 28 a9 5c 6d 00 f3 e2 53 1d 30 40 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 59 c9 09 c0 95 c3 70 f9 d8 03 bb 36 06 f7 5b 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 32 af dd 3a cf 37 03 03 fc a2 dd 6b 9b c6 af 00 68 3d 20 36 b4 dc 7b 3e 27 d6 5d 6b ea fb 44 25 07 72 cb ce d5 3a 8a b5 3a 84 6a 6d fc 67 41 94 1c 92 b3 f0 45 b0 f7 f1 0f 62 dd fd 95 6c ce 52 5e 5f 8c 06 da 93 2c ad 1d e0 32 1b cd 16 7d e8 a6 e5 50 09 c8 ec e0 3f f8 1e 08 d7 68 92 a2 b7 70 5b 64 80 95 59 6b f7 af 6b 38 c2 d0 e9 ad ae 31 be 39 c8 77 9d c7 70 e7 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 54 32 af dd 3a cf 37 03 03 fc a2 dd 6b 9b c6 af WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 32 af dd 3a cf 37 03 03 fc a2 dd 6b 9b c6 af 00 68 3d 20 36 b4 dc 7b 3e 27 d6 5d 6b ea fb 44 25 07 72 cb ce d5 3a 8a b5 3a 84 6a 6d fc 67 41 94 1c 92 b3 f0 45 b0 f7 f1 0f 62 dd fd 95 6c ce 52 5e 5f 8c 06 da 93 2c ad 1d e0 32 1b cd 16 7d e8 a6 e5 50 09 c8 ec e0 3f f8 1e 08 d7 68 92 a2 b7 70 5b 64 80 95 59 6b f7 af 6b 38 c2 d0 e9 ad ae 31 be 39 c8 77 9d c7 70 e7 RSN: encrypted key data - hexdump(len=104): 3d 20 36 b4 dc 7b 3e 27 d6 5d 6b ea fb 44 25 07 72 cb ce d5 3a 8a b5 3a 84 6a 6d fc 67 41 94 1c 92 b3 f0 45 b0 f7 f1 0f 62 dd fd 95 6c ce 52 5e 5f 8c 06 da 93 2c ad 1d e0 32 1b cd 16 7d e8 a6 e5 50 09 c8 ec e0 3f f8 1e 08 d7 68 92 a2 b7 70 5b 64 80 95 59 6b f7 af 6b 38 c2 d0 e9 ad ae 31 be 39 c8 77 9d c7 70 e7 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 07 f3 f5 e8 8e 40 8e 2d 0d d8 d1 99 25 88 da 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1528 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): ed 5d a3 85 58 3a 3e 47 15 71 bb d2 50 68 ba 78 89 bb e5 6f ce a3 e1 e8 fe 2a 10 ff e0 9e 92 de WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ed 5d a3 85 58 3a 3e 47 15 71 bb d2 50 68 ba 78 89 bb e5 6f ce a3 e1 e8 fe 2a 10 ff e0 9e 92 de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 ab b6 08 b8 f0 cd 72 2c 75 58 30 28 80 36 9a 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 7a 31 f3 91 72 39 50 92 b3 83 b3 b4 08 2c 5e 00 68 86 f1 a2 8d 01 25 eb 6b aa db 88 57 2a 67 df be 95 75 dc 14 e5 06 ae 58 4c 45 21 cc 85 1d 20 0b 44 9f 2e d7 3f c1 7b 85 59 38 a3 ed 0c 45 2a 0a 29 28 4e 84 f8 88 d0 f6 c6 9c ba ed 35 d8 a3 29 4a ce d7 fb 30 7f 65 f3 16 1f db 01 ac 4b 55 22 0f af 76 5d 2e 29 c9 cc 9f be e6 5e b1 22 31 fd 5c 99 21 62 df 56 f3 01 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): a3 7a 31 f3 91 72 39 50 92 b3 83 b3 b4 08 2c 5e WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f0 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 7a 31 f3 91 72 39 50 92 b3 83 b3 b4 08 2c 5e 00 68 86 f1 a2 8d 01 25 eb 6b aa db 88 57 2a 67 df be 95 75 dc 14 e5 06 ae 58 4c 45 21 cc 85 1d 20 0b 44 9f 2e d7 3f c1 7b 85 59 38 a3 ed 0c 45 2a 0a 29 28 4e 84 f8 88 d0 f6 c6 9c ba ed 35 d8 a3 29 4a ce d7 fb 30 7f 65 f3 16 1f db 01 ac 4b 55 22 0f af 76 5d 2e 29 c9 cc 9f be e6 5e b1 22 31 fd 5c 99 21 62 df 56 f3 01 RSN: encrypted key data - hexdump(len=104): 86 f1 a2 8d 01 25 eb 6b aa db 88 57 2a 67 df be 95 75 dc 14 e5 06 ae 58 4c 45 21 cc 85 1d 20 0b 44 9f 2e d7 3f c1 7b 85 59 38 a3 ed 0c 45 2a 0a 29 28 4e 84 f8 88 d0 f6 c6 9c ba ed 35 d8 a3 29 4a ce d7 fb 30 7f 65 f3 16 1f db 01 ac 4b 55 22 0f af 76 5d 2e 29 c9 cc 9f be e6 5e b1 22 31 fd 5c 99 21 62 df 56 f3 01 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 dd d0 a2 2f 24 74 35 a4 e2 19 14 ff 86 9a 8d 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 91 f4 c0 cb a2 4a 56 e2 b8 b3 68 4b be 7a f7 80 80 7e ac 71 b7 19 1a 46 1e 4c a5 9b 52 4e 2f 7b WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 91 f4 c0 cb a2 4a 56 e2 b8 b3 68 4b be 7a f7 80 80 7e ac 71 b7 19 1a 46 1e 4c a5 9b 52 4e 2f 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9f 72 36 bf f7 71 8b f6 58 2d 0a 7a 88 50 04 39 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 96 6f e7 1a 2f 1f 38 3d 1c 41 0b 0e b0 46 7e 00 68 1f 4e 8e ac 81 0b 2f 72 2e 14 30 fb 45 7a 30 88 a8 b8 85 b7 cc 0c c0 10 2e a6 bc df d4 5e 6f b7 6d 5f 77 2b 4f 04 d9 7b 6a 85 f6 1e e0 43 1b ab 6c 45 ae eb 19 aa f0 f0 76 96 03 d0 6a a7 a6 a8 3e d5 91 3c a4 27 31 50 f9 d6 cd 70 1a a0 f9 f2 f6 c7 d5 d9 64 86 d1 fd e8 84 9e 9c ff 46 03 61 d6 df be 8b a1 89 f7 db IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 4f 96 6f e7 1a 2f 1f 38 3d 1c 41 0b 0e b0 46 7e WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 96 6f e7 1a 2f 1f 38 3d 1c 41 0b 0e b0 46 7e 00 68 1f 4e 8e ac 81 0b 2f 72 2e 14 30 fb 45 7a 30 88 a8 b8 85 b7 cc 0c c0 10 2e a6 bc df d4 5e 6f b7 6d 5f 77 2b 4f 04 d9 7b 6a 85 f6 1e e0 43 1b ab 6c 45 ae eb 19 aa f0 f0 76 96 03 d0 6a a7 a6 a8 3e d5 91 3c a4 27 31 50 f9 d6 cd 70 1a a0 f9 f2 f6 c7 d5 d9 64 86 d1 fd e8 84 9e 9c ff 46 03 61 d6 df be 8b a1 89 f7 db RSN: encrypted key data - hexdump(len=104): 1f 4e 8e ac 81 0b 2f 72 2e 14 30 fb 45 7a 30 88 a8 b8 85 b7 cc 0c c0 10 2e a6 bc df d4 5e 6f b7 6d 5f 77 2b 4f 04 d9 7b 6a 85 f6 1e e0 43 1b ab 6c 45 ae eb 19 aa f0 f0 76 96 03 d0 6a a7 a6 a8 3e d5 91 3c a4 27 31 50 f9 d6 cd 70 1a a0 f9 f2 f6 c7 d5 d9 64 86 d1 fd e8 84 9e 9c ff 46 03 61 d6 df be 8b a1 89 f7 db WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 47 d7 5f 41 e1 a8 92 b5 12 d4 be bf 51 10 4d d1 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 91 5a 10 13 96 8e 03 8e de b0 94 3e 3b 1a 2b e6 ac d5 3b fb 58 0b 3b 5f 37 d6 ec fd f0 5d 25 4c WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 91 5a 10 13 96 8e 03 8e de b0 94 3e 3b 1a 2b e6 ac d5 3b fb 58 0b 3b 5f 37 d6 ec fd f0 5d 25 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 52 56 13 68 42 ea e1 51 83 47 b0 74 34 7c f3 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 c4 63 97 96 ff b3 a2 3a 76 42 65 56 2a d6 6f 00 68 cf 8a 0f 15 1c db 27 f3 b4 0f 33 b5 5c 3d e2 fc ac 90 68 50 c7 6d 94 59 86 65 f0 52 9e 8a b6 7c 4e 4b fe 9d 0b 16 34 1d 54 d2 58 15 99 d6 a4 38 a9 0d 2b 38 33 fc a6 f3 65 1b 0a 36 9e e4 d3 0d 98 e4 88 e3 b5 f1 f0 ec 43 11 a8 75 24 84 70 a4 ec ac a8 92 83 35 8e 7b 3e d2 d1 dd 54 11 ac 0e 3c a3 c6 c7 5e a3 da b3 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 57 c4 63 97 96 ff b3 a2 3a 76 42 65 56 2a d6 6f WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 c4 63 97 96 ff b3 a2 3a 76 42 65 56 2a d6 6f 00 68 cf 8a 0f 15 1c db 27 f3 b4 0f 33 b5 5c 3d e2 fc ac 90 68 50 c7 6d 94 59 86 65 f0 52 9e 8a b6 7c 4e 4b fe 9d 0b 16 34 1d 54 d2 58 15 99 d6 a4 38 a9 0d 2b 38 33 fc a6 f3 65 1b 0a 36 9e e4 d3 0d 98 e4 88 e3 b5 f1 f0 ec 43 11 a8 75 24 84 70 a4 ec ac a8 92 83 35 8e 7b 3e d2 d1 dd 54 11 ac 0e 3c a3 c6 c7 5e a3 da b3 RSN: encrypted key data - hexdump(len=104): cf 8a 0f 15 1c db 27 f3 b4 0f 33 b5 5c 3d e2 fc ac 90 68 50 c7 6d 94 59 86 65 f0 52 9e 8a b6 7c 4e 4b fe 9d 0b 16 34 1d 54 d2 58 15 99 d6 a4 38 a9 0d 2b 38 33 fc a6 f3 65 1b 0a 36 9e e4 d3 0d 98 e4 88 e3 b5 f1 f0 ec 43 11 a8 75 24 84 70 a4 ec ac a8 92 83 35 8e 7b 3e d2 d1 dd 54 11 ac 0e 3c a3 c6 c7 5e a3 da b3 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 4c 7b a0 55 43 ff 42 95 bc cd 2a d7 a9 40 34 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 02 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: No SSID info found (msg 1 of 4). RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 69 a5 c4 19 51 a4 81 f1 f2 84 2f 2b 0c 8c d3 3e 89 e3 a8 db b6 ec 27 df d1 76 64 da 9b 0d fe b1 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 69 a5 c4 19 51 a4 81 f1 f2 84 2f 2b 0c 8c d3 3e 89 e3 a8 db b6 ec 27 df d1 76 64 da 9b 0d fe b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 ba 15 49 bf b1 fe 39 ac fa f6 e0 45 e5 d0 4a 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc fe d6 99 04 b3 c9 d1 94 42 d9 cd 66 84 b7 9a 00 68 1b d5 80 91 31 39 96 da 7b 76 62 bd 96 5c 90 88 b9 94 b5 1c 6c 77 d1 f2 c9 5c 4c e5 81 a2 41 6f 99 ec 97 35 27 6d 61 ef c1 7a 77 bb 01 e2 84 58 f0 93 0e 14 55 ad cc 8f f1 86 f2 cf 2f a0 ff d4 0a 76 cf 6a 7d c5 6d 46 14 82 dc c1 f7 07 00 47 df 36 6a 7e 66 94 68 0a 67 75 07 a6 99 85 a3 26 7d e0 43 fe f8 9a 9f 46 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): bc fe d6 99 04 b3 c9 d1 94 42 d9 cd 66 84 b7 9a WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc fe d6 99 04 b3 c9 d1 94 42 d9 cd 66 84 b7 9a 00 68 1b d5 80 91 31 39 96 da 7b 76 62 bd 96 5c 90 88 b9 94 b5 1c 6c 77 d1 f2 c9 5c 4c e5 81 a2 41 6f 99 ec 97 35 27 6d 61 ef c1 7a 77 bb 01 e2 84 58 f0 93 0e 14 55 ad cc 8f f1 86 f2 cf 2f a0 ff d4 0a 76 cf 6a 7d c5 6d 46 14 82 dc c1 f7 07 00 47 df 36 6a 7e 66 94 68 0a 67 75 07 a6 99 85 a3 26 7d e0 43 fe f8 9a 9f 46 RSN: encrypted key data - hexdump(len=104): 1b d5 80 91 31 39 96 da 7b 76 62 bd 96 5c 90 88 b9 94 b5 1c 6c 77 d1 f2 c9 5c 4c e5 81 a2 41 6f 99 ec 97 35 27 6d 61 ef c1 7a 77 bb 01 e2 84 58 f0 93 0e 14 55 ad cc 8f f1 86 f2 cf 2f a0 ff d4 0a 76 cf 6a 7d c5 6d 46 14 82 dc c1 f7 07 00 47 df 36 6a 7e 66 94 68 0a 67 75 07 a6 99 85 a3 26 7d e0 43 fe f8 9a 9f 46 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 92 d0 e9 34 ff 36 6d 4f d2 fb 75 7d 91 1f 5e 59 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1526 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 04 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): b7 29 21 e7 76 70 15 28 e8 f8 84 e3 33 0a 86 1b ee 73 f8 52 d8 30 a0 e1 0c 9e 85 3f 49 21 89 7c WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 b7 29 21 e7 76 70 15 28 e8 f8 84 e3 33 0a 86 1b ee 73 f8 52 d8 30 a0 e1 0c 9e 85 3f 49 21 89 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db f8 45 58 4d 36 10 e7 90 07 45 fa f0 08 71 4c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 WPA: 4-Way Handshake failed - pre-shared key may be incorrect Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 19 38 ab 35 ac b5 e8 01 a9 46 a2 ba fc 23 eb 41 47 18 cd cf 50 fd 4b c9 6f 76 2a 3e d8 58 88 b7 WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 19 38 ab 35 ac b5 e8 01 a9 46 a2 ba fc 23 eb 41 47 18 cd cf 50 fd 4b c9 6f 76 2a 3e d8 58 88 b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 d6 50 a4 1d ee a1 e7 ae eb a9 6b 48 dc 82 3d 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 0d 07 33 25 dd 2b a1 7a c3 a2 95 79 1b 52 99 00 68 cd 91 88 3a 12 ec 5c d7 13 e0 3b 44 3f e2 e9 4b 1f c8 31 80 fb 49 17 61 5c 74 c7 65 66 ca 3d 27 36 35 0c 85 cd 1f 3a d2 83 ba 88 73 43 e3 49 9b dc c8 8a 50 2c 44 12 7c 0d 0e 5b 9a 6d a4 10 ad 13 f1 63 8f 2d 44 6d 01 8d 08 6a 3f 31 c0 c4 2b 90 00 7e 32 cd 43 cb 3d 64 89 b6 30 9c 30 9f 24 bd 99 5a 59 7e c4 5c 91 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 48 0d 07 33 25 dd 2b a1 7a c3 a2 95 79 1b 52 99 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 0d 07 33 25 dd 2b a1 7a c3 a2 95 79 1b 52 99 00 68 cd 91 88 3a 12 ec 5c d7 13 e0 3b 44 3f e2 e9 4b 1f c8 31 80 fb 49 17 61 5c 74 c7 65 66 ca 3d 27 36 35 0c 85 cd 1f 3a d2 83 ba 88 73 43 e3 49 9b dc c8 8a 50 2c 44 12 7c 0d 0e 5b 9a 6d a4 10 ad 13 f1 63 8f 2d 44 6d 01 8d 08 6a 3f 31 c0 c4 2b 90 00 7e 32 cd 43 cb 3d 64 89 b6 30 9c 30 9f 24 bd 99 5a 59 7e c4 5c 91 RSN: encrypted key data - hexdump(len=104): cd 91 88 3a 12 ec 5c d7 13 e0 3b 44 3f e2 e9 4b 1f c8 31 80 fb 49 17 61 5c 74 c7 65 66 ca 3d 27 36 35 0c 85 cd 1f 3a d2 83 ba 88 73 43 e3 49 9b dc c8 8a 50 2c 44 12 7c 0d 0e 5b 9a 6d a4 10 ad 13 f1 63 8f 2d 44 6d 01 8d 08 6a 3f 31 c0 c4 2b 90 00 7e 32 cd 43 cb 3d 64 89 b6 30 9c 30 9f 24 bd 99 5a 59 7e c4 5c 91 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 18 25 20 e7 f9 db a2 d8 6c 49 9b 2b 53 25 df 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 06 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: No SSID info found (msg 1 of 4). RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 07 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: No SSID info found (msg 1 of 4). RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): c0 61 32 3c 3a bc fb 9c 1e de 9b 39 5c fe 36 6e 15 c6 c1 da 76 59 4e 7a 4a 4a 17 e2 1f 35 ec dd WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 c0 61 32 3c 3a bc fb 9c 1e de 9b 39 5c fe 36 6e 15 c6 c1 da 76 59 4e 7a 4a 4a 17 e2 1f 35 ec dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c2 78 25 57 50 29 9f 19 4f 0b 16 ed 7d eb 8b d4 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 84 a7 c6 04 8a 41 a1 d9 30 16 75 fb f0 14 9a 00 68 65 d9 58 b8 b5 f4 81 67 36 1f c4 b2 ba 0d b8 43 46 91 d5 8d 03 f9 ae 07 40 c3 b5 7a 1c 88 2a 0e 71 41 ee 4f c5 14 7b 81 59 7a c1 8e 7c 41 24 d0 fb 11 ca a2 72 e4 0f 98 ef 93 60 79 4d 13 c8 d3 61 44 8e d2 3c bb 8e 11 96 58 8b df 33 06 1e 9b f8 a6 bc a1 7f 31 9c 14 2a 90 9b e8 9a 3d 6b b5 20 be e6 6e 72 1d da 97 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): b7 84 a7 c6 04 8a 41 a1 d9 30 16 75 fb f0 14 9a WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b7 84 a7 c6 04 8a 41 a1 d9 30 16 75 fb f0 14 9a 00 68 65 d9 58 b8 b5 f4 81 67 36 1f c4 b2 ba 0d b8 43 46 91 d5 8d 03 f9 ae 07 40 c3 b5 7a 1c 88 2a 0e 71 41 ee 4f c5 14 7b 81 59 7a c1 8e 7c 41 24 d0 fb 11 ca a2 72 e4 0f 98 ef 93 60 79 4d 13 c8 d3 61 44 8e d2 3c bb 8e 11 96 58 8b df 33 06 1e 9b f8 a6 bc a1 7f 31 9c 14 2a 90 9b e8 9a 3d 6b b5 20 be e6 6e 72 1d da 97 RSN: encrypted key data - hexdump(len=104): 65 d9 58 b8 b5 f4 81 67 36 1f c4 b2 ba 0d b8 43 46 91 d5 8d 03 f9 ae 07 40 c3 b5 7a 1c 88 2a 0e 71 41 ee 4f c5 14 7b 81 59 7a c1 8e 7c 41 24 d0 fb 11 ca a2 72 e4 0f 98 ef 93 60 79 4d 13 c8 d3 61 44 8e d2 3c bb 8e 11 96 58 8b df 33 06 1e 9b f8 a6 bc a1 7f 31 9c 14 2a 90 9b e8 9a 3d 6b b5 20 be e6 6e 72 1d da 97 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 d1 d5 ca 80 7a 8e 9d f4 d6 1a e3 86 5a dc 91 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID f0:7d:68:54:b0:80 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated with 00:00:00:00:00:00 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID f0:7d:68:54:b0:80 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=8 Received 1527 bytes of scan results (3 BSSes) New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=14 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch Try to find non-WPA AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 skip - blacklisted 1: 00:0f:c9:02:e5:d2 ssid='saarstr' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 skip - SSID mismatch 2: 00:1f:3f:85:3b:cb ssid='WLAN-001F3F853BCB' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: f0:7d:68:54:b0:80 ssid='josenkowitsch' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP f0:7d:68:54:b0:80 ssid='josenkowitsch' Trying to associate with f0:7d:68:54:b0:80 (SSID='josenkowitsch' freq=2457 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=21 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=171 AssocResp IE wireless event - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: f0:7d:68:54:b0:80 Association info event resp_ies - hexdump(len=163): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 8e 11 17 ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 0a 07 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 07 00 0c 43 07 00 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=f0:7d:68:54:b0:80 No keys have been configured - skip key clearing Associated with f0:7d:68:54:b0:80 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 59 ac 5b 51 47 f2 f1 5a d9 53 0e 7a 7f 19 37 c2 ba b3 8c ca 68 87 6b a0 db ce fc 94 1b 14 e9 6e WPA: PTK derivation - A1=00:1f:3f:0b:1d:45 A2=f0:7d:68:54:b0:80 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 59 ac 5b 51 47 f2 f1 5a d9 53 0e 7a 7f 19 37 c2 ba b3 8c ca 68 87 6b a0 db ce fc 94 1b 14 e9 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 2d 95 56 d6 12 72 3c e4 fd ef df 61 85 67 b5 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from f0:7d:68:54:b0:80 RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 f7 81 5e a6 75 98 46 39 ce 10 3a d1 c2 fa b8 00 68 99 46 bc 16 d5 f5 51 ad 7a e8 84 2e 91 31 50 c5 e6 72 4f 56 27 bf 02 98 cd 4b 9b 56 bc 10 5b 2b 3c 89 2e b9 87 97 23 0a 8e ac 69 ff 27 29 4c c4 d8 f0 c2 8d 5d 51 94 e3 03 54 95 04 ab e6 41 1b 8d f4 12 34 16 59 06 6c ca 96 9b 80 24 fe 43 ce f4 be ba fd f1 3e 42 3c 4c 0d d0 bf e6 16 2e 08 4e 12 1a a6 cb b6 ce 08 IEEE 802.1X RX: version=2 type=3 length=199 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=104 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 44 f7 81 5e a6 75 98 46 39 ce 10 3a d1 c2 fa b8 WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 02 ae bb 01 a8 a6 fe a0 83 02 34 a5 54 7a 88 2b 97 9a 1b 3f 7c f8 79 c8 6a e4 48 63 5b 3b 79 f1 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 f7 81 5e a6 75 98 46 39 ce 10 3a d1 c2 fa b8 00 68 99 46 bc 16 d5 f5 51 ad 7a e8 84 2e 91 31 50 c5 e6 72 4f 56 27 bf 02 98 cd 4b 9b 56 bc 10 5b 2b 3c 89 2e b9 87 97 23 0a 8e ac 69 ff 27 29 4c c4 d8 f0 c2 8d 5d 51 94 e3 03 54 95 04 ab e6 41 1b 8d f4 12 34 16 59 06 6c ca 96 9b 80 24 fe 43 ce f4 be ba fd f1 3e 42 3c 4c 0d d0 bf e6 16 2e 08 4e 12 1a a6 cb b6 ce 08 RSN: encrypted key data - hexdump(len=104): 99 46 bc 16 d5 f5 51 ad 7a e8 84 2e 91 31 50 c5 e6 72 4f 56 27 bf 02 98 cd 4b 9b 56 bc 10 5b 2b 3c 89 2e b9 87 97 23 0a 8e ac 69 ff 27 29 4c c4 d8 f0 c2 8d 5d 51 94 e3 03 54 95 04 ab e6 41 1b 8d f4 12 34 16 59 06 6c ca 96 9b 80 24 fe 43 ce f4 be ba fd f1 3e 42 3c 4c 0d d0 bf e6 16 2e 08 4e 12 1a a6 cb b6 ce 08 WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from f0:7d:68:54:b0:80 (ver=2) WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 02 10 ba cc 86 7a 4c ed 02 b2 ae d4 52 81 9e 9a 25 02 93 89 6a 21 d1 e2 87 0b 8e 82 69 2f 4b 62 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b 68 75 a8 37 80 4a 0c f5 4d ba c1 63 2b 8b 35 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with f0:7d:68:54:b0:80 [PTK=CCMP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to f0:7d:68:54:b0:80 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID f0:7d:68:54:b0:80 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=8 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds CTRL-EVENT-TERMINATING - signal 2 received Removing interface wlan0 No keys have been configured - skip key clearing State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing Removed BSSID f0:7d:68:54:b0:80 from blacklist (clear) Cancelling scan request Cancelling authentication timeout WEXT: Operstate: linkmode=0, operstate=6