wpa_supplicant v1.0 random: Trying to read entropy from /dev/random Initializing interface 'ra0' conf 'wpa_supplicant.tmp' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_supplicant.tmp' -> '/home/bambam/wpa_supplicant.tmp' Reading configuration file '/home/bambam/wpa_supplicant.tmp' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=1 Priority group 0 id=0 ssid='bambamnet' SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 ra0: Own MAC address: 24:65:11:40:0a:c6 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures ra0: RSN: flushing PMKID list in the driver ra0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface ra0 WPS: UUID based on MAC address - hexdump(len=16): 65 55 1b 67 8b 1e 51 4e ac 02 0c 44 7b 64 e3 20 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized ra0: Added interface ra0 random: Got 18/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event ra0: State: DISCONNECTED -> SCANNING ra0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized random: Got 2/2 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=8 ra0: Event SCAN_RESULTS (3) received Received 444 bytes of scan results (3 BSSes) ra0: BSS: Start scan result update 1 ra0: BSS: Add new id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet' ra0: BSS: Add new id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network' ra0: BSS: Add new id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933' ra0: New scan results available ra0: Selecting BSS from priority group 0 ra0: 0: 00:24:fe:b3:e8:69 ssid='bambamnet' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 level=-38 ra0: selected based on WPA IE ra0: selected BSS 00:24:fe:b3:e8:69 ssid='bambamnet' ra0: Request association: reassociate: 0 selected: 00:24:fe:b3:e8:69 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ra0: Trying to associate with 00:24:fe:b3:e8:69 (SSID='bambamnet' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): ra0: Cancelling scan request ra0: WPA: clearing own WPA/RSN IE ra0: Automatic auth_alg selection: 0x1 ra0: WPA: using IEEE 802.11i/D3.0 ra0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 ra0: WPA: clearing AP RSN IE ra0: WPA: using GTK TKIP ra0: WPA: using PTK TKIP ra0: WPA: using KEY_MGMT WPA-PSK ra0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 ra0: No keys have been configured - skip key clearing ra0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk ra0: Association request to the driver failed ra0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=17 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c07 len=49 AssocReq IE wireless event - hexdump(len=41): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:24:00:00:e8:69 ra0: Event ASSOCINFO (4) received ra0: Association info event req_ies - hexdump(len=41): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): ra0: Event ASSOC (0) received ra0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 ra0: Associated to a new BSS: BSSID=00:24:fe:b3:e8:69 ra0: No keys have been configured - skip key clearing ra0: Associated with 00:24:fe:b3:e8:69 ra0: WPA: Association event - clear replay counter ra0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE ra0: Setting authentication timeout: 10 sec 0 usec ra0: Cancelling scan request ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: Setting authentication timeout: 10 sec 0 usec ra0: IEEE 802.1X RX: version=1 type=3 length=95 ra0: EAPOL-Key type=254 ra0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) ra0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ra0: State: ASSOCIATED -> 4WAY_HANDSHAKE ra0: WPA: RX message 1 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 7f 96 db 9c 04 a9 31 b6 c4 fc c5 53 2e a4 a8 ea b9 19 cb 57 98 24 e3 0f 7c b1 cf 75 ea 18 5f 71 WPA: PTK derivation - A1=24:65:11:40:0a:c6 A2=00:24:fe:b3:e8:69 WPA: Nonce1 - hexdump(len=32): 7f 96 db 9c 04 a9 31 b6 c4 fc c5 53 2e a4 a8 ea b9 19 cb 57 98 24 e3 0f 7c b1 cf 75 ea 18 5f 71 WPA: Nonce2 - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 ra0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): d2 af 25 22 31 0f e8 bd 20 c6 88 45 37 0e 08 ca EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: IEEE 802.1X RX: version=1 type=3 length=121 ra0: EAPOL-Key type=254 ra0: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) ra0: key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): c5 18 d3 a7 a1 9a 69 1f c4 1e 01 bc c9 cc 87 42 ra0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE ra0: WPA: RX message 3 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 ra0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): af 0d 4f 80 2c 26 65 4b 3c 37 7c c7 88 f0 a7 ed ra0: WPA: Installing PTK to the driver WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 ra0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: IEEE 802.1X RX: version=1 type=3 length=127 ra0: EAPOL-Key type=254 ra0: key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) ra0: key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 34 da 62 6e a8 de 83 4e f3 25 ea ee 4b 87 4f 5a 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1c key_iv - hexdump(len=16): 2b 3b 86 0c e1 01 78 ce 1e 2b 14 a1 da 45 52 1f key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 43 1d cc 7b 89 b3 76 a8 de 58 ea 64 1a 37 ae 87 ra0: WPA: RX message 1 of Group Key Handshake from 00:24:fe:b3:e8:69 (ver=1) ra0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] ra0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 ra0: WPA: Sending EAPOL-Key 2/2 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): e1 8c 98 c7 b8 90 4e 27 d6 f1 02 d8 2c de bd 62 ra0: WPA: Key negotiation completed with 00:24:fe:b3:e8:69 [PTK=TKIP GTK=TKIP] ra0: Cancelling authentication timeout ra0: State: GROUP_HANDSHAKE -> COMPLETED ra0: CTRL-EVENT-CONNECTED - Connection to 00:24:fe:b3:e8:69 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event EAPOL: startWhen --> 0 EAPOL: disable timer tick ra0: CTRL-EVENT-TERMINATING - signal 15 received ra0: Removing interface ra0 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 ra0: State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wpa_driver_wext_set_countermeasures ra0: No keys have been configured - skip key clearing ra0: BSS: Remove id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet' ra0: BSS: Remove id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network' ra0: BSS: Remove id 2 BSSID 20:4e:7f:08:4a:08 SSID 'Neptun1933' ra0: Cancelling scan request ra0: Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6