wpa_supplicant v1.0 random: Trying to read entropy from /dev/random Initializing interface 'ra0' conf 'wpa_supplicant.tmp' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_supplicant.tmp' -> '/home/bambam/wpa_supplicant.tmp' Reading configuration file '/home/bambam/wpa_supplicant.tmp' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=1 Priority group 0 id=0 ssid='bambamnet' SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 ra0: Own MAC address: 24:65:11:40:0a:c6 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures ra0: RSN: flushing PMKID list in the driver ra0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface ra0 WPS: UUID based on MAC address - hexdump(len=16): 65 55 1b 67 8b 1e 51 4e ac 02 0c 44 7b 64 e3 20 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized ra0: Added interface ra0 random: Got 20/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event ra0: State: DISCONNECTED -> SCANNING ra0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=8 ra0: Event SCAN_RESULTS (3) received Received 304 bytes of scan results (2 BSSes) ra0: BSS: Start scan result update 1 ra0: BSS: Add new id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet' ra0: BSS: Add new id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network' ra0: New scan results available ra0: Selecting BSS from priority group 0 ra0: 0: 00:24:fe:b3:e8:69 ssid='bambamnet' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-40 ra0: selected based on RSN IE ra0: selected BSS 00:24:fe:b3:e8:69 ssid='bambamnet' ra0: Request association: reassociate: 0 selected: 00:24:fe:b3:e8:69 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ra0: Trying to associate with 00:24:fe:b3:e8:69 (SSID='bambamnet' freq=2447 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): ra0: Cancelling scan request ra0: WPA: clearing own WPA/RSN IE ra0: Automatic auth_alg selection: 0x1 ra0: RSN: using IEEE 802.11i/D9.0 ra0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 ra0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 ra0: WPA: using GTK CCMP ra0: WPA: using PTK CCMP ra0: WPA: using KEY_MGMT WPA-PSK ra0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 ra0: No keys have been configured - skip key clearing ra0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk ra0: Association request to the driver failed ra0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=17 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c07 len=47 AssocReq IE wireless event - hexdump(len=39): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:24:00:00:e8:69 ra0: Event ASSOCINFO (4) received ra0: Association info event req_ies - hexdump(len=39): 00 09 62 61 6d 62 61 6d 6e 65 74 01 04 82 84 8b 96 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): ra0: Event ASSOC (0) received ra0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 ra0: Associated to a new BSS: BSSID=00:24:fe:b3:e8:69 ra0: No keys have been configured - skip key clearing ra0: Associated with 00:24:fe:b3:e8:69 ra0: WPA: Association event - clear replay counter ra0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE ra0: Setting authentication timeout: 10 sec 0 usec ra0: Cancelling scan request ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: Setting authentication timeout: 10 sec 0 usec ra0: IEEE 802.1X RX: version=1 type=3 length=95 ra0: EAPOL-Key type=2 ra0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) ra0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 1b 0e 06 17 23 89 f2 03 ef 7a 3e 0b 9b e1 bf 97 71 2c f0 84 5d f9 8c 6e df 30 54 93 1e 28 86 c9 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ra0: State: ASSOCIATED -> 4WAY_HANDSHAKE ra0: WPA: RX message 1 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): d7 62 f0 6f 71 ab c6 f4 8f f3 46 1e 1a ea cc 83 51 ac 57 65 d9 c8 63 76 5a 72 d5 4b 2d cc 71 15 WPA: PTK derivation - A1=24:65:11:40:0a:c6 A2=00:24:fe:b3:e8:69 WPA: Nonce1 - hexdump(len=32): d7 62 f0 6f 71 ab c6 f4 8f f3 46 1e 1a ea cc 83 51 ac 57 65 d9 c8 63 76 5a 72 d5 4b 2d cc 71 15 WPA: Nonce2 - hexdump(len=32): 1b 0e 06 17 23 89 f2 03 ef 7a 3e 0b 9b e1 bf 97 71 2c f0 84 5d f9 8c 6e df 30 54 93 1e 28 86 c9 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 ra0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 13 34 f9 b3 c8 10 f8 d6 e9 dc d1 2f 74 28 9a f3 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) ra0: RX EAPOL from 00:24:fe:b3:e8:69 ra0: IEEE 802.1X RX: version=1 type=3 length=151 ra0: EAPOL-Key type=2 ra0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) ra0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 1b 0e 06 17 23 89 f2 03 ef 7a 3e 0b 9b e1 bf 97 71 2c f0 84 5d f9 8c 6e df 30 54 93 1e 28 86 c9 key_iv - hexdump(len=16): a6 a6 a6 a6 a6 a6 a6 a6 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): b8 09 d2 1f e0 76 3b 9b b1 f8 6d c4 b0 88 d0 cc RSN: encrypted key data - hexdump(len=56): 51 4c a0 81 28 65 8c b6 91 21 4c 5a 5b a2 7e 7c 23 3e 18 5a f5 36 26 91 a5 17 1b 6b c1 f0 8e b9 ff 08 8a 1d ac 02 7e 3e 89 8f fe f0 83 3a b9 3a 36 97 1f 88 c3 af 0e be WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] ra0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE ra0: WPA: RX message 3 of 4-Way Handshake from 00:24:fe:b3:e8:69 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 49 6f d1 62 a9 fb 7d e9 63 3e 5a 85 ab 94 ec 37 dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] ra0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 6c 3b e7 fc 36 69 e9 14 e0 aa 73 e6 0a 8b ed fd ra0: WPA: Installing PTK to the driver wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 ra0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] ra0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16 ra0: WPA: Key negotiation completed with 00:24:fe:b3:e8:69 [PTK=CCMP GTK=CCMP] ra0: Cancelling authentication timeout ra0: State: GROUP_HANDSHAKE -> COMPLETED ra0: CTRL-EVENT-CONNECTED - Connection to 00:24:fe:b3:e8:69 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added WEXT: if_removed already cleared - ignore event EAPOL: startWhen --> 0 EAPOL: disable timer tick ra0: CTRL-EVENT-TERMINATING - signal 15 received ra0: Removing interface ra0 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 ra0: State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wpa_driver_wext_set_countermeasures ra0: No keys have been configured - skip key clearing ra0: BSS: Remove id 0 BSSID 00:24:fe:b3:e8:69 SSID 'bambamnet' ra0: BSS: Remove id 1 BSSID 74:31:70:9e:df:38 SSID 'COMPUTER-PC_Network' ra0: Cancelling scan request ra0: Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6