Created
May 3, 2016 08:20
-
-
Save anonymous/72f8d94c677d735cdff168bc7c181747 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
wpa_supplicant v2.5 | |
Successfully initialized wpa_supplicant | |
Initializing interface 'wlp1s0b1' conf '/etc/wpa_supplicant/example.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' | |
Configuration file '/etc/wpa_supplicant/example.conf' -> '/etc/wpa_supplicant/example.conf' | |
Reading configuration file '/etc/wpa_supplicant/example.conf' | |
ctrl_interface='/run/wpa_supplicant' | |
Line: 3 - start of a new network block | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
key_mgmt: 0x1 | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA | |
password - hexdump_ascii(len=6): [REMOVED] | |
phase1 - hexdump_ascii(len=43): | |
74 6c 73 5f 64 69 73 61 62 6c 65 5f 74 6c 73 76 tls_disable_tlsv | |
31 5f 31 3d 31 20 74 6c 73 5f 64 69 73 61 62 6c 1_1=1 tls_disabl | |
65 5f 74 6c 73 76 31 5f 32 3d 31 e_tlsv1_2=1 | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
Priority group 0 | |
id=0 ssid='eduroam' | |
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=3 type=2 op=0 soft=0 hard=0 | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:10 | |
nl80211: Supported cipher 00-0f-ac:8 | |
nl80211: Supported cipher 00-0f-ac:9 | |
nl80211: Using driver-based off-channel TX | |
nl80211: interface wlp1s0b1 in phy phy0 | |
nl80211: Set mode ifindex 2 iftype 2 (STATION) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x21814c0 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0505 | |
netlink: Operstate: ifindex=2 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) | |
nl80211: driver param='(null)' | |
Add interface wlp1s0b1 to a new radio phy0 | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp1s0b1: Own MAC address: 74:2f:68:d2:b1:f3 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 | |
wlp1s0b1: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
TDLS: TDLS operation not supported by driver | |
TDLS: Driver uses internal link setup | |
TDLS: Driver does not support TDLS channel switching | |
wlp1s0b1: WPS: UUID based on MAC address: e909a86f-b1a7-5277-89e0-0bfd7fd694fd | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
wlp1s0b1: Added interface wlp1s0b1 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x219f5d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x219f5d0 after 0.000019 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 10 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000062 seconds | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660952 seconds | |
nl80211: Received scan results (2 BSSes) | |
wlp1s0b1: BSS: Start scan result update 1 | |
wlp1s0b1: BSS: Add new id 0 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' freq 2437 | |
wlp1s0b1: BSS: Add new id 1 BSSID 00:3a:98:f5:90:e3 SSID 'test' freq 2437 | |
BSS: last_scan_res_used=2/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x219f5d0 done in 0.661495 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-59 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Add radio work 'sme-connect'@0x219f5d0 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x219f5d0 after 0.000025 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:3a:98:f5:90:e2 | |
RSN: No PMKSA cache entry found | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 d0 e2 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 30 e3 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2437 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2 | |
wlp1s0b1: Associated with 00:3a:98:f5:90:e2 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=50 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=41): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B, | |
70 6f 72 74 69 64 3d 32 39 portid=29 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=10 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=1) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x301 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=226): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 231 bytes pending from ssl_out | |
SSL: 231 bytes left to be sent out (of total 231 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21af8c0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=245): 01 00 00 f1 02 02 00 f1 19 80 00 00 00 e7 16 03 01 00 e2 01 00 00 de 03 01 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 00 00 64 c0 14 c0 0a 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13 c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 03 05 10 19 c0 00 00 34 84 16 03 01 34 7f 02 00 00 4d 03 01 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd 20 c6 09 00 00 70 ea 90 61 93 31 9a 93 4e 33 2e 2c a5 d6 27 52 ca 8f ee a7 83 b1 b9 b1 ac 00 cf 20 00 04 00 00 05 ff 01 00 01 00 0b 00 04 72 00 04 6f 00 04 6c 30 82 04 68 30 82 03 d1 a0 03 02 01 02 02 0a 40 90 c1 b1 00 03 00 00 01 4c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 26 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 0f 30 0d 06 03 55 04 03 13 06 62 73 75 72 61 64 30 1e 17 0d 31 34 30 33 30 33 31 33 33 33 34 38 5a 17 0d 31 35 30 33 30 33 31 33 33 32 30 36 5a 30 15 31 13 30 11 06 03 55 04 03 13 0a 62 73 75 72 61 64 2e 62 73 75 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 98 a7 1a 4c 87 5b 74 f5 9a 5f 71 81 4e 75 4a 76 22 7c 4d bc f2 10 f7 9f 1c 0c d6 94 0a bc 97 74 d8 9d fc b7 c2 4b b8 6d de 73 e0 94 33 b7 71 2a 45 d1 24 57 35 b7 d9 9a 36 20 c4 63 6e 5c 3e 4d dd c4 98 f0 6d ca 53 70 29 3c 91 2e 32 80 ee e7 2f 7b 71 61 24 16 db 29 4f 86 73 4d 47 a5 0f e0 47 4b a7 e4 41 31 02 d2 72 92 2d 80 b5 6b b4 87 ce 81 aa 2d 7e f6 6c 73 1c 68 c8 f8 bf 4c 0c bf 02 03 01 00 01 a3 82 02 ac 30 82 02 a8 30 0b 06 03 55 1d 0f 04 04 03 02 05 a0 30 44 06 09 2a 86 48 86 f7 0d 01 09 0f 04 37 30 35 30 0e 06 08 2a 86 48 86 f7 0d 03 02 02 02 00 80 30 0e 06 08 2a 86 48 86 f7 0d 03 04 02 02 00 80 30 07 06 05 2b 0e 03 02 07 30 0a 06 08 2a 86 48 86 f7 0d 03 07 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 1d 06 03 55 1d 0e 04 16 04 14 f7 36 37 35 f2 6e 03 4f 13 30 7d 0c de 20 ad 38 06 8a fb 59 30 1f 06 03 55 1d 23 04 18 30 16 80 14 23 12 68 5d a4 c1 56 d4 47 1e 8f ca 83 b6 85 b9 c4 33 e3 b3 30 81 e7 06 03 55 1d 1f 04 81 df 30 81 dc 30 81 d9 a0 81 d6 a0 81 d3 86 81 a4 6c 64 61 70 3a 2f 2f 2f 43 4e 3d 62 73 75 72 61 64 28 33 29 2c 43 4e 3d 62 73 75 72 61 64 2c 43 4e 3d 43 44 50 2c 43 4e 3d 50 75 62 6c 69 63 25 32 30 4b 65 79 25 32 30 53 65 72 76 69 63 65 73 2c 43 4e 3d 53 65 72 76 69 63 65 73 2c 43 4e 3d 43 6f 6e 66 69 67 75 72 61 74 69 6f 6e 2c 44 43 3d 62 73 75 3f 63 65 72 74 69 66 69 63 61 74 65 52 65 76 6f 63 61 74 69 6f 6e 4c 69 73 74 3f 62 61 73 65 3f 6f 62 6a 65 63 74 43 6c 61 73 73 3d 63 52 4c 44 69 73 74 72 69 62 75 74 69 6f 6e 50 6f 69 6e 74 86 2a 68 74 74 70 3a 2f 2f 62 73 75 72 61 64 2e 62 73 75 2f 43 65 72 74 45 6e 72 6f 6c 6c 2f 62 73 75 72 61 64 28 33 29 2e 63 72 6c 30 81 f0 06 08 2b 06 01 05 05 07 01 01 04 81 e3 30 81 e0 30 81 9a 06 08 2b 06 01 05 05 07 30 02 86 81 8d 6c 64 61 70 3a 2f 2f 2f 43 4e 3d 62 73 75 72 61 64 2c 43 4e 3d 41 49 41 2c 43 4e 3d 50 75 62 6c 69 63 25 32 30 4b 65 79 25 32 30 53 65 72 76 69 63 65 73 2c 43 4e 3d 53 65 72 76 69 63 65 73 2c 43 4e 3d 43 6f 6e 66 69 67 75 72 61 74 69 6f 6e 2c 44 43 3d 62 73 75 3f 63 41 43 65 72 74 69 66 69 63 61 74 65 3f 62 61 73 65 3f 6f 62 6a 65 63 74 43 6c 61 73 73 3d 63 65 72 74 69 66 69 63 61 74 69 6f 6e 41 75 74 68 6f 72 69 74 79 30 41 06 08 2b 06 01 05 05 07 30 02 86 35 68 74 74 70 3a 2f 2f 62 73 75 72 61 64 2e 62 73 75 2f 43 65 72 74 45 6e 72 6f 6c 6c 2f 62 73 75 72 61 64 2e 62 73 75 5f 62 73 75 72 61 64 28 33 29 2e 63 72 74 30 21 06 09 2b 06 01 04 01 82 37 14 02 04 14 1e 12 00 57 00 65 00 62 00 53 00 65 00 72 00 76 00 65 00 72 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 44 1f a7 c0 46 27 9a c7 d2 f7 eb 53 07 2c 0f 57 ec 9f e1 d6 2e d5 69 b4 3b e6 36 fd ca 20 f7 7b f2 18 0c d7 68 d0 50 8c 07 bc ef d2 ee 98 5e e4 7b ed e9 07 fc dc e7 6c 29 96 77 03 b7 e4 84 9d 95 f6 24 ab 3e a3 90 dd 48 c8 6f 7f be a9 95 a3 fb 49 1c ae 4d fc bd 5a d4 68 2d a2 a5 fa 35 39 c3 44 58 b3 76 35 15 e9 3c 41 e4 57 d4 c5 b5 73 fa 9c cc 4c 4b ef b6 0b 83 16 1b 32 18 aa 59 80 0d 00 2f b0 02 01 02 2f ab 00 24 30 22 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 0b 30 09 06 03 55 04 03 13 02 6e 73 00 25 30 23 31 13 30 11 06 0a 09 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0xc0 | |
SSL: TLS Message Length: 13444 | |
SSL: Need 12158 bytes more input data | |
SSL: Building ACK (type=25 id=3 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: startWhen --> 0 | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 04 05 10 19 40 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 0c 30 0a 06 03 55 04 03 13 03 72 61 64 00 2a 30 28 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 11 30 0f 06 03 55 04 03 13 08 63 69 74 2d 74 65 73 74 00 cc 30 81 c9 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 42 30 40 06 03 55 04 03 13 39 4e 65 74 4c 6f 63 6b 20 4d 69 6e 6f 73 69 74 65 74 74 20 4b 6f 7a 6a 65 67 79 7a 6f 69 20 28 43 6c 61 73 73 20 51 41 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 69 6e 66 6f 40 6e 65 74 6c 6f 63 6b 2e 68 75 00 66 30 64 31 0b 30 09 06 03 55 04 06 13 02 4b 52 31 0d 30 0b 06 03 55 04 0a 0c 04 4b 49 53 41 31 2e 30 2c 06 03 55 04 0b 0c 25 4b 6f 72 65 61 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 43 65 6e 74 72 61 6c 31 16 30 14 06 03 55 04 03 0c 0d 4b 49 53 41 20 52 6f 6f 74 43 41 20 31 00 71 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 00 9b 30 81 98 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03 55 04 0a 13 0d 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 31 39 30 37 06 03 55 04 0b 13 30 28 63 29 20 32 30 30 38 20 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 36 30 34 06 03 55 04 03 13 2d 47 65 6f 54 72 75 73 74 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 33 00 37 30 35 31 0b 30 09 06 03 55 04 06 13 02 53 49 31 0f 30 0d 06 03 55 04 0a 13 06 48 61 6c 63 6f 6d 31 15 30 13 06 03 55 04 03 13 0c 48 61 6c 63 6f 6d 20 43 41 20 46 4f 00 98 30 81 95 31 81 92 30 09 06 03 55 04 06 0c 02 42 47 30 15 06 03 55 04 0a 0c 0e 49 6e 66 6f 4e 6f 74 61 72 79 20 50 4c 43 30 15 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 07 72 6f 6f 74 2d 63 61 30 1a 06 03 55 04 03 0c 13 49 6e 66 6f 4e 6f 74 61 72 79 20 43 53 50 20 52 6f 6f 74 30 1a 06 03 55 04 0b 0c 13 49 6e 66 6f 4e 6f 74 61 72 79 20 43 53 50 20 52 6f 6f 74 30 1f 06 09 2a 86 48 86 f7 0d 01 09 01 16 12 63 73 70 40 69 6e 66 6f 6e 6f 74 61 72 79 2e 63 6f 6d 00 1f 30 1d 31 0b 30 09 06 03 55 04 06 13 02 53 49 31 0e 30 0c 06 03 55 04 0a 13 05 41 43 4e 4c 42 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 55 30 53 31 0b 30 09 06 03 55 04 06 13 02 42 45 31 1c 30 1a 06 03 55 04 0a 13 13 43 65 72 74 69 70 6f 73 74 20 73 2e 61 2e 2f 6e 2e 76 2e 31 26 30 24 06 03 55 04 03 13 1d 43 65 72 74 69 70 6f 73 74 20 45 2d 54 72 75 73 74 20 54 4f 50 20 52 6f 6f 74 20 43 41 00 67 30 65 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 24 30 22 06 03 55 04 03 13 1b 44 69 67 69 43 65 72 74 20 41 73 73 75 72 65 64 20 49 44 20 52 6f 6f 74 20 43 41 00 aa | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 10868 bytes more input data | |
SSL: Building ACK (type=25 id=4 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 05 05 10 19 40 30 81 a7 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 0c 08 42 75 64 61 70 65 73 74 31 15 30 13 06 03 55 04 0a 0c 0c 4e 65 74 4c 6f 63 6b 20 4b 66 74 2e 31 37 30 35 06 03 55 04 0b 0c 2e 54 61 6e c3 ba 73 c3 ad 74 76 c3 a1 6e 79 6b 69 61 64 c3 b3 6b 20 28 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 29 31 35 30 33 06 03 55 04 03 0c 2c 4e 65 74 4c 6f 63 6b 20 41 72 61 6e 79 20 28 43 6c 61 73 73 20 47 6f 6c 64 29 20 46 c5 91 74 61 6e c3 ba 73 c3 ad 74 76 c3 a1 6e 79 00 3b 30 39 31 0b 30 09 06 03 55 04 06 13 02 46 49 31 0f 30 0d 06 03 55 04 0a 13 06 53 6f 6e 65 72 61 31 19 30 17 06 03 55 04 03 13 10 53 6f 6e 65 72 61 20 43 6c 61 73 73 31 20 43 41 00 80 30 7e 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 22 30 20 06 03 55 04 0a 13 19 55 6e 69 7a 65 74 6f 20 54 65 63 68 6e 6f 6c 6f 67 69 65 73 20 53 2e 41 2e 31 27 30 25 06 03 55 04 0b 13 1e 43 65 72 74 75 6d 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 22 30 20 06 03 55 04 03 13 19 43 65 72 74 75 6d 20 54 72 75 73 74 65 64 20 4e 65 74 77 6f 72 6b 20 43 41 00 92 30 81 8f 31 0b 30 09 06 03 55 04 06 13 02 4c 56 31 35 30 33 06 03 55 04 0a 13 2c 56 41 53 20 4c 61 74 76 69 6a 61 73 20 50 61 73 74 73 20 2d 20 56 69 65 6e 2e 72 65 67 2e 4e 72 2e 34 30 30 30 33 30 35 32 37 39 30 31 23 30 21 06 03 55 04 0b 13 1a 53 65 72 74 69 66 69 6b 61 63 69 6a 61 73 20 70 61 6b 61 6c 70 6f 6a 75 6d 69 31 24 30 22 06 03 55 04 03 13 1b 56 41 53 20 4c 61 74 76 69 6a 61 73 20 50 61 73 74 73 20 53 53 49 28 52 43 41 29 00 4c 30 4a 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 15 30 13 06 03 55 04 0a 13 0c 53 77 69 73 73 53 69 67 6e 20 41 47 31 24 30 22 06 03 55 04 03 13 1b 53 77 69 73 73 53 69 67 6e 20 47 6f 6c 64 20 52 6f 6f 74 20 43 41 20 2d 20 47 33 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 34 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 3c 30 3a 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 0a 13 08 55 6e 69 54 72 75 73 74 31 18 30 16 06 03 55 04 03 13 0f 55 43 41 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 00 8f 30 81 8c 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 4b 30 49 06 03 55 04 0a 13 42 41 67 65 6e 63 69 61 20 4e 6f 74 61 72 69 61 6c 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 53 2e 4c 2e 20 55 6e 69 70 65 72 73 6f 6e 61 6c 20 2d 20 43 49 46 20 42 38 33 33 39 35 39 38 38 31 30 30 2e 06 03 55 04 03 13 27 41 4e 43 45 52 54 20 43 6f 72 70 6f 72 61 63 69 6f 6e 65 73 20 64 65 20 44 65 72 65 63 68 6f 20 50 75 62 6c 69 63 6f 00 57 30 55 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 1e 30 1c 06 03 55 04 0a 13 15 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 31 26 30 24 06 03 55 04 03 13 1d 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 20 52 6f 6f 74 20 43 41 00 7e 30 7c 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 4b 30 49 06 03 55 04 0a 13 42 41 67 65 6e 63 69 61 20 4e 6f 74 61 72 69 61 6c 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 53 2e 4c 2e 20 55 6e 69 70 65 72 73 6f 6e 61 6c 20 2d 20 43 49 46 20 42 38 33 33 39 35 39 38 38 31 20 30 1e 06 03 55 04 03 13 17 41 4e 43 45 52 54 20 43 65 72 74 69 66 69 63 61 64 6f 73 20 43 47 4e 00 68 30 66 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 28 30 26 06 03 55 04 0a 13 1f 53 77 65 64 69 73 68 20 53 6f 63 69 61 6c 20 49 6e 73 75 72 61 6e 63 65 20 41 67 65 6e 63 79 31 2d 30 2b 06 03 55 04 03 13 24 53 77 65 64 69 73 68 20 47 6f 76 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 9578 bytes more input data | |
SSL: Building ACK (type=25 id=5 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 06 05 10 19 40 65 72 6e 6d 65 6e 74 20 52 6f 6f 74 20 41 75 74 68 6f 72 69 74 79 20 76 31 00 cd 30 81 ca 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 39 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 45 30 43 06 03 55 04 03 13 3c 56 65 72 69 53 69 67 6e 20 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 33 00 3c 30 3a 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 11 30 0f 06 03 55 04 0a 0c 08 44 41 54 45 56 20 65 47 31 18 30 16 06 03 55 04 03 0c 0f 43 41 20 44 41 54 45 56 20 53 54 44 20 30 31 00 38 30 36 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 11 30 0f 06 03 55 04 0a 0c 08 43 61 72 65 6c 69 6e 6b 31 14 30 12 06 03 55 04 03 0c 0b 53 49 54 48 53 20 43 41 20 76 33 00 60 30 5e 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0e 30 0c 06 03 55 04 0a 13 05 41 4e 53 53 49 31 17 30 15 06 03 55 04 0b 13 0e 30 30 30 32 20 31 33 30 30 30 37 36 36 39 31 26 30 24 06 03 55 04 03 13 1d 49 47 43 2f 41 20 41 43 20 72 61 63 69 6e 65 20 45 74 61 74 20 66 72 61 6e 63 61 69 73 01 2f 30 82 01 2b 31 0b 30 09 06 03 55 04 06 13 02 54 52 31 18 30 16 06 03 55 04 07 0c 0f 47 65 62 7a 65 20 2d 20 4b 6f 63 61 65 6c 69 31 47 30 45 06 03 55 04 0a 0c 3e 54 c3 bc 72 6b 69 79 65 20 42 69 6c 69 6d 73 65 6c 20 76 65 20 54 65 6b 6e 6f 6c 6f 6a 69 6b 20 41 72 61 c5 9f 74 c4 b1 72 6d 61 20 4b 75 72 75 6d 75 20 2d 20 54 c3 9c 42 c4 b0 54 41 4b 31 48 30 46 06 03 55 04 0b 0c 3f 55 6c 75 73 61 6c 20 45 6c 65 6b 74 72 6f 6e 69 6b 20 76 65 20 4b 72 69 70 74 6f 6c 6f 6a 69 20 41 72 61 c5 9f 74 c4 b1 72 6d 61 20 45 6e 73 74 69 74 c3 bc 73 c3 bc 20 2d 20 55 45 4b 41 45 31 23 30 21 06 03 55 04 0b 0c 1a 4b 61 6d 75 20 53 65 72 74 69 66 69 6b 61 73 79 6f 6e 20 4d 65 72 6b 65 7a 69 31 4a 30 48 06 03 55 04 03 0c 41 54 c3 9c 42 c4 b0 54 41 4b 20 55 45 4b 41 45 20 4b c3 b6 6b 20 53 65 72 74 69 66 69 6b 61 20 48 69 7a 6d 65 74 20 53 61 c4 9f 6c 61 79 c4 b1 63 c4 b1 73 c4 b1 20 2d 20 53 c3 bc 72 c3 bc 6d 20 33 00 47 30 45 31 0b 30 09 06 03 55 04 06 13 02 42 4d 31 19 30 17 06 03 55 04 0a 13 10 51 75 6f 56 61 64 69 73 20 4c 69 6d 69 74 65 64 31 1b 30 19 06 03 55 04 03 13 12 51 75 6f 56 61 64 69 73 20 52 6f 6f 74 20 43 41 20 33 00 cd 30 81 ca 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 39 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 45 30 43 06 03 55 04 03 13 3c 56 65 72 69 53 69 67 6e 20 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 33 00 d4 30 81 d1 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 24 30 22 06 03 55 04 03 13 1b 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 46 72 65 65 6d 61 69 6c 20 43 41 31 2b 30 29 06 09 2a 86 48 86 f7 0d 01 09 01 16 1c 70 65 72 73 6f 6e 61 6c 2d 66 72 65 65 6d 61 69 6c 40 74 68 61 77 74 65 2e 63 6f 6d 00 51 30 4f 31 0b 30 09 06 03 55 04 06 13 02 4b 52 31 1c 30 1a 06 03 55 04 0a 13 13 47 6f 76 65 72 6e 6d 65 6e 74 20 6f 66 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 8288 bytes more input data | |
SSL: Building ACK (type=25 id=6 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 07 05 10 19 40 20 4b 6f 72 65 61 31 0d 30 0b 06 03 55 04 0b 13 04 47 50 4b 49 31 13 30 11 06 03 55 04 03 13 0a 47 50 4b 49 52 6f 6f 74 43 41 00 a7 30 81 a4 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 4a 30 48 06 03 55 04 0a 0c 41 43 6f 6c 65 67 69 6f 20 64 65 20 52 65 67 69 73 74 72 61 64 6f 72 65 73 20 64 65 20 6c 61 20 50 72 6f 70 69 65 64 61 64 20 79 20 4d 65 72 63 61 6e 74 69 6c 65 73 20 64 65 20 45 73 70 61 c3 b1 61 31 1b 30 19 06 03 55 04 0b 0c 12 43 65 72 74 69 66 69 63 61 64 6f 20 50 72 6f 70 69 6f 31 2c 30 2a 06 03 55 04 03 0c 23 52 65 67 69 73 74 72 61 64 6f 72 65 73 20 64 65 20 45 73 70 61 c3 b1 61 20 2d 20 43 41 20 52 61 c3 ad 7a 00 45 30 43 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 15 30 13 06 03 55 04 0a 13 0c 54 44 43 20 49 6e 74 65 72 6e 65 74 31 1d 30 1b 06 03 55 04 0b 13 14 54 44 43 20 49 6e 74 65 72 6e 65 74 20 52 6f 6f 74 20 43 41 00 74 30 72 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 16 30 14 06 03 55 04 0a 13 0d 4d 69 63 72 6f 73 65 63 20 4c 74 64 2e 31 14 30 12 06 03 55 04 0b 13 0b 65 2d 53 7a 69 67 6e 6f 20 43 41 31 22 30 20 06 03 55 04 03 13 19 4d 69 63 72 6f 73 65 63 20 65 2d 53 7a 69 67 6e 6f 20 52 6f 6f 74 20 43 41 00 76 30 74 31 0b 30 09 06 03 55 04 06 13 02 4c 54 31 2b 30 29 06 03 55 04 0a 13 22 53 6b 61 69 74 6d 65 6e 69 6e 69 6f 20 73 65 72 74 69 66 69 6b 61 76 69 6d 6f 20 63 65 6e 74 72 61 73 31 20 30 1e 06 03 55 04 0b 13 17 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 16 30 14 06 03 55 04 03 13 0d 53 53 43 20 52 6f 6f 74 20 43 41 20 43 00 3c 30 3a 31 19 30 17 06 03 55 04 0a 13 10 52 53 41 20 53 65 63 75 72 69 74 79 20 49 6e 63 31 1d 30 1b 06 03 55 04 0b 13 14 52 53 41 20 53 65 63 75 72 69 74 79 20 32 30 34 38 20 56 33 00 6e 30 6c 31 0b 30 09 06 03 55 04 06 13 02 63 68 31 0e 30 0c 06 03 55 04 0a 13 05 61 64 6d 69 6e 31 11 30 0f 06 03 55 04 0b 13 08 53 65 72 76 69 63 65 73 31 22 30 20 06 03 55 04 0b 13 19 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 69 65 73 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e 2d 52 6f 6f 74 2d 43 41 00 65 30 63 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 21 30 1f 06 03 55 04 0a 13 18 54 68 65 20 47 6f 20 44 61 64 64 79 20 47 72 6f 75 70 2c 20 49 6e 63 2e 31 31 30 2f 06 03 55 04 0b 13 28 47 6f 20 44 61 64 64 79 20 43 6c 61 73 73 20 32 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 f6 30 81 f3 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 3b 30 39 06 03 55 04 0a 13 32 41 67 65 6e 63 69 61 20 43 61 74 61 6c 61 6e 61 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 20 28 4e 49 46 20 51 2d 30 38 30 31 31 37 36 2d 49 29 31 28 30 26 06 03 55 04 0b 13 1f 53 65 72 76 65 69 73 20 50 75 62 6c 69 63 73 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 31 35 30 33 06 03 55 04 0b 13 2c 56 65 67 65 75 20 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 61 74 63 65 72 74 2e 6e 65 74 2f 76 65 72 61 72 72 65 6c 20 28 63 29 30 33 31 35 30 33 06 03 55 04 0b 13 2c 4a 65 72 61 72 71 75 69 61 20 45 6e 74 69 74 61 74 73 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 20 43 61 74 61 6c 61 6e 65 73 31 0f 30 0d 06 03 55 04 03 13 06 45 43 2d 41 43 43 00 46 30 44 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 14 30 12 06 03 55 04 0a 0c 0b 41 66 66 69 72 6d 54 72 75 73 74 31 1f 30 1d 06 03 55 04 03 0c 16 41 66 66 69 72 6d 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 69 6e 67 00 4c 30 4a 31 0b 30 09 06 03 55 04 06 13 02 53 4b 31 13 30 11 06 03 55 04 07 13 0a 42 72 61 74 69 73 6c 61 76 61 31 13 30 11 06 03 55 04 0a 13 0a 44 69 73 69 67 20 61 2e 73 2e 31 11 30 0f 06 03 55 04 03 13 08 43 41 20 44 69 73 69 67 00 8b 30 81 88 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 4e 65 77 20 4a 65 72 73 65 79 31 14 30 12 06 03 55 04 07 13 0b 4a 65 72 73 65 79 20 43 69 74 79 31 1e 30 1c 06 03 55 04 0a 13 15 54 68 65 20 55 53 45 52 54 52 55 53 54 20 4e 65 74 77 6f 72 6b 31 2e | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 6998 bytes more input data | |
SSL: Building ACK (type=25 id=7 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 08 05 10 19 40 30 2c 06 03 55 04 03 13 25 55 53 45 52 54 72 75 73 74 20 52 53 41 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 3e 30 3c 31 1e 30 1c 06 03 55 04 03 0c 15 41 74 6f 73 20 54 72 75 73 74 65 64 52 6f 6f 74 20 32 30 31 31 31 0d 30 0b 06 03 55 04 0a 0c 04 41 74 6f 73 31 0b 30 09 06 03 55 04 06 13 02 44 45 00 65 30 63 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 13 30 11 06 03 55 04 0a 13 0a 43 65 72 74 69 6e 6f 6d 69 73 31 17 30 15 06 03 55 04 0b 13 0e 30 30 30 32 20 34 33 33 39 39 38 39 30 33 31 26 30 24 06 03 55 04 03 0c 1d 43 65 72 74 69 6e 6f 6d 69 73 20 2d 20 41 75 74 6f 72 69 74 c3 a9 20 52 61 63 69 6e 65 00 91 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 54 4e 31 0d 30 0b 06 03 55 04 0a 13 04 41 4e 43 45 31 11 30 0f 06 03 55 04 0b 13 08 41 4e 43 45 20 57 45 42 31 37 30 35 06 03 55 04 03 13 2e 41 67 65 6e 63 65 20 4e 61 74 69 6f 6e 61 6c 65 20 64 65 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 45 6c 65 63 74 72 6f 6e 69 71 75 65 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 61 6e 63 65 40 63 65 72 74 69 66 69 63 61 74 69 6f 6e 2e 74 6e 00 3a 30 38 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 14 30 12 06 03 55 04 0a 0c 0b 49 5a 45 4e 50 45 20 53 2e 41 2e 31 13 30 11 06 03 55 04 03 0c 0a 49 7a 65 6e 70 65 2e 63 6f 6d 00 5a 30 58 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03 55 04 0a 13 0d 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 31 31 30 2f 06 03 55 04 03 13 28 47 65 6f 54 72 75 73 74 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 7f 30 7d 31 0b 30 09 06 03 55 04 06 13 02 45 55 31 27 30 25 06 03 55 04 0a 13 1e 41 43 20 43 61 6d 65 72 66 69 72 6d 61 20 53 41 20 43 49 46 20 41 38 32 37 34 33 32 38 37 31 23 30 21 06 03 55 04 0b 13 1a 68 74 74 70 3a 2f 2f 77 77 77 2e 63 68 61 6d 62 65 72 73 69 67 6e 2e 6f 72 67 31 20 30 1e 06 03 55 04 03 13 17 47 6c 6f 62 61 6c 20 43 68 61 6d 62 65 72 73 69 67 6e 20 52 6f 6f 74 00 d7 30 81 d4 31 0b 30 09 06 03 55 04 06 13 02 41 54 31 0f 30 0d 06 03 55 04 07 13 06 56 69 65 6e 6e 61 31 10 30 0e 06 03 55 04 08 13 07 41 75 73 74 72 69 61 31 3a 30 38 06 03 55 04 0a 13 31 41 52 47 45 20 44 41 54 45 4e 20 2d 20 41 75 73 74 72 69 61 6e 20 53 6f 63 69 65 74 79 20 66 6f 72 20 44 61 74 61 20 50 72 6f 74 65 63 74 69 6f 6e 31 2a 30 28 06 03 55 04 0b 13 21 47 4c 4f 42 41 4c 54 52 55 53 54 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 31 14 30 12 06 03 55 04 03 13 0b 47 4c 4f 42 41 4c 54 52 55 53 54 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 69 6e 66 6f 40 67 6c 6f 62 61 6c 74 72 75 73 74 2e 69 6e 66 6f 01 35 30 82 01 31 31 17 30 15 06 03 55 04 07 13 0e 41 6c 76 61 72 6f 20 4f 62 72 65 67 6f 6e 31 19 30 17 06 03 55 04 08 13 10 44 69 73 74 72 69 74 6f 20 46 65 64 65 72 61 6c 31 0b 30 09 06 03 55 04 06 13 02 4d 58 31 0e 30 0c 06 03 55 04 11 13 05 30 31 30 33 30 31 1d 30 1b 06 03 55 04 09 13 14 49 6e 73 75 72 67 65 6e 74 65 73 20 53 75 72 20 31 39 34 30 31 42 30 40 06 03 55 04 03 13 39 41 75 74 6f 72 69 64 61 64 20 43 65 72 74 69 66 69 63 61 64 6f 72 61 20 52 61 69 7a 20 64 65 20 6c 61 20 53 65 63 72 65 74 61 72 69 61 20 64 65 20 45 63 6f 6e 6f 6d 69 61 31 34 30 32 06 03 55 04 0b 13 2b 44 69 72 65 63 63 69 6f 6e 20 47 65 6e 65 72 61 6c 20 64 65 20 4e 6f 72 6d 61 74 69 76 69 64 61 64 20 4d 65 72 63 61 6e 74 69 6c 31 1f 30 1d 06 03 55 04 0a 13 16 53 65 63 72 65 74 61 72 69 61 20 64 65 20 45 63 6f 6e 6f 6d 69 61 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 61 63 72 73 65 40 65 63 6f 6e 6f 6d 69 61 2e 67 6f 62 2e 6d 78 00 c0 30 81 bd 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 32 30 30 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 5708 bytes more input data | |
SSL: Building ACK (type=25 id=8 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 09 05 10 19 40 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 38 30 36 06 03 55 04 03 13 2f 56 65 72 69 53 69 67 6e 20 55 6e 69 76 65 72 73 61 6c 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 d2 30 81 cf 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 23 30 21 06 03 55 04 03 13 1a 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 50 72 65 6d 69 75 6d 20 43 41 31 2a 30 28 06 09 2a 86 48 86 f7 0d 01 09 01 16 1b 70 65 72 73 6f 6e 61 6c 2d 70 72 65 6d 69 75 6d 40 74 68 61 77 74 65 2e 63 6f 6d 00 52 30 50 31 0b 30 09 06 03 55 04 06 13 02 4a 50 31 18 30 16 06 03 55 04 0a 13 0f 53 45 43 4f 4d 20 54 72 75 73 74 2e 6e 65 74 31 27 30 25 06 03 55 04 0b 13 1e 53 65 63 75 72 69 74 79 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 20 52 6f 6f 74 43 41 31 00 49 30 47 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03 55 04 0a 13 0d 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 31 20 30 1e 06 03 55 04 03 13 17 47 65 6f 54 72 75 73 74 20 55 6e 69 76 65 72 73 61 6c 20 43 41 20 32 00 3b 30 39 31 0b 30 09 06 03 55 04 06 13 02 46 49 31 0f 30 0d 06 03 55 04 0a 13 06 53 6f 6e 65 72 61 31 19 30 17 06 03 55 04 03 13 10 53 6f 6e 65 72 61 20 43 6c 61 73 73 32 20 43 41 00 35 30 33 31 0b 30 09 06 03 55 04 06 13 02 50 54 31 0d 30 0b 06 03 55 04 0a 0c 04 53 43 45 45 31 15 30 13 06 03 55 04 03 0c 0c 45 43 52 61 69 7a 45 73 74 61 64 6f 00 65 30 63 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1c 30 1a 06 03 55 04 0a 13 13 41 6d 65 72 69 63 61 20 4f 6e 6c 69 6e 65 20 49 6e 63 2e 31 36 30 34 06 03 55 04 03 13 2d 41 6d 65 72 69 63 61 20 4f 6e 6c 69 6e 65 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 31 00 3b 30 39 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 11 30 0f 06 03 55 04 0a 0c 08 44 41 54 45 56 20 65 47 31 17 30 15 06 03 55 04 03 0c 0e 43 41 20 44 41 54 45 56 20 42 54 20 30 32 01 22 30 82 01 1e 31 3e 30 3c 06 03 55 04 03 13 35 41 75 74 6f 72 69 64 61 64 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 52 61 69 7a 20 64 65 6c 20 45 73 74 61 64 6f 20 56 65 6e 65 7a 6f 6c 61 6e 6f 31 0b 30 09 06 03 55 04 06 13 02 56 45 31 10 30 0e 06 03 55 04 07 13 07 43 61 72 61 63 61 73 31 19 30 17 06 03 55 04 08 13 10 44 69 73 74 72 69 74 6f 20 43 61 70 69 74 61 6c 31 36 30 34 06 03 55 04 0a 13 2d 53 69 73 74 65 6d 61 20 4e 61 63 69 6f 6e 61 6c 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 45 6c 65 63 74 72 6f 6e 69 63 61 31 43 30 41 06 03 55 04 0b 13 3a 53 75 70 65 72 69 6e 74 65 6e 64 65 6e 63 69 61 20 64 65 20 53 65 72 76 69 63 69 6f 73 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 45 6c 65 63 74 72 6f 6e 69 63 61 31 25 30 23 06 09 2a 86 48 86 f7 0d 01 09 01 16 16 61 63 72 61 69 7a 40 73 75 73 63 65 72 74 65 2e 67 6f 62 2e 76 65 00 4c 30 4a 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 20 30 1e 06 03 55 04 0a 13 17 53 65 63 75 72 65 54 72 75 73 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 19 30 17 06 03 55 04 03 13 10 53 65 63 75 72 65 20 47 6c 6f 62 61 6c 20 43 41 00 47 30 45 31 0b 30 09 06 03 55 04 06 13 02 47 42 31 18 30 16 06 03 55 04 0a 13 0f 54 72 75 73 74 69 73 20 4c 69 6d 69 74 65 64 31 1c 30 1a 06 03 55 04 0b 13 13 54 72 75 73 74 69 73 20 46 50 53 20 52 6f 6f 74 20 43 41 00 5a 30 58 31 0b 30 09 06 03 55 04 06 13 02 4a 50 31 2b 30 29 06 03 55 04 0a 13 22 4a 61 70 61 6e 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 2c 20 49 6e 63 2e 31 1c 30 1a 06 03 55 04 03 13 13 53 65 63 75 72 65 53 69 67 6e 20 52 6f 6f 74 43 41 31 31 00 b5 30 81 b2 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 0f 30 0d 06 03 55 04 08 13 06 4d 61 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 4418 bytes more input data | |
SSL: Building ACK (type=25 id=9 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 09 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 0a 05 10 19 40 64 72 69 64 31 0f 30 0d 06 03 55 04 07 13 06 4d 61 64 72 69 64 31 2f 30 2d 06 03 55 04 0a 13 26 49 50 53 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 73 2e 6c 2e 20 69 70 73 43 41 31 0e 30 0c 06 03 55 04 0b 13 05 69 70 73 43 41 31 1d 30 1b 06 03 55 04 03 13 14 69 70 73 43 41 20 47 6c 6f 62 61 6c 20 43 41 20 52 6f 6f 74 31 21 30 1f 06 09 2a 86 48 86 f7 0d 01 09 01 16 12 67 6c 6f 62 61 6c 30 31 40 69 70 73 63 61 2e 63 6f 6d 00 7f 30 7d 31 0b 30 09 06 03 55 04 06 13 02 49 4c 31 16 30 14 06 03 55 04 0a 13 0d 53 74 61 72 74 43 6f 6d 20 4c 74 64 2e 31 2b 30 29 06 03 55 04 0b 13 22 53 65 63 75 72 65 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 20 53 69 67 6e 69 6e 67 31 29 30 27 06 03 55 04 03 13 20 53 74 61 72 74 43 6f 6d 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 3f 30 3d 31 0b 30 09 06 03 55 04 06 13 02 73 69 31 1b 30 19 06 03 55 04 0a 13 12 73 74 61 74 65 2d 69 6e 73 74 69 74 75 74 69 6f 6e 73 31 11 30 0f 06 03 55 04 0b 13 08 73 69 67 65 6e 2d 63 61 00 76 30 74 31 0b 30 09 06 03 55 04 06 13 02 4c 54 31 2b 30 29 06 03 55 04 0a 13 22 53 6b 61 69 74 6d 65 6e 69 6e 69 6f 20 73 65 72 74 69 66 69 6b 61 76 69 6d 6f 20 63 65 6e 74 72 61 73 31 20 30 1e 06 03 55 04 0b 13 17 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 16 30 14 06 03 55 04 03 13 0d 53 53 43 20 52 6f 6f 74 20 43 41 20 42 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 2d 30 2b 06 03 55 04 0a 13 24 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 31 45 30 43 06 03 55 04 03 13 3c 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 5f 30 5d 31 18 30 16 06 09 2a 86 48 86 f7 0d 01 09 01 16 09 70 6b 69 40 73 6b 2e 65 65 31 0b 30 09 06 03 55 04 06 13 02 45 45 31 22 30 20 06 03 55 04 0a 13 19 41 53 20 53 65 72 74 69 66 69 74 73 65 65 72 69 6d 69 73 6b 65 73 6b 75 73 31 10 30 0e 06 03 55 04 03 13 07 4a 75 75 72 2d 53 4b 00 ce 30 81 cb 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 42 61 73 69 63 20 43 41 31 28 30 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 70 65 72 73 6f 6e 61 6c 2d 62 61 73 69 63 40 74 68 61 77 74 65 2e 63 6f 6d 00 8e 30 81 8b 31 0b 30 09 06 03 55 04 06 13 02 41 54 31 48 30 46 06 03 55 04 0a 0c 3f 41 2d 54 72 75 73 74 20 47 65 73 2e 20 66 2e 20 53 69 63 68 65 72 68 65 69 74 73 73 79 73 74 65 6d 65 20 69 6d 20 65 6c 65 6b 74 72 2e 20 44 61 74 65 6e 76 65 72 6b 65 68 72 20 47 6d 62 48 31 18 30 16 06 03 55 04 0b 0c 0f 41 2d 54 72 75 73 74 2d 51 75 61 6c 2d 30 33 31 18 30 16 06 03 55 04 03 0c 0f 41 2d 54 72 75 73 74 2d 51 75 61 6c 2d 30 33 00 39 30 37 31 14 30 12 06 03 55 04 0a 0c 0b 54 65 6c 69 61 53 6f 6e 65 72 61 31 1f 30 1d 06 03 55 04 03 0c 16 54 65 6c 69 61 53 6f 6e 65 72 61 20 52 6f 6f 74 20 43 41 20 76 31 00 75 30 73 31 0b 30 09 06 03 55 04 06 13 02 49 4c 31 18 30 16 06 03 55 04 0a 0c 0f 50 65 72 73 6f 6e 61 6c 49 44 20 4c 74 64 2e 31 1d 30 1b 06 03 55 04 0b 0c 14 43 65 72 74 69 66 69 63 61 74 65 20 53 65 72 76 69 63 65 73 31 2b 30 29 06 03 55 04 03 0c 22 50 65 72 73 6f 6e 61 6c 49 44 20 54 72 75 73 74 77 6f 72 74 68 79 20 52 6f 6f 74 43 41 20 32 30 31 31 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69 7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61 6c 65 31 1a 30 18 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 3128 bytes more input data | |
SSL: Building ACK (type=25 id=10 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0a 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 0b 05 10 19 40 06 03 55 04 0a 13 11 47 6f 44 61 64 64 79 2e 63 6f 6d 2c 20 49 6e 63 2e 31 31 30 2f 06 03 55 04 03 13 28 47 6f 20 44 61 64 64 79 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 00 50 30 4e 31 0b 30 09 06 03 55 04 06 13 02 4e 4f 31 1d 30 1b 06 03 55 04 0a 0c 14 42 75 79 70 61 73 73 20 41 53 2d 39 38 33 31 36 33 33 32 37 31 20 30 1e 06 03 55 04 03 0c 17 42 75 79 70 61 73 73 20 43 6c 61 73 73 20 32 20 52 6f 6f 74 20 43 41 00 4d 30 4b 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 15 30 13 06 03 55 04 0a 0c 0c 44 2d 54 72 75 73 74 20 47 6d 62 48 31 25 30 23 06 03 55 04 03 0c 1c 44 2d 54 52 55 53 54 20 52 6f 6f 74 20 43 6c 61 73 73 20 32 20 43 41 20 32 30 30 37 00 d3 30 81 d0 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 48 30 46 06 03 55 04 0a 13 3f 49 5a 45 4e 50 45 20 53 2e 41 2e 20 2d 20 43 49 46 20 41 2d 30 31 33 33 37 32 36 30 2d 52 4d 65 72 63 2e 56 69 74 6f 72 69 61 2d 47 61 73 74 65 69 7a 20 54 31 30 35 35 20 46 36 32 20 53 38 31 42 30 40 06 03 55 04 07 13 39 41 76 64 61 20 64 65 6c 20 4d 65 64 69 74 65 72 72 61 6e 65 6f 20 45 74 6f 72 62 69 64 65 61 20 33 20 2d 20 30 31 30 31 30 20 56 69 74 6f 72 69 61 2d 47 61 73 74 65 69 7a 31 13 30 11 06 03 55 04 03 13 0a 49 7a 65 6e 70 65 2e 63 6f 6d 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 49 6e 66 6f 40 69 7a 65 6e 70 65 2e 63 6f 6d 00 af 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 45 55 31 43 30 41 06 03 55 04 07 13 3a 4d 61 64 72 69 64 20 28 73 65 65 20 63 75 72 72 65 6e 74 20 61 64 64 72 65 73 73 20 61 74 20 77 77 77 2e 63 61 6d 65 72 66 69 72 6d 61 2e 63 6f 6d 2f 61 64 64 72 65 73 73 29 31 12 30 10 06 03 55 04 05 13 09 41 38 32 37 34 33 32 38 37 31 1b 30 19 06 03 55 04 0a 13 12 41 43 20 43 61 6d 65 72 66 69 72 6d 61 20 53 2e 41 2e 31 27 30 25 06 03 55 04 03 13 1e 47 6c 6f 62 61 6c 20 43 68 61 6d 62 65 72 73 69 67 6e 20 52 6f 6f 74 20 2d 20 32 30 30 38 00 cd 30 81 ca 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 32 30 30 36 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 45 30 43 06 03 55 04 03 13 3c 56 65 72 69 53 69 67 6e 20 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 35 00 95 30 81 92 31 24 30 22 06 03 55 04 07 13 1b 42 6f 67 6f 74 61 20 41 56 20 43 61 6c 6c 65 20 32 36 20 4e 20 36 38 44 2d 33 35 31 0b 30 09 06 03 55 04 06 13 02 43 4f 31 42 30 40 06 03 55 04 0a 13 39 45 6e 74 69 64 61 64 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 44 69 67 69 74 61 6c 20 41 62 69 65 72 74 61 20 43 65 72 74 69 63 61 6d 61 72 61 20 53 2e 41 2e 31 19 30 17 06 03 55 04 03 13 10 43 45 52 54 49 43 41 4d 41 52 41 20 53 2e 41 2e 00 8d 30 81 8a 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 32 30 30 06 03 55 04 0a 0c 29 43 68 69 6e 61 20 49 6e 74 65 72 6e 65 74 20 4e 65 74 77 6f 72 6b 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 43 65 6e 74 65 72 31 47 30 45 06 03 55 04 03 0c 3e 43 68 69 6e 61 20 49 6e 74 65 72 6e 65 74 20 4e 65 74 77 6f 72 6b 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 43 65 6e 74 65 72 20 45 56 20 43 65 72 74 69 66 69 63 61 74 65 73 20 52 6f 6f 74 00 b7 30 81 b4 31 14 30 12 06 03 55 04 0a 13 0b 45 6e 74 72 75 73 74 2e 6e 65 74 31 40 30 3e 06 03 55 04 0b 14 37 77 77 77 2e 65 6e 74 72 75 73 74 2e 6e 65 74 2f 43 50 53 5f 32 30 34 38 20 69 6e 63 6f 72 70 2e 20 62 79 20 72 65 66 2e 20 28 6c 69 6d 69 74 73 20 6c 69 61 62 2e 29 31 25 30 23 06 03 55 04 0b 13 1c 28 63 29 20 31 39 39 39 20 45 6e 74 72 75 73 74 2e 6e 65 74 20 4c 69 6d 69 74 65 64 31 33 30 31 06 03 55 04 03 13 2a 45 6e 74 72 75 73 74 2e 6e 65 74 20 43 65 72 74 69 66 69 63 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 1838 bytes more input data | |
SSL: Building ACK (type=25 id=11 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0b 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 0c 05 10 19 40 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 28 32 30 34 38 29 00 57 30 55 31 0b 30 09 06 03 55 04 06 13 02 41 54 31 10 30 0e 06 03 55 04 0a 13 07 41 2d 54 72 75 73 74 31 19 30 17 06 03 55 04 0b 13 10 41 2d 54 72 75 73 74 2d 6e 51 75 61 6c 2d 30 31 31 19 30 17 06 03 55 04 03 13 10 41 2d 54 72 75 73 74 2d 6e 51 75 61 6c 2d 30 31 00 3c 30 3a 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 11 30 0f 06 03 55 04 0a 0c 08 44 41 54 45 56 20 65 47 31 18 30 16 06 03 55 04 03 0c 0f 43 41 20 44 41 54 45 56 20 49 4e 54 20 30 31 00 85 30 81 82 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 2b 30 29 06 03 55 04 0a 0c 22 54 2d 53 79 73 74 65 6d 73 20 45 6e 74 65 72 70 72 69 73 65 20 53 65 72 76 69 63 65 73 20 47 6d 62 48 31 1f 30 1d 06 03 55 04 0b 0c 16 54 2d 53 79 73 74 65 6d 73 20 54 72 75 73 74 20 43 65 6e 74 65 72 31 25 30 23 06 03 55 04 03 0c 1c 54 2d 54 65 6c 65 53 65 63 20 47 6c 6f 62 61 6c 52 6f 6f 74 20 43 6c 61 73 73 20 33 00 4f 30 4d 31 0b 30 09 06 03 55 04 06 13 02 53 47 31 28 30 26 06 03 55 04 0a 13 1f 4e 65 74 72 75 73 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 20 31 31 14 30 12 06 03 55 04 0b 13 0b 4e 65 74 72 75 73 74 20 43 41 31 00 4b 30 49 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 15 30 13 06 03 55 04 0a 13 0c 53 77 69 73 73 53 69 67 6e 20 41 47 31 23 30 21 06 03 55 04 03 13 1a 53 77 69 73 73 53 69 67 6e 20 50 6c 61 74 69 6e 75 6d 20 43 41 20 2d 20 47 32 00 4f 30 4d 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 15 30 13 06 03 55 04 0a 0c 0c 44 2d 54 72 75 73 74 20 47 6d 62 48 31 27 30 25 06 03 55 04 03 0c 1e 44 2d 54 52 55 53 54 20 52 6f 6f 74 20 43 6c 61 73 73 20 33 20 43 41 20 32 20 32 30 30 39 00 8d 30 81 8a 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 0a 13 07 57 49 53 65 4b 65 79 31 1b 30 19 06 03 55 04 0b 13 12 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32 30 30 35 31 22 30 20 06 03 55 04 0b 13 19 4f 49 53 54 45 20 46 6f 75 6e 64 61 74 69 6f 6e 20 45 6e 64 6f 72 73 65 64 31 28 30 26 06 03 55 04 03 13 1f 4f 49 53 54 45 20 57 49 53 65 4b 65 79 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 20 47 41 20 43 41 00 5c 30 5a 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 1e 30 1c 06 03 55 04 0a 0c 15 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 31 2b 30 29 06 03 55 04 03 0c 22 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 20 52 6f 6f 74 20 43 41 20 2d 20 47 32 00 7b 30 79 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0d 30 0b 06 03 55 04 0a 13 04 56 49 53 41 31 2f 30 2d 06 03 55 04 0b 13 26 56 69 73 61 20 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 20 53 65 72 76 69 63 65 20 41 73 73 6f 63 69 61 74 69 6f 6e 31 2a 30 28 06 03 55 04 03 13 21 56 69 73 61 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 44 65 6c 69 76 65 72 79 20 52 6f 6f 74 20 43 41 00 76 30 74 31 0b 30 09 06 03 55 04 06 13 02 4c 54 31 2b 30 29 06 03 55 04 0a 13 22 53 6b 61 69 74 6d 65 6e 69 6e 69 6f 20 73 65 72 74 69 66 69 6b 61 76 69 6d 6f 20 63 65 6e 74 72 61 73 31 20 30 1e 06 03 55 04 0b 13 17 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 16 30 14 06 03 55 04 03 13 0d 53 53 43 20 52 6f 6f 74 20 43 41 20 41 00 d2 30 81 cf 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69 7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61 6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20 54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 3a 30 38 06 03 55 04 0b 13 31 68 74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 31 36 30 34 06 03 55 04 03 13 2d 53 74 61 72 66 69 65 6c 64 20 53 65 72 76 69 63 65 73 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 00 66 30 64 31 0b 30 09 06 03 55 04 06 13 02 63 68 31 11 30 0f 06 03 55 04 0a 13 08 53 77 69 73 73 63 6f 6d 31 25 30 23 06 03 55 04 0b 13 1c 44 69 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1296) - Flags 0x40 | |
SSL: Need 548 bytes more input data | |
SSL: Building ACK (type=25 id=12 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0c 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=558 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=558): 02 00 02 2a 01 0d 02 2a 19 00 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 20 53 65 72 76 69 63 65 73 31 1b 30 19 06 03 55 04 03 13 12 53 77 69 73 73 63 6f 6d 20 52 6f 6f 74 20 43 41 20 31 00 5f 30 5d 31 0b 30 09 06 03 55 04 06 13 02 4a 50 31 25 30 23 06 03 55 04 0a 13 1c 53 45 43 4f 4d 20 54 72 75 73 74 20 53 79 73 74 65 6d 73 20 43 4f 2e 2c 4c 54 44 2e 31 27 30 25 06 03 55 04 0b 13 1e 53 65 63 75 72 69 74 79 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 20 52 6f 6f 74 43 41 32 00 3d 30 3b 31 18 30 16 06 03 55 04 0a 13 0f 43 79 62 65 72 74 72 75 73 74 2c 20 49 6e 63 31 1f 30 1d 06 03 55 04 03 13 16 43 79 62 65 72 74 72 75 73 74 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 00 6e 30 6c 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 2b 30 29 06 03 55 04 03 13 22 44 69 67 69 43 65 72 74 20 48 69 67 68 20 41 73 73 75 72 61 6e 63 65 20 45 56 20 52 6f 6f 74 20 43 41 00 88 30 81 85 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 46 72 61 6e 63 65 31 0e 30 0c 06 03 55 04 07 13 05 50 61 72 69 73 31 10 30 0e 06 03 55 04 0a 13 07 50 4d 2f 53 47 44 4e 31 0e 30 0c 06 03 55 04 0b 13 05 44 43 53 53 49 31 0e 30 0c 06 03 55 04 03 13 05 49 47 43 2f 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 69 67 63 61 40 73 67 64 6e 2e 70 6d 2e 67 6f 75 76 2e 66 72 00 4d 30 4b 31 0b 30 09 06 03 55 04 06 13 02 4e 4f 31 1d 30 1b 06 03 55 04 0a 0c 14 42 75 79 70 61 73 73 20 41 53 2d 39 38 33 31 36 33 33 32 37 31 1d 30 1b 06 03 55 04 03 0c 14 42 75 79 70 61 73 73 20 43 6c 61 73 73 20 33 20 43 41 20 31 0e 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=554) - Flags 0x00 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=81): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=1142): [REMOVED] | |
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/CN=bsurad.bsu' | |
wlp1s0b1: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=bsurad.bsu' hash=5fcb8120d877105c01d56d8d8d92ab0c9c26e96c727d39654ebad78008e356b1 | |
EAP: Status notification: remote certificate verification (param=success) | |
TLS: tls_verify_cb - preverify_ok=1 err=21 (unable to verify the first certificate) ca_cert_verify=0 depth=0 buf='/CN=bsurad.bsu' | |
wlp1s0b1: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=bsurad.bsu' hash=5fcb8120d877105c01d56d8d8d92ab0c9c26e96c727d39654ebad78008e356b1 | |
EAP: Status notification: remote certificate verification (param=success) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=12212): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=4): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=7): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=134): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=20 | |
OpenSSL: Message - hexdump(len=1): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=16): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in unknown state | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in unknown state | |
SSL: SSL_connect - want more data | |
SSL: 194 bytes pending from ssl_out | |
SSL: 194 bytes left to be sent out (of total 194 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21daa50 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=208): 01 00 00 cc 02 0d 00 cc 19 80 00 00 00 c2 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 00 86 10 00 00 82 00 80 44 d1 5e 85 c9 c5 46 dc 4c 86 06 ee da 59 66 82 3b 00 1c 98 62 46 e1 05 91 f7 7b b8 94 e3 91 8b c7 e9 6a 90 66 e1 ef 5e ab 89 aa d3 22 47 45 b3 1c 81 6b 95 74 6f 9d 8b 09 98 40 00 18 e5 6a f6 1a dc cc c1 64 5b 61 25 62 f7 e1 4a d0 05 c6 72 80 b9 50 c6 41 fc 37 ad 57 0d b3 ff 6c 46 97 d1 18 12 a3 f3 e7 8e 36 66 02 6c 55 5a 3a 2b af ba a2 18 79 cb d2 fe a1 3e 03 48 75 15 1b 01 c4 32 14 03 01 00 01 01 16 03 01 00 20 b6 35 d8 0a 39 d7 37 a7 81 fa 32 59 bb 6e 63 9c d6 cb cd a9 8b df 61 6d 04 6d 6b f4 87 c9 42 53 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=57 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=57): 02 00 00 35 01 0e 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 7a d6 44 72 de 3f d9 49 30 89 13 25 ff fd d2 13 8f 10 7e f1 94 c8 47 5e 58 9a c0 35 c3 a2 a2 d2 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=53) - Flags 0x80 | |
SSL: TLS Message Length: 43 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=20 | |
OpenSSL: Message - hexdump(len=1): [REMOVED] | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=16): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x20 ret=0x1) | |
SSL: (where=0x1002 ret=0x1) | |
SSL: 0 bytes pending from ssl_out | |
OpenSSL: Handshake finished - resumed=0 | |
SSL: No Application Data included | |
SSL: No data to be sent out | |
EAP-PEAP: TLS done, proceed to Phase 2 | |
EAP-PEAP: using label 'client EAP encryption' in key derivation | |
OpenSSL: Using internal PRF | |
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] | |
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd | |
SSL: Building ACK (type=25 id=14 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21bad00 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0e 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=32 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=32): 02 00 00 1c 01 0f 00 1c 19 00 17 03 01 00 11 78 f6 c0 38 c9 d3 b3 50 d3 c6 28 2f 94 1d 03 0e e7 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=15 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=28) - Flags 0x00 | |
EAP-PEAP: received 22 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01 | |
EAP-PEAP: received Phase 2: code=1 identifier=15 length=5 | |
EAP-PEAP: Phase 2 Request: type=1 | |
EAP: using real identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=17): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 34 bytes left to be sent out (of total 34 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21d9b60 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=44): 01 00 00 28 02 0f 00 28 19 00 17 03 01 00 1d 3c c3 5f 82 e9 a5 ab 3b c6 21 06 d9 fc 79 f1 35 dc 97 48 b0 88 26 d2 35 47 28 c8 bd f3 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=59 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=59): 02 00 00 37 01 10 00 37 19 00 17 03 01 00 2c 7a 59 8e db 93 0a ff 78 3a cd cf cd f0 80 cd 89 b5 51 17 12 b1 2b 39 99 87 b9 04 55 d0 31 ad 1e a3 e0 e6 a8 77 9f 81 ca 43 29 bd e6 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=16 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=55) - Flags 0x00 | |
EAP-PEAP: received 49 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=28): 1a 01 10 00 1b 10 e2 6a 8b 4e 12 e7 ea 44 ee b4 31 f6 aa 42 ea 91 42 53 55 52 41 44 | |
EAP-PEAP: received Phase 2: code=1 identifier=16 length=32 | |
EAP-PEAP: Phase 2 Request: type=26 | |
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 | |
EAP-MSCHAPV2: RX identifier 16 mschapv2_id 16 | |
EAP-MSCHAPV2: Received challenge | |
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=6): | |
42 53 55 52 41 44 BSURAD | |
EAP-MSCHAPV2: Generating Challenge Response | |
MSCHAPV2: Identity - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA | |
MSCHAPV2: Username - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA | |
MSCHAPV2: auth_challenge - hexdump(len=16): e2 6a 8b 4e 12 e7 ea 44 ee b4 31 f6 aa 42 ea 91 | |
MSCHAPV2: peer_challenge - hexdump(len=16): 8e d8 eb f2 bc ff bc 67 40 e9 45 fb 0f 8b 52 49 | |
MSCHAPV2: username - hexdump_ascii(len=12): | |
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA | |
MSCHAPV2: password - hexdump_ascii(len=6): [REMOVED] | |
MSCHAPV2: NT Response - hexdump(len=24): 1d ea 1e 52 3b 46 97 9e 97 5b 7b ee 2e 82 6c 6d d8 32 49 5a 07 c6 20 2f | |
MSCHAPV2: Auth Response - hexdump(len=20): 1e b3 94 35 8d bb 4a d5 a3 a3 14 b3 6e ed c3 4c c9 84 60 e4 | |
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] | |
EAP-MSCHAPV2: TX identifier 16 mschapv2_id 16 (response) | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=71): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 88 bytes left to be sent out (of total 88 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21af950 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=98): 01 00 00 5e 02 10 00 5e 19 00 17 03 01 00 53 4e 92 0e c1 99 d6 91 45 f6 b6 78 06 5b 53 5a 2c e2 95 4a d6 b5 85 64 a5 e1 ef fa 08 05 74 4b a3 16 cc b2 e9 b4 93 c8 25 0a 31 24 c5 49 8f b5 35 c6 af 20 4f ad 34 6e 58 56 90 a1 4c 2e ec 92 da c8 c9 39 49 90 e9 e8 d6 98 0c 8a bf 14 c2 55 7d 2e ad b7 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=78 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=78): 02 00 00 4a 01 11 00 4a 19 00 17 03 01 00 3f 50 f2 16 31 4f 05 2d ea 66 6f 07 6e 29 e3 ae c1 17 8c 89 68 ef be 43 01 62 c9 4b dd db a2 e0 c4 97 ac 66 8b ec f8 64 a6 d8 9b df ea c6 8d ba ad a6 cf d3 52 74 b5 54 fb c5 ca 99 c9 bb f6 8e | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=17 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=74) - Flags 0x00 | |
EAP-PEAP: received 68 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 10 00 2e 53 3d 31 45 42 33 39 34 33 35 38 44 42 42 34 41 44 35 41 33 41 33 31 34 42 33 36 45 45 44 43 33 34 43 43 39 38 34 36 30 45 34 | |
EAP-PEAP: received Phase 2: code=1 identifier=17 length=51 | |
EAP-PEAP: Phase 2 Request: type=26 | |
EAP-MSCHAPV2: RX identifier 17 mschapv2_id 16 | |
EAP-MSCHAPV2: Received success | |
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): | |
EAP-MSCHAPV2: Authentication succeeded | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 23 bytes left to be sent out (of total 23 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21af910 | |
EAP: Session-Id - hexdump(len=65): 19 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 11 00 1d 19 00 17 03 01 00 12 ee 6c de 3d c3 d3 f6 77 cc db f7 22 47 8a 9b 63 3c 15 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=42 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=42): 02 00 00 26 01 12 00 26 19 00 17 03 01 00 1b 52 d4 57 2c 1e ed 66 ca 24 47 dc 3e be e7 9d 36 54 f3 ea 2e 52 5f 2e 62 1e 65 f8 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=18 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=38) - Flags 0x00 | |
EAP-PEAP: received 32 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 12 00 0b 21 80 03 00 02 00 01 | |
EAP-PEAP: received Phase 2: code=1 identifier=18 length=11 | |
EAP-PEAP: Phase 2 Request: type=33 | |
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 | |
EAP-TLV: Result TLV - hexdump(len=2): 00 01 | |
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 32 bytes left to be sent out (of total 32 bytes) | |
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x21da030 | |
EAP: Session-Id - hexdump(len=65): 19 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:3a:98:f5:90:e2 | |
TX EAPOL - hexdump(len=42): 01 00 00 26 02 12 00 26 19 00 17 03 01 00 1b 91 d5 8f f0 ff de e7 58 08 15 5a f3 e5 26 d3 3e 13 83 a8 e2 04 04 b0 dc d4 29 b1 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=8 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=8): 02 00 00 04 03 13 00 04 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Success | |
EAP: Status notification: completion (param=success) | |
EAP: Workaround for unexpected identifier field in EAP Success: reqId=19 lastId=18 (these are supposed to be same) | |
EAP: EAP entering state SUCCESS | |
wlp1s0b1: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117 | |
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) | |
wlp1s0b1: key_length=16 key_data_length=22 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_nonce - hexdump(len=32): 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: RSN: no matching PMKID found | |
EAPOL: Successfully fetched key (len=32) | |
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] | |
RSN: Added PMKSA cache entry for 00:3a:98:f5:90:e2 network_ctx=0x2181a10 | |
nl80211: Add PMKID for 00:3a:98:f5:90:e2 | |
wlp1s0b1: RSN: the new PMK matches with the PMKID | |
WPA: Renewed SNonce - hexdump(len=32): 13 21 64 7e 54 04 c8 fc 16 cd 55 f9 d0 37 00 ce 72 84 40 2f 9f ed 3f 3c 78 c6 49 8b ef 42 87 3d | |
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
WPA: Nonce1 - hexdump(len=32): 13 21 64 7e 54 04 c8 fc 16 cd 55 f9 d0 37 00 ce 72 84 40 2f 9f ed 3f 3c 78 c6 49 8b ef 42 87 3d | |
WPA: Nonce2 - hexdump(len=32): 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d | |
WPA: PMK - hexdump(len=32): [REMOVED] | |
WPA: PTK - hexdump(len=48): [REMOVED] | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: KEK - hexdump(len=16): [REMOVED] | |
WPA: TK - hexdump(len=16): [REMOVED] | |
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
wlp1s0b1: WPA: Sending EAPOL-Key 2/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 59 c6 8a 2d ab 56 9c 25 d9 c4 46 cc 13 f7 27 f1 | |
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 13 21 64 7e 54 04 c8 fc 16 cd 55 f9 d0 37 00 ce 72 84 40 2f 9f ed 3f 3c 78 c6 49 8b ef 42 87 3d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 c6 8a 2d ab 56 9c 25 d9 c4 46 cc 13 f7 27 f1 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 fa 03 b5 0d 1d d9 08 db bc c5 50 56 c5 0b 94 00 50 51 ae ee 71 c4 6a f8 f6 98 ab 7e 55 b0 2c 0b 3e 9d 3d 3b 04 04 2b 15 4e 87 4d 7b 48 e6 56 a0 4a b2 04 b2 a0 bd c8 f6 4f 01 0a 3c 47 21 ed d0 2d 3d f4 57 ea 06 41 09 01 88 6a b6 fc 9c a8 78 0a ea ec be 43 f6 b9 18 75 7e 6e ef 44 b5 37 45 5e | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175 | |
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 fa 03 b5 0d 1d d9 08 db bc c5 50 56 c5 0b 94 00 50 51 ae ee 71 c4 6a f8 f6 98 ab 7e 55 b0 2c 0b 3e 9d 3d 3b 04 04 2b 15 4e 87 4d 7b 48 e6 56 a0 4a b2 04 b2 a0 bd c8 f6 4f 01 0a 3c 47 21 ed d0 2d 3d f4 57 ea 06 41 09 01 88 6a b6 fc 9c a8 78 0a ea ec be 43 f6 b9 18 75 7e 6e ef 44 b5 37 45 5e | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) | |
wlp1s0b1: key_length=16 key_data_length=80 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 | |
key_nonce - hexdump(len=32): 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 94 fa 03 b5 0d 1d d9 08 db bc c5 50 56 c5 0b 94 | |
RSN: encrypted key data - hexdump(len=80): 51 ae ee 71 c4 6a f8 f6 98 ab 7e 55 b0 2c 0b 3e 9d 3d 3b 04 04 2b 15 4e 87 4d 7b 48 e6 56 a0 4a b2 04 b2 a0 bd c8 f6 4f 01 0a 3c 47 21 ed d0 2d 3d f4 57 ea 06 41 09 01 88 6a b6 fc 9c a8 78 0a ea ec be 43 f6 b9 18 75 7e 6e ef 44 b5 37 45 5e | |
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] | |
wlp1s0b1: WPA: Sending EAPOL-Key 4/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): eb ea ff 1d 00 e7 75 f1 86 c7 4e 51 97 76 52 a5 | |
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb ea ff 1d 00 e7 75 f1 86 c7 4e 51 97 76 52 a5 00 00 | |
wlp1s0b1: WPA: Installing PTK to the driver | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
addr=00:3a:98:f5:90:e2 | |
EAPOL: External notification - portValid=1 | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2 | |
EAPOL authentication completed - result=SUCCESS | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE | |
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] | |
WPA: Group Key - hexdump(len=32): [REMOVED] | |
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32) | |
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32 | |
nl80211: KEY_DATA - hexdump(len=32): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
broadcast key | |
nl80211: set_key failed; err=-22 Invalid argument) | |
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1) | |
wlp1s0b1: RSN: Failed to install GTK | |
wlp1s0b1: RSN: Failed to configure GTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 1 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1 | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x219f5d0 done in 5.386528 seconds | |
Added BSSID 00:3a:98:f5:90:e2 into blacklist | |
wlp1s0b1: Blacklist count 1 --> request scan in 100 ms | |
wlp1s0b1: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
addr=00:3a:98:f5:90:e2 | |
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
EAPOL: disable timer tick | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x219d880 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x219d880 after 0.000020 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000054 seconds | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.660971 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 2 | |
wlp1s0b1: BSS: Add new id 2 BSSID 00:3a:9a:00:7c:13 SSID 'test' freq 2437 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x219d880 done in 0.661456 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: skip - blacklisted (count=1 limit=0) | |
wlp1s0b1: 1: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-61 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 2: 00:3a:9a:00:7c:13 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-74 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear) | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x219d880 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x219d880 after 0.000024 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:3a:98:f5:90:e2 | |
RSN: PMKSA cache entry found - PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: Trying to use cached PMKSA | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 10 ee 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=50): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 20 ee 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2437 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2 | |
wlp1s0b1: Associated with 00:3a:98:f5:90:e2 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: maintaining EAP method data for fast reauthentication | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117 | |
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) | |
wlp1s0b1: key_length=16 key_data_length=22 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: matched PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMK from PMKSA cache - hexdump(len=32): [REMOVED] | |
EAPOL: PMKSA caching was used - skip EAPOL | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
WPA: Renewed SNonce - hexdump(len=32): 2e 6f a4 a1 f6 21 44 07 6f 60 b6 a5 be 90 76 7a 24 bd 47 fc a0 a6 3a 5a db dd 50 fa 3c 44 69 2c | |
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
WPA: Nonce1 - hexdump(len=32): 2e 6f a4 a1 f6 21 44 07 6f 60 b6 a5 be 90 76 7a 24 bd 47 fc a0 a6 3a 5a db dd 50 fa 3c 44 69 2c | |
WPA: Nonce2 - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e | |
WPA: PMK - hexdump(len=32): [REMOVED] | |
WPA: PTK - hexdump(len=48): [REMOVED] | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: KEK - hexdump(len=16): [REMOVED] | |
WPA: TK - hexdump(len=16): [REMOVED] | |
WPA: WPA IE for msg 2/4 - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
wlp1s0b1: WPA: Sending EAPOL-Key 2/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 05 99 14 8d 66 bd a7 b8 89 b2 fd b8 d0 d5 b0 76 | |
WPA: TX EAPOL-Key - hexdump(len=139): 01 03 00 87 02 01 0a 00 00 00 00 00 00 00 00 00 00 2e 6f a4 a1 f6 21 44 07 6f 60 b6 a5 be 90 76 7a 24 bd 47 fc a0 a6 3a 5a db dd 50 fa 3c 44 69 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 99 14 8d 66 bd a7 b8 89 b2 fd b8 d0 d5 b0 76 00 28 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 fb 50 b5 f6 23 93 95 92 37 94 a7 c9 ad ea 27 00 50 d9 75 0a a0 1a c9 ba 7c ed 20 5a 05 a3 27 7b 6a 79 45 15 46 7d 0b 32 f7 b1 62 3e 72 33 63 30 ae 8c 6a 7f f7 4c e6 68 80 94 0d 41 93 ab 1e ec 9b ea b5 62 b5 21 5d 63 31 01 3e 43 4a 73 8e 8e c0 28 8f e4 9c 8c a9 4c dd 26 70 27 c8 fe 32 64 fc | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175 | |
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 fb 50 b5 f6 23 93 95 92 37 94 a7 c9 ad ea 27 00 50 d9 75 0a a0 1a c9 ba 7c ed 20 5a 05 a3 27 7b 6a 79 45 15 46 7d 0b 32 f7 b1 62 3e 72 33 63 30 ae 8c 6a 7f f7 4c e6 68 80 94 0d 41 93 ab 1e ec 9b ea b5 62 b5 21 5d 63 31 01 3e 43 4a 73 8e 8e c0 28 8f e4 9c 8c a9 4c dd 26 70 27 c8 fe 32 64 fc | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) | |
wlp1s0b1: key_length=16 key_data_length=80 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 | |
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 35 fb 50 b5 f6 23 93 95 92 37 94 a7 c9 ad ea 27 | |
RSN: encrypted key data - hexdump(len=80): d9 75 0a a0 1a c9 ba 7c ed 20 5a 05 a3 27 7b 6a 79 45 15 46 7d 0b 32 f7 b1 62 3e 72 33 63 30 ae 8c 6a 7f f7 4c e6 68 80 94 0d 41 93 ab 1e ec 9b ea b5 62 b5 21 5d 63 31 01 3e 43 4a 73 8e 8e c0 28 8f e4 9c 8c a9 4c dd 26 70 27 c8 fe 32 64 fc | |
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] | |
wlp1s0b1: WPA: Sending EAPOL-Key 4/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): fd 7b 9c 48 87 fb c9 e2 da c9 67 5b 03 55 b3 43 | |
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd 7b 9c 48 87 fb c9 e2 da c9 67 5b 03 55 b3 43 00 00 | |
wlp1s0b1: WPA: Installing PTK to the driver | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
addr=00:3a:98:f5:90:e2 | |
EAPOL: External notification - portValid=1 | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2 | |
EAPOL authentication completed - result=SUCCESS | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE | |
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] | |
WPA: Group Key - hexdump(len=32): [REMOVED] | |
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32) | |
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32 | |
nl80211: KEY_DATA - hexdump(len=32): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
broadcast key | |
nl80211: set_key failed; err=-22 Invalid argument) | |
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1) | |
wlp1s0b1: RSN: Failed to install GTK | |
wlp1s0b1: RSN: Failed to configure GTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 1 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1 | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x219d880 done in 0.655424 seconds | |
Added BSSID 00:3a:98:f5:90:e2 into blacklist | |
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms | |
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
addr=00:3a:98:f5:90:e2 | |
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x21d9370 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x21d9370 after 0.000020 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000054 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.659943 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 3 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x21d9370 done in 0.660367 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2437 | |
wlp1s0b1: skip - blacklisted (count=1 limit=0) | |
wlp1s0b1: 2: 00:3a:9a:00:7c:13 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-74 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear) | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x21d9370 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x21d9370 after 0.000024 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:3a:98:f5:90:e2 | |
RSN: PMKSA cache entry found - PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: Trying to use cached PMKSA | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 a0 f0 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=50): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 b0 f0 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2437 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2 | |
wlp1s0b1: Associated with 00:3a:98:f5:90:e2 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: maintaining EAP method data for fast reauthentication | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117 | |
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) | |
wlp1s0b1: key_length=16 key_data_length=22 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: matched PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMK from PMKSA cache - hexdump(len=32): [REMOVED] | |
EAPOL: PMKSA caching was used - skip EAPOL | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
WPA: Renewed SNonce - hexdump(len=32): bd 30 18 db 51 4e a3 4b 1f 85 72 af f8 3e 9e d3 9a 8e 67 c5 5e bc 3d a7 22 31 bd 88 ef fe c8 05 | |
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
WPA: Nonce1 - hexdump(len=32): bd 30 18 db 51 4e a3 4b 1f 85 72 af f8 3e 9e d3 9a 8e 67 c5 5e bc 3d a7 22 31 bd 88 ef fe c8 05 | |
WPA: Nonce2 - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f | |
WPA: PMK - hexdump(len=32): [REMOVED] | |
WPA: PTK - hexdump(len=48): [REMOVED] | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: KEK - hexdump(len=16): [REMOVED] | |
WPA: TK - hexdump(len=16): [REMOVED] | |
WPA: WPA IE for msg 2/4 - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
wlp1s0b1: WPA: Sending EAPOL-Key 2/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): cb 13 5b 0c 55 0e 98 99 b9 10 a0 87 be 8c 41 74 | |
WPA: TX EAPOL-Key - hexdump(len=139): 01 03 00 87 02 01 0a 00 00 00 00 00 00 00 00 00 00 bd 30 18 db 51 4e a3 4b 1f 85 72 af f8 3e 9e d3 9a 8e 67 c5 5e bc 3d a7 22 31 bd 88 ef fe c8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cb 13 5b 0c 55 0e 98 99 b9 10 a0 87 be 8c 41 74 00 28 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 53 0d 3b 7d 10 38 c0 ae fc 76 86 fc 4c a1 8d 00 50 3c 15 fb 0b 1b 19 2c b4 c9 6c 1f 8f c6 14 b4 be f4 ef 5a 31 b4 cd 78 7d d5 ed 21 44 a9 c9 17 42 1e 81 70 98 29 2c 64 2a 7f bb c6 1d 62 e9 f0 6a d7 b8 49 7e fa 4e a9 c6 71 fb 02 4d 22 69 03 08 67 1a 08 8e 74 30 35 88 0b a0 8e 40 c2 77 9f 87 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175 | |
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 53 0d 3b 7d 10 38 c0 ae fc 76 86 fc 4c a1 8d 00 50 3c 15 fb 0b 1b 19 2c b4 c9 6c 1f 8f c6 14 b4 be f4 ef 5a 31 b4 cd 78 7d d5 ed 21 44 a9 c9 17 42 1e 81 70 98 29 2c 64 2a 7f bb c6 1d 62 e9 f0 6a d7 b8 49 7e fa 4e a9 c6 71 fb 02 4d 22 69 03 08 67 1a 08 8e 74 30 35 88 0b a0 8e 40 c2 77 9f 87 | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) | |
wlp1s0b1: key_length=16 key_data_length=80 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 | |
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 2c 53 0d 3b 7d 10 38 c0 ae fc 76 86 fc 4c a1 8d | |
RSN: encrypted key data - hexdump(len=80): 3c 15 fb 0b 1b 19 2c b4 c9 6c 1f 8f c6 14 b4 be f4 ef 5a 31 b4 cd 78 7d d5 ed 21 44 a9 c9 17 42 1e 81 70 98 29 2c 64 2a 7f bb c6 1d 62 e9 f0 6a d7 b8 49 7e fa 4e a9 c6 71 fb 02 4d 22 69 03 08 67 1a 08 8e 74 30 35 88 0b a0 8e 40 c2 77 9f 87 | |
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] | |
wlp1s0b1: WPA: Sending EAPOL-Key 4/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 07 a8 db 2b 4a 40 b1 b1 6a 29 ef 9a 70 c2 c3 d9 | |
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 a8 db 2b 4a 40 b1 b1 6a 29 ef 9a 70 c2 c3 d9 00 00 | |
wlp1s0b1: WPA: Installing PTK to the driver | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
addr=00:3a:98:f5:90:e2 | |
EAPOL: External notification - portValid=1 | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2 | |
EAPOL authentication completed - result=SUCCESS | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE | |
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] | |
WPA: Group Key - hexdump(len=32): [REMOVED] | |
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32) | |
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32 | |
nl80211: KEY_DATA - hexdump(len=32): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
broadcast key | |
nl80211: set_key failed; err=-22 Invalid argument) | |
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1) | |
wlp1s0b1: RSN: Failed to install GTK | |
wlp1s0b1: RSN: Failed to configure GTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 1 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1 | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x21d9370 done in 1.316746 seconds | |
Added BSSID 00:3a:98:f5:90:e2 into blacklist | |
wlp1s0b1: Blacklist count 3 --> request scan in 1000 ms | |
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
addr=00:3a:98:f5:90:e2 | |
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x21da030 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x21da030 after 0.000021 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000054 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.658894 seconds | |
nl80211: Received scan results (3 BSSes) | |
wlp1s0b1: BSS: Start scan result update 4 | |
BSS: last_scan_res_used=3/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x21da030 done in 0.659467 seconds | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: skip - blacklisted (count=1 limit=0) | |
wlp1s0b1: 2: 00:3a:9a:00:7c:13 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-74 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: No APs found - clear blacklist and try again | |
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear) | |
wlp1s0b1: Selecting BSS from priority group 0 | |
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: skip - SSID mismatch | |
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437 | |
wlp1s0b1: selected based on RSN IE | |
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam' | |
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil) | |
wlp1s0b1: Request association with 00:3a:98:f5:90:e2 | |
wlp1s0b1: Re-association to the same ESS | |
wlp1s0b1: Add radio work 'sme-connect'@0x21da030 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'sme-connect'@0x21da030 after 0.000026 second wait | |
wlp1s0b1: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:3a:98:f5:90:e2 | |
RSN: PMKSA cache entry found - PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: Trying to use cached PMKSA | |
wlp1s0b1: RSN: using IEEE 802.11i/D9.0 | |
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2 | |
wlp1s0b1: WPA: Selected mgmt group cipher 32 | |
wlp1s0b1: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
wlp1s0b1: WPA: using GTK TKIP | |
wlp1s0b1: WPA: using PTK CCMP | |
wlp1s0b1: WPA: using KEY_MGMT 802.1X | |
wlp1s0b1: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
wlp1s0b1: Determining shared radio frequencies (max len 1) | |
wlp1s0b1: Shared frequencies (len=0): completed iteration | |
nl80211: Authenticate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1 | |
nl80211: New station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 d0 f3 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp1s0b1: Event AUTH (11) received | |
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp1s0b1: set_disable_max_amsdu: -1 | |
wlp1s0b1: set_ampdu_factor: -1 | |
wlp1s0b1: set_ampdu_density: -1 | |
wlp1s0b1: set_disable_ht40: 0 | |
wlp1s0b1: set_disable_sgi: 0 | |
wlp1s0b1: set_disable_ldpc: 0 | |
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz) | |
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
nl80211: Associate (ifindex=2) | |
* bssid=00:3a:98:f5:90:e2 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=50): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 7f 08 00 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac02 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 10 f4 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
nl80211: Associate event | |
wlp1s0b1: Event ASSOC (0) received | |
wlp1s0b1: Association info event | |
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00 | |
wlp1s0b1: freq=2437 MHz | |
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2 | |
wlp1s0b1: Associated with 00:3a:98:f5:90:e2 | |
wlp1s0b1: WPA: Association event - clear replay counter | |
wlp1s0b1: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: maintaining EAP method data for fast reauthentication | |
EAP: EAP entering state IDLE | |
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec | |
wlp1s0b1: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117 | |
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) | |
wlp1s0b1: key_length=16 key_data_length=22 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: matched PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
RSN: PMK from PMKSA cache - hexdump(len=32): [REMOVED] | |
EAPOL: PMKSA caching was used - skip EAPOL | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
WPA: Renewed SNonce - hexdump(len=32): db ba ad 66 39 73 d1 7b 10 b0 1d c1 6f a3 a1 d4 0a bc 5e 4a 1a b5 80 d8 d1 ad 88 45 70 d4 bc 9c | |
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2 | |
WPA: Nonce1 - hexdump(len=32): db ba ad 66 39 73 d1 7b 10 b0 1d c1 6f a3 a1 d4 0a bc 5e 4a 1a b5 80 d8 d1 ad 88 45 70 d4 bc 9c | |
WPA: Nonce2 - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 | |
WPA: PMK - hexdump(len=32): [REMOVED] | |
WPA: PTK - hexdump(len=48): [REMOVED] | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: KEK - hexdump(len=16): [REMOVED] | |
WPA: TK - hexdump(len=16): [REMOVED] | |
WPA: WPA IE for msg 2/4 - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
wlp1s0b1: WPA: Sending EAPOL-Key 2/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 06 14 c4 58 74 df f7 64 70 c1 48 4d 2d 3c ef f1 | |
WPA: TX EAPOL-Key - hexdump(len=139): 01 03 00 87 02 01 0a 00 00 00 00 00 00 00 00 00 00 db ba ad 66 39 73 d1 7b 10 b0 1d c1 6f a3 a1 d4 0a bc 5e 4a 1a b5 80 d8 d1 ad 88 45 70 d4 bc 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 14 c4 58 74 df f7 64 70 c1 48 4d 2d 3c ef f1 00 28 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 | |
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179 | |
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2 | |
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fb 39 c3 88 a8 67 87 0b 21 2d 27 ee 2c 8a b0 85 00 50 e2 89 12 0e ff ae 70 e8 09 ce 58 25 a9 e9 91 d6 76 2e d1 94 8e 43 00 35 76 48 06 1c 46 9f ac e0 7f c6 2f 0f 4b 28 14 e5 be d4 ca 0d fd eb e4 34 11 df 80 a1 b7 2b fa f9 0b f3 09 87 68 80 74 25 54 de 11 11 03 c3 9e 7b 1c e0 2f 66 70 10 cb 97 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175 | |
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fb 39 c3 88 a8 67 87 0b 21 2d 27 ee 2c 8a b0 85 00 50 e2 89 12 0e ff ae 70 e8 09 ce 58 25 a9 e9 91 d6 76 2e d1 94 8e 43 00 35 76 48 06 1c 46 9f ac e0 7f c6 2f 0f 4b 28 14 e5 be d4 ca 0d fd eb e4 34 11 df 80 a1 b7 2b fa f9 0b f3 09 87 68 80 74 25 54 de 11 11 03 c3 9e 7b 1c e0 2f 66 70 10 cb 97 | |
wlp1s0b1: EAPOL-Key type=2 | |
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) | |
wlp1s0b1: key_length=16 key_data_length=80 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 | |
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): fb 39 c3 88 a8 67 87 0b 21 2d 27 ee 2c 8a b0 85 | |
RSN: encrypted key data - hexdump(len=80): e2 89 12 0e ff ae 70 e8 09 ce 58 25 a9 e9 91 d6 76 2e d1 94 8e 43 00 35 76 48 06 1c 46 9f ac e0 7f c6 2f 0f 4b 28 14 e5 be d4 ca 0d fd eb e4 34 11 df 80 a1 b7 2b fa f9 0b f3 09 87 68 80 74 25 54 de 11 11 03 c3 9e 7b 1c e0 2f 66 70 10 cb 97 | |
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE | |
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2) | |
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 | |
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] | |
wlp1s0b1: WPA: Sending EAPOL-Key 4/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 19 d9 ad 84 78 40 9d 3b 91 df 25 7f b7 b6 98 7d | |
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 d9 ad 84 78 40 9d 3b 91 df 25 7f b7 b6 98 7d 00 00 | |
wlp1s0b1: WPA: Installing PTK to the driver | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
addr=00:3a:98:f5:90:e2 | |
EAPOL: External notification - portValid=1 | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2 | |
EAPOL authentication completed - result=SUCCESS | |
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE | |
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] | |
WPA: Group Key - hexdump(len=32): [REMOVED] | |
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32) | |
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32 | |
nl80211: KEY_DATA - hexdump(len=32): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
broadcast key | |
nl80211: set_key failed; err=-22 Invalid argument) | |
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1) | |
wlp1s0b1: RSN: Failed to install GTK | |
wlp1s0b1: RSN: Failed to configure GTK | |
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1) | |
wlp1s0b1: Event DEAUTH (12) received | |
wlp1s0b1: Deauthentication notification | |
wlp1s0b1: * reason 1 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1 | |
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8) | |
wlp1s0b1: Setting scan request: 0.100000 sec | |
wlp1s0b1: Radio work 'sme-connect'@0x21da030 done in 0.282146 seconds | |
Added BSSID 00:3a:98:f5:90:e2 into blacklist | |
Continuous association failures - consider temporary network disabling | |
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=CONN_FAILED | |
wlp1s0b1: Blacklist count 4 --> request scan in 5000 ms | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
wlp1s0b1: Disconnect event - remove keys | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
addr=00:3a:98:f5:90:e2 | |
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1 | |
nl80211: Delete station 00:3a:98:f5:90:e2 | |
nl80211: Event message available | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00 | |
nl80211: Deauthenticate event | |
nl80211: Ignore deauth event triggered due to own deauth request | |
nl80211: Event message available | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1 | |
nl80211: Ignore disconnect event when using userspace SME | |
wlp1s0b1: State: DISCONNECTED -> SCANNING | |
wlp1s0b1: Starting AP scan for wildcard SSID | |
wlp1s0b1: Add radio work 'scan'@0x21d9b60 | |
wlp1s0b1: First radio work item in the queue - schedule start immediately | |
wlp1s0b1: Starting radio work 'scan'@0x21d9b60 after 0.000036 second wait | |
wlp1s0b1: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40 | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1 | |
wlp1s0b1: nl80211: Scan trigger | |
wlp1s0b1: Event SCAN_STARTED (47) received | |
wlp1s0b1: Own scan request started a scan in 0.000053 seconds | |
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1 | |
wlp1s0b1: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 | |
wlp1s0b1: Event SCAN_RESULTS (3) received | |
wlp1s0b1: Scan completed in 0.673376 seconds | |
nl80211: Received scan results (4 BSSes) | |
wlp1s0b1: BSS: Start scan result update 5 | |
wlp1s0b1: BSS: Add new id 3 BSSID 00:3a:99:04:bf:43 SSID 'test' freq 2462 | |
BSS: last_scan_res_used=4/32 | |
wlp1s0b1: New scan results available (own=1 ext=0) | |
wlp1s0b1: Radio work 'scan'@0x21d9b60 done in 0.673873 seconds | |
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled | |
EAPOL: startWhen --> 0 | |
EAPOL: disable timer tick | |
wlp1s0b1: Removing interface wlp1s0b1 | |
wlp1s0b1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING | |
TDLS: Tear down peers | |
wlp1s0b1: State: SCANNING -> DISCONNECTED | |
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
RSN: Flush PMKSA cache entry for 00:3a:98:f5:90:e2 | |
nl80211: Delete PMKID for 00:3a:98:f5:90:e2 | |
wlp1s0b1: RSN: PMKSA cache entry free_cb: 00:3a:98:f5:90:e2 reason=0 | |
EAP: deinitialize previously used EAP method (0, PEAP) at EAP deinit | |
ENGINE: engine deinit | |
wlp1s0b1: WPA: Clear old PMK and PTK | |
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear) | |
wlp1s0b1: BSS: Remove id 1 BSSID 00:3a:98:f5:90:e3 SSID 'test' due to wpa_bss_flush | |
wlp1s0b1: BSS: Remove id 0 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' due to wpa_bss_flush | |
wlp1s0b1: BSS: Remove id 3 BSSID 00:3a:99:04:bf:43 SSID 'test' due to wpa_bss_flush | |
wlp1s0b1: BSS: Remove id 2 BSSID 00:3a:9a:00:7c:13 SSID 'test' due to wpa_bss_flush | |
wlp1s0b1: Cancelling scan request | |
wlp1s0b1: Cancelling authentication timeout | |
Remove interface wlp1s0b1 from radio phy0 | |
Remove radio phy0 | |
nl80211: deinit ifname=wlp1s0b1 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=2 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Set mode ifindex 2 iftype 2 (STATION) | |
nl80211: Unsubscribe mgmt frames handle 0x888888888a909c49 (mode change) | |
wlp1s0b1: CTRL-EVENT-TERMINATING |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment