Skip to content

Instantly share code, notes, and snippets.

Created May 3, 2016 08:20
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save anonymous/72f8d94c677d735cdff168bc7c181747 to your computer and use it in GitHub Desktop.
Save anonymous/72f8d94c677d735cdff168bc7c181747 to your computer and use it in GitHub Desktop.
wpa_supplicant v2.5
Successfully initialized wpa_supplicant
Initializing interface 'wlp1s0b1' conf '/etc/wpa_supplicant/example.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/example.conf' -> '/etc/wpa_supplicant/example.conf'
Reading configuration file '/etc/wpa_supplicant/example.conf'
ctrl_interface='/run/wpa_supplicant'
Line: 3 - start of a new network block
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
key_mgmt: 0x1
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA
password - hexdump_ascii(len=6): [REMOVED]
phase1 - hexdump_ascii(len=43):
74 6c 73 5f 64 69 73 61 62 6c 65 5f 74 6c 73 76 tls_disable_tlsv
31 5f 31 3d 31 20 74 6c 73 5f 64 69 73 61 62 6c 1_1=1 tls_disabl
65 5f 74 6c 73 76 31 5f 32 3d 31 e_tlsv1_2=1
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
Priority group 0
id=0 ssid='eduroam'
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0
rfkill: initial event: idx=3 type=2 op=0 soft=0 hard=0
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Using driver-based off-channel TX
nl80211: interface wlp1s0b1 in phy phy0
nl80211: Set mode ifindex 2 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x21814c0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21814c0 match=0505
netlink: Operstate: ifindex=2 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlp1s0b1 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
wlp1s0b1: Own MAC address: 74:2f:68:d2:b1:f3
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp1s0b1: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlp1s0b1: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
wlp1s0b1: WPS: UUID based on MAC address: e909a86f-b1a7-5277-89e0-0bfd7fd694fd
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
wlp1s0b1: Added interface wlp1s0b1
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp1s0b1: State: DISCONNECTED -> SCANNING
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x219f5d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x219f5d0 after 0.000019 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000062 seconds
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660952 seconds
nl80211: Received scan results (2 BSSes)
wlp1s0b1: BSS: Start scan result update 1
wlp1s0b1: BSS: Add new id 0 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' freq 2437
wlp1s0b1: BSS: Add new id 1 BSSID 00:3a:98:f5:90:e3 SSID 'test' freq 2437
BSS: last_scan_res_used=2/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x219f5d0 done in 0.661495 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-59 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:98:f5:90:e2
wlp1s0b1: Add radio work 'sme-connect'@0x219f5d0
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x219f5d0 after 0.000025 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:3a:98:f5:90:e2
RSN: No PMKSA cache entry found
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 d0 e2 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 30 e3 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2437 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2
wlp1s0b1: Associated with 00:3a:98:f5:90:e2
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:90:e2 len=50
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=50): 02 00 00 2e 01 01 00 2e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c 70 6f 72 74 69 64 3d 32 39
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp1s0b1: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=41):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 57 69 46 69 2d 42 2c am,nasid=WiFi-B,
70 6f 72 74 69 64 3d 32 39 portid=29
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=21): 01 00 00 11 02 01 00 11 01 66 70 6d 2e 53 69 6e 79 61 6b 53 41
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=10
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=10): 02 00 00 06 01 02 00 06 19 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp1s0b1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
wlp1s0b1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x301 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=226): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 231 bytes pending from ssl_out
SSL: 231 bytes left to be sent out (of total 231 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21af8c0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=245): 01 00 00 f1 02 02 00 f1 19 80 00 00 00 e7 16 03 01 00 e2 01 00 00 de 03 01 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 00 00 64 c0 14 c0 0a 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13 c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 03 05 10 19 c0 00 00 34 84 16 03 01 34 7f 02 00 00 4d 03 01 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd 20 c6 09 00 00 70 ea 90 61 93 31 9a 93 4e 33 2e 2c a5 d6 27 52 ca 8f ee a7 83 b1 b9 b1 ac 00 cf 20 00 04 00 00 05 ff 01 00 01 00 0b 00 04 72 00 04 6f 00 04 6c 30 82 04 68 30 82 03 d1 a0 03 02 01 02 02 0a 40 90 c1 b1 00 03 00 00 01 4c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 26 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 0f 30 0d 06 03 55 04 03 13 06 62 73 75 72 61 64 30 1e 17 0d 31 34 30 33 30 33 31 33 33 33 34 38 5a 17 0d 31 35 30 33 30 33 31 33 33 32 30 36 5a 30 15 31 13 30 11 06 03 55 04 03 13 0a 62 73 75 72 61 64 2e 62 73 75 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 98 a7 1a 4c 87 5b 74 f5 9a 5f 71 81 4e 75 4a 76 22 7c 4d bc f2 10 f7 9f 1c 0c d6 94 0a bc 97 74 d8 9d fc b7 c2 4b b8 6d de 73 e0 94 33 b7 71 2a 45 d1 24 57 35 b7 d9 9a 36 20 c4 63 6e 5c 3e 4d dd c4 98 f0 6d ca 53 70 29 3c 91 2e 32 80 ee e7 2f 7b 71 61 24 16 db 29 4f 86 73 4d 47 a5 0f e0 47 4b a7 e4 41 31 02 d2 72 92 2d 80 b5 6b b4 87 ce 81 aa 2d 7e f6 6c 73 1c 68 c8 f8 bf 4c 0c bf 02 03 01 00 01 a3 82 02 ac 30 82 02 a8 30 0b 06 03 55 1d 0f 04 04 03 02 05 a0 30 44 06 09 2a 86 48 86 f7 0d 01 09 0f 04 37 30 35 30 0e 06 08 2a 86 48 86 f7 0d 03 02 02 02 00 80 30 0e 06 08 2a 86 48 86 f7 0d 03 04 02 02 00 80 30 07 06 05 2b 0e 03 02 07 30 0a 06 08 2a 86 48 86 f7 0d 03 07 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 1d 06 03 55 1d 0e 04 16 04 14 f7 36 37 35 f2 6e 03 4f 13 30 7d 0c de 20 ad 38 06 8a fb 59 30 1f 06 03 55 1d 23 04 18 30 16 80 14 23 12 68 5d a4 c1 56 d4 47 1e 8f ca 83 b6 85 b9 c4 33 e3 b3 30 81 e7 06 03 55 1d 1f 04 81 df 30 81 dc 30 81 d9 a0 81 d6 a0 81 d3 86 81 a4 6c 64 61 70 3a 2f 2f 2f 43 4e 3d 62 73 75 72 61 64 28 33 29 2c 43 4e 3d 62 73 75 72 61 64 2c 43 4e 3d 43 44 50 2c 43 4e 3d 50 75 62 6c 69 63 25 32 30 4b 65 79 25 32 30 53 65 72 76 69 63 65 73 2c 43 4e 3d 53 65 72 76 69 63 65 73 2c 43 4e 3d 43 6f 6e 66 69 67 75 72 61 74 69 6f 6e 2c 44 43 3d 62 73 75 3f 63 65 72 74 69 66 69 63 61 74 65 52 65 76 6f 63 61 74 69 6f 6e 4c 69 73 74 3f 62 61 73 65 3f 6f 62 6a 65 63 74 43 6c 61 73 73 3d 63 52 4c 44 69 73 74 72 69 62 75 74 69 6f 6e 50 6f 69 6e 74 86 2a 68 74 74 70 3a 2f 2f 62 73 75 72 61 64 2e 62 73 75 2f 43 65 72 74 45 6e 72 6f 6c 6c 2f 62 73 75 72 61 64 28 33 29 2e 63 72 6c 30 81 f0 06 08 2b 06 01 05 05 07 01 01 04 81 e3 30 81 e0 30 81 9a 06 08 2b 06 01 05 05 07 30 02 86 81 8d 6c 64 61 70 3a 2f 2f 2f 43 4e 3d 62 73 75 72 61 64 2c 43 4e 3d 41 49 41 2c 43 4e 3d 50 75 62 6c 69 63 25 32 30 4b 65 79 25 32 30 53 65 72 76 69 63 65 73 2c 43 4e 3d 53 65 72 76 69 63 65 73 2c 43 4e 3d 43 6f 6e 66 69 67 75 72 61 74 69 6f 6e 2c 44 43 3d 62 73 75 3f 63 41 43 65 72 74 69 66 69 63 61 74 65 3f 62 61 73 65 3f 6f 62 6a 65 63 74 43 6c 61 73 73 3d 63 65 72 74 69 66 69 63 61 74 69 6f 6e 41 75 74 68 6f 72 69 74 79 30 41 06 08 2b 06 01 05 05 07 30 02 86 35 68 74 74 70 3a 2f 2f 62 73 75 72 61 64 2e 62 73 75 2f 43 65 72 74 45 6e 72 6f 6c 6c 2f 62 73 75 72 61 64 2e 62 73 75 5f 62 73 75 72 61 64 28 33 29 2e 63 72 74 30 21 06 09 2b 06 01 04 01 82 37 14 02 04 14 1e 12 00 57 00 65 00 62 00 53 00 65 00 72 00 76 00 65 00 72 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 44 1f a7 c0 46 27 9a c7 d2 f7 eb 53 07 2c 0f 57 ec 9f e1 d6 2e d5 69 b4 3b e6 36 fd ca 20 f7 7b f2 18 0c d7 68 d0 50 8c 07 bc ef d2 ee 98 5e e4 7b ed e9 07 fc dc e7 6c 29 96 77 03 b7 e4 84 9d 95 f6 24 ab 3e a3 90 dd 48 c8 6f 7f be a9 95 a3 fb 49 1c ae 4d fc bd 5a d4 68 2d a2 a5 fa 35 39 c3 44 58 b3 76 35 15 e9 3c 41 e4 57 d4 c5 b5 73 fa 9c cc 4c 4b ef b6 0b 83 16 1b 32 18 aa 59 80 0d 00 2f b0 02 01 02 2f ab 00 24 30 22 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 0b 30 09 06 03 55 04 03 13 02 6e 73 00 25 30 23 31 13 30 11 06 0a 09
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0xc0
SSL: TLS Message Length: 13444
SSL: Need 12158 bytes more input data
SSL: Building ACK (type=25 id=3 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: startWhen --> 0
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 04 05 10 19 40 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 0c 30 0a 06 03 55 04 03 13 03 72 61 64 00 2a 30 28 31 13 30 11 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 03 62 73 75 31 11 30 0f 06 03 55 04 03 13 08 63 69 74 2d 74 65 73 74 00 cc 30 81 c9 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 27 30 25 06 03 55 04 0a 13 1e 4e 65 74 4c 6f 63 6b 20 48 61 6c 6f 7a 61 74 62 69 7a 74 6f 6e 73 61 67 69 20 4b 66 74 2e 31 1a 30 18 06 03 55 04 0b 13 11 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 6b 31 42 30 40 06 03 55 04 03 13 39 4e 65 74 4c 6f 63 6b 20 4d 69 6e 6f 73 69 74 65 74 74 20 4b 6f 7a 6a 65 67 79 7a 6f 69 20 28 43 6c 61 73 73 20 51 41 29 20 54 61 6e 75 73 69 74 76 61 6e 79 6b 69 61 64 6f 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 69 6e 66 6f 40 6e 65 74 6c 6f 63 6b 2e 68 75 00 66 30 64 31 0b 30 09 06 03 55 04 06 13 02 4b 52 31 0d 30 0b 06 03 55 04 0a 0c 04 4b 49 53 41 31 2e 30 2c 06 03 55 04 0b 0c 25 4b 6f 72 65 61 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 43 65 6e 74 72 61 6c 31 16 30 14 06 03 55 04 03 0c 0d 4b 49 53 41 20 52 6f 6f 74 43 41 20 31 00 71 30 6f 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 14 30 12 06 03 55 04 0a 13 0b 41 64 64 54 72 75 73 74 20 41 42 31 26 30 24 06 03 55 04 0b 13 1d 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 54 54 50 20 4e 65 74 77 6f 72 6b 31 22 30 20 06 03 55 04 03 13 19 41 64 64 54 72 75 73 74 20 45 78 74 65 72 6e 61 6c 20 43 41 20 52 6f 6f 74 00 9b 30 81 98 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03 55 04 0a 13 0d 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 31 39 30 37 06 03 55 04 0b 13 30 28 63 29 20 32 30 30 38 20 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 36 30 34 06 03 55 04 03 13 2d 47 65 6f 54 72 75 73 74 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 33 00 37 30 35 31 0b 30 09 06 03 55 04 06 13 02 53 49 31 0f 30 0d 06 03 55 04 0a 13 06 48 61 6c 63 6f 6d 31 15 30 13 06 03 55 04 03 13 0c 48 61 6c 63 6f 6d 20 43 41 20 46 4f 00 98 30 81 95 31 81 92 30 09 06 03 55 04 06 0c 02 42 47 30 15 06 03 55 04 0a 0c 0e 49 6e 66 6f 4e 6f 74 61 72 79 20 50 4c 43 30 15 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 07 72 6f 6f 74 2d 63 61 30 1a 06 03 55 04 03 0c 13 49 6e 66 6f 4e 6f 74 61 72 79 20 43 53 50 20 52 6f 6f 74 30 1a 06 03 55 04 0b 0c 13 49 6e 66 6f 4e 6f 74 61 72 79 20 43 53 50 20 52 6f 6f 74 30 1f 06 09 2a 86 48 86 f7 0d 01 09 01 16 12 63 73 70 40 69 6e 66 6f 6e 6f 74 61 72 79 2e 63 6f 6d 00 1f 30 1d 31 0b 30 09 06 03 55 04 06 13 02 53 49 31 0e 30 0c 06 03 55 04 0a 13 05 41 43 4e 4c 42 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 55 30 53 31 0b 30 09 06 03 55 04 06 13 02 42 45 31 1c 30 1a 06 03 55 04 0a 13 13 43 65 72 74 69 70 6f 73 74 20 73 2e 61 2e 2f 6e 2e 76 2e 31 26 30 24 06 03 55 04 03 13 1d 43 65 72 74 69 70 6f 73 74 20 45 2d 54 72 75 73 74 20 54 4f 50 20 52 6f 6f 74 20 43 41 00 67 30 65 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 24 30 22 06 03 55 04 03 13 1b 44 69 67 69 43 65 72 74 20 41 73 73 75 72 65 64 20 49 44 20 52 6f 6f 74 20 43 41 00 aa
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 10868 bytes more input data
SSL: Building ACK (type=25 id=4 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 05 05 10 19 40 30 81 a7 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 0c 08 42 75 64 61 70 65 73 74 31 15 30 13 06 03 55 04 0a 0c 0c 4e 65 74 4c 6f 63 6b 20 4b 66 74 2e 31 37 30 35 06 03 55 04 0b 0c 2e 54 61 6e c3 ba 73 c3 ad 74 76 c3 a1 6e 79 6b 69 61 64 c3 b3 6b 20 28 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 29 31 35 30 33 06 03 55 04 03 0c 2c 4e 65 74 4c 6f 63 6b 20 41 72 61 6e 79 20 28 43 6c 61 73 73 20 47 6f 6c 64 29 20 46 c5 91 74 61 6e c3 ba 73 c3 ad 74 76 c3 a1 6e 79 00 3b 30 39 31 0b 30 09 06 03 55 04 06 13 02 46 49 31 0f 30 0d 06 03 55 04 0a 13 06 53 6f 6e 65 72 61 31 19 30 17 06 03 55 04 03 13 10 53 6f 6e 65 72 61 20 43 6c 61 73 73 31 20 43 41 00 80 30 7e 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 22 30 20 06 03 55 04 0a 13 19 55 6e 69 7a 65 74 6f 20 54 65 63 68 6e 6f 6c 6f 67 69 65 73 20 53 2e 41 2e 31 27 30 25 06 03 55 04 0b 13 1e 43 65 72 74 75 6d 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 22 30 20 06 03 55 04 03 13 19 43 65 72 74 75 6d 20 54 72 75 73 74 65 64 20 4e 65 74 77 6f 72 6b 20 43 41 00 92 30 81 8f 31 0b 30 09 06 03 55 04 06 13 02 4c 56 31 35 30 33 06 03 55 04 0a 13 2c 56 41 53 20 4c 61 74 76 69 6a 61 73 20 50 61 73 74 73 20 2d 20 56 69 65 6e 2e 72 65 67 2e 4e 72 2e 34 30 30 30 33 30 35 32 37 39 30 31 23 30 21 06 03 55 04 0b 13 1a 53 65 72 74 69 66 69 6b 61 63 69 6a 61 73 20 70 61 6b 61 6c 70 6f 6a 75 6d 69 31 24 30 22 06 03 55 04 03 13 1b 56 41 53 20 4c 61 74 76 69 6a 61 73 20 50 61 73 74 73 20 53 53 49 28 52 43 41 29 00 4c 30 4a 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 15 30 13 06 03 55 04 0a 13 0c 53 77 69 73 73 53 69 67 6e 20 41 47 31 24 30 22 06 03 55 04 03 13 1b 53 77 69 73 73 53 69 67 6e 20 47 6f 6c 64 20 52 6f 6f 74 20 43 41 20 2d 20 47 33 00 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 34 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 00 3c 30 3a 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 11 30 0f 06 03 55 04 0a 13 08 55 6e 69 54 72 75 73 74 31 18 30 16 06 03 55 04 03 13 0f 55 43 41 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 00 8f 30 81 8c 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 4b 30 49 06 03 55 04 0a 13 42 41 67 65 6e 63 69 61 20 4e 6f 74 61 72 69 61 6c 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 53 2e 4c 2e 20 55 6e 69 70 65 72 73 6f 6e 61 6c 20 2d 20 43 49 46 20 42 38 33 33 39 35 39 38 38 31 30 30 2e 06 03 55 04 03 13 27 41 4e 43 45 52 54 20 43 6f 72 70 6f 72 61 63 69 6f 6e 65 73 20 64 65 20 44 65 72 65 63 68 6f 20 50 75 62 6c 69 63 6f 00 57 30 55 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 1e 30 1c 06 03 55 04 0a 13 15 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 31 26 30 24 06 03 55 04 03 13 1d 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 20 52 6f 6f 74 20 43 41 00 7e 30 7c 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 4b 30 49 06 03 55 04 0a 13 42 41 67 65 6e 63 69 61 20 4e 6f 74 61 72 69 61 6c 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 53 2e 4c 2e 20 55 6e 69 70 65 72 73 6f 6e 61 6c 20 2d 20 43 49 46 20 42 38 33 33 39 35 39 38 38 31 20 30 1e 06 03 55 04 03 13 17 41 4e 43 45 52 54 20 43 65 72 74 69 66 69 63 61 64 6f 73 20 43 47 4e 00 68 30 66 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 28 30 26 06 03 55 04 0a 13 1f 53 77 65 64 69 73 68 20 53 6f 63 69 61 6c 20 49 6e 73 75 72 61 6e 63 65 20 41 67 65 6e 63 79 31 2d 30 2b 06 03 55 04 03 13 24 53 77 65 64 69 73 68 20 47 6f 76
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 9578 bytes more input data
SSL: Building ACK (type=25 id=5 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 06 05 10 19 40 65 72 6e 6d 65 6e 74 20 52 6f 6f 74 20 41 75 74 68 6f 72 69 74 79 20 76 31 00 cd 30 81 ca 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 39 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 45 30 43 06 03 55 04 03 13 3c 56 65 72 69 53 69 67 6e 20 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 33 00 3c 30 3a 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 11 30 0f 06 03 55 04 0a 0c 08 44 41 54 45 56 20 65 47 31 18 30 16 06 03 55 04 03 0c 0f 43 41 20 44 41 54 45 56 20 53 54 44 20 30 31 00 38 30 36 31 0b 30 09 06 03 55 04 06 13 02 53 45 31 11 30 0f 06 03 55 04 0a 0c 08 43 61 72 65 6c 69 6e 6b 31 14 30 12 06 03 55 04 03 0c 0b 53 49 54 48 53 20 43 41 20 76 33 00 60 30 5e 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0e 30 0c 06 03 55 04 0a 13 05 41 4e 53 53 49 31 17 30 15 06 03 55 04 0b 13 0e 30 30 30 32 20 31 33 30 30 30 37 36 36 39 31 26 30 24 06 03 55 04 03 13 1d 49 47 43 2f 41 20 41 43 20 72 61 63 69 6e 65 20 45 74 61 74 20 66 72 61 6e 63 61 69 73 01 2f 30 82 01 2b 31 0b 30 09 06 03 55 04 06 13 02 54 52 31 18 30 16 06 03 55 04 07 0c 0f 47 65 62 7a 65 20 2d 20 4b 6f 63 61 65 6c 69 31 47 30 45 06 03 55 04 0a 0c 3e 54 c3 bc 72 6b 69 79 65 20 42 69 6c 69 6d 73 65 6c 20 76 65 20 54 65 6b 6e 6f 6c 6f 6a 69 6b 20 41 72 61 c5 9f 74 c4 b1 72 6d 61 20 4b 75 72 75 6d 75 20 2d 20 54 c3 9c 42 c4 b0 54 41 4b 31 48 30 46 06 03 55 04 0b 0c 3f 55 6c 75 73 61 6c 20 45 6c 65 6b 74 72 6f 6e 69 6b 20 76 65 20 4b 72 69 70 74 6f 6c 6f 6a 69 20 41 72 61 c5 9f 74 c4 b1 72 6d 61 20 45 6e 73 74 69 74 c3 bc 73 c3 bc 20 2d 20 55 45 4b 41 45 31 23 30 21 06 03 55 04 0b 0c 1a 4b 61 6d 75 20 53 65 72 74 69 66 69 6b 61 73 79 6f 6e 20 4d 65 72 6b 65 7a 69 31 4a 30 48 06 03 55 04 03 0c 41 54 c3 9c 42 c4 b0 54 41 4b 20 55 45 4b 41 45 20 4b c3 b6 6b 20 53 65 72 74 69 66 69 6b 61 20 48 69 7a 6d 65 74 20 53 61 c4 9f 6c 61 79 c4 b1 63 c4 b1 73 c4 b1 20 2d 20 53 c3 bc 72 c3 bc 6d 20 33 00 47 30 45 31 0b 30 09 06 03 55 04 06 13 02 42 4d 31 19 30 17 06 03 55 04 0a 13 10 51 75 6f 56 61 64 69 73 20 4c 69 6d 69 74 65 64 31 1b 30 19 06 03 55 04 03 13 12 51 75 6f 56 61 64 69 73 20 52 6f 6f 74 20 43 41 20 33 00 cd 30 81 ca 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 39 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 45 30 43 06 03 55 04 03 13 3c 56 65 72 69 53 69 67 6e 20 43 6c 61 73 73 20 31 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 33 00 d4 30 81 d1 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 24 30 22 06 03 55 04 03 13 1b 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 46 72 65 65 6d 61 69 6c 20 43 41 31 2b 30 29 06 09 2a 86 48 86 f7 0d 01 09 01 16 1c 70 65 72 73 6f 6e 61 6c 2d 66 72 65 65 6d 61 69 6c 40 74 68 61 77 74 65 2e 63 6f 6d 00 51 30 4f 31 0b 30 09 06 03 55 04 06 13 02 4b 52 31 1c 30 1a 06 03 55 04 0a 13 13 47 6f 76 65 72 6e 6d 65 6e 74 20 6f 66
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 8288 bytes more input data
SSL: Building ACK (type=25 id=6 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 07 05 10 19 40 20 4b 6f 72 65 61 31 0d 30 0b 06 03 55 04 0b 13 04 47 50 4b 49 31 13 30 11 06 03 55 04 03 13 0a 47 50 4b 49 52 6f 6f 74 43 41 00 a7 30 81 a4 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 4a 30 48 06 03 55 04 0a 0c 41 43 6f 6c 65 67 69 6f 20 64 65 20 52 65 67 69 73 74 72 61 64 6f 72 65 73 20 64 65 20 6c 61 20 50 72 6f 70 69 65 64 61 64 20 79 20 4d 65 72 63 61 6e 74 69 6c 65 73 20 64 65 20 45 73 70 61 c3 b1 61 31 1b 30 19 06 03 55 04 0b 0c 12 43 65 72 74 69 66 69 63 61 64 6f 20 50 72 6f 70 69 6f 31 2c 30 2a 06 03 55 04 03 0c 23 52 65 67 69 73 74 72 61 64 6f 72 65 73 20 64 65 20 45 73 70 61 c3 b1 61 20 2d 20 43 41 20 52 61 c3 ad 7a 00 45 30 43 31 0b 30 09 06 03 55 04 06 13 02 44 4b 31 15 30 13 06 03 55 04 0a 13 0c 54 44 43 20 49 6e 74 65 72 6e 65 74 31 1d 30 1b 06 03 55 04 0b 13 14 54 44 43 20 49 6e 74 65 72 6e 65 74 20 52 6f 6f 74 20 43 41 00 74 30 72 31 0b 30 09 06 03 55 04 06 13 02 48 55 31 11 30 0f 06 03 55 04 07 13 08 42 75 64 61 70 65 73 74 31 16 30 14 06 03 55 04 0a 13 0d 4d 69 63 72 6f 73 65 63 20 4c 74 64 2e 31 14 30 12 06 03 55 04 0b 13 0b 65 2d 53 7a 69 67 6e 6f 20 43 41 31 22 30 20 06 03 55 04 03 13 19 4d 69 63 72 6f 73 65 63 20 65 2d 53 7a 69 67 6e 6f 20 52 6f 6f 74 20 43 41 00 76 30 74 31 0b 30 09 06 03 55 04 06 13 02 4c 54 31 2b 30 29 06 03 55 04 0a 13 22 53 6b 61 69 74 6d 65 6e 69 6e 69 6f 20 73 65 72 74 69 66 69 6b 61 76 69 6d 6f 20 63 65 6e 74 72 61 73 31 20 30 1e 06 03 55 04 0b 13 17 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 16 30 14 06 03 55 04 03 13 0d 53 53 43 20 52 6f 6f 74 20 43 41 20 43 00 3c 30 3a 31 19 30 17 06 03 55 04 0a 13 10 52 53 41 20 53 65 63 75 72 69 74 79 20 49 6e 63 31 1d 30 1b 06 03 55 04 0b 13 14 52 53 41 20 53 65 63 75 72 69 74 79 20 32 30 34 38 20 56 33 00 6e 30 6c 31 0b 30 09 06 03 55 04 06 13 02 63 68 31 0e 30 0c 06 03 55 04 0a 13 05 61 64 6d 69 6e 31 11 30 0f 06 03 55 04 0b 13 08 53 65 72 76 69 63 65 73 31 22 30 20 06 03 55 04 0b 13 19 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 69 65 73 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e 2d 52 6f 6f 74 2d 43 41 00 65 30 63 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 21 30 1f 06 03 55 04 0a 13 18 54 68 65 20 47 6f 20 44 61 64 64 79 20 47 72 6f 75 70 2c 20 49 6e 63 2e 31 31 30 2f 06 03 55 04 0b 13 28 47 6f 20 44 61 64 64 79 20 43 6c 61 73 73 20 32 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 f6 30 81 f3 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 3b 30 39 06 03 55 04 0a 13 32 41 67 65 6e 63 69 61 20 43 61 74 61 6c 61 6e 61 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 20 28 4e 49 46 20 51 2d 30 38 30 31 31 37 36 2d 49 29 31 28 30 26 06 03 55 04 0b 13 1f 53 65 72 76 65 69 73 20 50 75 62 6c 69 63 73 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 31 35 30 33 06 03 55 04 0b 13 2c 56 65 67 65 75 20 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 61 74 63 65 72 74 2e 6e 65 74 2f 76 65 72 61 72 72 65 6c 20 28 63 29 30 33 31 35 30 33 06 03 55 04 0b 13 2c 4a 65 72 61 72 71 75 69 61 20 45 6e 74 69 74 61 74 73 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 20 43 61 74 61 6c 61 6e 65 73 31 0f 30 0d 06 03 55 04 03 13 06 45 43 2d 41 43 43 00 46 30 44 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 14 30 12 06 03 55 04 0a 0c 0b 41 66 66 69 72 6d 54 72 75 73 74 31 1f 30 1d 06 03 55 04 03 0c 16 41 66 66 69 72 6d 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 69 6e 67 00 4c 30 4a 31 0b 30 09 06 03 55 04 06 13 02 53 4b 31 13 30 11 06 03 55 04 07 13 0a 42 72 61 74 69 73 6c 61 76 61 31 13 30 11 06 03 55 04 0a 13 0a 44 69 73 69 67 20 61 2e 73 2e 31 11 30 0f 06 03 55 04 03 13 08 43 41 20 44 69 73 69 67 00 8b 30 81 88 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 4e 65 77 20 4a 65 72 73 65 79 31 14 30 12 06 03 55 04 07 13 0b 4a 65 72 73 65 79 20 43 69 74 79 31 1e 30 1c 06 03 55 04 0a 13 15 54 68 65 20 55 53 45 52 54 52 55 53 54 20 4e 65 74 77 6f 72 6b 31 2e
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 6998 bytes more input data
SSL: Building ACK (type=25 id=7 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 07 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 08 05 10 19 40 30 2c 06 03 55 04 03 13 25 55 53 45 52 54 72 75 73 74 20 52 53 41 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 3e 30 3c 31 1e 30 1c 06 03 55 04 03 0c 15 41 74 6f 73 20 54 72 75 73 74 65 64 52 6f 6f 74 20 32 30 31 31 31 0d 30 0b 06 03 55 04 0a 0c 04 41 74 6f 73 31 0b 30 09 06 03 55 04 06 13 02 44 45 00 65 30 63 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 13 30 11 06 03 55 04 0a 13 0a 43 65 72 74 69 6e 6f 6d 69 73 31 17 30 15 06 03 55 04 0b 13 0e 30 30 30 32 20 34 33 33 39 39 38 39 30 33 31 26 30 24 06 03 55 04 03 0c 1d 43 65 72 74 69 6e 6f 6d 69 73 20 2d 20 41 75 74 6f 72 69 74 c3 a9 20 52 61 63 69 6e 65 00 91 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 54 4e 31 0d 30 0b 06 03 55 04 0a 13 04 41 4e 43 45 31 11 30 0f 06 03 55 04 0b 13 08 41 4e 43 45 20 57 45 42 31 37 30 35 06 03 55 04 03 13 2e 41 67 65 6e 63 65 20 4e 61 74 69 6f 6e 61 6c 65 20 64 65 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 45 6c 65 63 74 72 6f 6e 69 71 75 65 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 61 6e 63 65 40 63 65 72 74 69 66 69 63 61 74 69 6f 6e 2e 74 6e 00 3a 30 38 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 14 30 12 06 03 55 04 0a 0c 0b 49 5a 45 4e 50 45 20 53 2e 41 2e 31 13 30 11 06 03 55 04 03 0c 0a 49 7a 65 6e 70 65 2e 63 6f 6d 00 5a 30 58 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03 55 04 0a 13 0d 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 31 31 30 2f 06 03 55 04 03 13 28 47 65 6f 54 72 75 73 74 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 7f 30 7d 31 0b 30 09 06 03 55 04 06 13 02 45 55 31 27 30 25 06 03 55 04 0a 13 1e 41 43 20 43 61 6d 65 72 66 69 72 6d 61 20 53 41 20 43 49 46 20 41 38 32 37 34 33 32 38 37 31 23 30 21 06 03 55 04 0b 13 1a 68 74 74 70 3a 2f 2f 77 77 77 2e 63 68 61 6d 62 65 72 73 69 67 6e 2e 6f 72 67 31 20 30 1e 06 03 55 04 03 13 17 47 6c 6f 62 61 6c 20 43 68 61 6d 62 65 72 73 69 67 6e 20 52 6f 6f 74 00 d7 30 81 d4 31 0b 30 09 06 03 55 04 06 13 02 41 54 31 0f 30 0d 06 03 55 04 07 13 06 56 69 65 6e 6e 61 31 10 30 0e 06 03 55 04 08 13 07 41 75 73 74 72 69 61 31 3a 30 38 06 03 55 04 0a 13 31 41 52 47 45 20 44 41 54 45 4e 20 2d 20 41 75 73 74 72 69 61 6e 20 53 6f 63 69 65 74 79 20 66 6f 72 20 44 61 74 61 20 50 72 6f 74 65 63 74 69 6f 6e 31 2a 30 28 06 03 55 04 0b 13 21 47 4c 4f 42 41 4c 54 52 55 53 54 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 31 14 30 12 06 03 55 04 03 13 0b 47 4c 4f 42 41 4c 54 52 55 53 54 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 69 6e 66 6f 40 67 6c 6f 62 61 6c 74 72 75 73 74 2e 69 6e 66 6f 01 35 30 82 01 31 31 17 30 15 06 03 55 04 07 13 0e 41 6c 76 61 72 6f 20 4f 62 72 65 67 6f 6e 31 19 30 17 06 03 55 04 08 13 10 44 69 73 74 72 69 74 6f 20 46 65 64 65 72 61 6c 31 0b 30 09 06 03 55 04 06 13 02 4d 58 31 0e 30 0c 06 03 55 04 11 13 05 30 31 30 33 30 31 1d 30 1b 06 03 55 04 09 13 14 49 6e 73 75 72 67 65 6e 74 65 73 20 53 75 72 20 31 39 34 30 31 42 30 40 06 03 55 04 03 13 39 41 75 74 6f 72 69 64 61 64 20 43 65 72 74 69 66 69 63 61 64 6f 72 61 20 52 61 69 7a 20 64 65 20 6c 61 20 53 65 63 72 65 74 61 72 69 61 20 64 65 20 45 63 6f 6e 6f 6d 69 61 31 34 30 32 06 03 55 04 0b 13 2b 44 69 72 65 63 63 69 6f 6e 20 47 65 6e 65 72 61 6c 20 64 65 20 4e 6f 72 6d 61 74 69 76 69 64 61 64 20 4d 65 72 63 61 6e 74 69 6c 31 1f 30 1d 06 03 55 04 0a 13 16 53 65 63 72 65 74 61 72 69 61 20 64 65 20 45 63 6f 6e 6f 6d 69 61 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01 16 15 61 63 72 73 65 40 65 63 6f 6e 6f 6d 69 61 2e 67 6f 62 2e 6d 78 00 c0 30 81 bd 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 32 30 30 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 5708 bytes more input data
SSL: Building ACK (type=25 id=8 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 09 05 10 19 40 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 38 30 36 06 03 55 04 03 13 2f 56 65 72 69 53 69 67 6e 20 55 6e 69 76 65 72 73 61 6c 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 d2 30 81 cf 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 23 30 21 06 03 55 04 03 13 1a 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 50 72 65 6d 69 75 6d 20 43 41 31 2a 30 28 06 09 2a 86 48 86 f7 0d 01 09 01 16 1b 70 65 72 73 6f 6e 61 6c 2d 70 72 65 6d 69 75 6d 40 74 68 61 77 74 65 2e 63 6f 6d 00 52 30 50 31 0b 30 09 06 03 55 04 06 13 02 4a 50 31 18 30 16 06 03 55 04 0a 13 0f 53 45 43 4f 4d 20 54 72 75 73 74 2e 6e 65 74 31 27 30 25 06 03 55 04 0b 13 1e 53 65 63 75 72 69 74 79 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 20 52 6f 6f 74 43 41 31 00 49 30 47 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 16 30 14 06 03 55 04 0a 13 0d 47 65 6f 54 72 75 73 74 20 49 6e 63 2e 31 20 30 1e 06 03 55 04 03 13 17 47 65 6f 54 72 75 73 74 20 55 6e 69 76 65 72 73 61 6c 20 43 41 20 32 00 3b 30 39 31 0b 30 09 06 03 55 04 06 13 02 46 49 31 0f 30 0d 06 03 55 04 0a 13 06 53 6f 6e 65 72 61 31 19 30 17 06 03 55 04 03 13 10 53 6f 6e 65 72 61 20 43 6c 61 73 73 32 20 43 41 00 35 30 33 31 0b 30 09 06 03 55 04 06 13 02 50 54 31 0d 30 0b 06 03 55 04 0a 0c 04 53 43 45 45 31 15 30 13 06 03 55 04 03 0c 0c 45 43 52 61 69 7a 45 73 74 61 64 6f 00 65 30 63 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1c 30 1a 06 03 55 04 0a 13 13 41 6d 65 72 69 63 61 20 4f 6e 6c 69 6e 65 20 49 6e 63 2e 31 36 30 34 06 03 55 04 03 13 2d 41 6d 65 72 69 63 61 20 4f 6e 6c 69 6e 65 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 31 00 3b 30 39 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 11 30 0f 06 03 55 04 0a 0c 08 44 41 54 45 56 20 65 47 31 17 30 15 06 03 55 04 03 0c 0e 43 41 20 44 41 54 45 56 20 42 54 20 30 32 01 22 30 82 01 1e 31 3e 30 3c 06 03 55 04 03 13 35 41 75 74 6f 72 69 64 61 64 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 52 61 69 7a 20 64 65 6c 20 45 73 74 61 64 6f 20 56 65 6e 65 7a 6f 6c 61 6e 6f 31 0b 30 09 06 03 55 04 06 13 02 56 45 31 10 30 0e 06 03 55 04 07 13 07 43 61 72 61 63 61 73 31 19 30 17 06 03 55 04 08 13 10 44 69 73 74 72 69 74 6f 20 43 61 70 69 74 61 6c 31 36 30 34 06 03 55 04 0a 13 2d 53 69 73 74 65 6d 61 20 4e 61 63 69 6f 6e 61 6c 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 45 6c 65 63 74 72 6f 6e 69 63 61 31 43 30 41 06 03 55 04 0b 13 3a 53 75 70 65 72 69 6e 74 65 6e 64 65 6e 63 69 61 20 64 65 20 53 65 72 76 69 63 69 6f 73 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 45 6c 65 63 74 72 6f 6e 69 63 61 31 25 30 23 06 09 2a 86 48 86 f7 0d 01 09 01 16 16 61 63 72 61 69 7a 40 73 75 73 63 65 72 74 65 2e 67 6f 62 2e 76 65 00 4c 30 4a 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 20 30 1e 06 03 55 04 0a 13 17 53 65 63 75 72 65 54 72 75 73 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 19 30 17 06 03 55 04 03 13 10 53 65 63 75 72 65 20 47 6c 6f 62 61 6c 20 43 41 00 47 30 45 31 0b 30 09 06 03 55 04 06 13 02 47 42 31 18 30 16 06 03 55 04 0a 13 0f 54 72 75 73 74 69 73 20 4c 69 6d 69 74 65 64 31 1c 30 1a 06 03 55 04 0b 13 13 54 72 75 73 74 69 73 20 46 50 53 20 52 6f 6f 74 20 43 41 00 5a 30 58 31 0b 30 09 06 03 55 04 06 13 02 4a 50 31 2b 30 29 06 03 55 04 0a 13 22 4a 61 70 61 6e 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 2c 20 49 6e 63 2e 31 1c 30 1a 06 03 55 04 03 13 13 53 65 63 75 72 65 53 69 67 6e 20 52 6f 6f 74 43 41 31 31 00 b5 30 81 b2 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 0f 30 0d 06 03 55 04 08 13 06 4d 61
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 4418 bytes more input data
SSL: Building ACK (type=25 id=9 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 09 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 0a 05 10 19 40 64 72 69 64 31 0f 30 0d 06 03 55 04 07 13 06 4d 61 64 72 69 64 31 2f 30 2d 06 03 55 04 0a 13 26 49 50 53 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 73 2e 6c 2e 20 69 70 73 43 41 31 0e 30 0c 06 03 55 04 0b 13 05 69 70 73 43 41 31 1d 30 1b 06 03 55 04 03 13 14 69 70 73 43 41 20 47 6c 6f 62 61 6c 20 43 41 20 52 6f 6f 74 31 21 30 1f 06 09 2a 86 48 86 f7 0d 01 09 01 16 12 67 6c 6f 62 61 6c 30 31 40 69 70 73 63 61 2e 63 6f 6d 00 7f 30 7d 31 0b 30 09 06 03 55 04 06 13 02 49 4c 31 16 30 14 06 03 55 04 0a 13 0d 53 74 61 72 74 43 6f 6d 20 4c 74 64 2e 31 2b 30 29 06 03 55 04 0b 13 22 53 65 63 75 72 65 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 20 53 69 67 6e 69 6e 67 31 29 30 27 06 03 55 04 03 13 20 53 74 61 72 74 43 6f 6d 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 3f 30 3d 31 0b 30 09 06 03 55 04 06 13 02 73 69 31 1b 30 19 06 03 55 04 0a 13 12 73 74 61 74 65 2d 69 6e 73 74 69 74 75 74 69 6f 6e 73 31 11 30 0f 06 03 55 04 0b 13 08 73 69 67 65 6e 2d 63 61 00 76 30 74 31 0b 30 09 06 03 55 04 06 13 02 4c 54 31 2b 30 29 06 03 55 04 0a 13 22 53 6b 61 69 74 6d 65 6e 69 6e 69 6f 20 73 65 72 74 69 66 69 6b 61 76 69 6d 6f 20 63 65 6e 74 72 61 73 31 20 30 1e 06 03 55 04 0b 13 17 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 16 30 14 06 03 55 04 03 13 0d 53 53 43 20 52 6f 6f 74 20 43 41 20 42 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 2d 30 2b 06 03 55 04 0a 13 24 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 31 45 30 43 06 03 55 04 03 13 3c 46 69 72 73 74 20 44 61 74 61 20 44 69 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 73 20 49 6e 63 2e 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 00 5f 30 5d 31 18 30 16 06 09 2a 86 48 86 f7 0d 01 09 01 16 09 70 6b 69 40 73 6b 2e 65 65 31 0b 30 09 06 03 55 04 06 13 02 45 45 31 22 30 20 06 03 55 04 0a 13 19 41 53 20 53 65 72 74 69 66 69 74 73 65 65 72 69 6d 69 73 6b 65 73 6b 75 73 31 10 30 0e 06 03 55 04 03 13 07 4a 75 75 72 2d 53 4b 00 ce 30 81 cb 31 0b 30 09 06 03 55 04 06 13 02 5a 41 31 15 30 13 06 03 55 04 08 13 0c 57 65 73 74 65 72 6e 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6f 77 6e 31 1a 30 18 06 03 55 04 0a 13 11 54 68 61 77 74 65 20 43 6f 6e 73 75 6c 74 69 6e 67 31 28 30 26 06 03 55 04 0b 13 1f 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 69 6f 6e 31 21 30 1f 06 03 55 04 03 13 18 54 68 61 77 74 65 20 50 65 72 73 6f 6e 61 6c 20 42 61 73 69 63 20 43 41 31 28 30 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 70 65 72 73 6f 6e 61 6c 2d 62 61 73 69 63 40 74 68 61 77 74 65 2e 63 6f 6d 00 8e 30 81 8b 31 0b 30 09 06 03 55 04 06 13 02 41 54 31 48 30 46 06 03 55 04 0a 0c 3f 41 2d 54 72 75 73 74 20 47 65 73 2e 20 66 2e 20 53 69 63 68 65 72 68 65 69 74 73 73 79 73 74 65 6d 65 20 69 6d 20 65 6c 65 6b 74 72 2e 20 44 61 74 65 6e 76 65 72 6b 65 68 72 20 47 6d 62 48 31 18 30 16 06 03 55 04 0b 0c 0f 41 2d 54 72 75 73 74 2d 51 75 61 6c 2d 30 33 31 18 30 16 06 03 55 04 03 0c 0f 41 2d 54 72 75 73 74 2d 51 75 61 6c 2d 30 33 00 39 30 37 31 14 30 12 06 03 55 04 0a 0c 0b 54 65 6c 69 61 53 6f 6e 65 72 61 31 1f 30 1d 06 03 55 04 03 0c 16 54 65 6c 69 61 53 6f 6e 65 72 61 20 52 6f 6f 74 20 43 41 20 76 31 00 75 30 73 31 0b 30 09 06 03 55 04 06 13 02 49 4c 31 18 30 16 06 03 55 04 0a 0c 0f 50 65 72 73 6f 6e 61 6c 49 44 20 4c 74 64 2e 31 1d 30 1b 06 03 55 04 0b 0c 14 43 65 72 74 69 66 69 63 61 74 65 20 53 65 72 76 69 63 65 73 31 2b 30 29 06 03 55 04 03 0c 22 50 65 72 73 6f 6e 61 6c 49 44 20 54 72 75 73 74 77 6f 72 74 68 79 20 52 6f 6f 74 43 41 20 32 30 31 31 00 86 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69 7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61 6c 65 31 1a 30 18
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 3128 bytes more input data
SSL: Building ACK (type=25 id=10 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0a 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 0b 05 10 19 40 06 03 55 04 0a 13 11 47 6f 44 61 64 64 79 2e 63 6f 6d 2c 20 49 6e 63 2e 31 31 30 2f 06 03 55 04 03 13 28 47 6f 20 44 61 64 64 79 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 00 50 30 4e 31 0b 30 09 06 03 55 04 06 13 02 4e 4f 31 1d 30 1b 06 03 55 04 0a 0c 14 42 75 79 70 61 73 73 20 41 53 2d 39 38 33 31 36 33 33 32 37 31 20 30 1e 06 03 55 04 03 0c 17 42 75 79 70 61 73 73 20 43 6c 61 73 73 20 32 20 52 6f 6f 74 20 43 41 00 4d 30 4b 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 15 30 13 06 03 55 04 0a 0c 0c 44 2d 54 72 75 73 74 20 47 6d 62 48 31 25 30 23 06 03 55 04 03 0c 1c 44 2d 54 52 55 53 54 20 52 6f 6f 74 20 43 6c 61 73 73 20 32 20 43 41 20 32 30 30 37 00 d3 30 81 d0 31 0b 30 09 06 03 55 04 06 13 02 45 53 31 48 30 46 06 03 55 04 0a 13 3f 49 5a 45 4e 50 45 20 53 2e 41 2e 20 2d 20 43 49 46 20 41 2d 30 31 33 33 37 32 36 30 2d 52 4d 65 72 63 2e 56 69 74 6f 72 69 61 2d 47 61 73 74 65 69 7a 20 54 31 30 35 35 20 46 36 32 20 53 38 31 42 30 40 06 03 55 04 07 13 39 41 76 64 61 20 64 65 6c 20 4d 65 64 69 74 65 72 72 61 6e 65 6f 20 45 74 6f 72 62 69 64 65 61 20 33 20 2d 20 30 31 30 31 30 20 56 69 74 6f 72 69 61 2d 47 61 73 74 65 69 7a 31 13 30 11 06 03 55 04 03 13 0a 49 7a 65 6e 70 65 2e 63 6f 6d 31 1e 30 1c 06 09 2a 86 48 86 f7 0d 01 09 01 16 0f 49 6e 66 6f 40 69 7a 65 6e 70 65 2e 63 6f 6d 00 af 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 45 55 31 43 30 41 06 03 55 04 07 13 3a 4d 61 64 72 69 64 20 28 73 65 65 20 63 75 72 72 65 6e 74 20 61 64 64 72 65 73 73 20 61 74 20 77 77 77 2e 63 61 6d 65 72 66 69 72 6d 61 2e 63 6f 6d 2f 61 64 64 72 65 73 73 29 31 12 30 10 06 03 55 04 05 13 09 41 38 32 37 34 33 32 38 37 31 1b 30 19 06 03 55 04 0a 13 12 41 43 20 43 61 6d 65 72 66 69 72 6d 61 20 53 2e 41 2e 31 27 30 25 06 03 55 04 03 13 1e 47 6c 6f 62 61 6c 20 43 68 61 6d 62 65 72 73 69 67 6e 20 52 6f 6f 74 20 2d 20 32 30 30 38 00 cd 30 81 ca 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 32 30 30 36 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 45 30 43 06 03 55 04 03 13 3c 56 65 72 69 53 69 67 6e 20 43 6c 61 73 73 20 33 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 35 00 95 30 81 92 31 24 30 22 06 03 55 04 07 13 1b 42 6f 67 6f 74 61 20 41 56 20 43 61 6c 6c 65 20 32 36 20 4e 20 36 38 44 2d 33 35 31 0b 30 09 06 03 55 04 06 13 02 43 4f 31 42 30 40 06 03 55 04 0a 13 39 45 6e 74 69 64 61 64 20 64 65 20 43 65 72 74 69 66 69 63 61 63 69 6f 6e 20 44 69 67 69 74 61 6c 20 41 62 69 65 72 74 61 20 43 65 72 74 69 63 61 6d 61 72 61 20 53 2e 41 2e 31 19 30 17 06 03 55 04 03 13 10 43 45 52 54 49 43 41 4d 41 52 41 20 53 2e 41 2e 00 8d 30 81 8a 31 0b 30 09 06 03 55 04 06 13 02 43 4e 31 32 30 30 06 03 55 04 0a 0c 29 43 68 69 6e 61 20 49 6e 74 65 72 6e 65 74 20 4e 65 74 77 6f 72 6b 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 43 65 6e 74 65 72 31 47 30 45 06 03 55 04 03 0c 3e 43 68 69 6e 61 20 49 6e 74 65 72 6e 65 74 20 4e 65 74 77 6f 72 6b 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 43 65 6e 74 65 72 20 45 56 20 43 65 72 74 69 66 69 63 61 74 65 73 20 52 6f 6f 74 00 b7 30 81 b4 31 14 30 12 06 03 55 04 0a 13 0b 45 6e 74 72 75 73 74 2e 6e 65 74 31 40 30 3e 06 03 55 04 0b 14 37 77 77 77 2e 65 6e 74 72 75 73 74 2e 6e 65 74 2f 43 50 53 5f 32 30 34 38 20 69 6e 63 6f 72 70 2e 20 62 79 20 72 65 66 2e 20 28 6c 69 6d 69 74 73 20 6c 69 61 62 2e 29 31 25 30 23 06 03 55 04 0b 13 1c 28 63 29 20 31 39 39 39 20 45 6e 74 72 75 73 74 2e 6e 65 74 20 4c 69 6d 69 74 65 64 31 33 30 31 06 03 55 04 03 13 2a 45 6e 74 72 75 73 74 2e 6e 65 74 20 43 65 72 74 69 66 69 63
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 1838 bytes more input data
SSL: Building ACK (type=25 id=11 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0b 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=1300
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=1300): 02 00 05 10 01 0c 05 10 19 40 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 28 32 30 34 38 29 00 57 30 55 31 0b 30 09 06 03 55 04 06 13 02 41 54 31 10 30 0e 06 03 55 04 0a 13 07 41 2d 54 72 75 73 74 31 19 30 17 06 03 55 04 0b 13 10 41 2d 54 72 75 73 74 2d 6e 51 75 61 6c 2d 30 31 31 19 30 17 06 03 55 04 03 13 10 41 2d 54 72 75 73 74 2d 6e 51 75 61 6c 2d 30 31 00 3c 30 3a 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 11 30 0f 06 03 55 04 0a 0c 08 44 41 54 45 56 20 65 47 31 18 30 16 06 03 55 04 03 0c 0f 43 41 20 44 41 54 45 56 20 49 4e 54 20 30 31 00 85 30 81 82 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 2b 30 29 06 03 55 04 0a 0c 22 54 2d 53 79 73 74 65 6d 73 20 45 6e 74 65 72 70 72 69 73 65 20 53 65 72 76 69 63 65 73 20 47 6d 62 48 31 1f 30 1d 06 03 55 04 0b 0c 16 54 2d 53 79 73 74 65 6d 73 20 54 72 75 73 74 20 43 65 6e 74 65 72 31 25 30 23 06 03 55 04 03 0c 1c 54 2d 54 65 6c 65 53 65 63 20 47 6c 6f 62 61 6c 52 6f 6f 74 20 43 6c 61 73 73 20 33 00 4f 30 4d 31 0b 30 09 06 03 55 04 06 13 02 53 47 31 28 30 26 06 03 55 04 0a 13 1f 4e 65 74 72 75 73 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 20 31 31 14 30 12 06 03 55 04 0b 13 0b 4e 65 74 72 75 73 74 20 43 41 31 00 4b 30 49 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 15 30 13 06 03 55 04 0a 13 0c 53 77 69 73 73 53 69 67 6e 20 41 47 31 23 30 21 06 03 55 04 03 13 1a 53 77 69 73 73 53 69 67 6e 20 50 6c 61 74 69 6e 75 6d 20 43 41 20 2d 20 47 32 00 4f 30 4d 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 15 30 13 06 03 55 04 0a 0c 0c 44 2d 54 72 75 73 74 20 47 6d 62 48 31 27 30 25 06 03 55 04 03 0c 1e 44 2d 54 52 55 53 54 20 52 6f 6f 74 20 43 6c 61 73 73 20 33 20 43 41 20 32 20 32 30 30 39 00 8d 30 81 8a 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 0a 13 07 57 49 53 65 4b 65 79 31 1b 30 19 06 03 55 04 0b 13 12 43 6f 70 79 72 69 67 68 74 20 28 63 29 20 32 30 30 35 31 22 30 20 06 03 55 04 0b 13 19 4f 49 53 54 45 20 46 6f 75 6e 64 61 74 69 6f 6e 20 45 6e 64 6f 72 73 65 64 31 28 30 26 06 03 55 04 03 13 1f 4f 49 53 54 45 20 57 49 53 65 4b 65 79 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 20 47 41 20 43 41 00 5c 30 5a 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 1e 30 1c 06 03 55 04 0a 0c 15 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 31 2b 30 29 06 03 55 04 03 0c 22 53 74 61 61 74 20 64 65 72 20 4e 65 64 65 72 6c 61 6e 64 65 6e 20 52 6f 6f 74 20 43 41 20 2d 20 47 32 00 7b 30 79 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0d 30 0b 06 03 55 04 0a 13 04 56 49 53 41 31 2f 30 2d 06 03 55 04 0b 13 26 56 69 73 61 20 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 20 53 65 72 76 69 63 65 20 41 73 73 6f 63 69 61 74 69 6f 6e 31 2a 30 28 06 03 55 04 03 13 21 56 69 73 61 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 20 44 65 6c 69 76 65 72 79 20 52 6f 6f 74 20 43 41 00 76 30 74 31 0b 30 09 06 03 55 04 06 13 02 4c 54 31 2b 30 29 06 03 55 04 0a 13 22 53 6b 61 69 74 6d 65 6e 69 6e 69 6f 20 73 65 72 74 69 66 69 6b 61 76 69 6d 6f 20 63 65 6e 74 72 61 73 31 20 30 1e 06 03 55 04 0b 13 17 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 31 16 30 14 06 03 55 04 03 13 0d 53 53 43 20 52 6f 6f 74 20 43 41 20 41 00 d2 30 81 cf 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69 7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61 6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20 54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 3a 30 38 06 03 55 04 0b 13 31 68 74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 31 36 30 34 06 03 55 04 03 13 2d 53 74 61 72 66 69 65 6c 64 20 53 65 72 76 69 63 65 73 20 52 6f 6f 74 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 00 66 30 64 31 0b 30 09 06 03 55 04 06 13 02 63 68 31 11 30 0f 06 03 55 04 0a 13 08 53 77 69 73 73 63 6f 6d 31 25 30 23 06 03 55 04 0b 13 1c 44 69
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1296) - Flags 0x40
SSL: Need 548 bytes more input data
SSL: Building ACK (type=25 id=12 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2181fe0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0c 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=558
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=558): 02 00 02 2a 01 0d 02 2a 19 00 67 69 74 61 6c 20 43 65 72 74 69 66 69 63 61 74 65 20 53 65 72 76 69 63 65 73 31 1b 30 19 06 03 55 04 03 13 12 53 77 69 73 73 63 6f 6d 20 52 6f 6f 74 20 43 41 20 31 00 5f 30 5d 31 0b 30 09 06 03 55 04 06 13 02 4a 50 31 25 30 23 06 03 55 04 0a 13 1c 53 45 43 4f 4d 20 54 72 75 73 74 20 53 79 73 74 65 6d 73 20 43 4f 2e 2c 4c 54 44 2e 31 27 30 25 06 03 55 04 0b 13 1e 53 65 63 75 72 69 74 79 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 20 52 6f 6f 74 43 41 32 00 3d 30 3b 31 18 30 16 06 03 55 04 0a 13 0f 43 79 62 65 72 74 72 75 73 74 2c 20 49 6e 63 31 1f 30 1d 06 03 55 04 03 13 16 43 79 62 65 72 74 72 75 73 74 20 47 6c 6f 62 61 6c 20 52 6f 6f 74 00 6e 30 6c 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 2b 30 29 06 03 55 04 03 13 22 44 69 67 69 43 65 72 74 20 48 69 67 68 20 41 73 73 75 72 61 6e 63 65 20 45 56 20 52 6f 6f 74 20 43 41 00 88 30 81 85 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 13 06 46 72 61 6e 63 65 31 0e 30 0c 06 03 55 04 07 13 05 50 61 72 69 73 31 10 30 0e 06 03 55 04 0a 13 07 50 4d 2f 53 47 44 4e 31 0e 30 0c 06 03 55 04 0b 13 05 44 43 53 53 49 31 0e 30 0c 06 03 55 04 03 13 05 49 47 43 2f 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 69 67 63 61 40 73 67 64 6e 2e 70 6d 2e 67 6f 75 76 2e 66 72 00 4d 30 4b 31 0b 30 09 06 03 55 04 06 13 02 4e 4f 31 1d 30 1b 06 03 55 04 0a 0c 14 42 75 79 70 61 73 73 20 41 53 2d 39 38 33 31 36 33 33 32 37 31 1d 30 1b 06 03 55 04 03 0c 14 42 75 79 70 61 73 73 20 43 6c 61 73 73 20 33 20 43 41 20 31 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=554) - Flags 0x00
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=81): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=1142): [REMOVED]
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/CN=bsurad.bsu'
wlp1s0b1: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=bsurad.bsu' hash=5fcb8120d877105c01d56d8d8d92ab0c9c26e96c727d39654ebad78008e356b1
EAP: Status notification: remote certificate verification (param=success)
TLS: tls_verify_cb - preverify_ok=1 err=21 (unable to verify the first certificate) ca_cert_verify=0 depth=0 buf='/CN=bsurad.bsu'
wlp1s0b1: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/CN=bsurad.bsu' hash=5fcb8120d877105c01d56d8d8d92ab0c9c26e96c727d39654ebad78008e356b1
EAP: Status notification: remote certificate verification (param=success)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=12212): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=4): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=7): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=134): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=20
OpenSSL: Message - hexdump(len=1): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in unknown state
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in unknown state
SSL: SSL_connect - want more data
SSL: 194 bytes pending from ssl_out
SSL: 194 bytes left to be sent out (of total 194 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21daa50
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=208): 01 00 00 cc 02 0d 00 cc 19 80 00 00 00 c2 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 00 86 10 00 00 82 00 80 44 d1 5e 85 c9 c5 46 dc 4c 86 06 ee da 59 66 82 3b 00 1c 98 62 46 e1 05 91 f7 7b b8 94 e3 91 8b c7 e9 6a 90 66 e1 ef 5e ab 89 aa d3 22 47 45 b3 1c 81 6b 95 74 6f 9d 8b 09 98 40 00 18 e5 6a f6 1a dc cc c1 64 5b 61 25 62 f7 e1 4a d0 05 c6 72 80 b9 50 c6 41 fc 37 ad 57 0d b3 ff 6c 46 97 d1 18 12 a3 f3 e7 8e 36 66 02 6c 55 5a 3a 2b af ba a2 18 79 cb d2 fe a1 3e 03 48 75 15 1b 01 c4 32 14 03 01 00 01 01 16 03 01 00 20 b6 35 d8 0a 39 d7 37 a7 81 fa 32 59 bb 6e 63 9c d6 cb cd a9 8b df 61 6d 04 6d 6b f4 87 c9 42 53
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=57
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=57): 02 00 00 35 01 0e 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 7a d6 44 72 de 3f d9 49 30 89 13 25 ff fd d2 13 8f 10 7e f1 94 c8 47 5e 58 9a c0 35 c3 a2 a2 d2
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x80
SSL: TLS Message Length: 43
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=20
OpenSSL: Message - hexdump(len=1): [REMOVED]
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: Handshake finished - resumed=0
SSL: No Application Data included
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
OpenSSL: Using internal PRF
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd
SSL: Building ACK (type=25 id=14 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21bad00
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=10): 01 00 00 06 02 0e 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=32
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=32): 02 00 00 1c 01 0f 00 1c 19 00 17 03 01 00 11 78 f6 c0 38 c9 d3 b3 50 d3 c6 28 2f 94 1d 03 0e e7
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=15 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=28) - Flags 0x00
EAP-PEAP: received 22 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=15 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=17): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 34 bytes left to be sent out (of total 34 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21d9b60
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=44): 01 00 00 28 02 0f 00 28 19 00 17 03 01 00 1d 3c c3 5f 82 e9 a5 ab 3b c6 21 06 d9 fc 79 f1 35 dc 97 48 b0 88 26 d2 35 47 28 c8 bd f3
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=59
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=59): 02 00 00 37 01 10 00 37 19 00 17 03 01 00 2c 7a 59 8e db 93 0a ff 78 3a cd cf cd f0 80 cd 89 b5 51 17 12 b1 2b 39 99 87 b9 04 55 d0 31 ad 1e a3 e0 e6 a8 77 9f 81 ca 43 29 bd e6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=16 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=55) - Flags 0x00
EAP-PEAP: received 49 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=28): 1a 01 10 00 1b 10 e2 6a 8b 4e 12 e7 ea 44 ee b4 31 f6 aa 42 ea 91 42 53 55 52 41 44
EAP-PEAP: received Phase 2: code=1 identifier=16 length=32
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 16 mschapv2_id 16
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=6):
42 53 55 52 41 44 BSURAD
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA
MSCHAPV2: Username - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA
MSCHAPV2: auth_challenge - hexdump(len=16): e2 6a 8b 4e 12 e7 ea 44 ee b4 31 f6 aa 42 ea 91
MSCHAPV2: peer_challenge - hexdump(len=16): 8e d8 eb f2 bc ff bc 67 40 e9 45 fb 0f 8b 52 49
MSCHAPV2: username - hexdump_ascii(len=12):
66 70 6d 2e 53 69 6e 79 61 6b 53 41 fpm.SinyakSA
MSCHAPV2: password - hexdump_ascii(len=6): [REMOVED]
MSCHAPV2: NT Response - hexdump(len=24): 1d ea 1e 52 3b 46 97 9e 97 5b 7b ee 2e 82 6c 6d d8 32 49 5a 07 c6 20 2f
MSCHAPV2: Auth Response - hexdump(len=20): 1e b3 94 35 8d bb 4a d5 a3 a3 14 b3 6e ed c3 4c c9 84 60 e4
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
EAP-MSCHAPV2: TX identifier 16 mschapv2_id 16 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=71): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 88 bytes left to be sent out (of total 88 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21af950
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=98): 01 00 00 5e 02 10 00 5e 19 00 17 03 01 00 53 4e 92 0e c1 99 d6 91 45 f6 b6 78 06 5b 53 5a 2c e2 95 4a d6 b5 85 64 a5 e1 ef fa 08 05 74 4b a3 16 cc b2 e9 b4 93 c8 25 0a 31 24 c5 49 8f b5 35 c6 af 20 4f ad 34 6e 58 56 90 a1 4c 2e ec 92 da c8 c9 39 49 90 e9 e8 d6 98 0c 8a bf 14 c2 55 7d 2e ad b7
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=78
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=78): 02 00 00 4a 01 11 00 4a 19 00 17 03 01 00 3f 50 f2 16 31 4f 05 2d ea 66 6f 07 6e 29 e3 ae c1 17 8c 89 68 ef be 43 01 62 c9 4b dd db a2 e0 c4 97 ac 66 8b ec f8 64 a6 d8 9b df ea c6 8d ba ad a6 cf d3 52 74 b5 54 fb c5 ca 99 c9 bb f6 8e
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=17 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=74) - Flags 0x00
EAP-PEAP: received 68 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 10 00 2e 53 3d 31 45 42 33 39 34 33 35 38 44 42 42 34 41 44 35 41 33 41 33 31 34 42 33 36 45 45 44 43 33 34 43 43 39 38 34 36 30 45 34
EAP-PEAP: received Phase 2: code=1 identifier=17 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-MSCHAPV2: RX identifier 17 mschapv2_id 16
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 23 bytes left to be sent out (of total 23 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21af910
EAP: Session-Id - hexdump(len=65): 19 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 11 00 1d 19 00 17 03 01 00 12 ee 6c de 3d c3 d3 f6 77 cc db f7 22 47 8a 9b 63 3c 15
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=42
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=42): 02 00 00 26 01 12 00 26 19 00 17 03 01 00 1b 52 d4 57 2c 1e ed 66 ca 24 47 dc 3e be e7 9d 36 54 f3 ea 2e 52 5f 2e 62 1e 65 f8
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=18 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=38) - Flags 0x00
EAP-PEAP: received 32 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 12 00 0b 21 80 03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=18 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-TLV: Result TLV - hexdump(len=2): 00 01
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 32 bytes left to be sent out (of total 32 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x21da030
EAP: Session-Id - hexdump(len=65): 19 22 bd 62 ba 4e 04 91 fc 54 42 d0 d4 35 7a c9 9b 10 34 50 62 43 9c ba 92 e8 d2 45 42 44 55 f2 ee 57 28 5e 80 34 57 98 12 4e da ba d3 d6 a0 e7 38 cb d2 36 78 37 59 13 08 6f e6 ea ef 3f 5d ea fd
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:3a:98:f5:90:e2
TX EAPOL - hexdump(len=42): 01 00 00 26 02 12 00 26 19 00 17 03 01 00 1b 91 d5 8f f0 ff de e7 58 08 15 5a f3 e5 26 d3 3e 13 83 a8 e2 04 04 b0 dc d4 29 b1
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=8
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=8): 02 00 00 04 03 13 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: Workaround for unexpected identifier field in EAP Success: reqId=19 lastId=18 (these are supposed to be same)
EAP: EAP entering state SUCCESS
wlp1s0b1: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp1s0b1: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: RSN: no matching PMKID found
EAPOL: Successfully fetched key (len=32)
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
RSN: Added PMKSA cache entry for 00:3a:98:f5:90:e2 network_ctx=0x2181a10
nl80211: Add PMKID for 00:3a:98:f5:90:e2
wlp1s0b1: RSN: the new PMK matches with the PMKID
WPA: Renewed SNonce - hexdump(len=32): 13 21 64 7e 54 04 c8 fc 16 cd 55 f9 d0 37 00 ce 72 84 40 2f 9f ed 3f 3c 78 c6 49 8b ef 42 87 3d
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
WPA: Nonce1 - hexdump(len=32): 13 21 64 7e 54 04 c8 fc 16 cd 55 f9 d0 37 00 ce 72 84 40 2f 9f ed 3f 3c 78 c6 49 8b ef 42 87 3d
WPA: Nonce2 - hexdump(len=32): 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp1s0b1: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 59 c6 8a 2d ab 56 9c 25 d9 c4 46 cc 13 f7 27 f1
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 13 21 64 7e 54 04 c8 fc 16 cd 55 f9 d0 37 00 ce 72 84 40 2f 9f ed 3f 3c 78 c6 49 8b ef 42 87 3d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 c6 8a 2d ab 56 9c 25 d9 c4 46 cc 13 f7 27 f1 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 fa 03 b5 0d 1d d9 08 db bc c5 50 56 c5 0b 94 00 50 51 ae ee 71 c4 6a f8 f6 98 ab 7e 55 b0 2c 0b 3e 9d 3d 3b 04 04 2b 15 4e 87 4d 7b 48 e6 56 a0 4a b2 04 b2 a0 bd c8 f6 4f 01 0a 3c 47 21 ed d0 2d 3d f4 57 ea 06 41 09 01 88 6a b6 fc 9c a8 78 0a ea ec be 43 f6 b9 18 75 7e 6e ef 44 b5 37 45 5e
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 fa 03 b5 0d 1d d9 08 db bc c5 50 56 c5 0b 94 00 50 51 ae ee 71 c4 6a f8 f6 98 ab 7e 55 b0 2c 0b 3e 9d 3d 3b 04 04 2b 15 4e 87 4d 7b 48 e6 56 a0 4a b2 04 b2 a0 bd c8 f6 4f 01 0a 3c 47 21 ed d0 2d 3d f4 57 ea 06 41 09 01 88 6a b6 fc 9c a8 78 0a ea ec be 43 f6 b9 18 75 7e 6e ef 44 b5 37 45 5e
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp1s0b1: key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 53 2e 71 3a b4 b6 eb 05 5c 74 51 b8 3b c7 eb 53 6e 83 dd 97 ca 44 1f 6f bf 24 bf c1 3c 2e 28 2d
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 94 fa 03 b5 0d 1d d9 08 db bc c5 50 56 c5 0b 94
RSN: encrypted key data - hexdump(len=80): 51 ae ee 71 c4 6a f8 f6 98 ab 7e 55 b0 2c 0b 3e 9d 3d 3b 04 04 2b 15 4e 87 4d 7b 48 e6 56 a0 4a b2 04 b2 a0 bd c8 f6 4f 01 0a 3c 47 21 ed d0 2d 3d f4 57 ea 06 41 09 01 88 6a b6 fc 9c a8 78 0a ea ec be 43 f6 b9 18 75 7e 6e ef 44 b5 37 45 5e
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp1s0b1: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): eb ea ff 1d 00 e7 75 f1 86 c7 4e 51 97 76 52 a5
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb ea ff 1d 00 e7 75 f1 86 c7 4e 51 97 76 52 a5 00 00
wlp1s0b1: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
addr=00:3a:98:f5:90:e2
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2
EAPOL authentication completed - result=SUCCESS
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32
nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
broadcast key
nl80211: set_key failed; err=-22 Invalid argument)
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1)
wlp1s0b1: RSN: Failed to install GTK
wlp1s0b1: RSN: Failed to configure GTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 1 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x219f5d0 done in 5.386528 seconds
Added BSSID 00:3a:98:f5:90:e2 into blacklist
wlp1s0b1: Blacklist count 1 --> request scan in 100 ms
wlp1s0b1: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:3a:98:f5:90:e2
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
EAPOL: disable timer tick
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp1s0b1: State: DISCONNECTED -> SCANNING
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x219d880
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x219d880 after 0.000020 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000054 seconds
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.660971 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 2
wlp1s0b1: BSS: Add new id 2 BSSID 00:3a:9a:00:7c:13 SSID 'test' freq 2437
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x219d880 done in 0.661456 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437
wlp1s0b1: skip - blacklisted (count=1 limit=0)
wlp1s0b1: 1: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-61 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 2: 00:3a:9a:00:7c:13 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-74 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear)
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:98:f5:90:e2
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x219d880
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x219d880 after 0.000024 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:3a:98:f5:90:e2
RSN: PMKSA cache entry found - PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: Trying to use cached PMKSA
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 10 ee 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=50): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 20 ee 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2437 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2
wlp1s0b1: Associated with 00:3a:98:f5:90:e2
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp1s0b1: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: matched PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMK from PMKSA cache - hexdump(len=32): [REMOVED]
EAPOL: PMKSA caching was used - skip EAPOL
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
WPA: Renewed SNonce - hexdump(len=32): 2e 6f a4 a1 f6 21 44 07 6f 60 b6 a5 be 90 76 7a 24 bd 47 fc a0 a6 3a 5a db dd 50 fa 3c 44 69 2c
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
WPA: Nonce1 - hexdump(len=32): 2e 6f a4 a1 f6 21 44 07 6f 60 b6 a5 be 90 76 7a 24 bd 47 fc a0 a6 3a 5a db dd 50 fa 3c 44 69 2c
WPA: Nonce2 - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp1s0b1: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 05 99 14 8d 66 bd a7 b8 89 b2 fd b8 d0 d5 b0 76
WPA: TX EAPOL-Key - hexdump(len=139): 01 03 00 87 02 01 0a 00 00 00 00 00 00 00 00 00 00 2e 6f a4 a1 f6 21 44 07 6f 60 b6 a5 be 90 76 7a 24 bd 47 fc a0 a6 3a 5a db dd 50 fa 3c 44 69 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 99 14 8d 66 bd a7 b8 89 b2 fd b8 d0 d5 b0 76 00 28 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 fb 50 b5 f6 23 93 95 92 37 94 a7 c9 ad ea 27 00 50 d9 75 0a a0 1a c9 ba 7c ed 20 5a 05 a3 27 7b 6a 79 45 15 46 7d 0b 32 f7 b1 62 3e 72 33 63 30 ae 8c 6a 7f f7 4c e6 68 80 94 0d 41 93 ab 1e ec 9b ea b5 62 b5 21 5d 63 31 01 3e 43 4a 73 8e 8e c0 28 8f e4 9c 8c a9 4c dd 26 70 27 c8 fe 32 64 fc
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 fb 50 b5 f6 23 93 95 92 37 94 a7 c9 ad ea 27 00 50 d9 75 0a a0 1a c9 ba 7c ed 20 5a 05 a3 27 7b 6a 79 45 15 46 7d 0b 32 f7 b1 62 3e 72 33 63 30 ae 8c 6a 7f f7 4c e6 68 80 94 0d 41 93 ab 1e ec 9b ea b5 62 b5 21 5d 63 31 01 3e 43 4a 73 8e 8e c0 28 8f e4 9c 8c a9 4c dd 26 70 27 c8 fe 32 64 fc
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp1s0b1: key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 35 fb 50 b5 f6 23 93 95 92 37 94 a7 c9 ad ea 27
RSN: encrypted key data - hexdump(len=80): d9 75 0a a0 1a c9 ba 7c ed 20 5a 05 a3 27 7b 6a 79 45 15 46 7d 0b 32 f7 b1 62 3e 72 33 63 30 ae 8c 6a 7f f7 4c e6 68 80 94 0d 41 93 ab 1e ec 9b ea b5 62 b5 21 5d 63 31 01 3e 43 4a 73 8e 8e c0 28 8f e4 9c 8c a9 4c dd 26 70 27 c8 fe 32 64 fc
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp1s0b1: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): fd 7b 9c 48 87 fb c9 e2 da c9 67 5b 03 55 b3 43
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd 7b 9c 48 87 fb c9 e2 da c9 67 5b 03 55 b3 43 00 00
wlp1s0b1: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
addr=00:3a:98:f5:90:e2
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2
EAPOL authentication completed - result=SUCCESS
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32
nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
broadcast key
nl80211: set_key failed; err=-22 Invalid argument)
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1)
wlp1s0b1: RSN: Failed to install GTK
wlp1s0b1: RSN: Failed to configure GTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 1 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x219d880 done in 0.655424 seconds
Added BSSID 00:3a:98:f5:90:e2 into blacklist
wlp1s0b1: Blacklist count 2 --> request scan in 500 ms
wlp1s0b1: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:3a:98:f5:90:e2
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
wlp1s0b1: State: DISCONNECTED -> SCANNING
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x21d9370
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x21d9370 after 0.000020 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000054 seconds
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.659943 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 3
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x21d9370 done in 0.660367 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2437
wlp1s0b1: skip - blacklisted (count=1 limit=0)
wlp1s0b1: 2: 00:3a:9a:00:7c:13 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-74 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear)
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-62 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:98:f5:90:e2
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x21d9370
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x21d9370 after 0.000024 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:3a:98:f5:90:e2
RSN: PMKSA cache entry found - PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: Trying to use cached PMKSA
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 a0 f0 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=50): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 b0 f0 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2437 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2
wlp1s0b1: Associated with 00:3a:98:f5:90:e2
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp1s0b1: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: matched PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMK from PMKSA cache - hexdump(len=32): [REMOVED]
EAPOL: PMKSA caching was used - skip EAPOL
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
WPA: Renewed SNonce - hexdump(len=32): bd 30 18 db 51 4e a3 4b 1f 85 72 af f8 3e 9e d3 9a 8e 67 c5 5e bc 3d a7 22 31 bd 88 ef fe c8 05
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
WPA: Nonce1 - hexdump(len=32): bd 30 18 db 51 4e a3 4b 1f 85 72 af f8 3e 9e d3 9a 8e 67 c5 5e bc 3d a7 22 31 bd 88 ef fe c8 05
WPA: Nonce2 - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp1s0b1: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): cb 13 5b 0c 55 0e 98 99 b9 10 a0 87 be 8c 41 74
WPA: TX EAPOL-Key - hexdump(len=139): 01 03 00 87 02 01 0a 00 00 00 00 00 00 00 00 00 00 bd 30 18 db 51 4e a3 4b 1f 85 72 af f8 3e 9e d3 9a 8e 67 c5 5e bc 3d a7 22 31 bd 88 ef fe c8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cb 13 5b 0c 55 0e 98 99 b9 10 a0 87 be 8c 41 74 00 28 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 53 0d 3b 7d 10 38 c0 ae fc 76 86 fc 4c a1 8d 00 50 3c 15 fb 0b 1b 19 2c b4 c9 6c 1f 8f c6 14 b4 be f4 ef 5a 31 b4 cd 78 7d d5 ed 21 44 a9 c9 17 42 1e 81 70 98 29 2c 64 2a 7f bb c6 1d 62 e9 f0 6a d7 b8 49 7e fa 4e a9 c6 71 fb 02 4d 22 69 03 08 67 1a 08 8e 74 30 35 88 0b a0 8e 40 c2 77 9f 87
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 53 0d 3b 7d 10 38 c0 ae fc 76 86 fc 4c a1 8d 00 50 3c 15 fb 0b 1b 19 2c b4 c9 6c 1f 8f c6 14 b4 be f4 ef 5a 31 b4 cd 78 7d d5 ed 21 44 a9 c9 17 42 1e 81 70 98 29 2c 64 2a 7f bb c6 1d 62 e9 f0 6a d7 b8 49 7e fa 4e a9 c6 71 fb 02 4d 22 69 03 08 67 1a 08 8e 74 30 35 88 0b a0 8e 40 c2 77 9f 87
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp1s0b1: key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 9f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 2c 53 0d 3b 7d 10 38 c0 ae fc 76 86 fc 4c a1 8d
RSN: encrypted key data - hexdump(len=80): 3c 15 fb 0b 1b 19 2c b4 c9 6c 1f 8f c6 14 b4 be f4 ef 5a 31 b4 cd 78 7d d5 ed 21 44 a9 c9 17 42 1e 81 70 98 29 2c 64 2a 7f bb c6 1d 62 e9 f0 6a d7 b8 49 7e fa 4e a9 c6 71 fb 02 4d 22 69 03 08 67 1a 08 8e 74 30 35 88 0b a0 8e 40 c2 77 9f 87
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp1s0b1: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 07 a8 db 2b 4a 40 b1 b1 6a 29 ef 9a 70 c2 c3 d9
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 a8 db 2b 4a 40 b1 b1 6a 29 ef 9a 70 c2 c3 d9 00 00
wlp1s0b1: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
addr=00:3a:98:f5:90:e2
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2
EAPOL authentication completed - result=SUCCESS
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32
nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
broadcast key
nl80211: set_key failed; err=-22 Invalid argument)
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1)
wlp1s0b1: RSN: Failed to install GTK
wlp1s0b1: RSN: Failed to configure GTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 1 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x21d9370 done in 1.316746 seconds
Added BSSID 00:3a:98:f5:90:e2 into blacklist
wlp1s0b1: Blacklist count 3 --> request scan in 1000 ms
wlp1s0b1: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:3a:98:f5:90:e2
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
wlp1s0b1: State: DISCONNECTED -> SCANNING
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x21da030
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x21da030 after 0.000021 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000054 seconds
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.658894 seconds
nl80211: Received scan results (3 BSSes)
wlp1s0b1: BSS: Start scan result update 4
BSS: last_scan_res_used=3/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x21da030 done in 0.659467 seconds
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437
wlp1s0b1: skip - blacklisted (count=1 limit=0)
wlp1s0b1: 2: 00:3a:9a:00:7c:13 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-74 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: No APs found - clear blacklist and try again
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear)
wlp1s0b1: Selecting BSS from priority group 0
wlp1s0b1: 0: 00:3a:98:f5:90:e3 ssid='test' wpa_ie_len=24 rsn_ie_len=20 caps=0x431 level=-52 freq=2437
wlp1s0b1: skip - SSID mismatch
wlp1s0b1: 1: 00:3a:98:f5:90:e2 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=24 caps=0x431 level=-52 freq=2437
wlp1s0b1: selected based on RSN IE
wlp1s0b1: selected BSS 00:3a:98:f5:90:e2 ssid='eduroam'
wlp1s0b1: Considering connect request: reassociate: 0 selected: 00:3a:98:f5:90:e2 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x2181a10 current_ssid=(nil)
wlp1s0b1: Request association with 00:3a:98:f5:90:e2
wlp1s0b1: Re-association to the same ESS
wlp1s0b1: Add radio work 'sme-connect'@0x21da030
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'sme-connect'@0x21da030 after 0.000026 second wait
wlp1s0b1: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:3a:98:f5:90:e2
RSN: PMKSA cache entry found - PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: Trying to use cached PMKSA
wlp1s0b1: RSN: using IEEE 802.11i/D9.0
wlp1s0b1: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
wlp1s0b1: WPA: Selected mgmt group cipher 32
wlp1s0b1: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
wlp1s0b1: WPA: using GTK TKIP
wlp1s0b1: WPA: using PTK CCMP
wlp1s0b1: WPA: using KEY_MGMT 802.1X
wlp1s0b1: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp1s0b1: Cancelling scan request
wlp1s0b1: SME: Trying to authenticate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
wlp1s0b1: Determining shared radio frequencies (max len 1)
wlp1s0b1: Shared frequencies (len=0): completed iteration
nl80211: Authenticate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp1s0b1
nl80211: New station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 d0 f3 00 00 02 00 00 00
nl80211: Authenticate event
wlp1s0b1: Event AUTH (11) received
wlp1s0b1: SME: Authentication response: peer=00:3a:98:f5:90:e2 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp1s0b1: set_disable_max_amsdu: -1
wlp1s0b1: set_ampdu_factor: -1
wlp1s0b1: set_ampdu_density: -1
wlp1s0b1: set_disable_ht40: 0
wlp1s0b1: set_disable_sgi: 0
wlp1s0b1: set_disable_ldpc: 0
wlp1s0b1: Trying to associate with 00:3a:98:f5:90:e2 (SSID='eduroam' freq=2437 MHz)
wlp1s0b1: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
nl80211: Associate (ifindex=2)
* bssid=00:3a:98:f5:90:e2
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=50): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31 7f 08 00 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac02
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp1s0b1
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 3a 98 f5 90 e2 10 f4 31 04 00 00 8c c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
nl80211: Associate event
wlp1s0b1: Event ASSOC (0) received
wlp1s0b1: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 00 00 00 27 00 00 00 42 00 00 00 62 00 00 00
wlp1s0b1: freq=2437 MHz
wlp1s0b1: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp1s0b1: Associated to a new BSS: BSSID=00:3a:98:f5:90:e2
wlp1s0b1: Associated with 00:3a:98:f5:90:e2
wlp1s0b1: WPA: Association event - clear replay counter
wlp1s0b1: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: maintaining EAP method data for fast reauthentication
EAP: EAP entering state IDLE
wlp1s0b1: Setting authentication timeout: 10 sec 0 usec
wlp1s0b1: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp1s0b1
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:3a:98:f5:90:e2 len=121
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: Setting authentication timeout: 70 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=117
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp1s0b1: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp1s0b1: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 1 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMKID from Authenticator - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: matched PMKID - hexdump(len=16): d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
RSN: PMK from PMKSA cache - hexdump(len=32): [REMOVED]
EAPOL: PMKSA caching was used - skip EAPOL
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
WPA: Renewed SNonce - hexdump(len=32): db ba ad 66 39 73 d1 7b 10 b0 1d c1 6f a3 a1 d4 0a bc 5e 4a 1a b5 80 d8 d1 ad 88 45 70 d4 bc 9c
WPA: PTK derivation - A1=74:2f:68:d2:b1:f3 A2=00:3a:98:f5:90:e2
WPA: Nonce1 - hexdump(len=32): db ba ad 66 39 73 d1 7b 10 b0 1d c1 6f a3 a1 d4 0a bc 5e 4a 1a b5 80 d8 d1 ad 88 45 70 d4 bc 9c
WPA: Nonce2 - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=40): 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp1s0b1: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 06 14 c4 58 74 df f7 64 70 c1 48 4d 2d 3c ef f1
WPA: TX EAPOL-Key - hexdump(len=139): 01 03 00 87 02 01 0a 00 00 00 00 00 00 00 00 00 00 db ba ad 66 39 73 d1 7b 10 b0 1d c1 6f a3 a1 d4 0a bc 5e 4a 1a b5 80 d8 d1 ad 88 45 70 d4 bc 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 14 c4 58 74 df f7 64 70 c1 48 4d 2d 3c ef f1 00 28 30 26 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 d6 ce 1b fc a4 3e 59 d4 52 80 5d 9c 1c 50 57 31
l2_packet_receive: src=00:3a:98:f5:90:e2 len=179
wlp1s0b1: RX EAPOL from 00:3a:98:f5:90:e2
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fb 39 c3 88 a8 67 87 0b 21 2d 27 ee 2c 8a b0 85 00 50 e2 89 12 0e ff ae 70 e8 09 ce 58 25 a9 e9 91 d6 76 2e d1 94 8e 43 00 35 76 48 06 1c 46 9f ac e0 7f c6 2f 0f 4b 28 14 e5 be d4 ca 0d fd eb e4 34 11 df 80 a1 b7 2b fa f9 0b f3 09 87 68 80 74 25 54 de 11 11 03 c3 9e 7b 1c e0 2f 66 70 10 cb 97
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp1s0b1: IEEE 802.1X RX: version=2 type=3 length=175
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 01 d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fb 39 c3 88 a8 67 87 0b 21 2d 27 ee 2c 8a b0 85 00 50 e2 89 12 0e ff ae 70 e8 09 ce 58 25 a9 e9 91 d6 76 2e d1 94 8e 43 00 35 76 48 06 1c 46 9f ac e0 7f c6 2f 0f 4b 28 14 e5 be d4 ca 0d fd eb e4 34 11 df 80 a1 b7 2b fa f9 0b f3 09 87 68 80 74 25 54 de 11 11 03 c3 9e 7b 1c e0 2f 66 70 10 cb 97
wlp1s0b1: EAPOL-Key type=2
wlp1s0b1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp1s0b1: key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): d9 4e 3b d9 c0 37 cf 4e 63 3e 8a 2a ae c3 54 40 41 5d e4 22 18 21 f2 23 e6 ed 73 63 58 57 a3 a2
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): fb 39 c3 88 a8 67 87 0b 21 2d 27 ee 2c 8a b0 85
RSN: encrypted key data - hexdump(len=80): e2 89 12 0e ff ae 70 e8 09 ce 58 25 a9 e9 91 d6 76 2e d1 94 8e 43 00 35 76 48 06 1c 46 9f ac e0 7f c6 2f 0f 4b 28 14 e5 be d4 ca 0d fd eb e4 34 11 df 80 a1 b7 2b fa f9 0b f3 09 87 68 80 74 25 54 de 11 11 03 c3 9e 7b 1c e0 2f 66 70 10 cb 97
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
wlp1s0b1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp1s0b1: WPA: RX message 3 of 4-Way Handshake from 00:3a:98:f5:90:e2 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 26 00 0f ac 01 01 00 92 42 65 60 dd e7 d5 26 75 22 80 97 08 2d e3 56 20 ba 9a 20 89 e3 59 6d 93 7a 45 dc f7 80 74 0e dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 01 28 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp1s0b1: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 19 d9 ad 84 78 40 9d 3b 91 df 25 7f b7 b6 98 7d
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 d9 ad 84 78 40 9d 3b 91 df 25 7f b7 b6 98 7d 00 00
wlp1s0b1: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=3 addr=0x2180ef0 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
addr=00:3a:98:f5:90:e2
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 00:3a:98:f5:90:e2
EAPOL authentication completed - result=SUCCESS
wlp1s0b1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp1s0b1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=2 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=32
nl80211: KEY_DATA - hexdump(len=32): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
broadcast key
nl80211: set_key failed; err=-22 Invalid argument)
wlp1s0b1: WPA: Failed to set GTK to the driver (alg=2 keylen=32 keyidx=1)
wlp1s0b1: RSN: Failed to install GTK
wlp1s0b1: RSN: Failed to configure GTK
wlp1s0b1: Request to deauthenticate - bssid=00:3a:98:f5:90:e2 pending_bssid=00:00:00:00:00:00 reason=1 state=GROUP_HANDSHAKE
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:3a:98:f5:90:e2 reason_code=1)
wlp1s0b1: Event DEAUTH (12) received
wlp1s0b1: Deauthentication notification
wlp1s0b1: * reason 1 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp1s0b1: CTRL-EVENT-DISCONNECTED bssid=00:3a:98:f5:90:e2 reason=1 locally_generated=1
wlp1s0b1: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=8)
wlp1s0b1: Setting scan request: 0.100000 sec
wlp1s0b1: Radio work 'sme-connect'@0x21da030 done in 0.282146 seconds
Added BSSID 00:3a:98:f5:90:e2 into blacklist
Continuous association failures - consider temporary network disabling
wlp1s0b1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=CONN_FAILED
wlp1s0b1: Blacklist count 4 --> request scan in 5000 ms
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp1s0b1: WPA: Clear old PMK and PTK
wlp1s0b1: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 (wlp1s0b1) alg=0 addr=0x217fa90 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:3a:98:f5:90:e2
wlp1s0b1: State: GROUP_HANDSHAKE -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp1s0b1: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wlp1s0b1: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp1s0b1
nl80211: Delete station 00:3a:98:f5:90:e2
nl80211: Event message available
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp1s0b1
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp1s0b1(74:2f:68:d2:b1:f3) A1=00:3a:98:f5:90:e2 A2=74:2f:68:d2:b1:f3
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 3a 98 f5 90 e2 74 2f 68 d2 b1 f3 00 3a 98 f5 90 e2 00 00 01 00
nl80211: Deauthenticate event
nl80211: Ignore deauth event triggered due to own deauth request
nl80211: Event message available
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp1s0b1
nl80211: Ignore disconnect event when using userspace SME
wlp1s0b1: State: DISCONNECTED -> SCANNING
wlp1s0b1: Starting AP scan for wildcard SSID
wlp1s0b1: Add radio work 'scan'@0x21d9b60
wlp1s0b1: First radio work item in the queue - schedule start immediately
wlp1s0b1: Starting radio work 'scan'@0x21d9b60 after 0.000036 second wait
wlp1s0b1: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=10): 7f 08 00 00 00 00 00 00 00 40
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp1s0b1
wlp1s0b1: nl80211: Scan trigger
wlp1s0b1: Event SCAN_STARTED (47) received
wlp1s0b1: Own scan request started a scan in 0.000053 seconds
RTM_NEWLINK: ifi_index=2 ifname=wlp1s0b1 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp1s0b1
wlp1s0b1: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462
wlp1s0b1: Event SCAN_RESULTS (3) received
wlp1s0b1: Scan completed in 0.673376 seconds
nl80211: Received scan results (4 BSSes)
wlp1s0b1: BSS: Start scan result update 5
wlp1s0b1: BSS: Add new id 3 BSSID 00:3a:99:04:bf:43 SSID 'test' freq 2462
BSS: last_scan_res_used=4/32
wlp1s0b1: New scan results available (own=1 ext=0)
wlp1s0b1: Radio work 'scan'@0x21d9b60 done in 0.673873 seconds
wlp1s0b1: Postpone network selection by 9 seconds since all networks are disabled
EAPOL: startWhen --> 0
EAPOL: disable timer tick
wlp1s0b1: Removing interface wlp1s0b1
wlp1s0b1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
TDLS: Tear down peers
wlp1s0b1: State: SCANNING -> DISCONNECTED
nl80211: Set wlp1s0b1 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RSN: Flush PMKSA cache entry for 00:3a:98:f5:90:e2
nl80211: Delete PMKID for 00:3a:98:f5:90:e2
wlp1s0b1: RSN: PMKSA cache entry free_cb: 00:3a:98:f5:90:e2 reason=0
EAP: deinitialize previously used EAP method (0, PEAP) at EAP deinit
ENGINE: engine deinit
wlp1s0b1: WPA: Clear old PMK and PTK
Removed BSSID 00:3a:98:f5:90:e2 from blacklist (clear)
wlp1s0b1: BSS: Remove id 1 BSSID 00:3a:98:f5:90:e3 SSID 'test' due to wpa_bss_flush
wlp1s0b1: BSS: Remove id 0 BSSID 00:3a:98:f5:90:e2 SSID 'eduroam' due to wpa_bss_flush
wlp1s0b1: BSS: Remove id 3 BSSID 00:3a:99:04:bf:43 SSID 'test' due to wpa_bss_flush
wlp1s0b1: BSS: Remove id 2 BSSID 00:3a:9a:00:7c:13 SSID 'test' due to wpa_bss_flush
wlp1s0b1: Cancelling scan request
wlp1s0b1: Cancelling authentication timeout
Remove interface wlp1s0b1 from radio phy0
Remove radio phy0
nl80211: deinit ifname=wlp1s0b1 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=2 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 2 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x888888888a909c49 (mode change)
wlp1s0b1: CTRL-EVENT-TERMINATING
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment