Skip to content

Instantly share code, notes, and snippets.

Created May 13, 2016 15:51
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save anonymous/d5989101a00ae7e1e5b1b681323c7094 to your computer and use it in GitHub Desktop.
Save anonymous/d5989101a00ae7e1e5b1b681323c7094 to your computer and use it in GitHub Desktop.
Debug wpa_supplicant
[root@UndevLaptop claudio]# cat /etc/NetworkManager/system-connections/eduroam
[connection]
id=eduroam
uuid=
type=wifi
permissions=
secondaries=
[wifi]
mac-address=DC:53:60:30:BF:C9
mac-address-blacklist=
mode=infrastructure
seen-bssids=
ssid=eduroam
[wifi-security]
group=
key-mgmt=wpa-eap
pairwise=
proto=
[802-1x]
altsubject-matches=
eap=peap;
identity=
password=
phase2-altsubject-matches=
phase2-auth=mschapv2
[ipv4]
dns-search=
method=auto
[ipv6]
dns-search=
ip6-privacy=0
method=auto
ctrl_interface=/run/wpa_supplicant
network={
ssid="eduroam"
key_mgmt=WPA-EAP
identity=
password=
eap=PEAP
#This is enough to allow the auth to succeed
#phase1="tls_disable_tlsv1_2=1"
phase2="auth=MSCHAPV2"
}
wpa_supplicant v2.3
Successfully initialized wpa_supplicant
Initializing interface 'wlp2s0' conf 'wpasupplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf'
Reading configuration file '/home/claudio/wpasupplicant.conf'
ctrl_interface='/run/wpa_supplicant'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
key_mgmt: 0x1
identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
password - hexdump_ascii(len=8): [REMOVED]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
Priority group 0
id=0 ssid='eduroam'
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: interface wlp2s0 in phy phy0
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x2445390
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040e
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0a11
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlp2s0 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Do not indicate P2P_DEVICE support (p2p_device=1 driver param not specified)
wlp2s0: Own MAC address: dc:53:60:30:bf:c9
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp2s0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
TDLS: TDLS operation supported by driver
TDLS: Driver uses external link setup
wlp2s0: WPS: UUID based on MAC address: 253333a1-33e3-5a54-a87b-93e80bcfe37c
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Own listen channel: 81:1
P2P: Random operating channel: 81:1
P2P: initialized
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: Added interface wlp2s0
wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp2s0: Starting delayed sched scan
wlp2s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
wlp2s0: Setting scan request: 0.000000 sec
wlp2s0: State: DISCONNECTED -> SCANNING
wlp2s0: Starting AP scan for wildcard SSID
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (2148)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 1
wlp2s0: Add radio work 'scan'@0x24452e0
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'scan'@0x24452e0 after 0.000004 second wait
wlp2s0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=126): dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 01
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
wlp2s0: nl80211: Scan trigger
wlp2s0: Event SCAN_STARTED (49) received
wlp2s0: Own scan request started a scan in 0.000021 seconds
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
wlp2s0: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
wlp2s0: Event SCAN_RESULTS (3) received
wlp2s0: Scan completed in 0.581338 seconds
nl80211: Received scan results (10 BSSes)
Sorted scan results
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=0 level=-51 flags=0xb age=230
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 1a 00 30 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 a1 9a ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 4f fa 90 91 41 7d 71 e5 06 ec 48 f4 49 47 08 40 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 1a 00 3a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 e2 51 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 ab 80 25 66 aa 90 7a ec 7c cc 62 82 4b ae 7b f0 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:70:d0 freq=2462 qual=0 noise=0 level=-70 flags=0xb age=29076
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 17 00 2d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 f6 06 a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 1c 8f 02 2b 56 5d 13 20 34 bb 67 cc 5a a3 cf 02 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
82:b9:a5:f8:06:6d freq=2462 qual=0 noise=0 level=-77 flags=0xb age=113
IEs - hexdump(len=230): 00 08 43 6f 67 75 6d 65 6c 6f 01 08 82 84 8b 96 0c 12 18 24 03 01 0b 07 06 50 54 20 01 0e 14 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 30 48 60 6c 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 18 00 50 f2 02 01 01 0d 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 03 7f 01 01 00 00 ff 7f
64:cc:2e:b8:ce:b8 freq=2437 qual=0 noise=0 level=-77 flags=0xb age=233
IEs - hexdump(len=148): 00 18 45 75 20 74 6f 75 20 72 69 6a 6f 20 f0 9f 92 aa f0 9f 92 aa f0 9f 92 aa 01 04 82 84 8b 96 03 01 06 2a 01 00 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=159): 00 18 45 75 20 74 6f 75 20 72 69 6a 6f 20 f0 9f 92 aa f0 9f 92 aa f0 9f 92 aa 01 04 82 84 8b 96 03 01 06 05 09 00 02 00 00 00 00 00 00 00 2a 01 00 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:e1 freq=5200 qual=0 noise=0 level=-82 flags=0xb age=26
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 a1 9d ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 25 da 6a e6 30 fc 31 a2 76 15 81 5f df c7 6f 63 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 e2 20 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 9f e5 25 1a 9d 5f c5 9a a3 16 80 48 21 ca eb 52 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:40 freq=2412 qual=0 noise=0 level=-81 flags=0xb age=29320
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 07 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 ee a9 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 28 39 73 85 9c 15 29 58 d5 c8 07 d4 d2 90 4c 25 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:40 freq=2437 qual=0 noise=0 level=-82 flags=0xb age=29180
IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 06 00 2b 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 e2 4c 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 79 cb 77 f9 09 90 3d 6a 8b 5e 9c 9c 97 0e 67 6b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 06 00 2b 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 e2 4c 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 79 cb 77 f9 09 90 3d 6a 8b 5e 9c 9c 97 0e 67 6b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:41 freq=5180 qual=0 noise=0 level=-94 flags=0xb age=43
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 67 10 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 3e 7e 43 f9 36 12 a6 74 9d b9 82 f7 90 28 2f e6 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:70:c1 freq=5200 qual=0 noise=0 level=-95 flags=0xb age=28990
IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 f7 5c b2 93 b5 00 17 e2 af 19 f2 97 78 11 99 53 f6 81 4c 14 57 2f 23 64 d8 c3 ad a6 0b 8f 49 75 ac 58 54 ab 1b d1 00 0f b7 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 f7 5c b2 93 b5 00 17 e2 af 19 f2 97 78 11 99 53 f6 81 4c 14 57 2f 23 64 d8 c3 ad a6 0b 8f 49 75 ac 58 54 ab 1b d1 00 0f b7 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=0 level=-71 flags=0xb age=230
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00
wlp2s0: BSS: Start scan result update 1
wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam'
wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam'
wlp2s0: BSS: Add new id 2 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo'
wlp2s0: BSS: Add new id 3 BSSID 64:cc:2e:b8:ce:b8 SSID 'Eu tou rijo \xf0\x9f\x92\xaa\xf0\x9f\x92\xaa\xf0\x9f\x92\xaa'
wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam'
wlp2s0: BSS: Add new id 5 BSSID 00:11:88:d2:71:40 SSID 'eduroam'
wlp2s0: BSS: Add new id 6 BSSID 00:11:88:d2:6f:40 SSID 'eduroam'
wlp2s0: BSS: Add new id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam'
wlp2s0: BSS: Add new id 8 BSSID 00:11:88:d2:70:c1 SSID 'eduroam'
wlp2s0: BSS: Add new id 9 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-'
BSS: last_scan_res_used=10/32
wlp2s0: New scan results available (own=1 ext=0)
wlp2s0: Radio work 'scan'@0x24452e0 done in 0.584548 seconds
wlp2s0: Selecting BSS from priority group 0
wlp2s0: 0: 00:11:88:d2:6f:e0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-51
wlp2s0: selected based on RSN IE
wlp2s0: selected BSS 00:11:88:d2:6f:e0 ssid='eduroam'
wlp2s0: Considering connect request: reassociate: 0 selected: 00:11:88:d2:6f:e0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x24458c0 current_ssid=(nil)
wlp2s0: Request association with 00:11:88:d2:6f:e0
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=9): 00 07 65 64 75 72 6f 61 6d
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 06
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=8): 07 06 50 54 20 01 0d 11
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=7): 0b 05 1a 00 30 00 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=4): 43 02 00 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
TDLS: TDLS is allowed in the target BSS
wlp2s0: Add radio work 'sme-connect'@0x24452e0
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'sme-connect'@0x24452e0 after 0.000021 second wait
wlp2s0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:11:88:d2:6f:e0
RSN: No PMKSA cache entry found
wlp2s0: RSN: using IEEE 802.11i/D9.0
wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
wlp2s0: WPA: Selected mgmt group cipher 32
wlp2s0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
wlp2s0: WPA: using GTK CCMP
wlp2s0: WPA: using PTK CCMP
wlp2s0: WPA: using KEY_MGMT 802.1X
wlp2s0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
wlp2s0: Cancelling scan request
wlp2s0: SME: Trying to authenticate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz)
wlp2s0: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
nl80211: Authenticate (ifindex=3)
* bssid=00:11:88:d2:6f:e0
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
nl80211: New station 00:11:88:d2:6f:e0
nl80211: Event message available
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=30): b0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 70 d7 00 00 02 00 00 00
nl80211: Authenticate event
wlp2s0: Event AUTH (11) received
wlp2s0: SME: Authentication response: peer=00:11:88:d2:6f:e0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp2s0: set_disable_max_amsdu: -1
wlp2s0: set_ampdu_factor: -1
wlp2s0: set_ampdu_density: -1
wlp2s0: set_disable_ht40: 0
wlp2s0: set_disable_sgi: 0
wlp2s0: set_disable_ldpc: 0
wlp2s0: Trying to associate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz)
wlp2s0: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=3)
* bssid=00:11:88:d2:6f:e0
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 04 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac04
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39
wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=65): 10 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 80 d7 31 00 00 00 15 c0 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Associate event
wlp2s0: Event ASSOC (0) received
wlp2s0: Association info event
resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
wlp2s0: freq=2437 MHz
wlp2s0: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp2s0: Associated to a new BSS: BSSID=00:11:88:d2:6f:e0
wlp2s0: Associated with 00:11:88:d2:6f:e0
wlp2s0: WPA: Association event - clear replay counter
wlp2s0: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp2s0: Setting authentication timeout: 10 sec 0 usec
wlp2s0: Cancelling scan request
wlp2s0: Process pending EAPOL frame that was received just before association notification
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39
wlp2s0: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp2s0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=42):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 am,nasid=AP3/1,p
6f 72 74 69 64 3d 32 30 36 39 ortid=2069
EAP: using real identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=36): [CENSORED]
EAPOL: SUPP_BE entering state RECEIVE
nl80211: Event message available
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
nl80211: Ignore connect event (cmd=46) when using userspace SME
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp2s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
wlp2s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=190): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in unknown state
SSL: SSL_connect - want more data
SSL: 195 bytes pending from ssl_out
SSL: 195 bytes left to be sent out (of total 195 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2467f10
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=209): 01 00 00 cd 02 02 00 cd 19 80 00 00 00 c3 16 03 01 00 be 01 00 00 ba 03 01 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 00 00 64 c0 14 c0 0a 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13 c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 2d 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=1500): 01 00 05 d8 01 03 05 d8 19 c0 00 00 0a c9 16 03 01 0a c4 02 00 00 4d 03 01 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20 20 cc 17 00 00 f8 2d f8 60 69 31 ac 4a e6 4e cd 7d 18 bd 4d e7 31 c7 12 36 77 24 79 4b fa 32 fb ae 00 04 00 00 05 ff 01 00 01 00 0b 00 0a 62 00 0a 5f 00 05 5a 30 82 05 56 30 82 04 3e a0 03 02 01 02 02 10 0f ed 55 0e 58 0f a6 45 ee 08 3b 50 ca c2 ea 26 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 1e 17 0d 31 35 31 30 32 32 30 30 30 30 30 30 5a 17 0d 31 38 31 30 32 36 31 32 30 30 30 30 5a 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 50 54 31 11 30 0f 06 03 55 04 08 0c 08 53 65 74 c3 ba 62 61 6c 31 11 30 0f 06 03 55 04 07 0c 08 53 65 74 c3 ba 62 61 6c 31 2b 30 29 06 03 55 04 0a 0c 22 49 6e 73 74 69 74 75 74 6f 20 50 6f 6c 69 74 c3 a9 63 6e 69 63 6f 20 64 65 20 53 65 74 c3 ba 62 61 6c 31 13 30 11 06 03 55 04 0b 13 0a 45 53 54 53 65 74 75 62 61 6c 31 1f 30 1d 06 03 55 04 03 13 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ba 5c 3e e0 6d 1e 15 f5 09 86 78 92 98 47 f2 17 7e ff d3 59 2f 86 2b 6c 98 15 df b9 4c fe 4f 2c 70 f2 d7 57 f2 63 f2 5f ab ab 38 27 9f d0 28 80 15 ff 71 0b 54 03 ce e3 d2 ef bb 20 fc a0 b8 17 73 ab 7b 5a 63 68 d7 4f 18 67 18 19 8c b0 28 46 6f 65 79 9c dd b9 c4 b4 59 58 39 a0 f0 3f d4 ff 5e 35 8d b7 62 bd 04 46 6b 4f 47 f9 e8 5f 12 2d 6b 6b 99 2f 64 71 67 f0 b1 08 58 86 7d ab 7b 32 6d 11 64 8e 5e 25 64 23 68 44 ea b7 dd c3 aa 3d 5d f2 f0 93 94 28 5b 70 4e 1c 6e 07 ee 69 9f dd 59 89 eb 90 50 7a 09 1c 4a 83 b2 d4 fc 86 f4 72 39 74 fa ee 8b a6 a6 c1 6a 40 55 04 76 43 2a e8 65 e1 c0 f1 ac c1 3c 23 cc 62 8c 2f 14 f6 4c 22 c9 0c c6 59 57 c0 6b 4c f9 5d bb 03 ad e1 fd d2 b3 51 fc cf bd 80 43 c0 1e 33 88 e1 50 04 50 94 e2 af be 26 42 bc 26 0e 18 74 81 41 22 b8 83 77 02 03 01 00 01 a3 82 01 cf 30 82 01 cb 30 1f 06 03 55 1d 23 04 18 30 16 80 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1d 06 03 55 1d 0e 04 16 04 14 f8 a9 76 28 39 ec 2b b4 f8 b5 6c 27 2a e9 30 dd 15 53 8b 99 30 21 06 03 55 1d 11 04 1a 30 18 82 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 6b 06 03 55 1d 1f 04 64 30 62 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c 01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 08 06 06 67 81 0c 01 02 02 30 6e 06 08 2b 06 01 05 05 07 01 01 04 62 30 60 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 38 06 08 2b 06 01 05 05 07 30 02 86 2c 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 74 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 1d 27 0b 88 ac f0 2f f2 9e 25 eb 57 b0 fa ad 2a 96 3f 8a 89 38 28 1b 13 01 80 6e 01 83 b7 36 a1 0c 9c 88 4e 3f 03 b8 af 84 dd d8 bf fb 00 a7 22 99 1e 1f ba f6 48 98 c1 4b ef a3 2f d2 77 7d 08 06 9e 0b 47 6c ef 21 cb 72 60 94 31 37 53 f2 ab 0d 34 6f 83 9e 24 8f ab ee 56 0c 2d 5b 0b 08 ad 7d 23 2b f0 6b b3 b2 4e bd 35 7f ae f8 0e c3 78 30 4c 22 94 53 ba 14 4a d2 dd 70 2a 6d 51 7a 70 fa db 1a 94 2c 72 cb 06 23 20 3b cd e2 7b 12 e2 12 84 b6 ad 85 b7 5a 7a ed ea 14 80 2c 32 3d 12 3f 3b 47 0f ae 90 8a 95 49 7f 17 b4 a3 40 a8 5e 56 ac ba be 78 04 8a 2f 0c a0 e5 08 4e fa 4f 55 f7 1f 85 5d be c5 6d 57 d3 bf aa 0d c2 3e 3b 35 6a 46 10 28 39 23 e3 27 1c 26 0a c7 b7 c9 ab ab ce 19 42 e9 51 e2 68 f0 0c 2b 21 a0 e9 34 84 a6 24 42 7e f0 91 08 69 5f e6 51 9d 97 52 87 11 d1 00 04 ff 30 82 04 fb 30 82 03 e3 a0 03 02 01 02 02 10 08 70
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1496) - Flags 0xc0
SSL: TLS Message Length: 2761
SSL: Need 1275 bytes more input data
SSL: Building ACK (type=25 id=3 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2445290
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=1285): 01 00 05 01 01 04 05 01 19 00 bc c5 af 3f db 95 9a 91 cb 6a ee ef e4 65 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 65 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 24 30 22 06 03 55 04 03 13 1b 44 69 67 69 43 65 72 74 20 41 73 73 75 72 65 64 20 49 44 20 52 6f 6f 74 20 43 41 30 1e 17 0d 31 34 31 31 31 38 31 32 30 30 30 30 5a 17 0d 32 34 31 31 31 38 31 32 30 30 30 30 5a 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c5 76 0f 0f d9 43 29 3b 6c 6d d1 47 ad de 10 bf 23 c2 78 a8 4a 77 35 f1 23 5b e0 4c 1e 41 e7 c2 31 00 bd 88 37 45 75 dd b9 02 10 80 1e 8f ed 64 23 04 45 a7 a0 39 3b 81 4d cf 63 3f c2 49 ff 22 9e 88 b0 d2 96 b9 5c 8a 74 1f 92 2a 2a f2 12 c8 b7 68 54 b5 58 41 81 40 68 06 1a 4f 85 29 fb b5 4d 3c 0f 4f 3f 40 96 1b ce a8 cc 5e 35 ff 64 98 f5 75 dd 74 54 05 a0 36 11 04 12 24 55 63 ef 94 77 2e 77 f1 15 76 ee d3 a4 59 45 21 9f a8 be d1 27 ed 0a e8 ab 38 ca 3f 87 d1 da f1 8f b9 0b 1f 44 e7 e0 ad f3 95 c2 16 4d ec 84 a3 3a 92 d4 cf c6 7d e6 bd cb 1a 40 4f b3 54 b1 f3 8f 6f 0d 1e e3 be 49 a3 56 e4 07 bc 8d a7 ce 1d b0 5b 57 56 d1 c4 1c fc 98 65 d1 cd 46 2f 91 94 bf 45 85 49 f8 6d 52 87 1c 02 56 01 27 16 ab 72 2e f4 71 e4 61 b5 20 a0 fa 26 69 6a 0a f1 ab 9f 6d b7 cf 25 02 03 01 00 01 a3 82 01 a6 30 82 01 a2 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 86 30 79 06 08 2b 06 01 05 05 07 01 01 04 6d 30 6b 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 43 06 08 2b 06 01 05 05 07 30 02 86 37 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 74 30 81 81 06 03 55 1d 1f 04 7a 30 78 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3d 06 03 55 1d 20 04 36 30 34 30 32 06 04 55 1d 20 00 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 1d 06 03 55 1d 0e 04 16 04 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1f 06 03 55 1d 23 04 18 30 16 80 14 45 eb a2 af f4 92 cb 82 31 2d 51 8b a7 a7 21 9d f3 6d c8 0f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 a9 28 35 7a c4 7b d6 da 27 1e ac 98 cf 27 36 4f 11 32 74 74 e6 40 dd 1d cd f2 68 77 35 af b3 8c 5d c6 04 bf 15 f4 23 67 8b b9 6f 97 04 eb 46 9d c2 cd c9 d1 a4 ae 81 2e c9 ba b1 e8 80 d0 1c c9 39 c1 56 76 59 6c 9c 7d e3 a9 f0 d3 d1 34 d8 3c 49 59 8b 1a 98 ce bf c6 f2 d8 30 35 ff e9 6f 5d a0 af 3a ee 66 53 ae aa 8c 69 c8 be 9a a7 a0 7b d8 82 4b 33 13 c8 07 f3 77 d7 f3 64 cd 9e 63 f9 42 27 53 ae 10 33 89 72 37 15 f1 be f7 1e 35 a2 ce c3 2d f2 d7 b2 e6 0b c7 69 c0 e5 1f 5f 7c 69 9b 7e ce 26 1a 33 44 c3 ba 77 05 3b ba 5d 3f 41 89 fa 16 3b ee 04 6e 5b ac 56 4b ef 8c 70 f2 4a 7b 57 bd 19 6e 8b 36 07 54 26 2d 86 09 94 1f 5f 37 ab f0 23 3f 8f 2c 5f 96 9e 47 71 a8 44 de a9 b9 85 2f b5 34 60 a5 5f 09 a0 9a 43 1d d4 bf 2d 44 d6 8d da fd 75 cb 5f 16 a0 0e 61 c2 70 3d 36 0d 00 00 05 02 01 02 00 00 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1281) - Flags 0x00
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=81): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=2662): [REMOVED]
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=1 buf='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3'
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3'
EAP: Status notification: remote certificate verification (param=success)
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt'
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt'
EAP: Status notification: remote certificate verification (param=success)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=9): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=4): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=7): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=262): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=20
OpenSSL: Message - hexdump(len=1): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in unknown state
SSL: SSL_connect - want more data
SSL: 322 bytes pending from ssl_out
SSL: 322 bytes left to be sent out (of total 322 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2478140
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=336): 01 00 01 4c 02 04 01 4c 19 80 00 00 01 42 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 01 06 10 00 01 02 01 00 b2 66 65 85 ff f2 4f ac 03 7d 81 e3 1f 49 9d 6d 60 43 69 fb f9 92 04 b1 15 89 60 20 ab 97 7e b8 23 65 15 92 96 ef 81 9b 3b 3c b0 d9 02 41 e0 89 9c d3 74 68 ca 7e b6 6b 1f c8 32 d8 bd 79 89 24 eb 89 08 89 9c 8a 36 dd d8 84 8e 3d 8f 33 20 6e 35 c8 9d 32 f3 d7 6d ef 55 ac 9b e5 da 57 85 47 d6 c2 79 65 a0 b7 70 e2 46 41 4b ef 97 86 f3 e3 f3 b9 e7 b2 b0 d0 c5 ef 13 c5 33 7a 80 60 66 2c 3b fa 37 56 2d 97 85 a0 5d 16 41 55 56 14 5a eb 75 a2 43 5f ef 01 09 50 e6 db e8 70 4e e0 fd c2 d8 e2 5f bd 77 db 6b 43 cc d2 1b a8 41 f0 9a a9 4a 68 7e 53 67 e1 70 0e 08 c6 4d 09 ec 28 8c d0 6f 53 1b 14 7e c6 2a aa 88 3c 6b 78 30 47 61 57 aa 3c f1 8d 64 04 66 aa 74 1a 49 13 3e 69 a6 36 13 66 26 9f dd 01 ef c2 75 ab db 47 f4 1c b7 3e 60 fe e4 32 72 ac d3 0c 2a 5d ee 8b b0 bf 97 bb 14 03 01 00 01 01 16 03 01 00 20 de 5a 23 4b 9a c5 7c f0 63 89 64 67 50 8c df 7c bd 41 15 e8 a7 6f 69 f2 4b 2e f2 5c 95 c4 ab 97
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=57): 01 00 00 35 01 05 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 29 1a 45 42 7a 62 92 14 59 0e 8f a7 d5 91 e7 2d 02 5b d5 86 1e f0 78 b9 ef a7 7f d5 db df 34 ba
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x80
SSL: TLS Message Length: 43
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=20
OpenSSL: Message - hexdump(len=1): [REMOVED]
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
SSL: No Application Data included
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
OpenSSL: Using internal PRF
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20
SSL: Building ACK (type=25 id=5 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x246e260
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 1c 01 06 00 1c 19 00 17 03 01 00 11 89 a5 b5 d6 1c 72 ef bd f8 76 61 94 26 60 6a 7f 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=28) - Flags 0x00
EAP-PEAP: received 22 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=6 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=32): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 49 bytes left to be sent out (of total 49 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x247e5b0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=59): 01 00 00 37 02 06 00 37 19 00 17 03 01 00 2c d4 98 49 2a 1c 6a f6 06 8e f2 c5 52 81 e0 bb 22 b7 74 c3 81 3d ae 8b 24 55 f8 b9 0b 7c 7c 91 0d 56 0d 78 69 ae 31 8a a4 b3 cf 9c 89
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=57): 01 00 00 35 01 07 00 35 19 00 17 03 01 00 2a a8 f6 85 3a 67 1a 49 f8 f2 86 b6 ff e0 d4 ba ad 73 cf 33 57 b7 59 c1 d6 a8 26 93 8a 87 d4 51 66 2a 49 56 01 fc b3 84 76 33 c2
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x00
EAP-PEAP: received 47 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=26): 1a 01 07 00 19 10 f6 62 cf 1f 27 b2 bb 8a 52 39 4a 9b 81 0a 99 77 49 41 54 45
EAP-PEAP: received Phase 2: code=1 identifier=7 length=30
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 7 mschapv2_id 7
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=4):
49 41 54 45 IATE
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
MSCHAPV2: Username - hexdump_ascii(len=27):
[CENSORED IDENTITY]
MSCHAPV2: auth_challenge - hexdump(len=16): f6 62 cf 1f 27 b2 bb 8a 52 39 4a 9b 81 0a 99 77
MSCHAPV2: peer_challenge - hexdump(len=16): ed 65 91 0f 47 39 ba a0 9e 54 bb 37 ba 9f 0a 2e
MSCHAPV2: username - hexdump_ascii(len=27):
[CENSORED IDENTITY]
MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED]
MSCHAPV2: NT Response - hexdump(len=24): 40 a2 27 c8 2d 99 97 02 9d a9 99 a9 47 ef 3a 0d 2f a5 c9 a2 93 46 c4 f0
MSCHAPV2: Auth Response - hexdump(len=20): 3c dc b4 c1 7b 3e fb 53 32 48 f2 e5 1b 43 0c b5 e4 9e 54 8b
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
EAP-MSCHAPV2: TX identifier 7 mschapv2_id 7 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=86): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 103 bytes left to be sent out (of total 103 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x247e8c0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=113): 01 00 00 6d 02 07 00 6d 19 00 17 03 01 00 62 38 3a 5e 9b 19 79 af da 5b 7b f5 ab 8d 00 b5 e4 10 0a 72 70 63 83 a8 45 ed ba 73 51 68 fb 7b 72 14 80 47 20 8d cc b8 61 d4 00 a3 b6 e3 12 1a ff 2e eb 49 68 a6 b6 53 46 6e 47 59 a1 dc 43 29 05 98 e4 54 56 89 01 a5 e1 0b bd 64 1e 57 27 f1 2c 4f 2d 6f d3 35 51 ef 18 49 9c 71 ba 65 86 56 92 00 45
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=78): 01 00 00 4a 01 08 00 4a 19 00 17 03 01 00 3f 2b 3f 2b 3f ba 54 16 06 7d f5 83 89 9a 37 c1 a5 29 f5 49 91 02 34 ca db 8f e8 f7 9a f8 04 34 cc d1 d1 c1 b5 e8 7e 12 ae a5 7c 20 53 78 86 6a 72 cd 4c 84 b1 c5 8a e9 3b bc 9d 4a 6b ae ed 28
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=74) - Flags 0x00
EAP-PEAP: received 68 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 07 00 2e 53 3d 33 43 44 43 42 34 43 31 37 42 33 45 46 42 35 33 33 32 34 38 46 32 45 35 31 42 34 33 30 43 42 35 45 34 39 45 35 34 38 42
EAP-PEAP: received Phase 2: code=1 identifier=8 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-MSCHAPV2: RX identifier 8 mschapv2_id 7
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 23 bytes left to be sent out (of total 23 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x247f200
EAP: Session-Id - hexdump(len=65): 19 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 08 00 1d 19 00 17 03 01 00 12 1a 18 38 f4 49 30 3a ea c2 2a c3 27 f4 fa c0 78 e9 dd
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 26 01 09 00 26 19 00 17 03 01 00 1b 6d 65 62 39 5c 75 1f f7 23 66 db 0c b5 f9 05 32 62 9f e3 5a d6 b2 1a 73 5a 35 54 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=38) - Flags 0x00
EAP-PEAP: received 32 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 09 00 0b 21 80 03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=9 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-TLV: Result TLV - hexdump(len=2): 00 01
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 32 bytes left to be sent out (of total 32 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x247e5b0
EAP: Session-Id - hexdump(len=65): 19 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=42): 01 00 00 26 02 09 00 26 19 00 17 03 01 00 1b 25 f0 f9 79 4a 16 01 c5 48 04 be 12 16 53 27 65 a9 05 69 a2 05 ed 63 3e ae a4 5b
EAPOL: SUPP_BE entering state RECEIVE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 04 03 09 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: EAP entering state SUCCESS
wlp2s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=117
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64
wlp2s0: EAPOL-Key type=2
wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp2s0: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64
RSN: PMKID from Authenticator - hexdump(len=16): da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64
wlp2s0: RSN: no matching PMKID found
EAPOL: Successfully fetched key (len=32)
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
RSN: Added PMKSA cache entry for 00:11:88:d2:6f:e0 network_ctx=0x24458c0
nl80211: Add PMKID for 00:11:88:d2:6f:e0
wlp2s0: RSN: the new PMK matches with the PMKID
WPA: Renewed SNonce - hexdump(len=32): e7 98 01 3b 0e cd df 4e 20 83 f7 6b c7 3c 08 1b ce 00 45 fe 24 3b bc 7c 95 be e6 58 9b a7 10 05
WPA: PTK derivation - A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
WPA: Nonce1 - hexdump(len=32): e7 98 01 3b 0e cd df 4e 20 83 f7 6b c7 3c 08 1b ce 00 45 fe 24 3b bc 7c 95 be e6 58 9b a7 10 05
WPA: Nonce2 - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp2s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 14 b2 ae 51 26 49 85 15 2e 2e fc 65 42 d6 b8 19
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 e7 98 01 3b 0e cd df 4e 20 83 f7 6b c7 3c 08 1b ce 00 45 fe 24 3b bc 7c 95 be e6 58 9b a7 10 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 b2 ae 51 26 49 85 15 2e 2e fc 65 42 d6 b8 19 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 15 36 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 53 8e 46 1b 85 7f 83 d7 19 1f 9d 1e 5e 45 d4 00 38 f1 25 86 3e 19 e8 59 5b 52 1d 07 fb 4d ad 93 65 ca f5 1d 6a 38 3c 6e cf da a3 5a 19 7a 0b a7 49 57 3d 2f 5c cb f4 52 f7 11 8b af 09 d1 44 d1 8f f4 b3 bc 9b b2 0d 7f 60
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=151
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 15 36 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 53 8e 46 1b 85 7f 83 d7 19 1f 9d 1e 5e 45 d4 00 38 f1 25 86 3e 19 e8 59 5b 52 1d 07 fb 4d ad 93 65 ca f5 1d 6a 38 3c 6e cf da a3 5a 19 7a 0b a7 49 57 3d 2f 5c cb f4 52 f7 11 8b af 09 d1 44 d1 8f f4 b3 bc 9b b2 0d 7f 60
wlp2s0: EAPOL-Key type=2
wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp2s0: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 15 15 36 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): ab 53 8e 46 1b 85 7f 83 d7 19 1f 9d 1e 5e 45 d4
RSN: encrypted key data - hexdump(len=56): f1 25 86 3e 19 e8 59 5b 52 1d 07 fb 4d ad 93 65 ca f5 1d 6a 38 3c 6e cf da a3 5a 19 7a 0b a7 49 57 3d 2f 5c cb f4 52 f7 11 8b af 09 d1 44 d1 8f f4 b3 bc 9b b2 0d 7f 60
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 16 00 0f ac 01 01 00 8e b9 a2 09 62 30 11 c7 c5 0f 45 a8 8d fd b7 0a dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlp2s0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): b0 86 be a5 31 b0 7a 82 78 85 43 37 f6 dc 27 dc
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 86 be a5 31 b0 7a 82 78 85 43 37 f6 dc 27 dc 00 00
wlp2s0: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x2444dc8 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
addr=00:11:88:d2:6f:e0
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 00:11:88:d2:6f:e0
EAPOL authentication completed - result=SUCCESS
wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 15 15 36 00 00 00
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x508836 key_idx=1 set_tx=0 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 15 15 36 00 00 00
broadcast key
wlp2s0: WPA: Key negotiation completed with 00:11:88:d2:6f:e0 [PTK=CCMP GTK=CCMP]
wlp2s0: Cancelling authentication timeout
wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
wlp2s0: Radio work 'sme-connect'@0x24452e0 done in 0.141998 seconds
wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:11:88:d2:6f:e0 completed [id=0 id_str=]
nl80211: Set wlp2s0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
EAPOL: External notification - portValid=1
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
EAPOL: startWhen --> 0
wlp2s0: Removing interface wlp2s0
wlp2s0: Request to deauthenticate - bssid=00:11:88:d2:6f:e0 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:11:88:d2:6f:e0 reason_code=3)
wlp2s0: Event DEAUTH (12) received
wlp2s0: Deauthentication notification
wlp2s0: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:11:88:d2:6f:e0 reason=3 locally_generated=1
wlp2s0: Auto connect disabled: do not try to re-connect
wlp2s0: Ignore connection failure indication since interface has been put into disconnected state
TDLS: Remove peers on disassociation
wlp2s0: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x2443a50 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:11:88:d2:6f:e0
wlp2s0: State: COMPLETED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RSN: Flush PMKSA cache entry for 00:11:88:d2:6f:e0
nl80211: Delete PMKID for 00:11:88:d2:6f:e0
wlp2s0: RSN: PMKSA cache entry free_cb: 00:11:88:d2:6f:e0 reason=0
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 2 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' due to wpa_bss_flush
wlp2s0: BSS: Remove id 3 BSSID 64:cc:2e:b8:ce:b8 SSID 'Eu tou rijo \xf0\x9f\x92\xaa\xf0\x9f\x92\xaa\xf0\x9f\x92\xaa' due to wpa_bss_flush
wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 5 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 6 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 8 BSSID 00:11:88:d2:70:c1 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 9 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush
wlp2s0: Cancelling delayed sched scan
wlp2s0: Cancelling scan request
wlp2s0: Cancelling authentication timeout
wlp2s0: P2P: Disable P2P since removing the management interface is being removed
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
Remove interface wlp2s0 from radio phy0
Remove radio phy0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x888888888accdb19 (mode change)
wlp2s0: CTRL-EVENT-TERMINATING
wpa_supplicant v2.5
Successfully initialized wpa_supplicant
Initializing interface 'wlp2s0' conf 'wpasupplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf'
Reading configuration file '/home/claudio/wpasupplicant.conf'
ctrl_interface='/run/wpa_supplicant'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
key_mgmt: 0x1
identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
password - hexdump_ascii(len=8): [REMOVED]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
Priority group 0
id=0 ssid='eduroam'
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: TDLS channel switch
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: interface wlp2s0 in phy phy0
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x216f550
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040e
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0505
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlp2s0 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
wlp2s0: Own MAC address: dc:53:60:30:bf:c9
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp2s0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
TDLS: TDLS operation supported by driver
TDLS: Driver uses external link setup
TDLS: Driver supports TDLS channel switching
wlp2s0: WPS: UUID based on MAC address: 253333a1-33e3-5a54-a87b-93e80bcfe37c
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
wlp2s0: Added interface wlp2s0
wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
nl80211: Create interface iftype 10 (P2P_DEVICE)
nl80211: New P2P Device interface p2p-dev-wlp2s0 (0x5) created
Initializing interface 'p2p-dev-wlp2s0' conf '/home/claudio/wpasupplicant.conf' driver 'nl80211' ctrl_interface '/run/wpa_supplicant' bridge 'N/A'
Configuration file '/home/claudio/wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf'
Reading configuration file '/home/claudio/wpasupplicant.conf'
ctrl_interface='/run/wpa_supplicant'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
key_mgmt: 0x1
identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
password - hexdump_ascii(len=8): [REMOVED]
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
Priority group 0
id=0 ssid='eduroam'
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0
Could not read interface p2p-dev-wlp2s0 flags: No such device
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: TDLS channel switch
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: interface p2p-dev-wlp2s0 in phy phy0
nl80211: Set mode ifindex 0 iftype 10 (P2P_DEVICE)
nl80211: Failed to set interface 0 to mode 10: -22 (Invalid argument)
nl80211: Subscribe to mgmt frames with non-AP handle 0x21701e0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040e
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0505
nl80211: Start P2P Device p2p-dev-wlp2s0 (0x5): Success
nl80211: driver param='(null)'
Add interface p2p-dev-wlp2s0 to existing radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
p2p-dev-wlp2s0: Own MAC address: dc:53:60:30:bf:ca
p2p-dev-wlp2s0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
p2p-dev-wlp2s0: State: DISCONNECTED -> INACTIVE
p2p-dev-wlp2s0: WPS: UUID from the first interface: 253333a1-33e3-5a54-a87b-93e80bcfe37c
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Own listen channel: 81:6
P2P: Random operating channel: 81:6
P2P: initialized
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
p2p-dev-wlp2s0: Added interface p2p-dev-wlp2s0
p2p-dev-wlp2s0: State: INACTIVE -> DISCONNECTED
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
p2p-dev-wlp2s0: Determining shared radio frequencies (max len 2)
p2p-dev-wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp2s0: Starting delayed sched scan
wlp2s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
wlp2s0: Setting scan request: 0.000000 sec
wlp2s0: State: DISCONNECTED -> SCANNING
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: Starting AP scan for wildcard SSID
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (3148)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 6
wlp2s0: Add radio work 'scan'@0x21930d0
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'scan'@0x21930d0 after 0.000032 second wait
wlp2s0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=136): 7f 08 04 00 00 00 00 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
wlp2s0: nl80211: Scan trigger
wlp2s0: Event SCAN_STARTED (47) received
wlp2s0: Own scan request started a scan in 0.000070 seconds
nl80211: Event message available
nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
wlp2s0: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
wlp2s0: Event SCAN_RESULTS (3) received
wlp2s0: Scan completed in 0.581152 seconds
nl80211: Received scan results (5 BSSes)
Sorted scan results
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-62 snr=27 flags=0xb age=230 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 8d c2 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 98 44 4e 01 91 75 9d 1c 1b f5 4a 0d 95 77 43 a1 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 18 00 49 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 b1 67 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 a6 2f 83 7e 53 0e 1e 19 26 dd 0b b7 ec 2f cc 97 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-69 snr=20 flags=0xb age=113 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 19 00 23 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 e6 ef a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0b 82 6c 72 bc 38 1c ff c5 de 13 c9 bf 62 6e 70 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 35 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 a3 da a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca f8 a3 63 de 3a a1 cd f7 7a ea 66 23 57 d6 12 1f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=233 est=36000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 05 00 3d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 55 f9 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 41 f4 a9 c4 22 97 84 d7 c3 25 70 ee 6d bf 5c ef dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 05 00 59 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 b2 6b 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 7c 90 2f e6 a4 df da 02 95 d7 a1 5b ea aa 42 2b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-84 snr=5 flags=0xb age=356 est=9000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 19 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d1 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d ef b2 39 df 0a ca 9c 3a 97 8e ca 92 b2 19 0a 28 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-91 snr=1 flags=0xb age=13 est=2000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d2 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 4c 68 46 ce b4 81 cb 61 2f c4 53 cc d2 41 94 d3 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
wlp2s0: BSS: Start scan result update 1
wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' freq 2437
wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' freq 2462
wlp2s0: BSS: Add new id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' freq 2437
wlp2s0: BSS: Add new id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' freq 2412
wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' freq 5220
BSS: last_scan_res_used=5/32
wlp2s0: New scan results available (own=1 ext=0)
wlp2s0: Radio work 'scan'@0x21930d0 done in 0.584256 seconds
wlp2s0: Selecting BSS from priority group 0
wlp2s0: 0: 00:11:88:d2:6f:e0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-62 freq=2437
wlp2s0: selected based on RSN IE
wlp2s0: selected BSS 00:11:88:d2:6f:e0 ssid='eduroam'
wlp2s0: Considering connect request: reassociate: 0 selected: 00:11:88:d2:6f:e0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x216fa80 current_ssid=(nil)
wlp2s0: Request association with 00:11:88:d2:6f:e0
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=24)
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=46)
wlp2s0: Add radio work 'sme-connect'@0x21930d0
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'sme-connect'@0x21930d0 after 0.000029 second wait
wlp2s0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:11:88:d2:6f:e0
RSN: No PMKSA cache entry found
wlp2s0: RSN: using IEEE 802.11i/D9.0
wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
wlp2s0: WPA: Selected mgmt group cipher 32
wlp2s0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
wlp2s0: WPA: using GTK CCMP
wlp2s0: WPA: using PTK CCMP
wlp2s0: WPA: using KEY_MGMT 802.1X
wlp2s0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp2s0: Cancelling scan request
wlp2s0: SME: Trying to authenticate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz)
wlp2s0: State: SCANNING -> AUTHENTICATING
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
nl80211: Authenticate (ifindex=3)
* bssid=00:11:88:d2:6f:e0
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Ignored event (cmd=19) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
nl80211: New station 00:11:88:d2:6f:e0
nl80211: Event message available
nl80211: Ignored event (cmd=37) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=30): b0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 30 f1 00 00 02 00 00 00
nl80211: Authenticate event
wlp2s0: Event AUTH (11) received
wlp2s0: SME: Authentication response: peer=00:11:88:d2:6f:e0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp2s0: set_disable_max_amsdu: -1
wlp2s0: set_ampdu_factor: -1
wlp2s0: set_ampdu_density: -1
wlp2s0: set_disable_ht40: 0
wlp2s0: set_disable_sgi: 0
wlp2s0: set_disable_ldpc: 0
wlp2s0: Trying to associate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz)
wlp2s0: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=3)
* bssid=00:11:88:d2:6f:e0
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 04 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac04
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Ignored event (cmd=38) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=65): 10 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 60 f1 31 00 00 00 11 c0 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Associate event
wlp2s0: Event ASSOC (0) received
wlp2s0: Association info event
resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
wlp2s0: freq=2437 MHz
wlp2s0: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=1): completed iteration
wlp2s0: freq[0]: 2437, flags=0x1
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: Associated to a new BSS: BSSID=00:11:88:d2:6f:e0
wlp2s0: Associated with 00:11:88:d2:6f:e0
wlp2s0: WPA: Association event - clear replay counter
wlp2s0: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp2s0: Setting authentication timeout: 10 sec 0 usec
wlp2s0: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:11:88:d2:6f:e0 len=51
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39
wlp2s0: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp2s0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=42):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 am,nasid=AP3/1,p
6f 72 74 69 64 3d 32 30 36 39 ortid=2069
EAP: using real identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=36): [CENSORED]
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp2s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
wlp2s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x303 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22
OpenSSL: Message - hexdump(len=298): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 303 bytes pending from ssl_out
SSL: 303 bytes left to be sent out (of total 303 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21a45e0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 c7 f1 5b bb 0b 03 3c 81 97 fc 31 30 4a 1f 67 d9 97 91 30 2e 7a 60 71 21 50 93 5c ca 7e 0c 03 32 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 04 04 02 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
wlp2s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:11:88:d2:6f:e0
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=FAILURE
wlp2s0: Setting authentication timeout: 2 sec 0 usec
nl80211: Event message available
nl80211: Ignored event (cmd=20) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp2s0
nl80211: Delete station 00:11:88:d2:6f:e0
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Ignored event (cmd=39) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp2s0
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=26): c0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 40 f2 01 00
nl80211: Deauthenticate event
wlp2s0: Event DEAUTH (12) received
wlp2s0: Deauthentication notification
wlp2s0: * reason 1
wlp2s0: * address 00:11:88:d2:6f:e0
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:11:88:d2:6f:e0 reason=1
wlp2s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED
wlp2s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
wlp2s0: Setting scan request: 0.100000 sec
wlp2s0: Radio work 'sme-connect'@0x21930d0 done in 0.101605 seconds
Added BSSID 00:11:88:d2:6f:e0 into blacklist
wlp2s0: Another BSS in this ESS has been seen; try it next
BSSID 00:11:88:d2:6f:e0 blacklist count incremented to 2
wlp2s0: Blacklist count 1 --> request scan in 100 ms
wlp2s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
wlp2s0: WPA: Clear old PMK and PTK
wlp2s0: Disconnect event - remove keys
wlp2s0: State: ASSOCIATED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
nl80211: Event message available
nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp2s0
nl80211: Ignore disconnect event when using userspace SME
wlp2s0: State: DISCONNECTED -> SCANNING
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: Starting AP scan for wildcard SSID
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (3148)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 6
wlp2s0: Optimize scan based on previously generated frequency list
wlp2s0: Add radio work 'scan'@0x218be80
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'scan'@0x218be80 after 0.000019 second wait
wlp2s0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=136): 7f 08 04 00 00 00 00 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06
nl80211: Scan frequency 2462 MHz
nl80211: Scan frequency 2437 MHz
nl80211: Scan frequency 2412 MHz
nl80211: Scan frequency 5220 MHz
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
wlp2s0: nl80211: Scan trigger
wlp2s0: Event SCAN_STARTED (47) received
wlp2s0: Own scan request started a scan in 0.000094 seconds
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
wlp2s0: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2462 2437 2412 5220
wlp2s0: Event SCAN_RESULTS (3) received
wlp2s0: Scan completed in 0.086365 seconds
nl80211: Received scan results (6 BSSes)
Sorted scan results
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-53 snr=36* flags=0xb age=40 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 8d ca ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 de d8 a4 2c 44 bb c4 05 62 22 1d 14 c0 db 95 31 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 14 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 b6 71 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 0c f8 9c 0e 78 6e bb 40 3e 48 f4 74 d5 7b c2 19 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-69 snr=20 flags=0xb age=403 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 19 00 23 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 e6 ef a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0b 82 6c 72 bc 38 1c ff c5 de 13 c9 bf 62 6e 70 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 35 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 a3 da a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca f8 a3 63 de 3a a1 cd f7 7a ea 66 23 57 d6 12 1f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=523 est=36000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 05 00 3d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 55 f9 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 41 f4 a9 c4 22 97 84 d7 c3 25 70 ee 6d bf 5c ef dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 05 00 59 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 b2 6b 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 7c 90 2f e6 a4 df da 02 95 d7 a1 5b ea aa 42 2b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-77 snr=12 flags=0xb age=33 est=36000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 19 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d3 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 3a 42 51 41 3b fa 89 d9 d3 07 b6 a1 1a f1 b8 a4 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-92 snr=0 flags=0xb age=10 est=1000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d4 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 50 90 eb 53 65 24 67 8f b3 b6 41 ef 90 c4 0c 0d dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=-89~ level=-67 snr=22 flags=0xb age=56 est=54000
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00
wlp2s0: BSS: Start scan result update 2
wlp2s0: BSS: Add new id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' freq 2412
BSS: last_scan_res_used=6/32
wlp2s0: New scan results available (own=1 ext=0)
wlp2s0: Radio work 'scan'@0x218be80 done in 0.089401 seconds
wlp2s0: Postpone network selection by 10 seconds since all networks are disabled
p2p-dev-wlp2s0: Updating scan results from sibling
nl80211: Received scan results (6 BSSes)
Sorted scan results
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-53 snr=36* flags=0xb age=43 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 8d ca ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 de d8 a4 2c 44 bb c4 05 62 22 1d 14 c0 db 95 31 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 14 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 b6 71 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 0c f8 9c 0e 78 6e bb 40 3e 48 f4 74 d5 7b c2 19 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-69 snr=20 flags=0xb age=406 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 19 00 23 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 e6 ef a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0b 82 6c 72 bc 38 1c ff c5 de 13 c9 bf 62 6e 70 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 35 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 a3 da a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca f8 a3 63 de 3a a1 cd f7 7a ea 66 23 57 d6 12 1f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=526 est=36000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 05 00 3d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 55 f9 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 41 f4 a9 c4 22 97 84 d7 c3 25 70 ee 6d bf 5c ef dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 05 00 59 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 b2 6b 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 7c 90 2f e6 a4 df da 02 95 d7 a1 5b ea aa 42 2b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-77 snr=12 flags=0xb age=36 est=36000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 19 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d3 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 3a 42 51 41 3b fa 89 d9 d3 07 b6 a1 1a f1 b8 a4 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-92 snr=0 flags=0xb age=13 est=1000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d4 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 50 90 eb 53 65 24 67 8f b3 b6 41 ef 90 c4 0c 0d dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=-89~ level=-67 snr=22 flags=0xb age=60 est=54000
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00
p2p-dev-wlp2s0: BSS: Start scan result update 1
p2p-dev-wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' freq 2437
p2p-dev-wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' freq 2462
p2p-dev-wlp2s0: BSS: Add new id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' freq 2437
p2p-dev-wlp2s0: BSS: Add new id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' freq 2412
p2p-dev-wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' freq 5220
p2p-dev-wlp2s0: BSS: Add new id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' freq 2412
BSS: last_scan_res_used=6/32
p2p-dev-wlp2s0: New scan results available (own=0 ext=0)
EAPOL: disable timer tick
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
EAPOL: startWhen --> 0
EAPOL: disable timer tick
p2p-dev-wlp2s0: Removing interface p2p-dev-wlp2s0
p2p-dev-wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED
TDLS: Tear down peers
p2p-dev-wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
p2p-dev-wlp2s0: WPA: Clear old PMK and PTK
p2p-dev-wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush
p2p-dev-wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush
p2p-dev-wlp2s0: BSS: Remove id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush
p2p-dev-wlp2s0: BSS: Remove id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush
p2p-dev-wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' due to wpa_bss_flush
p2p-dev-wlp2s0: BSS: Remove id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush
p2p-dev-wlp2s0: Cancelling delayed sched scan
p2p-dev-wlp2s0: Cancelling scan request
p2p-dev-wlp2s0: Cancelling authentication timeout
p2p-dev-wlp2s0: P2P: Disable P2P since removing the management interface is being removed
P2P: All ASP advertisements flushed
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
P2P: All ASP advertisements flushed
Remove interface p2p-dev-wlp2s0 from radio phy0
nl80211: deinit ifname=p2p-dev-wlp2s0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=0 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Stop P2P Device p2p-dev-wlp2s0 (0x5): Success
nl80211: Unsubscribe mgmt frames handle 0x888888888a9f8969 (deinit)
nl80211: Delete P2P Device p2p-dev-wlp2s0 (0x5): Success
p2p-dev-wlp2s0: CTRL-EVENT-TERMINATING
Control interface directory not empty - leaving it behind
wlp2s0: Removing interface wlp2s0
wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
TDLS: Tear down peers
wlp2s0: State: SCANNING -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
wlp2s0: WPA: Clear old PMK and PTK
Removed BSSID 00:11:88:d2:6f:e0 from blacklist (clear)
wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush
wlp2s0: Cancelling delayed sched scan
wlp2s0: Cancelling scan request
wlp2s0: Cancelling authentication timeout
Remove interface wlp2s0 from radio phy0
Remove radio phy0
nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x888888888a9e7dd9 (mode change)
wlp2s0: CTRL-EVENT-TERMINATING
wpa_supplicant v2.5
Successfully initialized wpa_supplicant
Initializing interface 'wlp2s0' conf 'wpasupplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf'
Reading configuration file '/home/claudio/wpasupplicant.conf'
ctrl_interface='/run/wpa_supplicant'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
key_mgmt: 0x1
identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
password - hexdump_ascii(len=8): [REMOVED]
phase1 - hexdump_ascii(len=21):
74 6c 73 5f 64 69 73 61 62 6c 65 5f 74 6c 73 76 tls_disable_tlsv
31 5f 32 3d 31 1_2=1
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
Priority group 0
id=0 ssid='eduroam'
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: TDLS channel switch
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: interface wlp2s0 in phy phy0
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x20e2550
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040e
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0505
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
nl80211: driver param='(null)'
Add interface wlp2s0 to a new radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
wlp2s0: Own MAC address: dc:53:60:30:bf:c9
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlp2s0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
TDLS: TDLS operation supported by driver
TDLS: Driver uses external link setup
TDLS: Driver supports TDLS channel switching
wlp2s0: WPS: UUID based on MAC address: 253333a1-33e3-5a54-a87b-93e80bcfe37c
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
wlp2s0: Added interface wlp2s0
wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
nl80211: Create interface iftype 10 (P2P_DEVICE)
nl80211: New P2P Device interface p2p-dev-wlp2s0 (0x7) created
Initializing interface 'p2p-dev-wlp2s0' conf '/home/claudio/wpasupplicant.conf' driver 'nl80211' ctrl_interface '/run/wpa_supplicant' bridge 'N/A'
Configuration file '/home/claudio/wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf'
Reading configuration file '/home/claudio/wpasupplicant.conf'
ctrl_interface='/run/wpa_supplicant'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
key_mgmt: 0x1
identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
password - hexdump_ascii(len=8): [REMOVED]
phase1 - hexdump_ascii(len=21):
74 6c 73 5f 64 69 73 61 62 6c 65 5f 74 6c 73 76 tls_disable_tlsv
31 5f 32 3d 31 1_2=1
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
Priority group 0
id=0 ssid='eduroam'
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0
Could not read interface p2p-dev-wlp2s0 flags: No such device
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:6
nl80211: Using driver-based off-channel TX
nl80211: TDLS channel switch
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: Enable multi-channel concurrent (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: interface p2p-dev-wlp2s0 in phy phy0
nl80211: Set mode ifindex 0 iftype 10 (P2P_DEVICE)
nl80211: Failed to set interface 0 to mode 10: -22 (Invalid argument)
nl80211: Subscribe to mgmt frames with non-AP handle 0x20e3220
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090a
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090b
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090c
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090d
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0409506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=7f506f9a09
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0801
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040e
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=06
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0a07
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0a11
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=1101
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=1102
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0505
nl80211: Start P2P Device p2p-dev-wlp2s0 (0x7): Success
nl80211: driver param='(null)'
Add interface p2p-dev-wlp2s0 to existing radio phy0
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Added 802.11b mode based on 802.11g information
p2p-dev-wlp2s0: Own MAC address: dc:53:60:30:bf:ca
p2p-dev-wlp2s0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
p2p-dev-wlp2s0: State: DISCONNECTED -> INACTIVE
p2p-dev-wlp2s0: WPS: UUID from the first interface: 253333a1-33e3-5a54-a87b-93e80bcfe37c
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Own listen channel: 81:11
P2P: Random operating channel: 81:11
P2P: initialized
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
p2p-dev-wlp2s0: Added interface p2p-dev-wlp2s0
p2p-dev-wlp2s0: State: INACTIVE -> DISCONNECTED
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
p2p-dev-wlp2s0: Determining shared radio frequencies (max len 2)
p2p-dev-wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
wlp2s0: Starting delayed sched scan
wlp2s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
wlp2s0: Setting scan request: 0.000000 sec
wlp2s0: State: DISCONNECTED -> SCANNING
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: Starting AP scan for wildcard SSID
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (3148)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 11
wlp2s0: Add radio work 'scan'@0x2106130
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'scan'@0x2106130 after 0.000015 second wait
wlp2s0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
nl80211: Scan extra IEs - hexdump(len=136): 7f 08 04 00 00 00 00 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
wlp2s0: nl80211: Scan trigger
wlp2s0: Event SCAN_STARTED (47) received
wlp2s0: Own scan request started a scan in 0.000069 seconds
EAPOL: disable timer tick
EAPOL: disable timer tick
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Event message available
nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
wlp2s0: nl80211: New scan results available
nl80211: Scan probed for SSID ''
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
wlp2s0: Event SCAN_RESULTS (3) received
wlp2s0: Scan completed in 2.769934 seconds
nl80211: Received scan results (9 BSSes)
Sorted scan results
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-57 snr=32* flags=0xb age=2640 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 18 00 42 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 92 00 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 88 58 68 d4 5e d6 8e 2a 7c e5 74 5d 72 1d b8 05 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 18 00 2d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 bb 93 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 22 f4 23 11 b6 f9 d2 9f 0c 81 90 be 1a ae dc 6f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:e1 freq=5200 qual=0 noise=-92~ level=-73 snr=19 flags=0xb age=2433 est=54000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 92 02 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 40 f5 7d 44 da dd 1e e8 c3 a5 7a 9b 63 1a 7b 9d dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 01 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 bb 9a ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 7a b0 a3 4d 9c 31 00 5e 73 f4 42 c6 ce 90 a1 99 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=2766 est=36000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 0a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e3 ac 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d b8 ed e7 fc b2 45 3c 79 4b f4 13 d1 77 6f 4f 4a dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-82 snr=7 flags=0xb age=2523 est=18000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 1b 00 26 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 ea 6c a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 15 26 e8 9e 1f 78 61 83 66 83 2e 78 9c 1f 7b 55 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 30 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 ad 06 a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0d 2a 3f 15 aa 2a 81 f1 5b 14 6b a7 b7 63 79 e3 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-83 snr=6 flags=0xb age=2640 est=12000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 06 00 3a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 59 fd 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 20 80 d8 c6 75 b3 48 57 22 7f 79 70 49 7f f9 4f dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 06 00 3a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 bf 9f 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 29 e5 d9 44 5f 14 5d 42 04 c3 ca 49 b9 4a 8a 84 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
82:b9:a5:f8:06:6d freq=2462 qual=0 noise=-89~ level=-87 snr=2 flags=0xb age=2520 est=6500
IEs - hexdump(len=230): 00 08 43 6f 67 75 6d 65 6c 6f 01 08 82 84 8b 96 0c 12 18 24 03 01 0b 07 06 50 54 20 01 0e 14 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 30 48 60 6c 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 18 00 50 f2 02 01 01 06 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 03 7f 01 01 00 00 ff 7f
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-90 snr=2 flags=0xb age=2420 est=2000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e3 b2 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d a0 bd 2a 35 b0 0f 74 27 47 22 5e 33 8e 96 a0 df dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 17 ba 4f 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 81 da c2 1d 40 6f c5 0d ec be a8 93 55 d7 59 f1 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
00:11:88:d2:6f:41 freq=5180 qual=0 noise=-92~ level=-92 snr=0 flags=0xb age=2450 est=1000
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 59 fe 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 6b 33 3b ac 80 23 86 a8 c9 ff 17 cd a5 a5 7c 8e dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=-89~ level=-74 snr=15 flags=0xb age=2636 est=48000
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00
wlp2s0: BSS: Start scan result update 1
wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' freq 2437
wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' freq 5200
wlp2s0: BSS: Add new id 2 BSSID 00:11:88:d2:71:40 SSID 'eduroam' freq 2412
wlp2s0: BSS: Add new id 3 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' freq 2462
wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' freq 2437
wlp2s0: BSS: Add new id 5 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' freq 2462
wlp2s0: BSS: Add new id 6 BSSID 00:11:88:d2:71:41 SSID 'eduroam' freq 5220
wlp2s0: BSS: Add new id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' freq 5180
wlp2s0: BSS: Add new id 8 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' freq 2412
BSS: last_scan_res_used=9/32
wlp2s0: New scan results available (own=1 ext=0)
wlp2s0: Radio work 'scan'@0x2106130 done in 2.772354 seconds
wlp2s0: Selecting BSS from priority group 0
wlp2s0: 0: 00:11:88:d2:6f:e0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-57 freq=2437
wlp2s0: selected based on RSN IE
wlp2s0: selected BSS 00:11:88:d2:6f:e0 ssid='eduroam'
wlp2s0: Considering connect request: reassociate: 0 selected: 00:11:88:d2:6f:e0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x20e2a80 current_ssid=(nil)
wlp2s0: Request association with 00:11:88:d2:6f:e0
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=24)
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=46)
wlp2s0: Add radio work 'sme-connect'@0x2106130
wlp2s0: First radio work item in the queue - schedule start immediately
wlp2s0: Starting radio work 'sme-connect'@0x2106130 after 0.000008 second wait
wlp2s0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:11:88:d2:6f:e0
RSN: No PMKSA cache entry found
wlp2s0: RSN: using IEEE 802.11i/D9.0
wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
wlp2s0: WPA: Selected mgmt group cipher 32
wlp2s0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
wlp2s0: WPA: using GTK CCMP
wlp2s0: WPA: using PTK CCMP
wlp2s0: WPA: using KEY_MGMT 802.1X
wlp2s0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
RRM: Determining whether RRM can be used - device support: 0x0
RRM: No RRM in network
wlp2s0: Cancelling scan request
wlp2s0: SME: Trying to authenticate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz)
wlp2s0: State: SCANNING -> AUTHENTICATING
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
nl80211: Authenticate (ifindex=3)
* bssid=00:11:88:d2:6f:e0
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Ignored event (cmd=19) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
nl80211: New station 00:11:88:d2:6f:e0
nl80211: Event message available
nl80211: Ignored event (cmd=37) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=30): b0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 d0 52 00 00 02 00 00 00
nl80211: Authenticate event
wlp2s0: Event AUTH (11) received
wlp2s0: SME: Authentication response: peer=00:11:88:d2:6f:e0 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlp2s0: set_disable_max_amsdu: -1
wlp2s0: set_ampdu_factor: -1
wlp2s0: set_ampdu_density: -1
wlp2s0: set_disable_ht40: 0
wlp2s0: set_disable_sgi: 0
wlp2s0: set_disable_ldpc: 0
wlp2s0: Trying to associate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz)
wlp2s0: State: AUTHENTICATING -> ASSOCIATING
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=0): completed iteration
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
nl80211: Associate (ifindex=3)
* bssid=00:11:88:d2:6f:e0
* freq=2437
* SSID - hexdump_ascii(len=7):
65 64 75 72 6f 61 6d eduroam
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 04 00 00 00 00 00 00 40
* WPA Versions 0x2
* pairwise=0xfac04
* group=0xfac04
* akm=0xfac01
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Association request send successfully
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Event message available
nl80211: Ignored event (cmd=38) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
nl80211: MLME event frame - hexdump(len=65): 10 08 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 00 53 31 00 00 00 11 c0 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
nl80211: Associate event
wlp2s0: Event ASSOC (0) received
wlp2s0: Association info event
resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
wlp2s0: freq=2437 MHz
wlp2s0: State: ASSOCIATING -> ASSOCIATED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=1): completed iteration
wlp2s0: freq[0]: 2437, flags=0x1
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: Associated to a new BSS: BSSID=00:11:88:d2:6f:e0
wlp2s0: Associated with 00:11:88:d2:6f:e0
wlp2s0: WPA: Association event - clear replay counter
wlp2s0: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
wlp2s0: Setting authentication timeout: 10 sec 0 usec
wlp2s0: Cancelling scan request
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
WMM AC: U-APSD queues=0x0
WMM AC: Valid WMM association, WMM AC is enabled
nl80211: Event message available
nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
nl80211: Ignore connect event (cmd=46) when using userspace SME
l2_packet_receive: src=00:11:88:d2:6f:e0 len=51
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39
wlp2s0: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
wlp2s0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=42):
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro
61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 am,nasid=AP3/1,p
6f 72 74 69 64 3d 32 30 36 39 ortid=2069
EAP: using real identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=36): [CENSORED]
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
wlp2s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
wlp2s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
OpenSSL: TX ver=0x302 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x302 content_type=22
OpenSSL: Message - hexdump(len=226): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect - want more data
SSL: 231 bytes pending from ssl_out
SSL: 231 bytes left to be sent out (of total 231 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x20fef70
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=245): 01 00 00 f1 02 02 00 f1 19 80 00 00 00 e7 16 03 01 00 e2 01 00 00 de 03 02 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 00 00 64 c0 14 c0 0a 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13 c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=1500
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=1500): 01 00 05 d8 01 03 05 d8 19 c0 00 00 0a c9 16 03 01 0a c4 02 00 00 4d 03 01 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de 20 02 15 00 00 d6 bc ac c5 64 e0 89 e4 e3 a1 32 69 b8 bb 7a 40 53 f9 65 53 e4 88 d9 38 10 4d 25 c2 00 04 00 00 05 ff 01 00 01 00 0b 00 0a 62 00 0a 5f 00 05 5a 30 82 05 56 30 82 04 3e a0 03 02 01 02 02 10 0f ed 55 0e 58 0f a6 45 ee 08 3b 50 ca c2 ea 26 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 1e 17 0d 31 35 31 30 32 32 30 30 30 30 30 30 5a 17 0d 31 38 31 30 32 36 31 32 30 30 30 30 5a 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 50 54 31 11 30 0f 06 03 55 04 08 0c 08 53 65 74 c3 ba 62 61 6c 31 11 30 0f 06 03 55 04 07 0c 08 53 65 74 c3 ba 62 61 6c 31 2b 30 29 06 03 55 04 0a 0c 22 49 6e 73 74 69 74 75 74 6f 20 50 6f 6c 69 74 c3 a9 63 6e 69 63 6f 20 64 65 20 53 65 74 c3 ba 62 61 6c 31 13 30 11 06 03 55 04 0b 13 0a 45 53 54 53 65 74 75 62 61 6c 31 1f 30 1d 06 03 55 04 03 13 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ba 5c 3e e0 6d 1e 15 f5 09 86 78 92 98 47 f2 17 7e ff d3 59 2f 86 2b 6c 98 15 df b9 4c fe 4f 2c 70 f2 d7 57 f2 63 f2 5f ab ab 38 27 9f d0 28 80 15 ff 71 0b 54 03 ce e3 d2 ef bb 20 fc a0 b8 17 73 ab 7b 5a 63 68 d7 4f 18 67 18 19 8c b0 28 46 6f 65 79 9c dd b9 c4 b4 59 58 39 a0 f0 3f d4 ff 5e 35 8d b7 62 bd 04 46 6b 4f 47 f9 e8 5f 12 2d 6b 6b 99 2f 64 71 67 f0 b1 08 58 86 7d ab 7b 32 6d 11 64 8e 5e 25 64 23 68 44 ea b7 dd c3 aa 3d 5d f2 f0 93 94 28 5b 70 4e 1c 6e 07 ee 69 9f dd 59 89 eb 90 50 7a 09 1c 4a 83 b2 d4 fc 86 f4 72 39 74 fa ee 8b a6 a6 c1 6a 40 55 04 76 43 2a e8 65 e1 c0 f1 ac c1 3c 23 cc 62 8c 2f 14 f6 4c 22 c9 0c c6 59 57 c0 6b 4c f9 5d bb 03 ad e1 fd d2 b3 51 fc cf bd 80 43 c0 1e 33 88 e1 50 04 50 94 e2 af be 26 42 bc 26 0e 18 74 81 41 22 b8 83 77 02 03 01 00 01 a3 82 01 cf 30 82 01 cb 30 1f 06 03 55 1d 23 04 18 30 16 80 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1d 06 03 55 1d 0e 04 16 04 14 f8 a9 76 28 39 ec 2b b4 f8 b5 6c 27 2a e9 30 dd 15 53 8b 99 30 21 06 03 55 1d 11 04 1a 30 18 82 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 6b 06 03 55 1d 1f 04 64 30 62 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c 01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 08 06 06 67 81 0c 01 02 02 30 6e 06 08 2b 06 01 05 05 07 01 01 04 62 30 60 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 38 06 08 2b 06 01 05 05 07 30 02 86 2c 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 74 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 1d 27 0b 88 ac f0 2f f2 9e 25 eb 57 b0 fa ad 2a 96 3f 8a 89 38 28 1b 13 01 80 6e 01 83 b7 36 a1 0c 9c 88 4e 3f 03 b8 af 84 dd d8 bf fb 00 a7 22 99 1e 1f ba f6 48 98 c1 4b ef a3 2f d2 77 7d 08 06 9e 0b 47 6c ef 21 cb 72 60 94 31 37 53 f2 ab 0d 34 6f 83 9e 24 8f ab ee 56 0c 2d 5b 0b 08 ad 7d 23 2b f0 6b b3 b2 4e bd 35 7f ae f8 0e c3 78 30 4c 22 94 53 ba 14 4a d2 dd 70 2a 6d 51 7a 70 fa db 1a 94 2c 72 cb 06 23 20 3b cd e2 7b 12 e2 12 84 b6 ad 85 b7 5a 7a ed ea 14 80 2c 32 3d 12 3f 3b 47 0f ae 90 8a 95 49 7f 17 b4 a3 40 a8 5e 56 ac ba be 78 04 8a 2f 0c a0 e5 08 4e fa 4f 55 f7 1f 85 5d be c5 6d 57 d3 bf aa 0d c2 3e 3b 35 6a 46 10 28 39 23 e3 27 1c 26 0a c7 b7 c9 ab ab ce 19 42 e9 51 e2 68 f0 0c 2b 21 a0 e9 34 84 a6 24 42 7e f0 91 08 69 5f e6 51 9d 97 52 87 11 d1 00 04 ff 30 82 04 fb 30 82 03 e3 a0 03 02 01 02 02 10 08 70
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1496) - Flags 0xc0
SSL: TLS Message Length: 2761
SSL: Need 1275 bytes more input data
SSL: Building ACK (type=25 id=3 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2106d90
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=1285
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=1285): 01 00 05 01 01 04 05 01 19 00 bc c5 af 3f db 95 9a 91 cb 6a ee ef e4 65 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 65 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 24 30 22 06 03 55 04 03 13 1b 44 69 67 69 43 65 72 74 20 41 73 73 75 72 65 64 20 49 44 20 52 6f 6f 74 20 43 41 30 1e 17 0d 31 34 31 31 31 38 31 32 30 30 30 30 5a 17 0d 32 34 31 31 31 38 31 32 30 30 30 30 5a 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c5 76 0f 0f d9 43 29 3b 6c 6d d1 47 ad de 10 bf 23 c2 78 a8 4a 77 35 f1 23 5b e0 4c 1e 41 e7 c2 31 00 bd 88 37 45 75 dd b9 02 10 80 1e 8f ed 64 23 04 45 a7 a0 39 3b 81 4d cf 63 3f c2 49 ff 22 9e 88 b0 d2 96 b9 5c 8a 74 1f 92 2a 2a f2 12 c8 b7 68 54 b5 58 41 81 40 68 06 1a 4f 85 29 fb b5 4d 3c 0f 4f 3f 40 96 1b ce a8 cc 5e 35 ff 64 98 f5 75 dd 74 54 05 a0 36 11 04 12 24 55 63 ef 94 77 2e 77 f1 15 76 ee d3 a4 59 45 21 9f a8 be d1 27 ed 0a e8 ab 38 ca 3f 87 d1 da f1 8f b9 0b 1f 44 e7 e0 ad f3 95 c2 16 4d ec 84 a3 3a 92 d4 cf c6 7d e6 bd cb 1a 40 4f b3 54 b1 f3 8f 6f 0d 1e e3 be 49 a3 56 e4 07 bc 8d a7 ce 1d b0 5b 57 56 d1 c4 1c fc 98 65 d1 cd 46 2f 91 94 bf 45 85 49 f8 6d 52 87 1c 02 56 01 27 16 ab 72 2e f4 71 e4 61 b5 20 a0 fa 26 69 6a 0a f1 ab 9f 6d b7 cf 25 02 03 01 00 01 a3 82 01 a6 30 82 01 a2 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 86 30 79 06 08 2b 06 01 05 05 07 01 01 04 6d 30 6b 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 43 06 08 2b 06 01 05 05 07 30 02 86 37 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 74 30 81 81 06 03 55 1d 1f 04 7a 30 78 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3d 06 03 55 1d 20 04 36 30 34 30 32 06 04 55 1d 20 00 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 1d 06 03 55 1d 0e 04 16 04 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1f 06 03 55 1d 23 04 18 30 16 80 14 45 eb a2 af f4 92 cb 82 31 2d 51 8b a7 a7 21 9d f3 6d c8 0f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 a9 28 35 7a c4 7b d6 da 27 1e ac 98 cf 27 36 4f 11 32 74 74 e6 40 dd 1d cd f2 68 77 35 af b3 8c 5d c6 04 bf 15 f4 23 67 8b b9 6f 97 04 eb 46 9d c2 cd c9 d1 a4 ae 81 2e c9 ba b1 e8 80 d0 1c c9 39 c1 56 76 59 6c 9c 7d e3 a9 f0 d3 d1 34 d8 3c 49 59 8b 1a 98 ce bf c6 f2 d8 30 35 ff e9 6f 5d a0 af 3a ee 66 53 ae aa 8c 69 c8 be 9a a7 a0 7b d8 82 4b 33 13 c8 07 f3 77 d7 f3 64 cd 9e 63 f9 42 27 53 ae 10 33 89 72 37 15 f1 be f7 1e 35 a2 ce c3 2d f2 d7 b2 e6 0b c7 69 c0 e5 1f 5f 7c 69 9b 7e ce 26 1a 33 44 c3 ba 77 05 3b ba 5d 3f 41 89 fa 16 3b ee 04 6e 5b ac 56 4b ef 8c 70 f2 4a 7b 57 bd 19 6e 8b 36 07 54 26 2d 86 09 94 1f 5f 37 ab f0 23 3f 8f 2c 5f 96 9e 47 71 a8 44 de a9 b9 85 2f b5 34 60 a5 5f 09 a0 9a 43 1d d4 bf 2d 44 d6 8d da fd 75 cb 5f 16 a0 0e 61 c2 70 3d 36 0d 00 00 05 02 01 02 00 00 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1281) - Flags 0x00
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=81): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=2662): [REMOVED]
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=1 buf='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3'
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3' hash=beb8efe9b1a73c841b375a90e5fff8048848e3a2af66f6c4dd7b938d6fe8c5d8
EAP: Status notification: remote certificate verification (param=success)
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt'
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt' hash=008f3e0e114b64f46f3c85df438f5dcc6ff8a4cdc0f7ebdeed15382084260631
wlp2s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:iate.estsetubal.ips.pt
EAP: Status notification: remote certificate verification (param=success)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=9): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=4): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=7): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=262): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=20
OpenSSL: Message - hexdump(len=1): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in unknown state
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in unknown state
SSL: SSL_connect - want more data
SSL: 322 bytes pending from ssl_out
SSL: 322 bytes left to be sent out (of total 322 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x210ff90
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=336): 01 00 01 4c 02 04 01 4c 19 80 00 00 01 42 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 01 06 10 00 01 02 01 00 7e ac a0 c7 28 b0 2d b0 e2 5e fd 3b 1e af f6 bd 8f 01 02 a0 b0 2e ec b3 c2 19 1f 3f 2c ea 51 33 c0 bb 9c 48 da 0f 70 90 a6 95 1b 67 6b 9c d7 50 b2 70 8a 1b e0 5a 9c 58 ce 39 d1 51 71 7c 58 4c bd e5 28 97 55 30 d5 e2 3a 21 da b2 86 51 fd b3 20 57 4e 59 85 5f 53 b8 27 ef bb de b3 a9 7a a5 f5 85 96 c2 cb 2e 5b 2e 19 5e 4f d8 66 d1 5e 0f 51 65 d0 a4 54 69 67 2f c0 32 40 b0 7c 94 12 1e 48 2e fa 71 9f 48 3d e3 34 d2 61 c2 68 17 f5 76 b0 15 54 08 2a 14 f8 88 80 de 1a 23 e8 e1 41 34 43 a6 0b 7d 83 ff a4 81 61 9a 58 91 48 56 b0 db af 48 aa e3 67 f2 77 c9 fd 77 a6 b9 f1 45 56 10 ce 94 64 81 3d e1 e6 d4 37 30 60 be ed c7 a8 66 df 54 e5 e9 56 f5 81 ff d2 75 11 a4 7e b9 c1 a3 a8 f0 2b a4 70 ee 74 5a 0f c2 3b 64 81 72 dd 52 05 a9 e4 2c 5f 39 ee c9 d1 86 a7 41 44 4d 21 56 14 03 01 00 01 01 16 03 01 00 20 cc 84 de 0d f3 59 5d cc 83 ec 68 77 1a 16 51 52 3a 6e 13 75 c8 03 7f ef 6a 74 ac 67 80 c0 b5 7e
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=57
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=57): 01 00 00 35 01 05 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 f0 c5 3d 0e d3 60 4e 29 94 76 1d e2 28 c5 59 cc dd 1b ec 19 e2 ca 09 f9 a1 4c 46 2e b6 97 4b 7a
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x80
SSL: TLS Message Length: 43
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=20
OpenSSL: Message - hexdump(len=1): [REMOVED]
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: RX ver=0x301 content_type=22
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:unknown state
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: Handshake finished - resumed=0
SSL: No Application Data included
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
OpenSSL: Using internal PRF
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de
SSL: Building ACK (type=25 id=5 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x20fefc0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 1c 01 06 00 1c 19 00 17 03 01 00 11 df 8c 52 72 7a 86 db e6 b6 b4 6e 35 db 8a 75 97 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=28) - Flags 0x00
EAP-PEAP: received 22 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
EAP-PEAP: received Phase 2: code=1 identifier=6 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=32): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 49 bytes left to be sent out (of total 49 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2120ed0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=59): 01 00 00 37 02 06 00 37 19 00 17 03 01 00 2c 16 d1 f8 d9 9e e7 78 4d 44 b9 0b 8e 6b 56 1f f9 de 60 66 df 86 15 1f 70 ff a6 fb 93 1c 54 f5 99 e4 69 03 bc bf 59 64 15 c8 06 5a da
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=57
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=57): 01 00 00 35 01 07 00 35 19 00 17 03 01 00 2a 11 c9 4f 18 43 08 18 87 16 3e 7b 23 01 c9 89 19 dc 9c ac 8e 83 e9 1a 54 31 7c 58 45 c9 bd 37 79 22 0a 94 21 b4 80 f2 7a c2 14
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=53) - Flags 0x00
EAP-PEAP: received 47 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=26): 1a 01 07 00 19 10 cc 1c 5a bc 55 b3 5d 1a 59 dc 13 02 e5 f6 1c 88 49 41 54 45
EAP-PEAP: received Phase 2: code=1 identifier=7 length=30
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 7 mschapv2_id 7
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=4):
49 41 54 45 IATE
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=27):
[CENSORED IDENTITY]
MSCHAPV2: Username - hexdump_ascii(len=27):
[CENSORED IDENTITY]
MSCHAPV2: auth_challenge - hexdump(len=16): cc 1c 5a bc 55 b3 5d 1a 59 dc 13 02 e5 f6 1c 88
MSCHAPV2: peer_challenge - hexdump(len=16): 5e a2 b7 de 92 be d6 1f af 12 e9 27 fa 26 65 f3
MSCHAPV2: username - hexdump_ascii(len=27):
[CENSORED IDENTITY]
MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED]
MSCHAPV2: NT Response - hexdump(len=24): 94 1b b1 cc a0 b8 66 24 c5 c8 32 17 37 6d 59 98 14 5e 67 0d bd 1e d7 40
MSCHAPV2: Auth Response - hexdump(len=20): 67 a4 87 50 ab 40 ad 39 0d df ec 91 76 c6 96 4a 84 19 6d 63
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
EAP-MSCHAPV2: TX identifier 7 mschapv2_id 7 (response)
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=86): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 103 bytes left to be sent out (of total 103 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x210fcd0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=113): 01 00 00 6d 02 07 00 6d 19 00 17 03 01 00 62 42 df 7a 44 99 8c 81 0d 41 4d 18 6b a2 76 1e cc 00 17 cd eb 25 d2 bd 58 53 06 8c 14 bc a2 cd 05 f4 cb 7d 28 97 52 08 11 79 c9 29 cf 66 ff c8 f5 2f cc 1d aa 4e e6 19 41 f5 1d 67 17 d5 c5 44 fe 34 b0 a2 55 df 9d 94 c7 0f b3 bb 4c 97 2b b3 c5 5a c6 6d d5 a1 76 db f2 5c db ff 33 28 f6 5c 06 90 65
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=78
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=78): 01 00 00 4a 01 08 00 4a 19 00 17 03 01 00 3f 3d ac dd de eb 62 51 02 d9 a7 a2 5e 39 52 54 61 fa da e6 64 a8 47 02 b0 7d 7e 70 d4 96 f8 52 c8 ad f8 ca 88 91 0d 97 3e 3f d3 49 7a bf 38 ee b8 32 db c6 75 69 92 0c d5 8f 16 72 7c 12 f9 e4
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=74) - Flags 0x00
EAP-PEAP: received 68 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 07 00 2e 53 3d 36 37 41 34 38 37 35 30 41 42 34 30 41 44 33 39 30 44 44 46 45 43 39 31 37 36 43 36 39 36 34 41 38 34 31 39 36 44 36 33
EAP-PEAP: received Phase 2: code=1 identifier=8 length=51
EAP-PEAP: Phase 2 Request: type=26
EAP-MSCHAPV2: RX identifier 8 mschapv2_id 7
EAP-MSCHAPV2: Received success
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
EAP-MSCHAPV2: Authentication succeeded
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 23 bytes left to be sent out (of total 23 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2121ed0
EAP: Session-Id - hexdump(len=65): 19 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 08 00 1d 19 00 17 03 01 00 12 ec 78 5d 22 27 e0 c7 35 09 d3 18 f9 31 78 35 6e 37 d3
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 26 01 09 00 26 19 00 17 03 01 00 1b 14 2d 55 5a aa 25 f9 9b 83 14 b5 4b 34 be e2 99 54 1f 3f 46 06 8c 4c ea ff ea af 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=38) - Flags 0x00
EAP-PEAP: received 32 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 09 00 0b 21 80 03 00 02 00 01
EAP-PEAP: received Phase 2: code=1 identifier=9 length=11
EAP-PEAP: Phase 2 Request: type=33
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
EAP-TLV: Result TLV - hexdump(len=2): 00 01
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 32 bytes left to be sent out (of total 32 bytes)
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x21221b0
EAP: Session-Id - hexdump(len=65): 19 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:11:88:d2:6f:e0
TX EAPOL - hexdump(len=42): 01 00 00 26 02 09 00 26 19 00 17 03 01 00 1b e1 02 4e 01 8c a8 33 09 8c 60 90 cf 3b 7c d5 95 f4 f9 e6 8c 3c 9d 0d 2f 40 cb 8b
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=50): 01 00 00 04 03 09 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: EAP entering state SUCCESS
wlp2s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
l2_packet_receive: src=00:11:88:d2:6f:e0 len=121
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=117
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8
wlp2s0: EAPOL-Key type=2
wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp2s0: key_length=16 key_data_length=22
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=1): completed iteration
wlp2s0: freq[0]: 2437, flags=0x1
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8
RSN: PMKID from Authenticator - hexdump(len=16): 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8
wlp2s0: RSN: no matching PMKID found
EAPOL: Successfully fetched key (len=32)
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
RSN: Added PMKSA cache entry for 00:11:88:d2:6f:e0 network_ctx=0x20e2a80
nl80211: Add PMKID for 00:11:88:d2:6f:e0
wlp2s0: RSN: the new PMK matches with the PMKID
WPA: Renewed SNonce - hexdump(len=32): 49 98 dd ea b4 34 c0 5b a1 a7 ea a7 7a f8 74 73 b7 4f c6 3d 34 f9 a4 db a3 72 d1 e4 c1 bc 67 b0
WPA: PTK derivation - A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0
WPA: Nonce1 - hexdump(len=32): 49 98 dd ea b4 34 c0 5b a1 a7 ea a7 7a f8 74 73 b7 4f c6 3d 34 f9 a4 db a3 72 d1 e4 c1 bc 67 b0
WPA: Nonce2 - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wlp2s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 9c f6 fb ae 19 5c a9 4a fa f5 ca ae 0e 44 81 dc
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 49 98 dd ea b4 34 c0 5b a1 a7 ea a7 7a f8 74 73 b7 4f c6 3d 34 f9 a4 db a3 72 d1 e4 c1 bc 67 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c f6 fb ae 19 5c a9 4a fa f5 ca ae 0e 44 81 dc 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
l2_packet_receive: src=00:11:88:d2:6f:e0 len=155
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 30 35 00 00 00 00 00 00 00 00 00 00 00 00 00 ce aa 7d dd 55 1f bf b0 3d 9e 3b fa ff 2b 3c 44 00 38 4b 8d 93 87 2f bb 56 dc e9 be 8d 4a 0d b1 78 c9 f6 99 86 43 0a 98 22 2a f3 e8 16 34 ed 20 2d d5 fd f3 d5 cb a6 63 7e 53 96 9a 7b b7 81 b7 07 3f c0 17 f5 b6 c6 6b 45 09
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=151
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 30 35 00 00 00 00 00 00 00 00 00 00 00 00 00 ce aa 7d dd 55 1f bf b0 3d 9e 3b fa ff 2b 3c 44 00 38 4b 8d 93 87 2f bb 56 dc e9 be 8d 4a 0d b1 78 c9 f6 99 86 43 0a 98 22 2a f3 e8 16 34 ed 20 2d d5 fd f3 d5 cb a6 63 7e 53 96 9a 7b b7 81 b7 07 3f c0 17 f5 b6 c6 6b 45 09
wlp2s0: EAPOL-Key type=2
wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp2s0: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 19 30 35 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): ce aa 7d dd 55 1f bf b0 3d 9e 3b fa ff 2b 3c 44
RSN: encrypted key data - hexdump(len=56): 4b 8d 93 87 2f bb 56 dc e9 be 8d 4a 0d b1 78 c9 f6 99 86 43 0a 98 22 2a f3 e8 16 34 ed 20 2d d5 fd f3 d5 cb a6 63 7e 53 96 9a 7b b7 81 b7 07 3f c0 17 f5 b6 c6 6b 45 09
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 16 00 0f ac 01 01 00 8e b9 a2 09 62 30 11 c7 c5 0f 45 a8 8d fd b7 0a dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlp2s0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 07 4d 13 95 74 76 30 5b e2 8b cb 88 59 62 66 4c
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 4d 13 95 74 76 30 5b e2 8b cb 88 59 62 66 4c 00 00
wlp2s0: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x20e1fe0 key_idx=0 set_tx=1 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
addr=00:11:88:d2:6f:e0
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 00:11:88:d2:6f:e0
EAPOL authentication completed - result=SUCCESS
wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=1): completed iteration
wlp2s0: freq[0]: 2437, flags=0x1
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 19 30 35 00 00 00
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=16
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
nl80211: KEY_SEQ - hexdump(len=6): 19 30 35 00 00 00
broadcast key
wlp2s0: WPA: Key negotiation completed with 00:11:88:d2:6f:e0 [PTK=CCMP GTK=CCMP]
wlp2s0: Cancelling authentication timeout
wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
wlp2s0: Radio work 'sme-connect'@0x2106130 done in 0.192403 seconds
wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:11:88:d2:6f:e0 completed [id=0 id_str=]
nl80211: Set wlp2s0 operstate 0->1 (UP)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
wlp2s0: Determining shared radio frequencies (max len 2)
wlp2s0: Shared frequencies (len=1): completed iteration
wlp2s0: freq[0]: 2437, flags=0x1
P2P: Add operating class 81
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
P2P: Update channel list
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13
P2P: cli_channels:
EAPOL: External notification - portValid=1
nl80211: Set rekey offload
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
EAPOL: startWhen --> 0
p2p-dev-wlp2s0: Removing interface p2p-dev-wlp2s0
p2p-dev-wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED
TDLS: Tear down peers
p2p-dev-wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
p2p-dev-wlp2s0: WPA: Clear old PMK and PTK
p2p-dev-wlp2s0: Cancelling delayed sched scan
p2p-dev-wlp2s0: Cancelling scan request
p2p-dev-wlp2s0: Cancelling authentication timeout
p2p-dev-wlp2s0: P2P: Disable P2P since removing the management interface is being removed
P2P: All ASP advertisements flushed
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
P2P: All ASP advertisements flushed
Remove interface p2p-dev-wlp2s0 from radio phy0
nl80211: deinit ifname=p2p-dev-wlp2s0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=0 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Stop P2P Device p2p-dev-wlp2s0 (0x7): Success
nl80211: Unsubscribe mgmt frames handle 0x888888888a86baa9 (deinit)
nl80211: Delete P2P Device p2p-dev-wlp2s0 (0x7): Success
p2p-dev-wlp2s0: CTRL-EVENT-TERMINATING
Control interface directory not empty - leaving it behind
wlp2s0: Removing interface wlp2s0
wlp2s0: Request to deauthenticate - bssid=00:11:88:d2:6f:e0 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
TDLS: Tear down peers
wpa_driver_nl80211_deauthenticate(addr=00:11:88:d2:6f:e0 reason_code=3)
wlp2s0: Event DEAUTH (12) received
wlp2s0: Deauthentication notification
wlp2s0: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:11:88:d2:6f:e0 reason=3 locally_generated=1
wlp2s0: Auto connect disabled: do not try to re-connect
wlp2s0: Ignore connection failure indication since interface has been put into disconnected state
TDLS: Remove peers on disassociation
wlp2s0: WPA: Clear old PMK and PTK
wlp2s0: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x20e0a90 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:11:88:d2:6f:e0
wlp2s0: State: COMPLETED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
WMM AC: WMM AC is disabled
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Skip set_supp_port(unauthorized) while not associated
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wlp2s0: State: DISCONNECTED -> DISCONNECTED
nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RSN: Flush PMKSA cache entry for 00:11:88:d2:6f:e0
nl80211: Delete PMKID for 00:11:88:d2:6f:e0
wlp2s0: RSN: PMKSA cache entry free_cb: 00:11:88:d2:6f:e0 reason=0
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
wlp2s0: WPA: Clear old PMK and PTK
wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 2 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 3 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 5 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' due to wpa_bss_flush
wlp2s0: BSS: Remove id 6 BSSID 00:11:88:d2:71:41 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' due to wpa_bss_flush
wlp2s0: BSS: Remove id 8 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush
wlp2s0: Cancelling delayed sched scan
wlp2s0: Cancelling scan request
wlp2s0: Cancelling authentication timeout
Remove interface wlp2s0 from radio phy0
Remove radio phy0
nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 3 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x888888888a86add9 (mode change)
wlp2s0: CTRL-EVENT-TERMINATING
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment