-
-
Save anonymous/d5989101a00ae7e1e5b1b681323c7094 to your computer and use it in GitHub Desktop.
Debug wpa_supplicant
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@UndevLaptop claudio]# cat /etc/NetworkManager/system-connections/eduroam | |
[connection] | |
id=eduroam | |
uuid= | |
type=wifi | |
permissions= | |
secondaries= | |
[wifi] | |
mac-address=DC:53:60:30:BF:C9 | |
mac-address-blacklist= | |
mode=infrastructure | |
seen-bssids= | |
ssid=eduroam | |
[wifi-security] | |
group= | |
key-mgmt=wpa-eap | |
pairwise= | |
proto= | |
[802-1x] | |
altsubject-matches= | |
eap=peap; | |
identity= | |
password= | |
phase2-altsubject-matches= | |
phase2-auth=mschapv2 | |
[ipv4] | |
dns-search= | |
method=auto | |
[ipv6] | |
dns-search= | |
ip6-privacy=0 | |
method=auto |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ctrl_interface=/run/wpa_supplicant | |
network={ | |
ssid="eduroam" | |
key_mgmt=WPA-EAP | |
identity= | |
password= | |
eap=PEAP | |
#This is enough to allow the auth to succeed | |
#phase1="tls_disable_tlsv1_2=1" | |
phase2="auth=MSCHAPV2" | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
wpa_supplicant v2.3 | |
Successfully initialized wpa_supplicant | |
Initializing interface 'wlp2s0' conf 'wpasupplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' | |
Configuration file 'wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf' | |
Reading configuration file '/home/claudio/wpasupplicant.conf' | |
ctrl_interface='/run/wpa_supplicant' | |
Line: 9 - start of a new network block | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
key_mgmt: 0x1 | |
identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
password - hexdump_ascii(len=8): [REMOVED] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
Priority group 0 | |
id=0 ssid='eduroam' | |
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0 | |
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0 | |
nl80211: TDLS supported | |
nl80211: TDLS external setup | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:6 | |
nl80211: Using driver-based off-channel TX | |
nl80211: Use separate P2P group interface (driver advertised support) | |
nl80211: Enable multi-channel concurrent (driver advertised support) | |
nl80211: interface wlp2s0 in phy phy0 | |
nl80211: Set mode ifindex 3 iftype 2 (STATION) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x2445390 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=040e | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x2445390 match=0a11 | |
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) | |
nl80211: driver param='(null)' | |
Add interface wlp2s0 to a new radio phy0 | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
nl80211: Do not indicate P2P_DEVICE support (p2p_device=1 driver param not specified) | |
wlp2s0: Own MAC address: dc:53:60:30:bf:c9 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 | |
wlp2s0: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
TDLS: TDLS operation supported by driver | |
TDLS: Driver uses external link setup | |
wlp2s0: WPS: UUID based on MAC address: 253333a1-33e3-5a54-a87b-93e80bcfe37c | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Own listen channel: 81:1 | |
P2P: Random operating channel: 81:1 | |
P2P: initialized | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: Added interface wlp2s0 | |
wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
wlp2s0: Starting delayed sched scan | |
wlp2s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0) | |
wlp2s0: Setting scan request: 0.000000 sec | |
wlp2s0: State: DISCONNECTED -> SCANNING | |
wlp2s0: Starting AP scan for wildcard SSID | |
WPS: Building WPS IE for Probe Request | |
WPS: * Version (hardcoded 0x10) | |
WPS: * Request Type | |
WPS: * Config Methods (2148) | |
WPS: * UUID-E | |
WPS: * Primary Device Type | |
WPS: * RF Bands (3) | |
WPS: * Association State | |
WPS: * Configuration Error (0) | |
WPS: * Device Password ID (0) | |
WPS: * Manufacturer | |
WPS: * Model Name | |
WPS: * Model Number | |
WPS: * Device Name | |
WPS: * Version2 (0x20) | |
P2P: * P2P IE header | |
P2P: * Capability dev=25 group=00 | |
P2P: * Listen Channel: Regulatory Class 81 Channel 1 | |
wlp2s0: Add radio work 'scan'@0x24452e0 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'scan'@0x24452e0 after 0.000004 second wait | |
wlp2s0: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=126): dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 01 | |
Scan requested (ret=0) - scan timeout 10 seconds | |
nl80211: Event message available | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0 | |
wlp2s0: nl80211: Scan trigger | |
wlp2s0: Event SCAN_STARTED (49) received | |
wlp2s0: Own scan request started a scan in 0.000021 seconds | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0 | |
wlp2s0: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825 | |
wlp2s0: Event SCAN_RESULTS (3) received | |
wlp2s0: Scan completed in 0.581338 seconds | |
nl80211: Received scan results (10 BSSes) | |
Sorted scan results | |
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=0 level=-51 flags=0xb age=230 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 1a 00 30 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 a1 9a ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 4f fa 90 91 41 7d 71 e5 06 ec 48 f4 49 47 08 40 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 1a 00 3a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 e2 51 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 ab 80 25 66 aa 90 7a ec 7c cc 62 82 4b ae 7b f0 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:70:d0 freq=2462 qual=0 noise=0 level=-70 flags=0xb age=29076 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 17 00 2d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 f6 06 a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 1c 8f 02 2b 56 5d 13 20 34 bb 67 cc 5a a3 cf 02 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
82:b9:a5:f8:06:6d freq=2462 qual=0 noise=0 level=-77 flags=0xb age=113 | |
IEs - hexdump(len=230): 00 08 43 6f 67 75 6d 65 6c 6f 01 08 82 84 8b 96 0c 12 18 24 03 01 0b 07 06 50 54 20 01 0e 14 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 30 48 60 6c 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 18 00 50 f2 02 01 01 0d 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 03 7f 01 01 00 00 ff 7f | |
64:cc:2e:b8:ce:b8 freq=2437 qual=0 noise=0 level=-77 flags=0xb age=233 | |
IEs - hexdump(len=148): 00 18 45 75 20 74 6f 75 20 72 69 6a 6f 20 f0 9f 92 aa f0 9f 92 aa f0 9f 92 aa 01 04 82 84 8b 96 03 01 06 2a 01 00 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=159): 00 18 45 75 20 74 6f 75 20 72 69 6a 6f 20 f0 9f 92 aa f0 9f 92 aa f0 9f 92 aa 01 04 82 84 8b 96 03 01 06 05 09 00 02 00 00 00 00 00 00 00 2a 01 00 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:e1 freq=5200 qual=0 noise=0 level=-82 flags=0xb age=26 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 a1 9d ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 25 da 6a e6 30 fc 31 a2 76 15 81 5f df c7 6f 63 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 e2 20 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 9f e5 25 1a 9d 5f c5 9a a3 16 80 48 21 ca eb 52 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:40 freq=2412 qual=0 noise=0 level=-81 flags=0xb age=29320 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 07 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 ee a9 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 28 39 73 85 9c 15 29 58 d5 c8 07 d4 d2 90 4c 25 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:40 freq=2437 qual=0 noise=0 level=-82 flags=0xb age=29180 | |
IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 06 00 2b 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 e2 4c 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 79 cb 77 f9 09 90 3d 6a 8b 5e 9c 9c 97 0e 67 6b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 06 00 2b 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 e2 4c 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 79 cb 77 f9 09 90 3d 6a 8b 5e 9c 9c 97 0e 67 6b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:41 freq=5180 qual=0 noise=0 level=-94 flags=0xb age=43 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 67 10 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 3e 7e 43 f9 36 12 a6 74 9d b9 82 f7 90 28 2f e6 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:70:c1 freq=5200 qual=0 noise=0 level=-95 flags=0xb age=28990 | |
IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 f7 5c b2 93 b5 00 17 e2 af 19 f2 97 78 11 99 53 f6 81 4c 14 57 2f 23 64 d8 c3 ad a6 0b 8f 49 75 ac 58 54 ab 1b d1 00 0f b7 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 f7 5c b2 93 b5 00 17 e2 af 19 f2 97 78 11 99 53 f6 81 4c 14 57 2f 23 64 d8 c3 ad a6 0b 8f 49 75 ac 58 54 ab 1b d1 00 0f b7 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=0 level=-71 flags=0xb age=230 | |
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00 | |
wlp2s0: BSS: Start scan result update 1 | |
wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 2 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' | |
wlp2s0: BSS: Add new id 3 BSSID 64:cc:2e:b8:ce:b8 SSID 'Eu tou rijo \xf0\x9f\x92\xaa\xf0\x9f\x92\xaa\xf0\x9f\x92\xaa' | |
wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 5 BSSID 00:11:88:d2:71:40 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 6 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 8 BSSID 00:11:88:d2:70:c1 SSID 'eduroam' | |
wlp2s0: BSS: Add new id 9 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' | |
BSS: last_scan_res_used=10/32 | |
wlp2s0: New scan results available (own=1 ext=0) | |
wlp2s0: Radio work 'scan'@0x24452e0 done in 0.584548 seconds | |
wlp2s0: Selecting BSS from priority group 0 | |
wlp2s0: 0: 00:11:88:d2:6f:e0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-51 | |
wlp2s0: selected based on RSN IE | |
wlp2s0: selected BSS 00:11:88:d2:6f:e0 ssid='eduroam' | |
wlp2s0: Considering connect request: reassociate: 0 selected: 00:11:88:d2:6f:e0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x24458c0 current_ssid=(nil) | |
wlp2s0: Request association with 00:11:88:d2:6f:e0 | |
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=9): 00 07 65 64 75 72 6f 61 6d | |
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 06 | |
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=8): 07 06 50 54 20 01 0d 11 | |
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=7): 0b 05 1a 00 30 00 00 | |
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=4): 43 02 00 00 | |
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
TDLS: TDLS is allowed in the target BSS | |
wlp2s0: Add radio work 'sme-connect'@0x24452e0 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'sme-connect'@0x24452e0 after 0.000021 second wait | |
wlp2s0: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:11:88:d2:6f:e0 | |
RSN: No PMKSA cache entry found | |
wlp2s0: RSN: using IEEE 802.11i/D9.0 | |
wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 | |
wlp2s0: WPA: Selected mgmt group cipher 32 | |
wlp2s0: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
wlp2s0: WPA: using GTK CCMP | |
wlp2s0: WPA: using PTK CCMP | |
wlp2s0: WPA: using KEY_MGMT 802.1X | |
wlp2s0: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
wlp2s0: Cancelling scan request | |
wlp2s0: SME: Trying to authenticate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz) | |
wlp2s0: State: SCANNING -> AUTHENTICATING | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
nl80211: Authenticate (ifindex=3) | |
* bssid=00:11:88:d2:6f:e0 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0 | |
nl80211: New station 00:11:88:d2:6f:e0 | |
nl80211: Event message available | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 70 d7 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp2s0: Event AUTH (11) received | |
wlp2s0: SME: Authentication response: peer=00:11:88:d2:6f:e0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp2s0: set_disable_max_amsdu: -1 | |
wlp2s0: set_ampdu_factor: -1 | |
wlp2s0: set_ampdu_density: -1 | |
wlp2s0: set_disable_ht40: 0 | |
wlp2s0: set_disable_sgi: 0 | |
wlp2s0: set_disable_ldpc: 0 | |
wlp2s0: Trying to associate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz) | |
wlp2s0: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=3) | |
* bssid=00:11:88:d2:6f:e0 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 04 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac04 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39 | |
wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=65): 10 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 80 d7 31 00 00 00 15 c0 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
nl80211: Associate event | |
wlp2s0: Event ASSOC (0) received | |
wlp2s0: Association info event | |
resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
wlp2s0: freq=2437 MHz | |
wlp2s0: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp2s0: Associated to a new BSS: BSSID=00:11:88:d2:6f:e0 | |
wlp2s0: Associated with 00:11:88:d2:6f:e0 | |
wlp2s0: WPA: Association event - clear replay counter | |
wlp2s0: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp2s0: Setting authentication timeout: 10 sec 0 usec | |
wlp2s0: Cancelling scan request | |
wlp2s0: Process pending EAPOL frame that was received just before association notification | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39 | |
wlp2s0: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp2s0: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=42): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 am,nasid=AP3/1,p | |
6f 72 74 69 64 3d 32 30 36 39 ortid=2069 | |
EAP: using real identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=36): [CENSORED] | |
EAPOL: SUPP_BE entering state RECEIVE | |
nl80211: Event message available | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp2s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
wlp2s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=1) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=190): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in unknown state | |
SSL: SSL_connect - want more data | |
SSL: 195 bytes pending from ssl_out | |
SSL: 195 bytes left to be sent out (of total 195 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2467f10 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=209): 01 00 00 cd 02 02 00 cd 19 80 00 00 00 c3 16 03 01 00 be 01 00 00 ba 03 01 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 00 00 64 c0 14 c0 0a 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13 c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 2d 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=1500): 01 00 05 d8 01 03 05 d8 19 c0 00 00 0a c9 16 03 01 0a c4 02 00 00 4d 03 01 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20 20 cc 17 00 00 f8 2d f8 60 69 31 ac 4a e6 4e cd 7d 18 bd 4d e7 31 c7 12 36 77 24 79 4b fa 32 fb ae 00 04 00 00 05 ff 01 00 01 00 0b 00 0a 62 00 0a 5f 00 05 5a 30 82 05 56 30 82 04 3e a0 03 02 01 02 02 10 0f ed 55 0e 58 0f a6 45 ee 08 3b 50 ca c2 ea 26 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 1e 17 0d 31 35 31 30 32 32 30 30 30 30 30 30 5a 17 0d 31 38 31 30 32 36 31 32 30 30 30 30 5a 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 50 54 31 11 30 0f 06 03 55 04 08 0c 08 53 65 74 c3 ba 62 61 6c 31 11 30 0f 06 03 55 04 07 0c 08 53 65 74 c3 ba 62 61 6c 31 2b 30 29 06 03 55 04 0a 0c 22 49 6e 73 74 69 74 75 74 6f 20 50 6f 6c 69 74 c3 a9 63 6e 69 63 6f 20 64 65 20 53 65 74 c3 ba 62 61 6c 31 13 30 11 06 03 55 04 0b 13 0a 45 53 54 53 65 74 75 62 61 6c 31 1f 30 1d 06 03 55 04 03 13 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ba 5c 3e e0 6d 1e 15 f5 09 86 78 92 98 47 f2 17 7e ff d3 59 2f 86 2b 6c 98 15 df b9 4c fe 4f 2c 70 f2 d7 57 f2 63 f2 5f ab ab 38 27 9f d0 28 80 15 ff 71 0b 54 03 ce e3 d2 ef bb 20 fc a0 b8 17 73 ab 7b 5a 63 68 d7 4f 18 67 18 19 8c b0 28 46 6f 65 79 9c dd b9 c4 b4 59 58 39 a0 f0 3f d4 ff 5e 35 8d b7 62 bd 04 46 6b 4f 47 f9 e8 5f 12 2d 6b 6b 99 2f 64 71 67 f0 b1 08 58 86 7d ab 7b 32 6d 11 64 8e 5e 25 64 23 68 44 ea b7 dd c3 aa 3d 5d f2 f0 93 94 28 5b 70 4e 1c 6e 07 ee 69 9f dd 59 89 eb 90 50 7a 09 1c 4a 83 b2 d4 fc 86 f4 72 39 74 fa ee 8b a6 a6 c1 6a 40 55 04 76 43 2a e8 65 e1 c0 f1 ac c1 3c 23 cc 62 8c 2f 14 f6 4c 22 c9 0c c6 59 57 c0 6b 4c f9 5d bb 03 ad e1 fd d2 b3 51 fc cf bd 80 43 c0 1e 33 88 e1 50 04 50 94 e2 af be 26 42 bc 26 0e 18 74 81 41 22 b8 83 77 02 03 01 00 01 a3 82 01 cf 30 82 01 cb 30 1f 06 03 55 1d 23 04 18 30 16 80 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1d 06 03 55 1d 0e 04 16 04 14 f8 a9 76 28 39 ec 2b b4 f8 b5 6c 27 2a e9 30 dd 15 53 8b 99 30 21 06 03 55 1d 11 04 1a 30 18 82 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 6b 06 03 55 1d 1f 04 64 30 62 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c 01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 08 06 06 67 81 0c 01 02 02 30 6e 06 08 2b 06 01 05 05 07 01 01 04 62 30 60 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 38 06 08 2b 06 01 05 05 07 30 02 86 2c 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 74 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 1d 27 0b 88 ac f0 2f f2 9e 25 eb 57 b0 fa ad 2a 96 3f 8a 89 38 28 1b 13 01 80 6e 01 83 b7 36 a1 0c 9c 88 4e 3f 03 b8 af 84 dd d8 bf fb 00 a7 22 99 1e 1f ba f6 48 98 c1 4b ef a3 2f d2 77 7d 08 06 9e 0b 47 6c ef 21 cb 72 60 94 31 37 53 f2 ab 0d 34 6f 83 9e 24 8f ab ee 56 0c 2d 5b 0b 08 ad 7d 23 2b f0 6b b3 b2 4e bd 35 7f ae f8 0e c3 78 30 4c 22 94 53 ba 14 4a d2 dd 70 2a 6d 51 7a 70 fa db 1a 94 2c 72 cb 06 23 20 3b cd e2 7b 12 e2 12 84 b6 ad 85 b7 5a 7a ed ea 14 80 2c 32 3d 12 3f 3b 47 0f ae 90 8a 95 49 7f 17 b4 a3 40 a8 5e 56 ac ba be 78 04 8a 2f 0c a0 e5 08 4e fa 4f 55 f7 1f 85 5d be c5 6d 57 d3 bf aa 0d c2 3e 3b 35 6a 46 10 28 39 23 e3 27 1c 26 0a c7 b7 c9 ab ab ce 19 42 e9 51 e2 68 f0 0c 2b 21 a0 e9 34 84 a6 24 42 7e f0 91 08 69 5f e6 51 9d 97 52 87 11 d1 00 04 ff 30 82 04 fb 30 82 03 e3 a0 03 02 01 02 02 10 08 70 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1496) - Flags 0xc0 | |
SSL: TLS Message Length: 2761 | |
SSL: Need 1275 bytes more input data | |
SSL: Building ACK (type=25 id=3 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2445290 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=1285): 01 00 05 01 01 04 05 01 19 00 bc c5 af 3f db 95 9a 91 cb 6a ee ef e4 65 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 65 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 24 30 22 06 03 55 04 03 13 1b 44 69 67 69 43 65 72 74 20 41 73 73 75 72 65 64 20 49 44 20 52 6f 6f 74 20 43 41 30 1e 17 0d 31 34 31 31 31 38 31 32 30 30 30 30 5a 17 0d 32 34 31 31 31 38 31 32 30 30 30 30 5a 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c5 76 0f 0f d9 43 29 3b 6c 6d d1 47 ad de 10 bf 23 c2 78 a8 4a 77 35 f1 23 5b e0 4c 1e 41 e7 c2 31 00 bd 88 37 45 75 dd b9 02 10 80 1e 8f ed 64 23 04 45 a7 a0 39 3b 81 4d cf 63 3f c2 49 ff 22 9e 88 b0 d2 96 b9 5c 8a 74 1f 92 2a 2a f2 12 c8 b7 68 54 b5 58 41 81 40 68 06 1a 4f 85 29 fb b5 4d 3c 0f 4f 3f 40 96 1b ce a8 cc 5e 35 ff 64 98 f5 75 dd 74 54 05 a0 36 11 04 12 24 55 63 ef 94 77 2e 77 f1 15 76 ee d3 a4 59 45 21 9f a8 be d1 27 ed 0a e8 ab 38 ca 3f 87 d1 da f1 8f b9 0b 1f 44 e7 e0 ad f3 95 c2 16 4d ec 84 a3 3a 92 d4 cf c6 7d e6 bd cb 1a 40 4f b3 54 b1 f3 8f 6f 0d 1e e3 be 49 a3 56 e4 07 bc 8d a7 ce 1d b0 5b 57 56 d1 c4 1c fc 98 65 d1 cd 46 2f 91 94 bf 45 85 49 f8 6d 52 87 1c 02 56 01 27 16 ab 72 2e f4 71 e4 61 b5 20 a0 fa 26 69 6a 0a f1 ab 9f 6d b7 cf 25 02 03 01 00 01 a3 82 01 a6 30 82 01 a2 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 86 30 79 06 08 2b 06 01 05 05 07 01 01 04 6d 30 6b 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 43 06 08 2b 06 01 05 05 07 30 02 86 37 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 74 30 81 81 06 03 55 1d 1f 04 7a 30 78 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3d 06 03 55 1d 20 04 36 30 34 30 32 06 04 55 1d 20 00 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 1d 06 03 55 1d 0e 04 16 04 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1f 06 03 55 1d 23 04 18 30 16 80 14 45 eb a2 af f4 92 cb 82 31 2d 51 8b a7 a7 21 9d f3 6d c8 0f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 a9 28 35 7a c4 7b d6 da 27 1e ac 98 cf 27 36 4f 11 32 74 74 e6 40 dd 1d cd f2 68 77 35 af b3 8c 5d c6 04 bf 15 f4 23 67 8b b9 6f 97 04 eb 46 9d c2 cd c9 d1 a4 ae 81 2e c9 ba b1 e8 80 d0 1c c9 39 c1 56 76 59 6c 9c 7d e3 a9 f0 d3 d1 34 d8 3c 49 59 8b 1a 98 ce bf c6 f2 d8 30 35 ff e9 6f 5d a0 af 3a ee 66 53 ae aa 8c 69 c8 be 9a a7 a0 7b d8 82 4b 33 13 c8 07 f3 77 d7 f3 64 cd 9e 63 f9 42 27 53 ae 10 33 89 72 37 15 f1 be f7 1e 35 a2 ce c3 2d f2 d7 b2 e6 0b c7 69 c0 e5 1f 5f 7c 69 9b 7e ce 26 1a 33 44 c3 ba 77 05 3b ba 5d 3f 41 89 fa 16 3b ee 04 6e 5b ac 56 4b ef 8c 70 f2 4a 7b 57 bd 19 6e 8b 36 07 54 26 2d 86 09 94 1f 5f 37 ab f0 23 3f 8f 2c 5f 96 9e 47 71 a8 44 de a9 b9 85 2f b5 34 60 a5 5f 09 a0 9a 43 1d d4 bf 2d 44 d6 8d da fd 75 cb 5f 16 a0 0e 61 c2 70 3d 36 0d 00 00 05 02 01 02 00 00 0e 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1281) - Flags 0x00 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=81): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=2662): [REMOVED] | |
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=1 buf='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3' | |
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3' | |
EAP: Status notification: remote certificate verification (param=success) | |
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt' | |
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt' | |
EAP: Status notification: remote certificate verification (param=success) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=9): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=4): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=7): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=262): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=20 | |
OpenSSL: Message - hexdump(len=1): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=16): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in unknown state | |
SSL: SSL_connect - want more data | |
SSL: 322 bytes pending from ssl_out | |
SSL: 322 bytes left to be sent out (of total 322 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2478140 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=336): 01 00 01 4c 02 04 01 4c 19 80 00 00 01 42 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 01 06 10 00 01 02 01 00 b2 66 65 85 ff f2 4f ac 03 7d 81 e3 1f 49 9d 6d 60 43 69 fb f9 92 04 b1 15 89 60 20 ab 97 7e b8 23 65 15 92 96 ef 81 9b 3b 3c b0 d9 02 41 e0 89 9c d3 74 68 ca 7e b6 6b 1f c8 32 d8 bd 79 89 24 eb 89 08 89 9c 8a 36 dd d8 84 8e 3d 8f 33 20 6e 35 c8 9d 32 f3 d7 6d ef 55 ac 9b e5 da 57 85 47 d6 c2 79 65 a0 b7 70 e2 46 41 4b ef 97 86 f3 e3 f3 b9 e7 b2 b0 d0 c5 ef 13 c5 33 7a 80 60 66 2c 3b fa 37 56 2d 97 85 a0 5d 16 41 55 56 14 5a eb 75 a2 43 5f ef 01 09 50 e6 db e8 70 4e e0 fd c2 d8 e2 5f bd 77 db 6b 43 cc d2 1b a8 41 f0 9a a9 4a 68 7e 53 67 e1 70 0e 08 c6 4d 09 ec 28 8c d0 6f 53 1b 14 7e c6 2a aa 88 3c 6b 78 30 47 61 57 aa 3c f1 8d 64 04 66 aa 74 1a 49 13 3e 69 a6 36 13 66 26 9f dd 01 ef c2 75 ab db 47 f4 1c b7 3e 60 fe e4 32 72 ac d3 0c 2a 5d ee 8b b0 bf 97 bb 14 03 01 00 01 01 16 03 01 00 20 de 5a 23 4b 9a c5 7c f0 63 89 64 67 50 8c df 7c bd 41 15 e8 a7 6f 69 f2 4b 2e f2 5c 95 c4 ab 97 | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=57): 01 00 00 35 01 05 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 29 1a 45 42 7a 62 92 14 59 0e 8f a7 d5 91 e7 2d 02 5b d5 86 1e f0 78 b9 ef a7 7f d5 db df 34 ba | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=53) - Flags 0x80 | |
SSL: TLS Message Length: 43 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=20 | |
OpenSSL: Message - hexdump(len=1): [REMOVED] | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=16): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x20 ret=0x1) | |
SSL: (where=0x1002 ret=0x1) | |
SSL: 0 bytes pending from ssl_out | |
SSL: No Application Data included | |
SSL: No data to be sent out | |
EAP-PEAP: TLS done, proceed to Phase 2 | |
EAP-PEAP: using label 'client EAP encryption' in key derivation | |
OpenSSL: Using internal PRF | |
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] | |
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20 | |
SSL: Building ACK (type=25 id=5 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x246e260 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 1c 01 06 00 1c 19 00 17 03 01 00 11 89 a5 b5 d6 1c 72 ef bd f8 76 61 94 26 60 6a 7f 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=28) - Flags 0x00 | |
EAP-PEAP: received 22 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01 | |
EAP-PEAP: received Phase 2: code=1 identifier=6 length=5 | |
EAP-PEAP: Phase 2 Request: type=1 | |
EAP: using real identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=32): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 49 bytes left to be sent out (of total 49 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x247e5b0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=59): 01 00 00 37 02 06 00 37 19 00 17 03 01 00 2c d4 98 49 2a 1c 6a f6 06 8e f2 c5 52 81 e0 bb 22 b7 74 c3 81 3d ae 8b 24 55 f8 b9 0b 7c 7c 91 0d 56 0d 78 69 ae 31 8a a4 b3 cf 9c 89 | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=57): 01 00 00 35 01 07 00 35 19 00 17 03 01 00 2a a8 f6 85 3a 67 1a 49 f8 f2 86 b6 ff e0 d4 ba ad 73 cf 33 57 b7 59 c1 d6 a8 26 93 8a 87 d4 51 66 2a 49 56 01 fc b3 84 76 33 c2 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=53) - Flags 0x00 | |
EAP-PEAP: received 47 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=26): 1a 01 07 00 19 10 f6 62 cf 1f 27 b2 bb 8a 52 39 4a 9b 81 0a 99 77 49 41 54 45 | |
EAP-PEAP: received Phase 2: code=1 identifier=7 length=30 | |
EAP-PEAP: Phase 2 Request: type=26 | |
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 | |
EAP-MSCHAPV2: RX identifier 7 mschapv2_id 7 | |
EAP-MSCHAPV2: Received challenge | |
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=4): | |
49 41 54 45 IATE | |
EAP-MSCHAPV2: Generating Challenge Response | |
MSCHAPV2: Identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
MSCHAPV2: Username - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
MSCHAPV2: auth_challenge - hexdump(len=16): f6 62 cf 1f 27 b2 bb 8a 52 39 4a 9b 81 0a 99 77 | |
MSCHAPV2: peer_challenge - hexdump(len=16): ed 65 91 0f 47 39 ba a0 9e 54 bb 37 ba 9f 0a 2e | |
MSCHAPV2: username - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] | |
MSCHAPV2: NT Response - hexdump(len=24): 40 a2 27 c8 2d 99 97 02 9d a9 99 a9 47 ef 3a 0d 2f a5 c9 a2 93 46 c4 f0 | |
MSCHAPV2: Auth Response - hexdump(len=20): 3c dc b4 c1 7b 3e fb 53 32 48 f2 e5 1b 43 0c b5 e4 9e 54 8b | |
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] | |
EAP-MSCHAPV2: TX identifier 7 mschapv2_id 7 (response) | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=86): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 103 bytes left to be sent out (of total 103 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x247e8c0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=113): 01 00 00 6d 02 07 00 6d 19 00 17 03 01 00 62 38 3a 5e 9b 19 79 af da 5b 7b f5 ab 8d 00 b5 e4 10 0a 72 70 63 83 a8 45 ed ba 73 51 68 fb 7b 72 14 80 47 20 8d cc b8 61 d4 00 a3 b6 e3 12 1a ff 2e eb 49 68 a6 b6 53 46 6e 47 59 a1 dc 43 29 05 98 e4 54 56 89 01 a5 e1 0b bd 64 1e 57 27 f1 2c 4f 2d 6f d3 35 51 ef 18 49 9c 71 ba 65 86 56 92 00 45 | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=78): 01 00 00 4a 01 08 00 4a 19 00 17 03 01 00 3f 2b 3f 2b 3f ba 54 16 06 7d f5 83 89 9a 37 c1 a5 29 f5 49 91 02 34 ca db 8f e8 f7 9a f8 04 34 cc d1 d1 c1 b5 e8 7e 12 ae a5 7c 20 53 78 86 6a 72 cd 4c 84 b1 c5 8a e9 3b bc 9d 4a 6b ae ed 28 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=74) - Flags 0x00 | |
EAP-PEAP: received 68 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 07 00 2e 53 3d 33 43 44 43 42 34 43 31 37 42 33 45 46 42 35 33 33 32 34 38 46 32 45 35 31 42 34 33 30 43 42 35 45 34 39 45 35 34 38 42 | |
EAP-PEAP: received Phase 2: code=1 identifier=8 length=51 | |
EAP-PEAP: Phase 2 Request: type=26 | |
EAP-MSCHAPV2: RX identifier 8 mschapv2_id 7 | |
EAP-MSCHAPV2: Received success | |
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): | |
EAP-MSCHAPV2: Authentication succeeded | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 23 bytes left to be sent out (of total 23 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x247f200 | |
EAP: Session-Id - hexdump(len=65): 19 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 08 00 1d 19 00 17 03 01 00 12 1a 18 38 f4 49 30 3a ea c2 2a c3 27 f4 fa c0 78 e9 dd | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 26 01 09 00 26 19 00 17 03 01 00 1b 6d 65 62 39 5c 75 1f f7 23 66 db 0c b5 f9 05 32 62 9f e3 5a d6 b2 1a 73 5a 35 54 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=38) - Flags 0x00 | |
EAP-PEAP: received 32 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 09 00 0b 21 80 03 00 02 00 01 | |
EAP-PEAP: received Phase 2: code=1 identifier=9 length=11 | |
EAP-PEAP: Phase 2 Request: type=33 | |
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 | |
EAP-TLV: Result TLV - hexdump(len=2): 00 01 | |
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 32 bytes left to be sent out (of total 32 bytes) | |
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x247e5b0 | |
EAP: Session-Id - hexdump(len=65): 19 cb 0c ab eb ac ba 4c d5 33 0e c4 70 74 e3 b6 2f e5 cb f3 6c e4 e9 8b e6 fc 69 27 9d 95 da 40 35 57 35 f1 28 0f 92 c0 4e 10 10 79 1c a2 98 ab c9 f5 a4 06 85 a2 ba c1 27 1b 76 4a f2 1d 54 d4 20 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=42): 01 00 00 26 02 09 00 26 19 00 17 03 01 00 1b 25 f0 f9 79 4a 16 01 c5 48 04 be 12 16 53 27 65 a9 05 69 a2 05 ed 63 3e ae a4 5b | |
EAPOL: SUPP_BE entering state RECEIVE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 04 03 09 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Success | |
EAP: Status notification: completion (param=success) | |
EAP: EAP entering state SUCCESS | |
wlp2s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=117 | |
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64 | |
wlp2s0: EAPOL-Key type=2 | |
wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) | |
wlp2s0: key_length=16 key_data_length=22 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE | |
wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2) | |
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64 | |
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64 | |
RSN: PMKID from Authenticator - hexdump(len=16): da 41 35 10 24 1c 1b e2 4f a2 b8 a3 c4 c3 45 64 | |
wlp2s0: RSN: no matching PMKID found | |
EAPOL: Successfully fetched key (len=32) | |
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] | |
RSN: Added PMKSA cache entry for 00:11:88:d2:6f:e0 network_ctx=0x24458c0 | |
nl80211: Add PMKID for 00:11:88:d2:6f:e0 | |
wlp2s0: RSN: the new PMK matches with the PMKID | |
WPA: Renewed SNonce - hexdump(len=32): e7 98 01 3b 0e cd df 4e 20 83 f7 6b c7 3c 08 1b ce 00 45 fe 24 3b bc 7c 95 be e6 58 9b a7 10 05 | |
WPA: PTK derivation - A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
WPA: Nonce1 - hexdump(len=32): e7 98 01 3b 0e cd df 4e 20 83 f7 6b c7 3c 08 1b ce 00 45 fe 24 3b bc 7c 95 be e6 58 9b a7 10 05 | |
WPA: Nonce2 - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e | |
WPA: PMK - hexdump(len=32): [REMOVED] | |
WPA: PTK - hexdump(len=48): [REMOVED] | |
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
wlp2s0: WPA: Sending EAPOL-Key 2/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 14 b2 ae 51 26 49 85 15 2e 2e fc 65 42 d6 b8 19 | |
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 e7 98 01 3b 0e cd df 4e 20 83 f7 6b c7 3c 08 1b ce 00 45 fe 24 3b bc 7c 95 be e6 58 9b a7 10 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 b2 ae 51 26 49 85 15 2e 2e fc 65 42 d6 b8 19 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 15 36 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 53 8e 46 1b 85 7f 83 d7 19 1f 9d 1e 5e 45 d4 00 38 f1 25 86 3e 19 e8 59 5b 52 1d 07 fb 4d ad 93 65 ca f5 1d 6a 38 3c 6e cf da a3 5a 19 7a 0b a7 49 57 3d 2f 5c cb f4 52 f7 11 8b af 09 d1 44 d1 8f f4 b3 bc 9b b2 0d 7f 60 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=151 | |
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 15 36 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 53 8e 46 1b 85 7f 83 d7 19 1f 9d 1e 5e 45 d4 00 38 f1 25 86 3e 19 e8 59 5b 52 1d 07 fb 4d ad 93 65 ca f5 1d 6a 38 3c 6e cf da a3 5a 19 7a 0b a7 49 57 3d 2f 5c cb f4 52 f7 11 8b af 09 d1 44 d1 8f f4 b3 bc 9b b2 0d 7f 60 | |
wlp2s0: EAPOL-Key type=2 | |
wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) | |
wlp2s0: key_length=16 key_data_length=56 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 | |
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c4 8e | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 15 15 36 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): ab 53 8e 46 1b 85 7f 83 d7 19 1f 9d 1e 5e 45 d4 | |
RSN: encrypted key data - hexdump(len=56): f1 25 86 3e 19 e8 59 5b 52 1d 07 fb 4d ad 93 65 ca f5 1d 6a 38 3c 6e cf da a3 5a 19 7a 0b a7 49 57 3d 2f 5c cb f4 52 f7 11 8b af 09 d1 44 d1 8f f4 b3 bc 9b b2 0d 7f 60 | |
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] | |
wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE | |
wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2) | |
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 16 00 0f ac 01 01 00 8e b9 a2 09 62 30 11 c7 c5 0f 45 a8 8d fd b7 0a dd 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] | |
wlp2s0: WPA: Sending EAPOL-Key 4/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): b0 86 be a5 31 b0 7a 82 78 85 43 37 f6 dc 27 dc | |
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 86 be a5 31 b0 7a 82 78 85 43 37 f6 dc 27 dc 00 00 | |
wlp2s0: WPA: Installing PTK to the driver | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x2444dc8 key_idx=0 set_tx=1 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
addr=00:11:88:d2:6f:e0 | |
EAPOL: External notification - portValid=1 | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for 00:11:88:d2:6f:e0 | |
EAPOL authentication completed - result=SUCCESS | |
wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE | |
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] | |
WPA: Group Key - hexdump(len=16): [REMOVED] | |
wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) | |
WPA: RSC - hexdump(len=6): 15 15 36 00 00 00 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x508836 key_idx=1 set_tx=0 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 15 15 36 00 00 00 | |
broadcast key | |
wlp2s0: WPA: Key negotiation completed with 00:11:88:d2:6f:e0 [PTK=CCMP GTK=CCMP] | |
wlp2s0: Cancelling authentication timeout | |
wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED | |
wlp2s0: Radio work 'sme-connect'@0x24452e0 done in 0.141998 seconds | |
wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:11:88:d2:6f:e0 completed [id=0 id_str=] | |
nl80211: Set wlp2s0 operstate 0->1 (UP) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) | |
EAPOL: External notification - portValid=1 | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) | |
EAPOL: startWhen --> 0 | |
wlp2s0: Removing interface wlp2s0 | |
wlp2s0: Request to deauthenticate - bssid=00:11:88:d2:6f:e0 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:11:88:d2:6f:e0 reason_code=3) | |
wlp2s0: Event DEAUTH (12) received | |
wlp2s0: Deauthentication notification | |
wlp2s0: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:11:88:d2:6f:e0 reason=3 locally_generated=1 | |
wlp2s0: Auto connect disabled: do not try to re-connect | |
wlp2s0: Ignore connection failure indication since interface has been put into disconnected state | |
TDLS: Remove peers on disassociation | |
wlp2s0: Disconnect event - remove keys | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x2443a50 key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
addr=00:11:88:d2:6f:e0 | |
wlp2s0: State: COMPLETED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 1->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
RSN: Flush PMKSA cache entry for 00:11:88:d2:6f:e0 | |
nl80211: Delete PMKID for 00:11:88:d2:6f:e0 | |
wlp2s0: RSN: PMKSA cache entry free_cb: 00:11:88:d2:6f:e0 reason=0 | |
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit | |
ENGINE: engine deinit | |
wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 2 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 3 BSSID 64:cc:2e:b8:ce:b8 SSID 'Eu tou rijo \xf0\x9f\x92\xaa\xf0\x9f\x92\xaa\xf0\x9f\x92\xaa' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 5 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 6 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 8 BSSID 00:11:88:d2:70:c1 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 9 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush | |
wlp2s0: Cancelling delayed sched scan | |
wlp2s0: Cancelling scan request | |
wlp2s0: Cancelling authentication timeout | |
wlp2s0: P2P: Disable P2P since removing the management interface is being removed | |
P2P: Stopping find | |
P2P: Clear timeout (state=IDLE) | |
P2P: State IDLE -> IDLE | |
Remove interface wlp2s0 from radio phy0 | |
Remove radio phy0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Set mode ifindex 3 iftype 2 (STATION) | |
nl80211: Unsubscribe mgmt frames handle 0x888888888accdb19 (mode change) | |
wlp2s0: CTRL-EVENT-TERMINATING |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
wpa_supplicant v2.5 | |
Successfully initialized wpa_supplicant | |
Initializing interface 'wlp2s0' conf 'wpasupplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' | |
Configuration file 'wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf' | |
Reading configuration file '/home/claudio/wpasupplicant.conf' | |
ctrl_interface='/run/wpa_supplicant' | |
Line: 9 - start of a new network block | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
key_mgmt: 0x1 | |
identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
password - hexdump_ascii(len=8): [REMOVED] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
Priority group 0 | |
id=0 ssid='eduroam' | |
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0 | |
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0 | |
nl80211: TDLS supported | |
nl80211: TDLS external setup | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:6 | |
nl80211: Using driver-based off-channel TX | |
nl80211: TDLS channel switch | |
nl80211: Use separate P2P group interface (driver advertised support) | |
nl80211: Enable multi-channel concurrent (driver advertised support) | |
nl80211: use P2P_DEVICE support | |
nl80211: interface wlp2s0 in phy phy0 | |
nl80211: Set mode ifindex 3 iftype 2 (STATION) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x216f550 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=040e | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x216f550 match=0505 | |
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) | |
nl80211: driver param='(null)' | |
Add interface wlp2s0 to a new radio phy0 | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp2s0: Own MAC address: dc:53:60:30:bf:c9 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 | |
wlp2s0: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
TDLS: TDLS operation supported by driver | |
TDLS: Driver uses external link setup | |
TDLS: Driver supports TDLS channel switching | |
wlp2s0: WPS: UUID based on MAC address: 253333a1-33e3-5a54-a87b-93e80bcfe37c | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
wlp2s0: Added interface wlp2s0 | |
wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
nl80211: Create interface iftype 10 (P2P_DEVICE) | |
nl80211: New P2P Device interface p2p-dev-wlp2s0 (0x5) created | |
Initializing interface 'p2p-dev-wlp2s0' conf '/home/claudio/wpasupplicant.conf' driver 'nl80211' ctrl_interface '/run/wpa_supplicant' bridge 'N/A' | |
Configuration file '/home/claudio/wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf' | |
Reading configuration file '/home/claudio/wpasupplicant.conf' | |
ctrl_interface='/run/wpa_supplicant' | |
Line: 9 - start of a new network block | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
key_mgmt: 0x1 | |
identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
password - hexdump_ascii(len=8): [REMOVED] | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
Priority group 0 | |
id=0 ssid='eduroam' | |
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0 | |
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0 | |
Could not read interface p2p-dev-wlp2s0 flags: No such device | |
nl80211: TDLS supported | |
nl80211: TDLS external setup | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:6 | |
nl80211: Using driver-based off-channel TX | |
nl80211: TDLS channel switch | |
nl80211: Use separate P2P group interface (driver advertised support) | |
nl80211: Enable multi-channel concurrent (driver advertised support) | |
nl80211: use P2P_DEVICE support | |
nl80211: interface p2p-dev-wlp2s0 in phy phy0 | |
nl80211: Set mode ifindex 0 iftype 10 (P2P_DEVICE) | |
nl80211: Failed to set interface 0 to mode 10: -22 (Invalid argument) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x21701e0 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=040e | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x21701e0 match=0505 | |
nl80211: Start P2P Device p2p-dev-wlp2s0 (0x5): Success | |
nl80211: driver param='(null)' | |
Add interface p2p-dev-wlp2s0 to existing radio phy0 | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
p2p-dev-wlp2s0: Own MAC address: dc:53:60:30:bf:ca | |
p2p-dev-wlp2s0: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
p2p-dev-wlp2s0: State: DISCONNECTED -> INACTIVE | |
p2p-dev-wlp2s0: WPS: UUID from the first interface: 253333a1-33e3-5a54-a87b-93e80bcfe37c | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
Using existing control interface directory. | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Own listen channel: 81:6 | |
P2P: Random operating channel: 81:6 | |
P2P: initialized | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
p2p-dev-wlp2s0: Added interface p2p-dev-wlp2s0 | |
p2p-dev-wlp2s0: State: INACTIVE -> DISCONNECTED | |
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
p2p-dev-wlp2s0: Determining shared radio frequencies (max len 2) | |
p2p-dev-wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
wlp2s0: Starting delayed sched scan | |
wlp2s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0) | |
wlp2s0: Setting scan request: 0.000000 sec | |
wlp2s0: State: DISCONNECTED -> SCANNING | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: Starting AP scan for wildcard SSID | |
WPS: Building WPS IE for Probe Request | |
WPS: * Version (hardcoded 0x10) | |
WPS: * Request Type | |
WPS: * Config Methods (3148) | |
WPS: * UUID-E | |
WPS: * Primary Device Type | |
WPS: * RF Bands (3) | |
WPS: * Association State | |
WPS: * Configuration Error (0) | |
WPS: * Device Password ID (0) | |
WPS: * Manufacturer | |
WPS: * Model Name | |
WPS: * Model Number | |
WPS: * Device Name | |
WPS: * Version2 (0x20) | |
P2P: * P2P IE header | |
P2P: * Capability dev=25 group=00 | |
P2P: * Listen Channel: Regulatory Class 81 Channel 6 | |
wlp2s0: Add radio work 'scan'@0x21930d0 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'scan'@0x21930d0 after 0.000032 second wait | |
wlp2s0: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=136): 7f 08 04 00 00 00 00 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 | |
Scan requested (ret=0) - scan timeout 10 seconds | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0 | |
wlp2s0: nl80211: Scan trigger | |
wlp2s0: Event SCAN_STARTED (47) received | |
wlp2s0: Own scan request started a scan in 0.000070 seconds | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0 | |
wlp2s0: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825 | |
wlp2s0: Event SCAN_RESULTS (3) received | |
wlp2s0: Scan completed in 0.581152 seconds | |
nl80211: Received scan results (5 BSSes) | |
Sorted scan results | |
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-62 snr=27 flags=0xb age=230 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 8d c2 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 98 44 4e 01 91 75 9d 1c 1b f5 4a 0d 95 77 43 a1 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 18 00 49 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 b1 67 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 a6 2f 83 7e 53 0e 1e 19 26 dd 0b b7 ec 2f cc 97 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-69 snr=20 flags=0xb age=113 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 19 00 23 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 e6 ef a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0b 82 6c 72 bc 38 1c ff c5 de 13 c9 bf 62 6e 70 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 35 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 a3 da a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca f8 a3 63 de 3a a1 cd f7 7a ea 66 23 57 d6 12 1f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=233 est=36000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 05 00 3d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 55 f9 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 41 f4 a9 c4 22 97 84 d7 c3 25 70 ee 6d bf 5c ef dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 05 00 59 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 b2 6b 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 7c 90 2f e6 a4 df da 02 95 d7 a1 5b ea aa 42 2b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-84 snr=5 flags=0xb age=356 est=9000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 19 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d1 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d ef b2 39 df 0a ca 9c 3a 97 8e ca 92 b2 19 0a 28 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-91 snr=1 flags=0xb age=13 est=2000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d2 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 4c 68 46 ce b4 81 cb 61 2f c4 53 cc d2 41 94 d3 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
wlp2s0: BSS: Start scan result update 1 | |
wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' freq 2437 | |
wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' freq 2462 | |
wlp2s0: BSS: Add new id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' freq 2437 | |
wlp2s0: BSS: Add new id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' freq 2412 | |
wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' freq 5220 | |
BSS: last_scan_res_used=5/32 | |
wlp2s0: New scan results available (own=1 ext=0) | |
wlp2s0: Radio work 'scan'@0x21930d0 done in 0.584256 seconds | |
wlp2s0: Selecting BSS from priority group 0 | |
wlp2s0: 0: 00:11:88:d2:6f:e0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-62 freq=2437 | |
wlp2s0: selected based on RSN IE | |
wlp2s0: selected BSS 00:11:88:d2:6f:e0 ssid='eduroam' | |
wlp2s0: Considering connect request: reassociate: 0 selected: 00:11:88:d2:6f:e0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x216fa80 current_ssid=(nil) | |
wlp2s0: Request association with 00:11:88:d2:6f:e0 | |
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=24) | |
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=46) | |
wlp2s0: Add radio work 'sme-connect'@0x21930d0 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'sme-connect'@0x21930d0 after 0.000029 second wait | |
wlp2s0: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:11:88:d2:6f:e0 | |
RSN: No PMKSA cache entry found | |
wlp2s0: RSN: using IEEE 802.11i/D9.0 | |
wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 | |
wlp2s0: WPA: Selected mgmt group cipher 32 | |
wlp2s0: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
wlp2s0: WPA: using GTK CCMP | |
wlp2s0: WPA: using PTK CCMP | |
wlp2s0: WPA: using KEY_MGMT 802.1X | |
wlp2s0: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp2s0: Cancelling scan request | |
wlp2s0: SME: Trying to authenticate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz) | |
wlp2s0: State: SCANNING -> AUTHENTICATING | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
nl80211: Authenticate (ifindex=3) | |
* bssid=00:11:88:d2:6f:e0 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=19) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0 | |
nl80211: New station 00:11:88:d2:6f:e0 | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=37) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 30 f1 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp2s0: Event AUTH (11) received | |
wlp2s0: SME: Authentication response: peer=00:11:88:d2:6f:e0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp2s0: set_disable_max_amsdu: -1 | |
wlp2s0: set_ampdu_factor: -1 | |
wlp2s0: set_ampdu_density: -1 | |
wlp2s0: set_disable_ht40: 0 | |
wlp2s0: set_disable_sgi: 0 | |
wlp2s0: set_disable_ldpc: 0 | |
wlp2s0: Trying to associate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz) | |
wlp2s0: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=3) | |
* bssid=00:11:88:d2:6f:e0 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 04 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac04 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=38) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=65): 10 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 60 f1 31 00 00 00 11 c0 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
nl80211: Associate event | |
wlp2s0: Event ASSOC (0) received | |
wlp2s0: Association info event | |
resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
wlp2s0: freq=2437 MHz | |
wlp2s0: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=1): completed iteration | |
wlp2s0: freq[0]: 2437, flags=0x1 | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: Associated to a new BSS: BSSID=00:11:88:d2:6f:e0 | |
wlp2s0: Associated with 00:11:88:d2:6f:e0 | |
wlp2s0: WPA: Association event - clear replay counter | |
wlp2s0: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp2s0: Setting authentication timeout: 10 sec 0 usec | |
wlp2s0: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=51 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39 | |
wlp2s0: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp2s0: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=42): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 am,nasid=AP3/1,p | |
6f 72 74 69 64 3d 32 30 36 39 ortid=2069 | |
EAP: using real identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=36): [CENSORED] | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp2s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
wlp2s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=1) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x303 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x303 content_type=22 | |
OpenSSL: Message - hexdump(len=298): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 303 bytes pending from ssl_out | |
SSL: 303 bytes left to be sent out (of total 303 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x21a45e0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=317): 01 00 01 39 02 02 01 39 19 80 00 00 01 2f 16 03 01 01 2a 01 00 01 26 03 03 c7 f1 5b bb 0b 03 3c 81 97 fc 31 30 4a 1f 67 d9 97 91 30 2e 7a 60 71 21 50 93 5c ca 7e 0c 03 32 00 00 ac c0 30 c0 2c c0 28 c0 24 c0 14 c0 0a 00 a5 00 a3 00 a1 00 9f 00 6b 00 6a 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 32 c0 2e c0 2a c0 26 c0 0f c0 05 00 9d 00 3d 00 35 00 84 c0 2f c0 2b c0 27 c0 23 c0 13 c0 09 00 a4 00 a2 00 a0 00 9e 00 67 00 40 00 3f 00 3e 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 31 c0 2d c0 29 c0 25 c0 0e c0 04 00 9c 00 3c 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 04 04 02 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Failure | |
EAP: Status notification: completion (param=failure) | |
EAP: EAP entering state FAILURE | |
wlp2s0: CTRL-EVENT-EAP-FAILURE EAP authentication failed | |
EAPOL: SUPP_PAE entering state HELD | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Set supplicant port unauthorized for 00:11:88:d2:6f:e0 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state FAIL | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=FAILURE | |
wlp2s0: Setting authentication timeout: 2 sec 0 usec | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=20) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlp2s0 | |
nl80211: Delete station 00:11:88:d2:6f:e0 | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=39) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlp2s0 | |
nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=26): c0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 40 f2 01 00 | |
nl80211: Deauthenticate event | |
wlp2s0: Event DEAUTH (12) received | |
wlp2s0: Deauthentication notification | |
wlp2s0: * reason 1 | |
wlp2s0: * address 00:11:88:d2:6f:e0 | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:11:88:d2:6f:e0 reason=1 | |
wlp2s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="eduroam" auth_failures=1 duration=10 reason=AUTH_FAILED | |
wlp2s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6) | |
wlp2s0: Setting scan request: 0.100000 sec | |
wlp2s0: Radio work 'sme-connect'@0x21930d0 done in 0.101605 seconds | |
Added BSSID 00:11:88:d2:6f:e0 into blacklist | |
wlp2s0: Another BSS in this ESS has been seen; try it next | |
BSSID 00:11:88:d2:6f:e0 blacklist count incremented to 2 | |
wlp2s0: Blacklist count 1 --> request scan in 100 ms | |
wlp2s0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner | |
TDLS: Remove peers on disassociation | |
wlp2s0: WPA: Clear old PMK and PTK | |
wlp2s0: Disconnect event - remove keys | |
wlp2s0: State: ASSOCIATED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlp2s0 | |
nl80211: Ignore disconnect event when using userspace SME | |
wlp2s0: State: DISCONNECTED -> SCANNING | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: Starting AP scan for wildcard SSID | |
WPS: Building WPS IE for Probe Request | |
WPS: * Version (hardcoded 0x10) | |
WPS: * Request Type | |
WPS: * Config Methods (3148) | |
WPS: * UUID-E | |
WPS: * Primary Device Type | |
WPS: * RF Bands (3) | |
WPS: * Association State | |
WPS: * Configuration Error (0) | |
WPS: * Device Password ID (0) | |
WPS: * Manufacturer | |
WPS: * Model Name | |
WPS: * Model Number | |
WPS: * Device Name | |
WPS: * Version2 (0x20) | |
P2P: * P2P IE header | |
P2P: * Capability dev=25 group=00 | |
P2P: * Listen Channel: Regulatory Class 81 Channel 6 | |
wlp2s0: Optimize scan based on previously generated frequency list | |
wlp2s0: Add radio work 'scan'@0x218be80 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'scan'@0x218be80 after 0.000019 second wait | |
wlp2s0: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=136): 7f 08 04 00 00 00 00 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 06 | |
nl80211: Scan frequency 2462 MHz | |
nl80211: Scan frequency 2437 MHz | |
nl80211: Scan frequency 2412 MHz | |
nl80211: Scan frequency 5220 MHz | |
Scan requested (ret=0) - scan timeout 30 seconds | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0 | |
wlp2s0: nl80211: Scan trigger | |
wlp2s0: Event SCAN_STARTED (47) received | |
wlp2s0: Own scan request started a scan in 0.000094 seconds | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0 | |
wlp2s0: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2462 2437 2412 5220 | |
wlp2s0: Event SCAN_RESULTS (3) received | |
wlp2s0: Scan completed in 0.086365 seconds | |
nl80211: Received scan results (6 BSSes) | |
Sorted scan results | |
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-53 snr=36* flags=0xb age=40 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 8d ca ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 de d8 a4 2c 44 bb c4 05 62 22 1d 14 c0 db 95 31 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 14 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 b6 71 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 0c f8 9c 0e 78 6e bb 40 3e 48 f4 74 d5 7b c2 19 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-69 snr=20 flags=0xb age=403 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 19 00 23 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 e6 ef a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0b 82 6c 72 bc 38 1c ff c5 de 13 c9 bf 62 6e 70 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 35 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 a3 da a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca f8 a3 63 de 3a a1 cd f7 7a ea 66 23 57 d6 12 1f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=523 est=36000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 05 00 3d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 55 f9 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 41 f4 a9 c4 22 97 84 d7 c3 25 70 ee 6d bf 5c ef dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 05 00 59 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 b2 6b 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 7c 90 2f e6 a4 df da 02 95 d7 a1 5b ea aa 42 2b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-77 snr=12 flags=0xb age=33 est=36000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 19 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d3 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 3a 42 51 41 3b fa 89 d9 d3 07 b6 a1 1a f1 b8 a4 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-92 snr=0 flags=0xb age=10 est=1000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d4 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 50 90 eb 53 65 24 67 8f b3 b6 41 ef 90 c4 0c 0d dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=-89~ level=-67 snr=22 flags=0xb age=56 est=54000 | |
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00 | |
wlp2s0: BSS: Start scan result update 2 | |
wlp2s0: BSS: Add new id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' freq 2412 | |
BSS: last_scan_res_used=6/32 | |
wlp2s0: New scan results available (own=1 ext=0) | |
wlp2s0: Radio work 'scan'@0x218be80 done in 0.089401 seconds | |
wlp2s0: Postpone network selection by 10 seconds since all networks are disabled | |
p2p-dev-wlp2s0: Updating scan results from sibling | |
nl80211: Received scan results (6 BSSes) | |
Sorted scan results | |
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-53 snr=36* flags=0xb age=43 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 8d ca ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 de d8 a4 2c 44 bb c4 05 62 22 1d 14 c0 db 95 31 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 14 07 06 50 54 20 01 0d 11 0b 05 19 00 3f 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 b6 71 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 0c f8 9c 0e 78 6e bb 40 3e 48 f4 74 d5 7b c2 19 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-69 snr=20 flags=0xb age=406 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 19 00 23 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 e6 ef a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0b 82 6c 72 bc 38 1c ff c5 de 13 c9 bf 62 6e 70 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 35 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 a3 da a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca f8 a3 63 de 3a a1 cd f7 7a ea 66 23 57 d6 12 1f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=526 est=36000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 05 00 3d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 55 f9 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 41 f4 a9 c4 22 97 84 d7 c3 25 70 ee 6d bf 5c ef dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 05 00 59 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 b2 6b 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 7c 90 2f e6 a4 df da 02 95 d7 a1 5b ea aa 42 2b dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-77 snr=12 flags=0xb age=36 est=36000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 19 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d3 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 3a 42 51 41 3b fa 89 d9 d3 07 b6 a1 1a f1 b8 a4 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-92 snr=0 flags=0xb age=13 est=1000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e0 d4 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 50 90 eb 53 65 24 67 8f b3 b6 41 ef 90 c4 0c 0d dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=-89~ level=-67 snr=22 flags=0xb age=60 est=54000 | |
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00 | |
p2p-dev-wlp2s0: BSS: Start scan result update 1 | |
p2p-dev-wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' freq 2437 | |
p2p-dev-wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' freq 2462 | |
p2p-dev-wlp2s0: BSS: Add new id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' freq 2437 | |
p2p-dev-wlp2s0: BSS: Add new id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' freq 2412 | |
p2p-dev-wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' freq 5220 | |
p2p-dev-wlp2s0: BSS: Add new id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' freq 2412 | |
BSS: last_scan_res_used=6/32 | |
p2p-dev-wlp2s0: New scan results available (own=0 ext=0) | |
EAPOL: disable timer tick | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
EAPOL: startWhen --> 0 | |
EAPOL: disable timer tick | |
p2p-dev-wlp2s0: Removing interface p2p-dev-wlp2s0 | |
p2p-dev-wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED | |
TDLS: Tear down peers | |
p2p-dev-wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
p2p-dev-wlp2s0: WPA: Clear old PMK and PTK | |
p2p-dev-wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush | |
p2p-dev-wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush | |
p2p-dev-wlp2s0: BSS: Remove id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush | |
p2p-dev-wlp2s0: BSS: Remove id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush | |
p2p-dev-wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' due to wpa_bss_flush | |
p2p-dev-wlp2s0: BSS: Remove id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush | |
p2p-dev-wlp2s0: Cancelling delayed sched scan | |
p2p-dev-wlp2s0: Cancelling scan request | |
p2p-dev-wlp2s0: Cancelling authentication timeout | |
p2p-dev-wlp2s0: P2P: Disable P2P since removing the management interface is being removed | |
P2P: All ASP advertisements flushed | |
P2P: Stopping find | |
P2P: Clear timeout (state=IDLE) | |
P2P: State IDLE -> IDLE | |
P2P: All ASP advertisements flushed | |
Remove interface p2p-dev-wlp2s0 from radio phy0 | |
nl80211: deinit ifname=p2p-dev-wlp2s0 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=0 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Stop P2P Device p2p-dev-wlp2s0 (0x5): Success | |
nl80211: Unsubscribe mgmt frames handle 0x888888888a9f8969 (deinit) | |
nl80211: Delete P2P Device p2p-dev-wlp2s0 (0x5): Success | |
p2p-dev-wlp2s0: CTRL-EVENT-TERMINATING | |
Control interface directory not empty - leaving it behind | |
wlp2s0: Removing interface wlp2s0 | |
wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING | |
TDLS: Tear down peers | |
wlp2s0: State: SCANNING -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit | |
ENGINE: engine deinit | |
wlp2s0: WPA: Clear old PMK and PTK | |
Removed BSSID 00:11:88:d2:6f:e0 from blacklist (clear) | |
wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 2 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 3 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:71:41 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 5 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush | |
wlp2s0: Cancelling delayed sched scan | |
wlp2s0: Cancelling scan request | |
wlp2s0: Cancelling authentication timeout | |
Remove interface wlp2s0 from radio phy0 | |
Remove radio phy0 | |
nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Set mode ifindex 3 iftype 2 (STATION) | |
nl80211: Unsubscribe mgmt frames handle 0x888888888a9e7dd9 (mode change) | |
wlp2s0: CTRL-EVENT-TERMINATING |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
wpa_supplicant v2.5 | |
Successfully initialized wpa_supplicant | |
Initializing interface 'wlp2s0' conf 'wpasupplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' | |
Configuration file 'wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf' | |
Reading configuration file '/home/claudio/wpasupplicant.conf' | |
ctrl_interface='/run/wpa_supplicant' | |
Line: 9 - start of a new network block | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
key_mgmt: 0x1 | |
identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
password - hexdump_ascii(len=8): [REMOVED] | |
phase1 - hexdump_ascii(len=21): | |
74 6c 73 5f 64 69 73 61 62 6c 65 5f 74 6c 73 76 tls_disable_tlsv | |
31 5f 32 3d 31 1_2=1 | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
Priority group 0 | |
id=0 ssid='eduroam' | |
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0 | |
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0 | |
nl80211: TDLS supported | |
nl80211: TDLS external setup | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:6 | |
nl80211: Using driver-based off-channel TX | |
nl80211: TDLS channel switch | |
nl80211: Use separate P2P group interface (driver advertised support) | |
nl80211: Enable multi-channel concurrent (driver advertised support) | |
nl80211: use P2P_DEVICE support | |
nl80211: interface wlp2s0 in phy phy0 | |
nl80211: Set mode ifindex 3 iftype 2 (STATION) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x20e2550 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=040e | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e2550 match=0505 | |
netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) | |
nl80211: driver param='(null)' | |
Add interface wlp2s0 to a new radio phy0 | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
wlp2s0: Own MAC address: dc:53:60:30:bf:c9 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 | |
wlp2s0: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
TDLS: TDLS operation supported by driver | |
TDLS: Driver uses external link setup | |
TDLS: Driver supports TDLS channel switching | |
wlp2s0: WPS: UUID based on MAC address: 253333a1-33e3-5a54-a87b-93e80bcfe37c | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
wlp2s0: Added interface wlp2s0 | |
wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
nl80211: Create interface iftype 10 (P2P_DEVICE) | |
nl80211: New P2P Device interface p2p-dev-wlp2s0 (0x7) created | |
Initializing interface 'p2p-dev-wlp2s0' conf '/home/claudio/wpasupplicant.conf' driver 'nl80211' ctrl_interface '/run/wpa_supplicant' bridge 'N/A' | |
Configuration file '/home/claudio/wpasupplicant.conf' -> '/home/claudio/wpasupplicant.conf' | |
Reading configuration file '/home/claudio/wpasupplicant.conf' | |
ctrl_interface='/run/wpa_supplicant' | |
Line: 9 - start of a new network block | |
ssid - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
key_mgmt: 0x1 | |
identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
password - hexdump_ascii(len=8): [REMOVED] | |
phase1 - hexdump_ascii(len=21): | |
74 6c 73 5f 64 69 73 61 62 6c 65 5f 74 6c 73 76 tls_disable_tlsv | |
31 5f 32 3d 31 1_2=1 | |
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 | |
phase2 - hexdump_ascii(len=13): | |
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 | |
Priority group 0 | |
id=0 ssid='eduroam' | |
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 | |
rfkill: initial event: idx=2 type=2 op=0 soft=1 hard=0 | |
rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0 | |
Could not read interface p2p-dev-wlp2s0 flags: No such device | |
nl80211: TDLS supported | |
nl80211: TDLS external setup | |
nl80211: Supported cipher 00-0f-ac:1 | |
nl80211: Supported cipher 00-0f-ac:5 | |
nl80211: Supported cipher 00-0f-ac:2 | |
nl80211: Supported cipher 00-0f-ac:4 | |
nl80211: Supported cipher 00-0f-ac:6 | |
nl80211: Using driver-based off-channel TX | |
nl80211: TDLS channel switch | |
nl80211: Use separate P2P group interface (driver advertised support) | |
nl80211: Enable multi-channel concurrent (driver advertised support) | |
nl80211: use P2P_DEVICE support | |
nl80211: interface p2p-dev-wlp2s0 in phy phy0 | |
nl80211: Set mode ifindex 0 iftype 10 (P2P_DEVICE) | |
nl80211: Failed to set interface 0 to mode 10: -22 (Invalid argument) | |
nl80211: Subscribe to mgmt frames with non-AP handle 0x20e3220 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090a | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090b | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090c | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=090d | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0409506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=7f506f9a09 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0801 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=040e | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=06 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0a07 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0a11 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=1101 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=1102 | |
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x20e3220 match=0505 | |
nl80211: Start P2P Device p2p-dev-wlp2s0 (0x7): Success | |
nl80211: driver param='(null)' | |
Add interface p2p-dev-wlp2s0 to existing radio phy0 | |
nl80211: Regulatory information - country=00 | |
nl80211: 2402-2472 @ 40 MHz 20 mBm | |
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) | |
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) | |
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) | |
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) | |
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) | |
nl80211: 57240-63720 @ 2160 MHz 0 mBm | |
nl80211: Added 802.11b mode based on 802.11g information | |
p2p-dev-wlp2s0: Own MAC address: dc:53:60:30:bf:ca | |
p2p-dev-wlp2s0: RSN: flushing PMKID list in the driver | |
nl80211: Flush PMKIDs | |
p2p-dev-wlp2s0: State: DISCONNECTED -> INACTIVE | |
p2p-dev-wlp2s0: WPS: UUID from the first interface: 253333a1-33e3-5a54-a87b-93e80bcfe37c | |
ENGINE: Loading dynamic engine | |
ENGINE: Loading dynamic engine | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: KEY_RX entering state NO_KEY_RECEIVE | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
Using existing control interface directory. | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Own listen channel: 81:11 | |
P2P: Random operating channel: 81:11 | |
P2P: initialized | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
p2p-dev-wlp2s0: Added interface p2p-dev-wlp2s0 | |
p2p-dev-wlp2s0: State: INACTIVE -> DISCONNECTED | |
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
p2p-dev-wlp2s0: Determining shared radio frequencies (max len 2) | |
p2p-dev-wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) | |
wlp2s0: Starting delayed sched scan | |
wlp2s0: Use normal scan instead of sched_scan for initial scans (normal_scans=0) | |
wlp2s0: Setting scan request: 0.000000 sec | |
wlp2s0: State: DISCONNECTED -> SCANNING | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: Starting AP scan for wildcard SSID | |
WPS: Building WPS IE for Probe Request | |
WPS: * Version (hardcoded 0x10) | |
WPS: * Request Type | |
WPS: * Config Methods (3148) | |
WPS: * UUID-E | |
WPS: * Primary Device Type | |
WPS: * RF Bands (3) | |
WPS: * Association State | |
WPS: * Configuration Error (0) | |
WPS: * Device Password ID (0) | |
WPS: * Manufacturer | |
WPS: * Model Name | |
WPS: * Model Number | |
WPS: * Device Name | |
WPS: * Version2 (0x20) | |
P2P: * P2P IE header | |
P2P: * Capability dev=25 group=00 | |
P2P: * Listen Channel: Regulatory Class 81 Channel 11 | |
wlp2s0: Add radio work 'scan'@0x2106130 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'scan'@0x2106130 after 0.000015 second wait | |
wlp2s0: nl80211: scan request | |
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] | |
nl80211: Scan extra IEs - hexdump(len=136): 7f 08 04 00 00 00 00 00 00 40 dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 31 48 10 47 00 10 25 33 33 a1 33 e3 5a 54 a8 7b 93 e8 0b cf e3 7c 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b | |
Scan requested (ret=0) - scan timeout 10 seconds | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0 | |
wlp2s0: nl80211: Scan trigger | |
wlp2s0: Event SCAN_STARTED (47) received | |
wlp2s0: Own scan request started a scan in 0.000069 seconds | |
EAPOL: disable timer tick | |
EAPOL: disable timer tick | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP]) | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0 | |
wlp2s0: nl80211: New scan results available | |
nl80211: Scan probed for SSID '' | |
nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825 | |
wlp2s0: Event SCAN_RESULTS (3) received | |
wlp2s0: Scan completed in 2.769934 seconds | |
nl80211: Received scan results (9 BSSes) | |
Sorted scan results | |
00:11:88:d2:6f:e0 freq=2437 qual=0 noise=-89~ level=-57 snr=32* flags=0xb age=2640 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 18 00 42 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 92 00 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 88 58 68 d4 5e d6 8e 2a 7c e5 74 5d 72 1d b8 05 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 18 00 2d 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 bb 93 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 22 f4 23 11 b6 f9 d2 9f 0c 81 90 be 1a ae dc 6f dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:e1 freq=5200 qual=0 noise=-92~ level=-73 snr=19 flags=0xb age=2433 est=54000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 04 92 02 ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 40 f5 7d 44 da dd 1e e8 c3 a5 7a 9b 63 1a 7b 9d dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 28 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 01 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 fd 08 23 e1 56 00 17 bb 9a ec ea 5e 2b 2e 24 3c bb 54 18 d3 ed 60 94 8a c2 7a b0 a3 4d 9c 31 00 5e 73 f4 42 c6 ce 90 a1 99 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:71:40 freq=2412 qual=0 noise=-89~ level=-75 snr=14 flags=0xb age=2766 est=36000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 01 07 06 50 54 20 01 0d 11 0b 05 05 00 0a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e3 ac 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d b8 ed e7 fc b2 45 3c 79 4b f4 13 d1 77 6f 4f 4a dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:70:d0 freq=2462 qual=0 noise=-89~ level=-82 snr=7 flags=0xb age=2523 est=18000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 07 06 50 54 20 01 0d 11 0b 05 1b 00 26 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 04 ea 6c a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 15 26 e8 9e 1f 78 61 83 66 83 2e 78 9c 1f 7b 55 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 0b 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 19 00 30 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 01 38 64 73 e1 ca 00 17 ad 06 a8 55 5a fb 37 ba ed 7c 99 33 e5 e0 7c 3a 93 ca 0d 2a 3f 15 aa 2a 81 f1 5b 14 6b a7 b7 63 79 e3 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:40 freq=2437 qual=0 noise=-89~ level=-83 snr=6 flags=0xb age=2640 est=12000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 07 06 50 54 20 01 0d 11 0b 05 06 00 3a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 59 fd 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 20 80 d8 c6 75 b3 48 57 22 7f 79 70 49 7f f9 4f dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 07 96 18 24 30 48 60 6c 03 01 06 05 04 00 01 01 00 07 06 50 54 20 01 0d 11 0b 05 06 00 3a 00 00 43 02 00 00 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 18 00 0b 0e 02 00 00 00 00 11 07 16 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 17 bf 9f 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 29 e5 d9 44 5f 14 5d 42 04 c3 ca 49 b9 4a 8a 84 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
82:b9:a5:f8:06:6d freq=2462 qual=0 noise=-89~ level=-87 snr=2 flags=0xb age=2520 est=6500 | |
IEs - hexdump(len=230): 00 08 43 6f 67 75 6d 65 6c 6f 01 08 82 84 8b 96 0c 12 18 24 03 01 0b 07 06 50 54 20 01 0e 14 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 30 48 60 6c 2d 1a 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 7f 01 01 dd 18 00 50 f2 02 01 01 06 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 2c 01 03 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 00 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 03 7f 01 01 00 00 ff 7f | |
00:11:88:d2:71:41 freq=5220 qual=0 noise=-92~ level=-90 snr=2 flags=0xb age=2420 est=2000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 02 e3 b2 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d a0 bd 2a 35 b0 0f 74 27 47 22 5e 33 8e 96 a0 df dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
Beacon IEs - hexdump(len=187): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 2c 05 04 00 01 00 00 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 05 00 0b 0e 04 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4d 4a 0e f7 00 17 ba 4f 64 8e 3d a9 aa c5 6e df 40 72 dd 70 41 a8 73 8d 81 da c2 1d 40 6f c5 0d ec be a8 93 55 d7 59 f1 dd 07 00 50 f2 02 00 01 01 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
00:11:88:d2:6f:41 freq=5180 qual=0 noise=-92~ level=-92 snr=0 flags=0xb age=2450 est=1000 | |
IEs - hexdump(len=165): 00 07 65 64 75 72 6f 61 6d 01 08 8c 12 98 24 b0 48 60 6c 03 01 24 07 06 50 54 20 24 04 0e 0b 05 00 00 00 00 00 43 02 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 1a 00 0b 0e 02 00 00 00 00 0e 08 0c a5 12 a6 18 a7 24 a8 30 ab 48 ae 60 b5 6c b8 dd 2e 00 0b 0e 03 00 e8 4a 4c 9a 21 00 05 59 fe 04 53 d9 2e 08 b8 99 42 bd 7b 2a c9 6b ae 2b fc 6b 33 3b ac 80 23 86 a8 c9 ff 17 cd a5 a5 7c 8e dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
f2:79:59:b1:c3:ce freq=2412 qual=0 noise=-89~ level=-74 snr=15 flags=0xb age=2636 est=48000 | |
IEs - hexdump(len=126): 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 03 01 01 2a 01 00 2f 01 00 2d 1a 0c 11 19 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 07 00 50 f2 02 00 01 00 | |
wlp2s0: BSS: Start scan result update 1 | |
wlp2s0: BSS: Add new id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' freq 2437 | |
wlp2s0: BSS: Add new id 1 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' freq 5200 | |
wlp2s0: BSS: Add new id 2 BSSID 00:11:88:d2:71:40 SSID 'eduroam' freq 2412 | |
wlp2s0: BSS: Add new id 3 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' freq 2462 | |
wlp2s0: BSS: Add new id 4 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' freq 2437 | |
wlp2s0: BSS: Add new id 5 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' freq 2462 | |
wlp2s0: BSS: Add new id 6 BSSID 00:11:88:d2:71:41 SSID 'eduroam' freq 5220 | |
wlp2s0: BSS: Add new id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' freq 5180 | |
wlp2s0: BSS: Add new id 8 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' freq 2412 | |
BSS: last_scan_res_used=9/32 | |
wlp2s0: New scan results available (own=1 ext=0) | |
wlp2s0: Radio work 'scan'@0x2106130 done in 2.772354 seconds | |
wlp2s0: Selecting BSS from priority group 0 | |
wlp2s0: 0: 00:11:88:d2:6f:e0 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=-57 freq=2437 | |
wlp2s0: selected based on RSN IE | |
wlp2s0: selected BSS 00:11:88:d2:6f:e0 ssid='eduroam' | |
wlp2s0: Considering connect request: reassociate: 0 selected: 00:11:88:d2:6f:e0 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x20e2a80 current_ssid=(nil) | |
wlp2s0: Request association with 00:11:88:d2:6f:e0 | |
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=24) | |
unknown vendor specific information element ignored (vendor OUI 00:0b:0e len=46) | |
wlp2s0: Add radio work 'sme-connect'@0x2106130 | |
wlp2s0: First radio work item in the queue - schedule start immediately | |
wlp2s0: Starting radio work 'sme-connect'@0x2106130 after 0.000008 second wait | |
wlp2s0: Automatic auth_alg selection: 0x1 | |
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 | |
RSN: Search for BSSID 00:11:88:d2:6f:e0 | |
RSN: No PMKSA cache entry found | |
wlp2s0: RSN: using IEEE 802.11i/D9.0 | |
wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 | |
wlp2s0: WPA: Selected mgmt group cipher 32 | |
wlp2s0: WPA: clearing AP WPA IE | |
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
wlp2s0: WPA: using GTK CCMP | |
wlp2s0: WPA: using PTK CCMP | |
wlp2s0: WPA: using KEY_MGMT 802.1X | |
wlp2s0: WPA: not using MGMT group cipher | |
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
RRM: Determining whether RRM can be used - device support: 0x0 | |
RRM: No RRM in network | |
wlp2s0: Cancelling scan request | |
wlp2s0: SME: Trying to authenticate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz) | |
wlp2s0: State: SCANNING -> AUTHENTICATING | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
EAPOL: External notification - EAP success=0 | |
EAPOL: External notification - EAP fail=0 | |
EAPOL: External notification - portControl=Auto | |
nl80211: Authenticate (ifindex=3) | |
* bssid=00:11:88:d2:6f:e0 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=0): [NULL] | |
* Auth Type 0 | |
nl80211: Authentication request send successfully | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=19) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0 | |
nl80211: New station 00:11:88:d2:6f:e0 | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=37) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0 | |
nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=30): b0 00 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 d0 52 00 00 02 00 00 00 | |
nl80211: Authenticate event | |
wlp2s0: Event AUTH (11) received | |
wlp2s0: SME: Authentication response: peer=00:11:88:d2:6f:e0 auth_type=0 auth_transaction=2 status_code=0 | |
SME: Authentication response IEs - hexdump(len=0): [NULL] | |
wlp2s0: set_disable_max_amsdu: -1 | |
wlp2s0: set_ampdu_factor: -1 | |
wlp2s0: set_ampdu_density: -1 | |
wlp2s0: set_disable_ht40: 0 | |
wlp2s0: set_disable_sgi: 0 | |
wlp2s0: set_disable_ldpc: 0 | |
wlp2s0: Trying to associate with 00:11:88:d2:6f:e0 (SSID='eduroam' freq=2437 MHz) | |
wlp2s0: State: AUTHENTICATING -> ASSOCIATING | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=0): completed iteration | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
nl80211: Associate (ifindex=3) | |
* bssid=00:11:88:d2:6f:e0 | |
* freq=2437 | |
* SSID - hexdump_ascii(len=7): | |
65 64 75 72 6f 61 6d eduroam | |
* IEs - hexdump(len=32): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 08 04 00 00 00 00 00 00 40 | |
* WPA Versions 0x2 | |
* pairwise=0xfac04 | |
* group=0xfac04 | |
* akm=0xfac01 | |
* htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
* vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00 | |
nl80211: Association request send successfully | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=38) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0 | |
nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on wlp2s0(dc:53:60:30:bf:c9) A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
nl80211: MLME event frame - hexdump(len=65): 10 08 d4 00 dc 53 60 30 bf c9 00 11 88 d2 6f e0 00 11 88 d2 6f e0 00 53 31 00 00 00 11 c0 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
nl80211: Associate event | |
wlp2s0: Event ASSOC (0) received | |
wlp2s0: Association info event | |
resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 | |
wlp2s0: freq=2437 MHz | |
wlp2s0: State: ASSOCIATING -> ASSOCIATED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=1): completed iteration | |
wlp2s0: freq[0]: 2437, flags=0x1 | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: Associated to a new BSS: BSSID=00:11:88:d2:6f:e0 | |
wlp2s0: Associated with 00:11:88:d2:6f:e0 | |
wlp2s0: WPA: Association event - clear replay counter | |
wlp2s0: WPA: Clear old PTK | |
TDLS: Remove peers on association | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
EAPOL: External notification - portEnabled=1 | |
EAPOL: SUPP_PAE entering state CONNECTING | |
EAPOL: enable timer tick | |
EAPOL: SUPP_BE entering state IDLE | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
wlp2s0: Setting authentication timeout: 10 sec 0 usec | |
wlp2s0: Cancelling scan request | |
WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0 | |
WMM AC: U-APSD queues=0x0 | |
WMM AC: Valid WMM association, WMM AC is enabled | |
nl80211: Event message available | |
nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0) | |
nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0 | |
nl80211: Ignore connect event (cmd=46) when using userspace SME | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=51 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f 61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 6f 72 74 69 64 3d 32 30 36 39 | |
wlp2s0: Setting authentication timeout: 70 sec 0 usec | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_PAE entering state RESTART | |
EAP: EAP entering state INITIALIZE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_PAE entering state AUTHENTICATING | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 | |
EAP: EAP entering state IDENTITY | |
wlp2s0: CTRL-EVENT-EAP-STARTED EAP authentication started | |
EAP: Status notification: started (param=) | |
EAP: EAP-Request Identity data - hexdump_ascii(len=42): | |
00 6e 65 74 77 6f 72 6b 69 64 3d 65 64 75 72 6f _networkid=eduro | |
61 6d 2c 6e 61 73 69 64 3d 41 50 33 2f 31 2c 70 am,nasid=AP3/1,p | |
6f 72 74 69 64 3d 32 30 36 39 ortid=2069 | |
EAP: using real identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=36): [CENSORED] | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 06 01 02 00 06 19 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state GET_METHOD | |
wlp2s0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
EAP: Status notification: accept proposed method (param=PEAP) | |
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) | |
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 | |
TLS: using phase1 config options | |
wlp2s0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=6) - Flags 0x20 | |
EAP-PEAP: Start (server ver=0, own ver=1) | |
EAP-PEAP: Using PEAP version 0 | |
SSL: (where=0x10 ret=0x1) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:before/connect initialization | |
OpenSSL: TX ver=0x302 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x302 content_type=22 | |
OpenSSL: Message - hexdump(len=226): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:SSLv2/v3 write client hello A | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in SSLv2/v3 read server hello A | |
SSL: SSL_connect - want more data | |
SSL: 231 bytes pending from ssl_out | |
SSL: 231 bytes left to be sent out (of total 231 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x20fef70 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=245): 01 00 00 f1 02 02 00 f1 19 80 00 00 00 e7 16 03 01 00 e2 01 00 00 de 03 02 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 00 00 64 c0 14 c0 0a 00 39 00 38 00 37 00 36 00 88 00 87 00 86 00 85 c0 0f c0 05 00 35 00 84 c0 13 c0 09 00 33 00 32 00 31 00 30 00 9a 00 99 00 98 00 97 00 45 00 44 00 43 00 42 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 c0 12 c0 08 00 16 00 13 00 10 00 0d c0 0d c0 03 00 0a 00 ff 01 00 00 51 00 0b 00 04 03 00 01 02 00 0a 00 1c 00 1a 00 17 00 19 00 1c 00 1b 00 18 00 1a 00 16 00 0e 00 0d 00 0b 00 0c 00 09 00 0a 00 0d 00 20 00 1e 06 01 06 02 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 03 02 03 03 02 01 02 02 02 03 00 0f 00 01 01 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=1500 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=1500): 01 00 05 d8 01 03 05 d8 19 c0 00 00 0a c9 16 03 01 0a c4 02 00 00 4d 03 01 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de 20 02 15 00 00 d6 bc ac c5 64 e0 89 e4 e3 a1 32 69 b8 bb 7a 40 53 f9 65 53 e4 88 d9 38 10 4d 25 c2 00 04 00 00 05 ff 01 00 01 00 0b 00 0a 62 00 0a 5f 00 05 5a 30 82 05 56 30 82 04 3e a0 03 02 01 02 02 10 0f ed 55 0e 58 0f a6 45 ee 08 3b 50 ca c2 ea 26 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 1e 17 0d 31 35 31 30 32 32 30 30 30 30 30 30 5a 17 0d 31 38 31 30 32 36 31 32 30 30 30 30 5a 30 81 96 31 0b 30 09 06 03 55 04 06 13 02 50 54 31 11 30 0f 06 03 55 04 08 0c 08 53 65 74 c3 ba 62 61 6c 31 11 30 0f 06 03 55 04 07 0c 08 53 65 74 c3 ba 62 61 6c 31 2b 30 29 06 03 55 04 0a 0c 22 49 6e 73 74 69 74 75 74 6f 20 50 6f 6c 69 74 c3 a9 63 6e 69 63 6f 20 64 65 20 53 65 74 c3 ba 62 61 6c 31 13 30 11 06 03 55 04 0b 13 0a 45 53 54 53 65 74 75 62 61 6c 31 1f 30 1d 06 03 55 04 03 13 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ba 5c 3e e0 6d 1e 15 f5 09 86 78 92 98 47 f2 17 7e ff d3 59 2f 86 2b 6c 98 15 df b9 4c fe 4f 2c 70 f2 d7 57 f2 63 f2 5f ab ab 38 27 9f d0 28 80 15 ff 71 0b 54 03 ce e3 d2 ef bb 20 fc a0 b8 17 73 ab 7b 5a 63 68 d7 4f 18 67 18 19 8c b0 28 46 6f 65 79 9c dd b9 c4 b4 59 58 39 a0 f0 3f d4 ff 5e 35 8d b7 62 bd 04 46 6b 4f 47 f9 e8 5f 12 2d 6b 6b 99 2f 64 71 67 f0 b1 08 58 86 7d ab 7b 32 6d 11 64 8e 5e 25 64 23 68 44 ea b7 dd c3 aa 3d 5d f2 f0 93 94 28 5b 70 4e 1c 6e 07 ee 69 9f dd 59 89 eb 90 50 7a 09 1c 4a 83 b2 d4 fc 86 f4 72 39 74 fa ee 8b a6 a6 c1 6a 40 55 04 76 43 2a e8 65 e1 c0 f1 ac c1 3c 23 cc 62 8c 2f 14 f6 4c 22 c9 0c c6 59 57 c0 6b 4c f9 5d bb 03 ad e1 fd d2 b3 51 fc cf bd 80 43 c0 1e 33 88 e1 50 04 50 94 e2 af be 26 42 bc 26 0e 18 74 81 41 22 b8 83 77 02 03 01 00 01 a3 82 01 cf 30 82 01 cb 30 1f 06 03 55 1d 23 04 18 30 16 80 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1d 06 03 55 1d 0e 04 16 04 14 f8 a9 76 28 39 ec 2b b4 f8 b5 6c 27 2a e9 30 dd 15 53 8b 99 30 21 06 03 55 1d 11 04 1a 30 18 82 16 69 61 74 65 2e 65 73 74 73 65 74 75 62 61 6c 2e 69 70 73 2e 70 74 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 05 a0 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 6b 06 03 55 1d 1f 04 64 30 62 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c 01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 08 06 06 67 81 0c 01 02 02 30 6e 06 08 2b 06 01 05 05 07 01 01 04 62 30 60 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 38 06 08 2b 06 01 05 05 07 30 02 86 2c 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 54 45 52 45 4e 41 53 53 4c 43 41 33 2e 63 72 74 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 1d 27 0b 88 ac f0 2f f2 9e 25 eb 57 b0 fa ad 2a 96 3f 8a 89 38 28 1b 13 01 80 6e 01 83 b7 36 a1 0c 9c 88 4e 3f 03 b8 af 84 dd d8 bf fb 00 a7 22 99 1e 1f ba f6 48 98 c1 4b ef a3 2f d2 77 7d 08 06 9e 0b 47 6c ef 21 cb 72 60 94 31 37 53 f2 ab 0d 34 6f 83 9e 24 8f ab ee 56 0c 2d 5b 0b 08 ad 7d 23 2b f0 6b b3 b2 4e bd 35 7f ae f8 0e c3 78 30 4c 22 94 53 ba 14 4a d2 dd 70 2a 6d 51 7a 70 fa db 1a 94 2c 72 cb 06 23 20 3b cd e2 7b 12 e2 12 84 b6 ad 85 b7 5a 7a ed ea 14 80 2c 32 3d 12 3f 3b 47 0f ae 90 8a 95 49 7f 17 b4 a3 40 a8 5e 56 ac ba be 78 04 8a 2f 0c a0 e5 08 4e fa 4f 55 f7 1f 85 5d be c5 6d 57 d3 bf aa 0d c2 3e 3b 35 6a 46 10 28 39 23 e3 27 1c 26 0a c7 b7 c9 ab ab ce 19 42 e9 51 e2 68 f0 0c 2b 21 a0 e9 34 84 a6 24 42 7e f0 91 08 69 5f e6 51 9d 97 52 87 11 d1 00 04 ff 30 82 04 fb 30 82 03 e3 a0 03 02 01 02 02 10 08 70 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1496) - Flags 0xc0 | |
SSL: TLS Message Length: 2761 | |
SSL: Need 1275 bytes more input data | |
SSL: Building ACK (type=25 id=3 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2106d90 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 03 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=1285 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=1285): 01 00 05 01 01 04 05 01 19 00 bc c5 af 3f db 95 9a 91 cb 6a ee ef e4 65 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 65 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 15 30 13 06 03 55 04 0a 13 0c 44 69 67 69 43 65 72 74 20 49 6e 63 31 19 30 17 06 03 55 04 0b 13 10 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 31 24 30 22 06 03 55 04 03 13 1b 44 69 67 69 43 65 72 74 20 41 73 73 75 72 65 64 20 49 44 20 52 6f 6f 74 20 43 41 30 1e 17 0d 31 34 31 31 31 38 31 32 30 30 30 30 5a 17 0d 32 34 31 31 31 38 31 32 30 30 30 30 5a 30 64 31 0b 30 09 06 03 55 04 06 13 02 4e 4c 31 16 30 14 06 03 55 04 08 13 0d 4e 6f 6f 72 64 2d 48 6f 6c 6c 61 6e 64 31 12 30 10 06 03 55 04 07 13 09 41 6d 73 74 65 72 64 61 6d 31 0f 30 0d 06 03 55 04 0a 13 06 54 45 52 45 4e 41 31 18 30 16 06 03 55 04 03 13 0f 54 45 52 45 4e 41 20 53 53 4c 20 43 41 20 33 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c5 76 0f 0f d9 43 29 3b 6c 6d d1 47 ad de 10 bf 23 c2 78 a8 4a 77 35 f1 23 5b e0 4c 1e 41 e7 c2 31 00 bd 88 37 45 75 dd b9 02 10 80 1e 8f ed 64 23 04 45 a7 a0 39 3b 81 4d cf 63 3f c2 49 ff 22 9e 88 b0 d2 96 b9 5c 8a 74 1f 92 2a 2a f2 12 c8 b7 68 54 b5 58 41 81 40 68 06 1a 4f 85 29 fb b5 4d 3c 0f 4f 3f 40 96 1b ce a8 cc 5e 35 ff 64 98 f5 75 dd 74 54 05 a0 36 11 04 12 24 55 63 ef 94 77 2e 77 f1 15 76 ee d3 a4 59 45 21 9f a8 be d1 27 ed 0a e8 ab 38 ca 3f 87 d1 da f1 8f b9 0b 1f 44 e7 e0 ad f3 95 c2 16 4d ec 84 a3 3a 92 d4 cf c6 7d e6 bd cb 1a 40 4f b3 54 b1 f3 8f 6f 0d 1e e3 be 49 a3 56 e4 07 bc 8d a7 ce 1d b0 5b 57 56 d1 c4 1c fc 98 65 d1 cd 46 2f 91 94 bf 45 85 49 f8 6d 52 87 1c 02 56 01 27 16 ab 72 2e f4 71 e4 61 b5 20 a0 fa 26 69 6a 0a f1 ab 9f 6d b7 cf 25 02 03 01 00 01 a3 82 01 a6 30 82 01 a2 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 86 30 79 06 08 2b 06 01 05 05 07 01 01 04 6d 30 6b 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f 2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 43 06 08 2b 06 01 05 05 07 30 02 86 37 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 74 30 81 81 06 03 55 1d 1f 04 7a 30 78 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3a a0 38 a0 36 86 34 68 74 74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 44 69 67 69 43 65 72 74 41 73 73 75 72 65 64 49 44 52 6f 6f 74 43 41 2e 63 72 6c 30 3d 06 03 55 1d 20 04 36 30 34 30 32 06 04 55 1d 20 00 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53 30 1d 06 03 55 1d 0e 04 16 04 14 67 fd 88 20 14 27 98 c7 09 d2 25 19 bb e9 51 11 63 75 50 62 30 1f 06 03 55 1d 23 04 18 30 16 80 14 45 eb a2 af f4 92 cb 82 31 2d 51 8b a7 a7 21 9d f3 6d c8 0f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 a9 28 35 7a c4 7b d6 da 27 1e ac 98 cf 27 36 4f 11 32 74 74 e6 40 dd 1d cd f2 68 77 35 af b3 8c 5d c6 04 bf 15 f4 23 67 8b b9 6f 97 04 eb 46 9d c2 cd c9 d1 a4 ae 81 2e c9 ba b1 e8 80 d0 1c c9 39 c1 56 76 59 6c 9c 7d e3 a9 f0 d3 d1 34 d8 3c 49 59 8b 1a 98 ce bf c6 f2 d8 30 35 ff e9 6f 5d a0 af 3a ee 66 53 ae aa 8c 69 c8 be 9a a7 a0 7b d8 82 4b 33 13 c8 07 f3 77 d7 f3 64 cd 9e 63 f9 42 27 53 ae 10 33 89 72 37 15 f1 be f7 1e 35 a2 ce c3 2d f2 d7 b2 e6 0b c7 69 c0 e5 1f 5f 7c 69 9b 7e ce 26 1a 33 44 c3 ba 77 05 3b ba 5d 3f 41 89 fa 16 3b ee 04 6e 5b ac 56 4b ef 8c 70 f2 4a 7b 57 bd 19 6e 8b 36 07 54 26 2d 86 09 94 1f 5f 37 ab f0 23 3f 8f 2c 5f 96 9e 47 71 a8 44 de a9 b9 85 2f b5 34 60 a5 5f 09 a0 9a 43 1d d4 bf 2d 44 d6 8d da fd 75 cb 5f 16 a0 0e 61 c2 70 3d 36 0d 00 00 05 02 01 02 00 00 0e 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=1281) - Flags 0x00 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=81): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=2662): [REMOVED] | |
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=1 buf='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3' | |
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=NL/ST=Noord-Holland/L=Amsterdam/O=TERENA/CN=TERENA SSL CA 3' hash=beb8efe9b1a73c841b375a90e5fff8048848e3a2af66f6c4dd7b938d6fe8c5d8 | |
EAP: Status notification: remote certificate verification (param=success) | |
TLS: tls_verify_cb - preverify_ok=1 err=20 (unable to get local issuer certificate) ca_cert_verify=0 depth=0 buf='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt' | |
wlp2s0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PT/ST=Set\xC3\xBAbal/L=Set\xC3\xBAbal/O=Instituto Polit\xC3\xA9cnico de Set\xC3\xBAbal/OU=ESTSetubal/CN=iate.estsetubal.ips.pt' hash=008f3e0e114b64f46f3c85df438f5dcc6ff8a4cdc0f7ebdeed15382084260631 | |
wlp2s0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:iate.estsetubal.ips.pt | |
EAP: Status notification: remote certificate verification (param=success) | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=9): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=4): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=7): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=262): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=20 | |
OpenSSL: Message - hexdump(len=1): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: TX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=16): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in unknown state | |
SSL: (where=0x1002 ret=0xffffffff) | |
SSL: SSL_connect:error in unknown state | |
SSL: SSL_connect - want more data | |
SSL: 322 bytes pending from ssl_out | |
SSL: 322 bytes left to be sent out (of total 322 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x210ff90 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=336): 01 00 01 4c 02 04 01 4c 19 80 00 00 01 42 16 03 01 00 07 0b 00 00 03 00 00 00 16 03 01 01 06 10 00 01 02 01 00 7e ac a0 c7 28 b0 2d b0 e2 5e fd 3b 1e af f6 bd 8f 01 02 a0 b0 2e ec b3 c2 19 1f 3f 2c ea 51 33 c0 bb 9c 48 da 0f 70 90 a6 95 1b 67 6b 9c d7 50 b2 70 8a 1b e0 5a 9c 58 ce 39 d1 51 71 7c 58 4c bd e5 28 97 55 30 d5 e2 3a 21 da b2 86 51 fd b3 20 57 4e 59 85 5f 53 b8 27 ef bb de b3 a9 7a a5 f5 85 96 c2 cb 2e 5b 2e 19 5e 4f d8 66 d1 5e 0f 51 65 d0 a4 54 69 67 2f c0 32 40 b0 7c 94 12 1e 48 2e fa 71 9f 48 3d e3 34 d2 61 c2 68 17 f5 76 b0 15 54 08 2a 14 f8 88 80 de 1a 23 e8 e1 41 34 43 a6 0b 7d 83 ff a4 81 61 9a 58 91 48 56 b0 db af 48 aa e3 67 f2 77 c9 fd 77 a6 b9 f1 45 56 10 ce 94 64 81 3d e1 e6 d4 37 30 60 be ed c7 a8 66 df 54 e5 e9 56 f5 81 ff d2 75 11 a4 7e b9 c1 a3 a8 f0 2b a4 70 ee 74 5a 0f c2 3b 64 81 72 dd 52 05 a9 e4 2c 5f 39 ee c9 d1 86 a7 41 44 4d 21 56 14 03 01 00 01 01 16 03 01 00 20 cc 84 de 0d f3 59 5d cc 83 ec 68 77 1a 16 51 52 3a 6e 13 75 c8 03 7f ef 6a 74 ac 67 80 c0 b5 7e | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=57 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=57): 01 00 00 35 01 05 00 35 19 80 00 00 00 2b 14 03 01 00 01 01 16 03 01 00 20 f0 c5 3d 0e d3 60 4e 29 94 76 1d e2 28 c5 59 cc dd 1b ec 19 e2 ca 09 f9 a1 4c 46 2e b6 97 4b 7a | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=53) - Flags 0x80 | |
SSL: TLS Message Length: 43 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=20 | |
OpenSSL: Message - hexdump(len=1): [REMOVED] | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
OpenSSL: RX ver=0x301 content_type=22 | |
OpenSSL: Message - hexdump(len=16): [REMOVED] | |
SSL: (where=0x1001 ret=0x1) | |
SSL: SSL_connect:unknown state | |
SSL: (where=0x20 ret=0x1) | |
SSL: (where=0x1002 ret=0x1) | |
SSL: 0 bytes pending from ssl_out | |
OpenSSL: Handshake finished - resumed=0 | |
SSL: No Application Data included | |
SSL: No data to be sent out | |
EAP-PEAP: TLS done, proceed to Phase 2 | |
EAP-PEAP: using label 'client EAP encryption' in key derivation | |
OpenSSL: Using internal PRF | |
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] | |
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de | |
SSL: Building ACK (type=25 id=5 ver=0) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x20fefc0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 1c 01 06 00 1c 19 00 17 03 01 00 11 df 8c 52 72 7a 86 db e6 b6 b4 6e 35 db 8a 75 97 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=28) - Flags 0x00 | |
EAP-PEAP: received 22 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01 | |
EAP-PEAP: received Phase 2: code=1 identifier=6 length=5 | |
EAP-PEAP: Phase 2 Request: type=1 | |
EAP: using real identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=32): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 49 bytes left to be sent out (of total 49 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2120ed0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=59): 01 00 00 37 02 06 00 37 19 00 17 03 01 00 2c 16 d1 f8 d9 9e e7 78 4d 44 b9 0b 8e 6b 56 1f f9 de 60 66 df 86 15 1f 70 ff a6 fb 93 1c 54 f5 99 e4 69 03 bc bf 59 64 15 c8 06 5a da | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=57 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=57): 01 00 00 35 01 07 00 35 19 00 17 03 01 00 2a 11 c9 4f 18 43 08 18 87 16 3e 7b 23 01 c9 89 19 dc 9c ac 8e 83 e9 1a 54 31 7c 58 45 c9 bd 37 79 22 0a 94 21 b4 80 f2 7a c2 14 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=53) - Flags 0x00 | |
EAP-PEAP: received 47 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=26): 1a 01 07 00 19 10 cc 1c 5a bc 55 b3 5d 1a 59 dc 13 02 e5 f6 1c 88 49 41 54 45 | |
EAP-PEAP: received Phase 2: code=1 identifier=7 length=30 | |
EAP-PEAP: Phase 2 Request: type=26 | |
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 | |
EAP-MSCHAPV2: RX identifier 7 mschapv2_id 7 | |
EAP-MSCHAPV2: Received challenge | |
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=4): | |
49 41 54 45 IATE | |
EAP-MSCHAPV2: Generating Challenge Response | |
MSCHAPV2: Identity - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
MSCHAPV2: Username - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
MSCHAPV2: auth_challenge - hexdump(len=16): cc 1c 5a bc 55 b3 5d 1a 59 dc 13 02 e5 f6 1c 88 | |
MSCHAPV2: peer_challenge - hexdump(len=16): 5e a2 b7 de 92 be d6 1f af 12 e9 27 fa 26 65 f3 | |
MSCHAPV2: username - hexdump_ascii(len=27): | |
[CENSORED IDENTITY] | |
MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] | |
MSCHAPV2: NT Response - hexdump(len=24): 94 1b b1 cc a0 b8 66 24 c5 c8 32 17 37 6d 59 98 14 5e 67 0d bd 1e d7 40 | |
MSCHAPV2: Auth Response - hexdump(len=20): 67 a4 87 50 ab 40 ad 39 0d df ec 91 76 c6 96 4a 84 19 6d 63 | |
MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] | |
EAP-MSCHAPV2: TX identifier 7 mschapv2_id 7 (response) | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=86): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 103 bytes left to be sent out (of total 103 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x210fcd0 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=113): 01 00 00 6d 02 07 00 6d 19 00 17 03 01 00 62 42 df 7a 44 99 8c 81 0d 41 4d 18 6b a2 76 1e cc 00 17 cd eb 25 d2 bd 58 53 06 8c 14 bc a2 cd 05 f4 cb 7d 28 97 52 08 11 79 c9 29 cf 66 ff c8 f5 2f cc 1d aa 4e e6 19 41 f5 1d 67 17 d5 c5 44 fe 34 b0 a2 55 df 9d 94 c7 0f b3 bb 4c 97 2b b3 c5 5a c6 6d d5 a1 76 db f2 5c db ff 33 28 f6 5c 06 90 65 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=78 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=78): 01 00 00 4a 01 08 00 4a 19 00 17 03 01 00 3f 3d ac dd de eb 62 51 02 d9 a7 a2 5e 39 52 54 61 fa da e6 64 a8 47 02 b0 7d 7e 70 d4 96 f8 52 c8 ad f8 ca 88 91 0d 97 3e 3f d3 49 7a bf 38 ee b8 32 db c6 75 69 92 0c d5 8f 16 72 7c 12 f9 e4 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=74) - Flags 0x00 | |
EAP-PEAP: received 68 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 07 00 2e 53 3d 36 37 41 34 38 37 35 30 41 42 34 30 41 44 33 39 30 44 44 46 45 43 39 31 37 36 43 36 39 36 34 41 38 34 31 39 36 44 36 33 | |
EAP-PEAP: received Phase 2: code=1 identifier=8 length=51 | |
EAP-PEAP: Phase 2 Request: type=26 | |
EAP-MSCHAPV2: RX identifier 8 mschapv2_id 7 | |
EAP-MSCHAPV2: Received success | |
EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): | |
EAP-MSCHAPV2: Authentication succeeded | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 23 bytes left to be sent out (of total 23 bytes) | |
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x2121ed0 | |
EAP: Session-Id - hexdump(len=65): 19 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=33): 01 00 00 1d 02 08 00 1d 19 00 17 03 01 00 12 ec 78 5d 22 27 e0 c7 35 09 d3 18 f9 31 78 35 6e 37 d3 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 26 01 09 00 26 19 00 17 03 01 00 1b 14 2d 55 5a aa 25 f9 9b 83 14 b5 4b 34 be e2 99 54 1f 3f 46 06 8c 4c ea ff ea af 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 | |
EAP: EAP entering state METHOD | |
SSL: Received packet(len=38) - Flags 0x00 | |
EAP-PEAP: received 32 bytes encrypted data for Phase 2 | |
OpenSSL: RX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 09 00 0b 21 80 03 00 02 00 01 | |
EAP-PEAP: received Phase 2: code=1 identifier=9 length=11 | |
EAP-PEAP: Phase 2 Request: type=33 | |
EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 | |
EAP-TLV: Result TLV - hexdump(len=2): 00 01 | |
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed | |
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 | |
OpenSSL: Message - hexdump(len=5): [REMOVED] | |
SSL: 32 bytes left to be sent out (of total 32 bytes) | |
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x21221b0 | |
EAP: Session-Id - hexdump(len=65): 19 56 22 20 3f 53 2f 81 a3 a8 7e e5 cc c3 2e 91 66 fb c7 1a 40 f6 a8 6f c2 0a e9 9c 5d ea 6f 2a a2 57 35 ef 46 84 d0 37 7e 09 9d 79 16 d9 78 2d 63 ec 46 7a d6 b1 c0 08 e5 61 84 77 66 00 dc f3 de | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=00:11:88:d2:6f:e0 | |
TX EAPOL - hexdump(len=42): 01 00 00 26 02 09 00 26 19 00 17 03 01 00 1b e1 02 4e 01 8c a8 33 09 8c 60 90 cf 3b 7c d5 95 f4 f9 e6 8c 3c 9d 0d 2f 40 cb 8b | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=50 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=50): 01 00 00 04 03 09 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Success | |
EAP: Status notification: completion (param=success) | |
EAP: EAP entering state SUCCESS | |
wlp2s0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=121 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=117 | |
WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8 | |
wlp2s0: EAPOL-Key type=2 | |
wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) | |
wlp2s0: key_length=16 key_data_length=22 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=1): completed iteration | |
wlp2s0: freq[0]: 2437, flags=0x1 | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
wlp2s0: WPA: RX message 1 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2) | |
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8 | |
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8 | |
RSN: PMKID from Authenticator - hexdump(len=16): 86 aa 45 eb 52 26 6c 24 72 9c 93 83 ce 92 cd f8 | |
wlp2s0: RSN: no matching PMKID found | |
EAPOL: Successfully fetched key (len=32) | |
WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] | |
RSN: Added PMKSA cache entry for 00:11:88:d2:6f:e0 network_ctx=0x20e2a80 | |
nl80211: Add PMKID for 00:11:88:d2:6f:e0 | |
wlp2s0: RSN: the new PMK matches with the PMKID | |
WPA: Renewed SNonce - hexdump(len=32): 49 98 dd ea b4 34 c0 5b a1 a7 ea a7 7a f8 74 73 b7 4f c6 3d 34 f9 a4 db a3 72 d1 e4 c1 bc 67 b0 | |
WPA: PTK derivation - A1=dc:53:60:30:bf:c9 A2=00:11:88:d2:6f:e0 | |
WPA: Nonce1 - hexdump(len=32): 49 98 dd ea b4 34 c0 5b a1 a7 ea a7 7a f8 74 73 b7 4f c6 3d 34 f9 a4 db a3 72 d1 e4 c1 bc 67 b0 | |
WPA: Nonce2 - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf | |
WPA: PMK - hexdump(len=32): [REMOVED] | |
WPA: PTK - hexdump(len=48): [REMOVED] | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: KEK - hexdump(len=16): [REMOVED] | |
WPA: TK - hexdump(len=16): [REMOVED] | |
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
wlp2s0: WPA: Sending EAPOL-Key 2/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 9c f6 fb ae 19 5c a9 4a fa f5 ca ae 0e 44 81 dc | |
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 49 98 dd ea b4 34 c0 5b a1 a7 ea a7 7a f8 74 73 b7 4f c6 3d 34 f9 a4 db a3 72 d1 e4 c1 bc 67 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c f6 fb ae 19 5c a9 4a fa f5 ca ae 0e 44 81 dc 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
l2_packet_receive: src=00:11:88:d2:6f:e0 len=155 | |
wlp2s0: RX EAPOL from 00:11:88:d2:6f:e0 | |
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 30 35 00 00 00 00 00 00 00 00 00 00 00 00 00 ce aa 7d dd 55 1f bf b0 3d 9e 3b fa ff 2b 3c 44 00 38 4b 8d 93 87 2f bb 56 dc e9 be 8d 4a 0d b1 78 c9 f6 99 86 43 0a 98 22 2a f3 e8 16 34 ed 20 2d d5 fd f3 d5 cb a6 63 7e 53 96 9a 7b b7 81 b7 07 3f c0 17 f5 b6 c6 6b 45 09 | |
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines | |
wlp2s0: IEEE 802.1X RX: version=1 type=3 length=151 | |
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 30 35 00 00 00 00 00 00 00 00 00 00 00 00 00 ce aa 7d dd 55 1f bf b0 3d 9e 3b fa ff 2b 3c 44 00 38 4b 8d 93 87 2f bb 56 dc e9 be 8d 4a 0d b1 78 c9 f6 99 86 43 0a 98 22 2a f3 e8 16 34 ed 20 2d d5 fd f3 d5 cb a6 63 7e 53 96 9a 7b b7 81 b7 07 3f c0 17 f5 b6 c6 6b 45 09 | |
wlp2s0: EAPOL-Key type=2 | |
wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) | |
wlp2s0: key_length=16 key_data_length=56 | |
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 | |
key_nonce - hexdump(len=32): a3 b7 e7 9c 5e d9 10 9e 6a 72 7e cc c4 12 bb 46 fd bf 1e 78 68 22 d5 df 85 0b 73 4b b4 53 c0 cf | |
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | |
key_rsc - hexdump(len=8): 19 30 35 00 00 00 00 00 | |
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 | |
key_mic - hexdump(len=16): ce aa 7d dd 55 1f bf b0 3d 9e 3b fa ff 2b 3c 44 | |
RSN: encrypted key data - hexdump(len=56): 4b 8d 93 87 2f bb 56 dc e9 be 8d 4a 0d b1 78 c9 f6 99 86 43 0a 98 22 2a f3 e8 16 34 ed 20 2d d5 fd f3 d5 cb a6 63 7e 53 96 9a 7b b7 81 b7 07 3f c0 17 f5 b6 c6 6b 45 09 | |
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] | |
wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE | |
wlp2s0: WPA: RX message 3 of 4-Way Handshake from 00:11:88:d2:6f:e0 (ver=2) | |
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 dd 16 00 0f ac 01 01 00 8e b9 a2 09 62 30 11 c7 c5 0f 45 a8 8d fd b7 0a dd 00 | |
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 | |
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] | |
wlp2s0: WPA: Sending EAPOL-Key 4/4 | |
WPA: KCK - hexdump(len=16): [REMOVED] | |
WPA: Derived Key MIC - hexdump(len=16): 07 4d 13 95 74 76 30 5b e2 8b cb 88 59 62 66 4c | |
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 4d 13 95 74 76 30 5b e2 8b cb 88 59 62 66 4c 00 00 | |
wlp2s0: WPA: Installing PTK to the driver | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x20e1fe0 key_idx=0 set_tx=1 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 | |
addr=00:11:88:d2:6f:e0 | |
EAPOL: External notification - portValid=1 | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for 00:11:88:d2:6f:e0 | |
EAPOL authentication completed - result=SUCCESS | |
wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=1): completed iteration | |
wlp2s0: freq[0]: 2437, flags=0x1 | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] | |
WPA: Group Key - hexdump(len=16): [REMOVED] | |
wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) | |
WPA: RSC - hexdump(len=6): 19 30 35 00 00 00 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x526966 key_idx=1 set_tx=0 seq_len=6 key_len=16 | |
nl80211: KEY_DATA - hexdump(len=16): [REMOVED] | |
nl80211: KEY_SEQ - hexdump(len=6): 19 30 35 00 00 00 | |
broadcast key | |
wlp2s0: WPA: Key negotiation completed with 00:11:88:d2:6f:e0 [PTK=CCMP GTK=CCMP] | |
wlp2s0: Cancelling authentication timeout | |
wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED | |
wlp2s0: Radio work 'sme-connect'@0x2106130 done in 0.192403 seconds | |
wlp2s0: CTRL-EVENT-CONNECTED - Connection to 00:11:88:d2:6f:e0 completed [id=0 id_str=] | |
nl80211: Set wlp2s0 operstate 0->1 (UP) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) | |
wlp2s0: Determining shared radio frequencies (max len 2) | |
wlp2s0: Shared frequencies (len=1): completed iteration | |
wlp2s0: freq[0]: 2437, flags=0x1 | |
P2P: Add operating class 81 | |
P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d | |
P2P: Update channel list | |
P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 | |
P2P: cli_channels: | |
EAPOL: External notification - portValid=1 | |
nl80211: Set rekey offload | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) | |
RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) | |
EAPOL: startWhen --> 0 | |
p2p-dev-wlp2s0: Removing interface p2p-dev-wlp2s0 | |
p2p-dev-wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED | |
TDLS: Tear down peers | |
p2p-dev-wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set p2p-dev-wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
p2p-dev-wlp2s0: WPA: Clear old PMK and PTK | |
p2p-dev-wlp2s0: Cancelling delayed sched scan | |
p2p-dev-wlp2s0: Cancelling scan request | |
p2p-dev-wlp2s0: Cancelling authentication timeout | |
p2p-dev-wlp2s0: P2P: Disable P2P since removing the management interface is being removed | |
P2P: All ASP advertisements flushed | |
P2P: Stopping find | |
P2P: Clear timeout (state=IDLE) | |
P2P: State IDLE -> IDLE | |
P2P: All ASP advertisements flushed | |
Remove interface p2p-dev-wlp2s0 from radio phy0 | |
nl80211: deinit ifname=p2p-dev-wlp2s0 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=0 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Stop P2P Device p2p-dev-wlp2s0 (0x7): Success | |
nl80211: Unsubscribe mgmt frames handle 0x888888888a86baa9 (deinit) | |
nl80211: Delete P2P Device p2p-dev-wlp2s0 (0x7): Success | |
p2p-dev-wlp2s0: CTRL-EVENT-TERMINATING | |
Control interface directory not empty - leaving it behind | |
wlp2s0: Removing interface wlp2s0 | |
wlp2s0: Request to deauthenticate - bssid=00:11:88:d2:6f:e0 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED | |
TDLS: Tear down peers | |
wpa_driver_nl80211_deauthenticate(addr=00:11:88:d2:6f:e0 reason_code=3) | |
wlp2s0: Event DEAUTH (12) received | |
wlp2s0: Deauthentication notification | |
wlp2s0: * reason 3 (locally generated) | |
Deauthentication frame IE(s) - hexdump(len=0): [NULL] | |
wlp2s0: CTRL-EVENT-DISCONNECTED bssid=00:11:88:d2:6f:e0 reason=3 locally_generated=1 | |
wlp2s0: Auto connect disabled: do not try to re-connect | |
wlp2s0: Ignore connection failure indication since interface has been put into disconnected state | |
TDLS: Remove peers on disassociation | |
wlp2s0: WPA: Clear old PMK and PTK | |
wlp2s0: Disconnect event - remove keys | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 | |
wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x20e0a90 key_idx=0 set_tx=0 seq_len=0 key_len=0 | |
addr=00:11:88:d2:6f:e0 | |
wlp2s0: State: COMPLETED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 1->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
WMM AC: WMM AC is disabled | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: SUPP_PAE entering state DISCONNECTED | |
EAPOL: Supplicant port status: Unauthorized | |
nl80211: Skip set_supp_port(unauthorized) while not associated | |
EAPOL: SUPP_BE entering state INITIALIZE | |
EAP: EAP entering state DISABLED | |
EAPOL: External notification - portValid=0 | |
wlp2s0: State: DISCONNECTED -> DISCONNECTED | |
nl80211: Set wlp2s0 operstate 0->0 (DORMANT) | |
netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) | |
EAPOL: External notification - portEnabled=0 | |
EAPOL: External notification - portValid=0 | |
RSN: Flush PMKSA cache entry for 00:11:88:d2:6f:e0 | |
nl80211: Delete PMKID for 00:11:88:d2:6f:e0 | |
wlp2s0: RSN: PMKSA cache entry free_cb: 00:11:88:d2:6f:e0 reason=0 | |
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit | |
ENGINE: engine deinit | |
wlp2s0: WPA: Clear old PMK and PTK | |
wlp2s0: BSS: Remove id 0 BSSID 00:11:88:d2:6f:e0 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 1 BSSID 00:11:88:d2:6f:e1 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 2 BSSID 00:11:88:d2:71:40 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 3 BSSID 00:11:88:d2:70:d0 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 4 BSSID 00:11:88:d2:6f:40 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 5 BSSID 82:b9:a5:f8:06:6d SSID 'Cogumelo' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 6 BSSID 00:11:88:d2:71:41 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 7 BSSID 00:11:88:d2:6f:41 SSID 'eduroam' due to wpa_bss_flush | |
wlp2s0: BSS: Remove id 8 BSSID f2:79:59:b1:c3:ce SSID 'DIRECT-' due to wpa_bss_flush | |
wlp2s0: Cancelling delayed sched scan | |
wlp2s0: Cancelling scan request | |
wlp2s0: Cancelling authentication timeout | |
Remove interface wlp2s0 from radio phy0 | |
Remove radio phy0 | |
nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0 | |
nl80211: Remove monitor interface: refcount=0 | |
netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) | |
nl80211: Set mode ifindex 3 iftype 2 (STATION) | |
nl80211: Unsubscribe mgmt frames handle 0x888888888a86add9 (mode change) | |
wlp2s0: CTRL-EVENT-TERMINATING |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment