FreeBSD Bugzilla – Attachment 147058 Details for
Bug 193458
can not connect reliable to Wifi AP with WPA-PSK / WPA-EAP
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
wpa debug log (2)
log2.txt (text/plain), 36.00 KB, created by
Matthias Apitz
on 2014-09-08 11:07:19 UTC
(
hide
)
Description:
wpa debug log (2)
Filename:
MIME Type:
Creator:
Matthias Apitz
Created:
2014-09-08 11:07:19 UTC
Size:
36.00 KB
patch
obsolete
>wpa_supplicant v2.0 >Successfully initialized wpa_supplicant >Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' >Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' >Reading configuration file '/etc/wpa_supplicant.conf' >ctrl_interface='/var/run/wpa_supplicant' >ctrl_interface_group='wheel' >eapol_version=1 >ap_scan=1 >fast_reauth=1 >Line: 21 - start of a new network block >ssid - hexdump_ascii(len=20): > 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese > 72 68 6f 66 rhof >scan_ssid=1 (0x1) >key_mgmt: 0x2 >PSK (ASCII passphrase) - hexdump_ascii(len=15): [REMOVED] >PSK (from passphrase) - hexdump(len=32): [REMOVED] >Priority group 0 > id=0 ssid='Naturhotel Wieserhof' >wpa_driver_bsd_capa: drivercaps=0x2181c001,cryptocaps=0x00000000 >wlan0: Own MAC address: 80:1f:02:ee:16:37 >bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=0 >bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=1 >bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=2 >bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=3 >wpa_driver_bsd_set_countermeasures: enabled=0 >wlan0: RSN: flushing PMKID list in the driver >wlan0: Setting scan request: 0 sec 100000 usec >WPS: Set UUID for interface wlan0 >WPS: UUID based on MAC address - hexdump(len=16): ba 96 5b 02 76 4e 51 2e b4 d1 5a 2c c1 f5 0b 09 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: Supplicant port status: Unauthorized >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >Using existing control interface directory. >ctrl_interface_group=0 (from group name 'wheel') >wlan0: Added interface wlan0 >wlan0: State: DISCONNECTED -> DISCONNECTED >wlan0: State: DISCONNECTED -> SCANNING >Scan SSID - hexdump_ascii(len=20): > 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese > 72 68 6f 66 rhof >wlan0: Starting AP scan for wildcard SSID >wpa_driver_bsd_set_wpa: enabled=1 >wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 >EAPOL: disable timer tick >EAPOL: Supplicant port status: Unauthorized >wlan0: Event SCAN_RESULTS (3) received >Received 284 bytes of scan results (1 BSSes) >wlan0: BSS: Start scan result update 1 >wlan0: BSS: Add new id 0 BSSID ec:43:f6:f8:25:e1 SSID 'Naturhotel Wieserhof' >BSS: last_scan_res_used=1/32 last_scan_full=0 >wlan0: New scan results available >wlan0: Selecting BSS from priority group 0 >wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 >wlan0: selected based on RSN IE >wlan0: selected BSS ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' >wlan0: Request association: reassociate: 0 selected: ec:43:f6:f8:25:e1 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >wlan0: Trying to associate with ec:43:f6:f8:25:e1 (SSID='Naturhotel Wieserhof' freq=2437 MHz) >FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): >wlan0: Cancelling scan request >wlan0: WPA: clearing own WPA/RSN IE >wlan0: Automatic auth_alg selection: 0x1 >RSN: PMKSA cache search - network_ctx=0x0 try_opportunistic=0 >RSN: Search for BSSID ec:43:f6:f8:25:e1 >RSN: No PMKSA cache entry found >wlan0: RSN: using IEEE 802.11i/D9.0 >wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 >WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 >WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 >wlan0: WPA: using GTK TKIP >wlan0: WPA: using PTK CCMP >wlan0: WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: No keys have been configured - skip key clearing >wlan0: State: SCANNING -> ASSOCIATING >Limit connection to BSSID ec:43:f6:f8:25:e1 freq=2437 MHz based on scan results (bssid_set=0) >wpa_driver_bsd_associate: ssid 'Naturhotel Wieserhof' wpa ie len 22 pairwise 3 group 2 key mgmt 1 >wpa_driver_bsd_set_drop_unencrypted: enabled=1 >bsd_set_opt_ie: set WPA+RSN ie (len 22) >wpa_driver_bsd_associate: set PRIVACY 1 >wlan0: Setting authentication timeout: 10 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - EAP fail=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portControl=Auto >EAPOL: Supplicant port status: Unauthorized >RSN: Ignored PMKID candidate without preauth flag >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >wlan0: Event ASSOC (0) received >wlan0: State: ASSOCIATING -> ASSOCIATED >wlan0: Associated to a new BSS: BSSID=ec:43:f6:f8:25:e1 >wlan0: No keys have been configured - skip key clearing >wlan0: Associated with ec:43:f6:f8:25:e1 >wlan0: WPA: Association event - clear replay counter >wlan0: WPA: Clear old PTK >EAPOL: External notification - portEnabled=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portValid=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - EAP success=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: SUPP_BE entering state IDLE >wlan0: Setting authentication timeout: 10 sec 0 usec >wlan0: Cancelling scan request >wlan0: Process pending EAPOL frame that was received just before association notification >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: Setting authentication timeout: 10 sec 0 usec >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >Get randomness: len=32 entropy=2 >WPA: Renewed SNonce - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): 3b 11 d5 a1 d2 07 26 b6 2b 18 1d eb ba fc b5 ed >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 11 d5 a1 d2 07 26 b6 2b 18 1d eb ba fc b5 ed 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >EAPOL: startWhen --> 0 >EAPOL: disable timer tick >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): 66 c1 cb e9 4b e0 ee 72 09 0d b9 b6 86 ba aa 33 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 c1 cb e9 4b e0 ee 72 09 0d b9 b6 86 ba aa 33 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): 13 13 55 27 e9 1a de 83 86 b4 52 99 05 1f 18 81 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 13 55 27 e9 1a de 83 86 b4 52 99 05 1f 18 81 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): 9a c6 59 fc a7 32 08 c9 2e 90 bd f5 ae e1 4e 75 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a c6 59 fc a7 32 08 c9 2e 90 bd f5 ae e1 4e 75 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: Event DISASSOC (1) received >wlan0: Disassociation notification >wlan0: CTRL-EVENT-DISCONNECTED bssid=ec:43:f6:f8:25:e1 reason=0 >wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect >wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Naturhotel Wieserhof" auth_failures=1 duration=10 >wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=7) >wlan0: Setting scan request: 0 sec 100000 usec >Added BSSID ec:43:f6:f8:25:e1 into blacklist >wlan0: Blacklist count 1 --> request scan in 100 ms >wlan0: Not rescheduling scan to ensure that specific SSID scans occur >wlan0: Disconnect event - remove keys >bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=0 >bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=1 >bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=2 >bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=3 >bsd_set_key: alg=0 addr=0x28c0a3a0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: addr=ec:43:f6:f8:25:e1 >wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: Supplicant port status: Unauthorized >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portValid=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - EAP success=0 >EAPOL: Supplicant port status: Unauthorized >wlan0: State: DISCONNECTED -> SCANNING >Scan SSID - hexdump_ascii(len=20): > 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese > 72 68 6f 66 rhof >wlan0: Starting AP scan for wildcard SSID >wpa_driver_bsd_set_wpa: enabled=1 >wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 >wlan0: Event SCAN_RESULTS (3) received >Received 284 bytes of scan results (1 BSSes) >wlan0: BSS: Start scan result update 2 >BSS: last_scan_res_used=1/32 last_scan_full=0 >wlan0: New scan results available >wlan0: Selecting BSS from priority group 0 >wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 >wlan0: skip - blacklisted (count=1 limit=0) >wlan0: No APs found - clear blacklist and try again >Removed BSSID ec:43:f6:f8:25:e1 from blacklist (clear) >wlan0: Selecting BSS from priority group 0 >wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 >wlan0: skip - disabled temporarily for 9 second(s) >wlan0: No suitable network found >wlan0: Setting scan request: 5 sec 0 usec >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >Scan SSID - hexdump_ascii(len=20): > 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese > 72 68 6f 66 rhof >wlan0: Starting AP scan for wildcard SSID >wpa_driver_bsd_set_wpa: enabled=1 >wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 >wlan0: Event SCAN_RESULTS (3) received >Received 284 bytes of scan results (1 BSSes) >wlan0: BSS: Start scan result update 3 >BSS: last_scan_res_used=1/32 last_scan_full=0 >wlan0: New scan results available >wlan0: Selecting BSS from priority group 0 >wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 >wlan0: skip - disabled temporarily for 4 second(s) >wlan0: No suitable network found >wlan0: Setting scan request: 5 sec 0 usec >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >EAPOL: Supplicant port status: Unauthorized >Scan SSID - hexdump_ascii(len=20): > 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese > 72 68 6f 66 rhof >wlan0: Starting AP scan for wildcard SSID >wpa_driver_bsd_set_wpa: enabled=1 >wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 >wlan0: Event SCAN_RESULTS (3) received >Received 284 bytes of scan results (1 BSSes) >wlan0: BSS: Start scan result update 4 >BSS: last_scan_res_used=1/32 last_scan_full=0 >wlan0: New scan results available >wlan0: Selecting BSS from priority group 0 >wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 >wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="Naturhotel Wieserhof" >wlan0: selected based on RSN IE >wlan0: selected BSS ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' >wlan0: Request association: reassociate: 0 selected: ec:43:f6:f8:25:e1 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >wlan0: Trying to associate with ec:43:f6:f8:25:e1 (SSID='Naturhotel Wieserhof' freq=2437 MHz) >FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): >wlan0: Cancelling scan request >wlan0: WPA: clearing own WPA/RSN IE >wlan0: Automatic auth_alg selection: 0x1 >RSN: PMKSA cache search - network_ctx=0x0 try_opportunistic=0 >RSN: Search for BSSID ec:43:f6:f8:25:e1 >RSN: No PMKSA cache entry found >wlan0: RSN: using IEEE 802.11i/D9.0 >wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 >WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 >WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 >wlan0: WPA: using GTK TKIP >wlan0: WPA: using PTK CCMP >wlan0: WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: No keys have been configured - skip key clearing >wlan0: State: SCANNING -> ASSOCIATING >Limit connection to BSSID ec:43:f6:f8:25:e1 freq=2437 MHz based on scan results (bssid_set=0) >wpa_driver_bsd_associate: ssid 'Naturhotel Wieserhof' wpa ie len 22 pairwise 3 group 2 key mgmt 1 >wpa_driver_bsd_set_drop_unencrypted: enabled=1 >bsd_set_opt_ie: set WPA+RSN ie (len 22) >wpa_driver_bsd_associate: set PRIVACY 1 >wlan0: Setting authentication timeout: 10 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - EAP fail=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portControl=Auto >EAPOL: Supplicant port status: Unauthorized >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >wlan0: Event ASSOC (0) received >wlan0: State: ASSOCIATING -> ASSOCIATED >wlan0: Associated to a new BSS: BSSID=ec:43:f6:f8:25:e1 >wlan0: No keys have been configured - skip key clearing >wlan0: Associated with ec:43:f6:f8:25:e1 >wlan0: WPA: Association event - clear replay counter >wlan0: WPA: Clear old PTK >EAPOL: External notification - portEnabled=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portValid=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - EAP success=0 >EAPOL: Supplicant port status: Unauthorized >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >wlan0: Setting authentication timeout: 10 sec 0 usec >wlan0: Cancelling scan request >wlan0: Process pending EAPOL frame that was received just before association notification >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: Setting authentication timeout: 10 sec 0 usec >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >Get randomness: len=32 entropy=4 >WPA: Renewed SNonce - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): d4 4f 0f 68 87 f5 11 be 98 84 71 d3 7a 3b 39 4a >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 4f 0f 68 87 f5 11 be 98 84 71 d3 7a 3b 39 4a 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >EAPOL: startWhen --> 0 >EAPOL: disable timer tick >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): 0e 41 ed ff ec 30 0b 54 9f eb bb 3b af 99 60 6d >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 41 ed ff ec 30 0b 54 9f eb bb 3b af 99 60 6d 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): d3 c3 8c b1 14 8c 43 26 e7 95 9a 50 29 ad ac 3c >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d3 c3 8c b1 14 8c 43 26 e7 95 9a 50 29 ad ac 3c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: RX EAPOL from ec:43:f6:f8:25:e1 >RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: IEEE 802.1X RX: version=2 type=3 length=95 >wlan0: EAPOL-Key type=2 >wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >wlan0: key_length=16 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) >RSN: msg 1/4 key data - hexdump(len=0): >WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 >WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e >WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=48): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 >wlan0: WPA: Sending EAPOL-Key 2/4 >WPA: KCK - hexdump(len=16): [REMOVED] >WPA: Derived Key MIC - hexdump(len=16): c5 b4 39 65 04 2f 41 c2 1f 47 7d c3 8c fb 21 09 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 b4 39 65 04 2f 41 c2 1f 47 7d c3 8c fb 21 09 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >wlan0: Event DISASSOC (1) received >wlan0: Disassociation notification >wlan0: CTRL-EVENT-DISCONNECTED bssid=ec:43:f6:f8:25:e1 reason=0 >wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect >wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Naturhotel Wieserhof" auth_failures=2 duration=20 >wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=7) >wlan0: Setting scan request: 0 sec 100000 usec >Added BSSID ec:43:f6:f8:25:e1 into blacklist >wlan0: Blacklist count 2 --> request scan in 500 ms >wlan0: Not rescheduling scan to ensure that specific SSID scans occur >wlan0: Disconnect event - remove keys >bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=0 >bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=1 >bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=2 >bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >bsd_del_key: key_idx=3 >bsd_set_key: alg=0 addr=0x28c0a3a0 key_idx=0 set_tx=0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 193458
:
147057
| 147058