wpa_supplicant v2.0 Successfully initialized wpa_supplicant Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel' eapol_version=1 ap_scan=1 fast_reauth=1 Line: 21 - start of a new network block ssid - hexdump_ascii(len=20): 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese 72 68 6f 66 rhof scan_ssid=1 (0x1) key_mgmt: 0x2 PSK (ASCII passphrase) - hexdump_ascii(len=15): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='Naturhotel Wieserhof' wpa_driver_bsd_capa: drivercaps=0x2181c001,cryptocaps=0x00000000 wlan0: Own MAC address: 80:1f:02:ee:16:37 bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 wpa_driver_bsd_set_countermeasures: enabled=0 wlan0: RSN: flushing PMKID list in the driver wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): ba 96 5b 02 76 4e 51 2e b4 d1 5a 2c c1 f5 0b 09 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Using existing control interface directory. ctrl_interface_group=0 (from group name 'wheel') wlan0: Added interface wlan0 wlan0: State: DISCONNECTED -> DISCONNECTED wlan0: State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=20): 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese 72 68 6f 66 rhof wlan0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized wlan0: Event SCAN_RESULTS (3) received Received 284 bytes of scan results (1 BSSes) wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID ec:43:f6:f8:25:e1 SSID 'Naturhotel Wieserhof' BSS: last_scan_res_used=1/32 last_scan_full=0 wlan0: New scan results available wlan0: Selecting BSS from priority group 0 wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 wlan0: selected based on RSN IE wlan0: selected BSS ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wlan0: Request association: reassociate: 0 selected: ec:43:f6:f8:25:e1 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with ec:43:f6:f8:25:e1 (SSID='Naturhotel Wieserhof' freq=2437 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x0 try_opportunistic=0 RSN: Search for BSSID ec:43:f6:f8:25:e1 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 wlan0: WPA: using GTK TKIP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING Limit connection to BSSID ec:43:f6:f8:25:e1 freq=2437 MHz based on scan results (bssid_set=0) wpa_driver_bsd_associate: ssid 'Naturhotel Wieserhof' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 wlan0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wlan0: Associated to a new BSS: BSSID=ec:43:f6:f8:25:e1 wlan0: No keys have been configured - skip key clearing wlan0: Associated with ec:43:f6:f8:25:e1 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: Process pending EAPOL frame that was received just before association notification wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): Get randomness: len=32 entropy=2 WPA: Renewed SNonce - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 3b 11 d5 a1 d2 07 26 b6 2b 18 1d eb ba fc b5 ed WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 11 d5 a1 d2 07 26 b6 2b 18 1d eb ba fc b5 ed 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 66 c1 cb e9 4b e0 ee 72 09 0d b9 b6 86 ba aa 33 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 c1 cb e9 4b e0 ee 72 09 0d b9 b6 86 ba aa 33 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 13 13 55 27 e9 1a de 83 86 b4 52 99 05 1f 18 81 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 13 55 27 e9 1a de 83 86 b4 52 99 05 1f 18 81 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 88 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 9a c6 59 fc a7 32 08 c9 2e 90 bd f5 ae e1 4e 75 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 ee 0d 5f d2 c5 a8 14 c2 40 3e 29 85 f7 8e 26 de ea 0d ac ab 4b 71 a2 b1 8f a2 7e f8 a9 de ff 7f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a c6 59 fc a7 32 08 c9 2e 90 bd f5 ae e1 4e 75 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: Event DISASSOC (1) received wlan0: Disassociation notification wlan0: CTRL-EVENT-DISCONNECTED bssid=ec:43:f6:f8:25:e1 reason=0 wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Naturhotel Wieserhof" auth_failures=1 duration=10 wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=7) wlan0: Setting scan request: 0 sec 100000 usec Added BSSID ec:43:f6:f8:25:e1 into blacklist wlan0: Blacklist count 1 --> request scan in 100 ms wlan0: Not rescheduling scan to ensure that specific SSID scans occur wlan0: Disconnect event - remove keys bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 bsd_set_key: alg=0 addr=0x28c0a3a0 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: addr=ec:43:f6:f8:25:e1 wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wlan0: State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=20): 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese 72 68 6f 66 rhof wlan0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 wlan0: Event SCAN_RESULTS (3) received Received 284 bytes of scan results (1 BSSes) wlan0: BSS: Start scan result update 2 BSS: last_scan_res_used=1/32 last_scan_full=0 wlan0: New scan results available wlan0: Selecting BSS from priority group 0 wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 wlan0: skip - blacklisted (count=1 limit=0) wlan0: No APs found - clear blacklist and try again Removed BSSID ec:43:f6:f8:25:e1 from blacklist (clear) wlan0: Selecting BSS from priority group 0 wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 wlan0: skip - disabled temporarily for 9 second(s) wlan0: No suitable network found wlan0: Setting scan request: 5 sec 0 usec EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Scan SSID - hexdump_ascii(len=20): 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese 72 68 6f 66 rhof wlan0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 wlan0: Event SCAN_RESULTS (3) received Received 284 bytes of scan results (1 BSSes) wlan0: BSS: Start scan result update 3 BSS: last_scan_res_used=1/32 last_scan_full=0 wlan0: New scan results available wlan0: Selecting BSS from priority group 0 wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 wlan0: skip - disabled temporarily for 4 second(s) wlan0: No suitable network found wlan0: Setting scan request: 5 sec 0 usec EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Scan SSID - hexdump_ascii(len=20): 4e 61 74 75 72 68 6f 74 65 6c 20 57 69 65 73 65 Naturhotel Wiese 72 68 6f 66 rhof wlan0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 wlan0: Event SCAN_RESULTS (3) received Received 284 bytes of scan results (1 BSSes) wlan0: BSS: Start scan result update 4 BSS: last_scan_res_used=1/32 last_scan_full=0 wlan0: New scan results available wlan0: Selecting BSS from priority group 0 wlan0: 0: ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wpa_ie_len=26 rsn_ie_len=24 caps=0x31 level=-69 wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="Naturhotel Wieserhof" wlan0: selected based on RSN IE wlan0: selected BSS ec:43:f6:f8:25:e1 ssid='Naturhotel Wieserhof' wlan0: Request association: reassociate: 0 selected: ec:43:f6:f8:25:e1 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with ec:43:f6:f8:25:e1 (SSID='Naturhotel Wieserhof' freq=2437 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x0 try_opportunistic=0 RSN: Search for BSSID ec:43:f6:f8:25:e1 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 wlan0: WPA: using GTK TKIP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING Limit connection to BSSID ec:43:f6:f8:25:e1 freq=2437 MHz based on scan results (bssid_set=0) wpa_driver_bsd_associate: ssid 'Naturhotel Wieserhof' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 wlan0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wlan0: Associated to a new BSS: BSSID=ec:43:f6:f8:25:e1 wlan0: No keys have been configured - skip key clearing wlan0: Associated with ec:43:f6:f8:25:e1 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: Process pending EAPOL frame that was received just before association notification wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): Get randomness: len=32 entropy=4 WPA: Renewed SNonce - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): d4 4f 0f 68 87 f5 11 be 98 84 71 d3 7a 3b 39 4a WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 4f 0f 68 87 f5 11 be 98 84 71 d3 7a 3b 39 4a 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 0e 41 ed ff ec 30 0b 54 9f eb bb 3b af 99 60 6d WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 41 ed ff ec 30 0b 54 9f eb bb 3b af 99 60 6d 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): d3 c3 8c b1 14 8c 43 26 e7 95 9a 50 29 ad ac 3c WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d3 c3 8c b1 14 8c 43 26 e7 95 9a 50 29 ad ac 3c 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: RX EAPOL from ec:43:f6:f8:25:e1 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: IEEE 802.1X RX: version=2 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from ec:43:f6:f8:25:e1 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: PTK derivation - A1=80:1f:02:ee:16:37 A2=ec:43:f6:f8:25:e1 WPA: Nonce1 - hexdump(len=32): ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e WPA: Nonce2 - hexdump(len=32): 48 c9 6e 7e 54 4a c6 50 4d 4d 51 6e bf c7 11 45 c1 eb 32 7b 9a 7b 95 ae 42 7c 0f cc 03 27 98 89 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c5 b4 39 65 04 2f 41 c2 1f 47 7d c3 8c fb 21 09 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 ea 52 32 ca 51 85 c2 af 2e 4b 58 df 3e 05 fd 23 1e 2f 46 f9 6c 9f 00 85 1f 83 18 c0 09 0d e4 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 b4 39 65 04 2f 41 c2 1f 47 7d c3 8c fb 21 09 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: Event DISASSOC (1) received wlan0: Disassociation notification wlan0: CTRL-EVENT-DISCONNECTED bssid=ec:43:f6:f8:25:e1 reason=0 wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Naturhotel Wieserhof" auth_failures=2 duration=20 wlan0: Auto connect enabled: try to reconnect (wps=0 wpa_state=7) wlan0: Setting scan request: 0 sec 100000 usec Added BSSID ec:43:f6:f8:25:e1 into blacklist wlan0: Blacklist count 2 --> request scan in 500 ms wlan0: Not rescheduling scan to ensure that specific SSID scans occur wlan0: Disconnect event - remove keys bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 bsd_set_key: alg=0 addr=0x28c0a3a0 key_idx=0 set_tx=0