wpa supplicant doesn't work on feisty with Ralink Devices
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wpasupplicant (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: wpasupplicant
I'm unable to connect to my WPA-PSK Wireless Network:
I've a Linksys WUsb54g; The Device works fine with WEP and OPEN networks, but it doesn't works on WPA both with rt2570 (legacy driver) and rt2500usb (experimental driver) included in the ubuntu kernel.
I've tested the last ubuntu wpasupplicant package (wpasupplicant-
This is my logs:
root@arpstorm:
root@arpstorm:
root@arpstorm:
lo Interface doesn't support scanning.
eth0 Interface doesn't support scanning.
wmaster0 Interface doesn't support scanning : Operation not supported
wlan0 Scan completed :
Cell 01 - Address: 00:18:F8:BD:7C:D6
root@arpstorm:
# WPA-PSK/TKIP
ctrl_interface=
network={
proto=WPA
group=TKIP
scan_ssid=0
}
root@arpstorm:
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz)
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - ioctl[SIOCSIWMODE]: Device or resource busy
Association request to the driver failed
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
CTRL-EVENT-
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
CTRL-EVENT-
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
CTRL-EVENT-
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
*******
root@arpstorm:
Initializing interface 'wlan0' conf '/etc/wpa_
Configuration file '/etc/wpa_
Reading configuration file '/etc/wpa_
ctrl_interface=
Line: 5 - start of a new network block
ssid -root@arpstorm:
Initializing interface 'wlan0' conf '/etc/wpa_
Configuration file '/etc/wpa_
Reading configuration file '/etc/wpa_
ctrl_interface=
Line: 5 - start of a new network block
ssid - hexdump_
48 45 41 56 45 4e 2d 47 41 54 45 HEAVEN-GATE
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_
scan_ssid=0 (0x0)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='HEAVEN-GATE'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0
capabilities: key_mgmt 0x0 enc 0x3
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:17:81:84:41
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - wpa_driver_
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 10
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING]
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING]
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Scan results: -1
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 170 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_
ioctl[SIOCSIWMODE]: Device or resource busy
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b1a len=19
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: ASSOCIATING -> ASSOCIATED
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 63 7b 69 3b da d1 9c 34 30 44 7e 69 08 c2 a0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=26
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 60 2c 0f 11 44 b4 17 1e 5e ac 24 31 81 9c 48 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af e0 ea 01 fd 0c 3a 80 f3 db 60 54 e6 9a 6c 07 00 00
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING]
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 32 86 c7 55 13 4a 06 9e bd 22 c6 53 ce 95 8a e6 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea c6 da 8d 1f 7d 3a af b3 63 5a 1b ca e3 c5 34 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: startWhen --> 0
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a a7 5a fc 15 0b 9f d9 59 f8 73 60 7a 9b 2c 2e 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING]
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:18:f8:bd:7c:d6 into blacklist
CTRL-EVENT-
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
State: COMPLETED -> DISCONNECTED
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: SCANNING -> ASSOCIATED
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 170 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Already associated with the selected AP.
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 8d e9 0c 55 8a d0 3d be 94 9e 40 49 ea d6 89 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=26
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d8 9c 9f 4d fe 13 e3 78 f6 8b 25 9b 16 dd 8b 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 c1 90 b9 c6 00 f5 fe f3 42 18 05 c5 96 05 c2 00 00
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 00:18:f8:bd:7c:d6 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING]
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 b1 b3 28 90 c8 01 d4 a1 0b 8e c9 51 b2 bc d2 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: startWhen --> 0
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de e9 3c 6f 65 b0 e7 1b 1e 62 8f 90 23 58 4b d4 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 f2 29 c3 fe 8e cf aa 29 2e 76 d1 13 bf 51 3c 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING]
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:18:f8:bd:7c:d6 into blacklist
CTRL-EVENT-
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
State: COMPLETED -> DISCONNECTED
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: SCANNING -> ASSOCIATED
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
CTRL-EVENT-
Removing interface wlan0
State: ASSOCIATED -> DISCONNECTED
hexdump_
48 45 41 56 45 4e 2d 47 41 54 45 HEAVEN-GATE
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_
scan_ssid=0 (0x0)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='HEAVEN-GATE'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0
capabilities: key_mgmt 0x0 enc 0x3
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:17:81:84:41
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
wpa_driver_
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - wpa_driver_
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 10
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING]
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING]
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Scan results: -1
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 170 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
selected based on WPA IE
Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_
ioctl[SIOCSIWMODE]: Device or resource busy
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b1a len=19
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: ASSOCIATING -> ASSOCIATED
wpa_driver_
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portE