root@epsik:~# wpa_supplicant -Dwext -ira0 -c /etc/wpa_supplicant/wpa_supplicant.conf CTRL-EVENT-SCAN-RESULTS CTRL-EVENT-SCAN-RESULTS Trying to associate with 00:0d:88:a6:c5:23 (SSID='1MKAP' freq=2462 MHz) Associated with 00:0d:88:a6:c5:23 Authentication with 00:0d:88:a6:c5:23 timed out. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-SCAN-RESULTS Associated with 00:0d:88:a6:c5:23 Authentication with 00:0d:88:a6:c5:23 timed out. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-SCAN-RESULTS Associated with 00:0d:88:a6:c5:23 Authentication with 00:0d:88:a6:c5:23 timed out. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8c07 len=45 AssocReq IE wireless event - hexdump(len=37): 00 05 31 4d 4b 41 50 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:0d:88:a6:c5:23 Association info event req_ies - hexdump(len=37): 00 05 31 4d 4b 41 50 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:0d:88:a6:c5:23 No keys have been configured - skip key clearing Associated with 00:0d:88:a6:c5:23 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) RX EAPOL from 00:0d:88:a6:c5:23 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 ec 50 43 28 50 36 b1 e2 38 11 d0 40 a0 b9 c4 1e 7b 73 55 05 0c 1d 0c e0 a9 ec f2 49 ab ff 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 33 ec 50 43 28 50 36 b1 e2 38 11 d0 40 a0 b9 c4 1e 7b 73 55 05 0c 1d 0c e0 a9 ec f2 49 ab ff 78 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 ec 50 43 28 50 36 b1 e2 38 11 d0 40 a0 b9 c4 1e 7b 73 55 05 0c 1d 0c e0 a9 ec f2 49 ab ff 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0d:88:a6:c5:23 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 22 1e 9d b6 74 54 12 2c e7 2b 3e 01 82 32 3e 6f 13 38 50 94 9e 9e 27 61 a2 38 e5 86 a8 48 c2 38 WPA: PTK derivation - A1=00:22:43:4b:63:c1 A2=00:0d:88:a6:c5:23 WPA: PMK - hexdump(len=32): 13 0b 60 66 3d 82 96 42 74 7d 07 6e 95 fb 96 98 ab 18 d3 1c 60 37 65 53 5e 45 54 be 6b 59 fd c5 WPA: PTK - hexdump(len=64): 71 f0 5a e9 9d 84 7d 60 17 6a 6c 6f 22 30 a0 6a c3 6f 09 f2 06 ef 1f ae 5a 41 f9 71 79 1e df 09 c1 09 0e 71 26 54 6c dc 22 72 c7 45 40 dd e4 8b 4f 39 b2 43 af 7c 5d ef 6b 78 d1 fb 71 53 be 4c WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 22 1e 9d b6 74 54 12 2c e7 2b 3e 01 82 32 3e 6f 13 38 50 94 9e 9e 27 61 a2 38 e5 86 a8 48 c2 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 95 43 7c 09 58 37 72 eb 20 51 6d 75 f3 7e c3 32 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:0d:88:a6:c5:23 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 ec 50 43 28 50 36 b1 e2 38 11 d0 40 a0 b9 c4 1e 7b 73 55 05 0c 1d 0c e0 a9 ec f2 49 ab ff 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 53 23 76 61 67 bd b9 ec ca 28 01 bb 17 39 f0 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 33 ec 50 43 28 50 36 b1 e2 38 11 d0 40 a0 b9 c4 1e 7b 73 55 05 0c 1d 0c e0 a9 ec f2 49 ab ff 78 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 98 53 23 76 61 67 bd b9 ec ca 28 01 bb 17 39 f0 WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 ec 50 43 28 50 36 b1 e2 38 11 d0 40 a0 b9 c4 1e 7b 73 55 05 0c 1d 0c e0 a9 ec f2 49 ab ff 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 53 23 76 61 67 bd b9 ec ca 28 01 bb 17 39 f0 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:0d:88:a6:c5:23 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5a 38 7c 11 e4 0c dd f5 cc 79 4b 40 bc 97 a4 fe 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE Authentication with 00:0d:88:a6:c5:23 timed out. Added BSSID 00:0d:88:a6:c5:23 into blacklist wpa_driver_wext_disassociate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: GROUP_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 5 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 3 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 4 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Scan timeout - try to get results Received 243 bytes of scan results (2 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID 00:00:00:00:00:00 from blacklist (clear) Removed BSSID 00:0d:88:a6:c5:23 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No suitable AP found. Setting scan request: 5 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8c07 len=45 AssocReq IE wireless event - hexdump(len=37): 00 05 31 4d 4b 41 50 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:0d:88:a6:c5:23 Association info event req_ies - hexdump(len=37): 00 05 31 4d 4b 41 50 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: DISCONNECTED -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:0d:88:a6:c5:23 No keys have been configured - skip key clearing Select network based on association information Network configuration found for the current AP WPA: Using WPA IE from AssocReq to set cipher suites WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto Associated with 00:0d:88:a6:c5:23 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) RX EAPOL from 00:0d:88:a6:c5:23 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 93 b8 60 ef 41 f4 eb 12 0e 5b c6 9f de 55 43 c9 fb ed 5a f2 e0 89 f0 11 44 d2 c8 94 96 c1 bb 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 93 b8 60 ef 41 f4 eb 12 0e 5b c6 9f de 55 43 c9 fb ed 5a f2 e0 89 f0 11 44 d2 c8 94 96 c1 bb 1a key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 93 b8 60 ef 41 f4 eb 12 0e 5b c6 9f de 55 43 c9 fb ed 5a f2 e0 89 f0 11 44 d2 c8 94 96 c1 bb 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0d:88:a6:c5:23 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 0f 59 38 0d 41 da b2 3c 99 61 a7 e3 7f 1e 54 e9 f9 2d 38 f8 ec 26 cc 9a 15 46 ba e8 f1 14 ad b8 WPA: PTK derivation - A1=00:22:43:4b:63:c1 A2=00:0d:88:a6:c5:23 WPA: PMK - hexdump(len=32): 13 0b 60 66 3d 82 96 42 74 7d 07 6e 95 fb 96 98 ab 18 d3 1c 60 37 65 53 5e 45 54 be 6b 59 fd c5 WPA: PTK - hexdump(len=64): d4 28 e8 e1 d9 92 10 47 ed 25 8e 9e a6 93 cb 29 c7 46 16 09 dc 1e 2f bd 75 be e8 2d db d0 f8 87 e7 30 1d 01 e0 8a de 1e d3 9d 3c 25 05 91 8f 8d 5b 25 9d d7 ad 6a 22 16 14 3a d5 98 db 11 cc 2b WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 0f 59 38 0d 41 da b2 3c 99 61 a7 e3 7f 1e 54 e9 f9 2d 38 f8 ec 26 cc 9a 15 46 ba e8 f1 14 ad b8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 14 44 a5 50 2f ea 92 b1 6e ce 49 87 89 75 8d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:0d:88:a6:c5:23 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 93 b8 60 ef 41 f4 eb 12 0e 5b c6 9f de 55 43 c9 fb ed 5a f2 e0 89 f0 11 44 d2 c8 94 96 c1 bb 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 9c c4 8a 0e 73 37 54 76 3d e5 ea ad 57 54 7d 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 93 b8 60 ef 41 f4 eb 12 0e 5b c6 9f de 55 43 c9 fb ed 5a f2 e0 89 f0 11 44 d2 c8 94 96 c1 bb 1a key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 6f 9c c4 8a 0e 73 37 54 76 3d e5 ea ad 57 54 7d WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 93 b8 60 ef 41 f4 eb 12 0e 5b c6 9f de 55 43 c9 fb ed 5a f2 e0 89 f0 11 44 d2 c8 94 96 c1 bb 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 9c c4 8a 0e 73 37 54 76 3d e5 ea ad 57 54 7d 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:0d:88:a6:c5:23 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: No WPA/RSN IE for this AP known. Trying to get from scan results Received 358 bytes of scan results (3 BSSes) WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: Found the current AP from updated scan results WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 3c d2 86 81 1e 76 b4 59 65 d4 5f 73 ea 19 32 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE Authentication with 00:0d:88:a6:c5:23 timed out. Added BSSID 00:0d:88:a6:c5:23 into blacklist wpa_driver_wext_disassociate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: GROUP_HANDSHAKE -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 5 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 3 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:00:00:00:00:00 blacklist count incremented to 4 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 Scan timeout - try to get results Received 243 bytes of scan results (2 BSSes) CTRL-EVENT-SCAN-RESULTS Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID 00:00:00:00:00:00 from blacklist (clear) Removed BSSID 00:0d:88:a6:c5:23 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:21:29:73:a0:1a ssid='NatalkaKarolekJasiu' wpa_ie_len=22 rsn_ie_len=24 caps=0x11 skip - SSID mismatch 1: 00:16:b6:9a:a6:8a ssid='marzec' wpa_ie_len=0 rsn_ie_len=0 caps=0x11 skip - SSID mismatch No suitable AP found. Setting scan request: 5 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8c07 len=45 AssocReq IE wireless event - hexdump(len=37): 00 05 31 4d 4b 41 50 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:0d:88:a6:c5:23 Association info event req_ies - hexdump(len=37): 00 05 31 4d 4b 41 50 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: DISCONNECTED -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:0d:88:a6:c5:23 No keys have been configured - skip key clearing Select network based on association information Network configuration found for the current AP WPA: Using WPA IE from AssocReq to set cipher suites WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto Associated with 00:0d:88:a6:c5:23 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request ^CCTRL-EVENT-TERMINATING - signal 2 received Removing interface ra0 State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_deauthenticate No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing NetworkManager --debug NetworkManager: ra0: driver is 'rt2860'. NetworkManager: ra0: driver does not support SSID scans (scan_capa 0x00). NetworkManager: Found new 802.11 WiFi device 'ra0'. NetworkManager: (ra0): exported as /org/freedesktop/Hal/devices/net_pci_1814_781 NetworkManager: Unmanaged Device found; state CONNECTED forced. (see http://bugs.launchpad.net/bugs/191889) NetworkManager: Unmanaged Device found; state CONNECTED forced. (see http://bugs.launchpad.net/bugs/191889) NetworkManager: (eth0): device state change: 1 -> 2 NetworkManager: (eth0): bringing up device. NetworkManager: (eth0): preparing device. NetworkManager: (eth0): deactivating device (reason: 2). NetworkManager: Unmanaged Device found; state CONNECTED forced. (see http://bugs.launchpad.net/bugs/191889) NetworkManager: (ra0): device state change: 1 -> 2 NetworkManager: (ra0): bringing up device. NetworkManager: (ra0): preparing device. NetworkManager: (ra0): deactivating device (reason: 2). NetworkManager: (ra0): device state change: 2 -> 3 NetworkManager: (ra0): supplicant interface state change: 1 -> 2. NetworkManager: Activation (ra0) starting connection '1MKAP Lokietka' NetworkManager: (ra0): device state change: 3 -> 4 NetworkManager: Activation (ra0) Stage 1 of 5 (Device Prepare) scheduled... NetworkManager: Activation (ra0) Stage 1 of 5 (Device Prepare) started... NetworkManager: Activation (ra0) Stage 2 of 5 (Device Configure) scheduled... NetworkManager: Activation (ra0) Stage 1 of 5 (Device Prepare) complete. NetworkManager: Activation (ra0) Stage 2 of 5 (Device Configure) starting... NetworkManager: (ra0): device state change: 4 -> 5 NetworkManager: Activation (ra0/wireless): access point '1MKAP Lokietka' has security, but secrets are required. NetworkManager: (ra0): device state change: 5 -> 6 NetworkManager: Activation (ra0) Stage 2 of 5 (Device Configure) complete. NetworkManager: Activation (ra0) Stage 1 of 5 (Device Prepare) scheduled... NetworkManager: Activation (ra0) Stage 1 of 5 (Device Prepare) started... NetworkManager: (ra0): device state change: 6 -> 4 NetworkManager: Activation (ra0) Stage 2 of 5 (Device Configure) scheduled... NetworkManager: Activation (ra0) Stage 1 of 5 (Device Prepare) complete. NetworkManager: Activation (ra0) Stage 2 of 5 (Device Configure) starting... NetworkManager: (ra0): device state change: 4 -> 5 NetworkManager: Activation (ra0/wireless): connection '1MKAP Lokietka' has security, and secrets exist. No new secrets needed. NetworkManager: Config: added 'ssid' value '1MKAP' NetworkManager: Config: added 'scan_ssid' value '1' NetworkManager: Config: added 'key_mgmt' value 'WPA-PSK' NetworkManager: Config: added 'psk' value '' NetworkManager: Config: added 'proto' value 'WPA RSN' NetworkManager: Config: added 'pairwise' value 'TKIP CCMP' NetworkManager: Config: added 'group' value 'WEP40 WEP104 TKIP CCMP' NetworkManager: Activation (ra0) Stage 2 of 5 (Device Configure) complete. NetworkManager: Config: set interface ap_scan to 1 NetworkManager: (ra0): supplicant connection state change: 2 -> 0 NetworkManager: (ra0): supplicant connection state change: 0 -> 2 NetworkManager: (ra0): supplicant connection state change: 2 -> 3 NetworkManager: (ra0): supplicant connection state change: 3 -> 4 NetworkManager: (ra0): supplicant connection state change: 4 -> 5 NetworkManager: (ra0): supplicant connection state change: 5 -> 6 NetworkManager: ra0: link timed out. NetworkManager: (ra0): supplicant connection state change: 6 -> 0 NetworkManager: (ra0): supplicant connection state change: 0 -> 2 NetworkManager: (ra0): supplicant connection state change: 2 -> 0 NetworkManager: (ra0): supplicant connection state change: 0 -> 4 NetworkManager: (ra0): supplicant connection state change: 4 -> 5 NetworkManager: (ra0): supplicant connection state change: 5 -> 6 NetworkManager: ra0: link timed out. NetworkManager: (ra0): supplicant connection state change: 6 -> 0 NetworkManager: (ra0): supplicant connection state change: 0 -> 2 NetworkManager: (ra0): supplicant connection state change: 2 -> 0 NetworkManager: (ra0): supplicant connection state change: 0 -> 3 NetworkManager: (ra0): supplicant connection state change: 3 -> 4 NetworkManager: (ra0): supplicant connection state change: 4 -> 5 NetworkManager: (ra0): supplicant connection state change: 5 -> 6