[zd1211-devs] Re: -Dwext problems with zydas driver and wpa-psk - ioctl[SIOCSIWPMKSA]: Invalid argum
Status: Beta
Brought to you by:
mayne
From: John H. <mis...@gm...> - 2006-03-20 16:11:21
|
well, it can get on open networks fine. Here is w/ -dd, hope this is enough for you:) dapt is the actual SSID Of the router here. Script started on Mon 20 Mar 2006 10:06:56 AM CST /usr/src/wpasupplicant/wpa_supplicant -w -i wlan0 -dd -c / /etc/wpa_supplicant.conf -Dwext Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface=3D'/var/run/wpa_supplicant' ctrl_interface_group=3D0 eapol_version=3D1 ap_scan=3D1 Line: 192 - start of a new network block ssid - hexdump_ascii(len=3D4): 64 61 70 74 dapt scan_ssid=3D1 (0x1) pairwise: 0x8 PSK - hexdump(len=3D32): [REMOVED] group: 0x8 key_mgmt: 0x2 proto: 0x1 Line: 204 - start of a new network block ssid - hexdump_ascii(len=3D12): 4e 65 74 77 6f 72 6b 34 48 6f 6d 65 Network4Home scan_ssid=3D1 (0x1) pairwise: 0x8 PSK - hexdump(len=3D32): [REMOVED] group: 0x8 key_mgmt: 0x2 proto: 0x1 Priority group 0 id=3D0 ssid=3D'dapt' id=3D1 ssid=3D'Network4Home' Initializing interface (2) 'wlan0' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 ioctl[SIOCSIWPMKSA]: Invalid argument ioctl[SIOCSIWMODE]: Invalid argument Could not configure driver to use managed mode SIOCGIWRANGE: WE(compiled)=3D19 WE(source)=3D13 enc_capa=3D0x0 capabilities: key_mgmt 0x0 enc 0x3 Own MAC address: 00:12:0e:11:b7:42 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D1 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D2 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D3 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_countermeasures wpa_driver_wext_set_drop_unencrypted Setting scan request: 0 sec 100000 usec Added interface wlan0 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=3D4): 64 61 70 74 dapt Wireless event: cmd=3D0x8b19 len=3D8 Received 284 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:90:4b:36:b8:66 ssid=3D'dapt' wpa_ie_len=3D24 rsn_ie_len=3D0 caps=3D0x= 11 selected based on WPA IE Trying to associate with 00:90:4b:36:b8:66 (SSID=3D'dapt' freq=3D2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_associate ioctl[SIOCSIWFREQ]: Invalid argument Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=3D0 EAPOL: External notification - EAP fail=3D0 EAPOL: External notification - portControl=3DAuto RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ee ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ee ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATING -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=3D32): 73 09 f4 b3 8c 0e 0e 14 75 2f f2 bb 1f 9e 35 ba 53 bc 03 7c 7e 5e 53 04 23 cf e8 a4 f2 3b 57 81 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 73 09 f4 b3 8c 0e 0e 14 75 2f f2 bb 1f 9e 35 ba 53 bc 03 7c 7e 5e 53 04 23 cf e8 a4 f2 3b 57 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 75 ee 64 3b d9 e8 5e 4e 02 9c 65 cb 80 41 13 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:90:4b:36:b8:66 State: 4WAY_HANDSHAKE -> ASSOCIATED Associated to a new BSS: BSSID=3D00:90:4b:36:b8:66 No keys have been configured - skip key clearing Associated with 00:90:4b:36:b8:66 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 EAPOL: External notification - portEnabled=3D1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ee ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ee ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=3D32): a8 ad c5 a8 42 c0 0b 15 fe f1 b8 09 df 50 84 70 35 ab b0 7a 22 4f d2 bf df db 07 cf 37 c8 e6 b6 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 a8 ad c5 a8 42 c0 0b 15 fe f1 b8 09 df 50 84 70 35 ab b0 7a 22 4f d2 bf df db 07 cf 37 c8 e6 b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 d4 de 78 7c 0e 89 75 11 f2 a3 0f 9b bb 83 3a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ee ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 31 86 1e 9c 37 cc d6 12 02 3f c2 84 38 42 82 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=3D1 type=3D3 length=3D119 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ee ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 31 86 1e 9c 37 cc d6 12 02 3f c2 84 38 42 82 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: IE KeyData - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ce 05 84 46 f9 aa 87 88 a7 e0 28 e8 be fd 02 15 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=3D6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3D2 key_idx=3D0 set_tx=3D1 seq_len=3D6 key_len= =3D32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 d9 ed fe 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ef ff ff 39 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d ac c1 51 6a 30 a9 ae 08 72 15 65 49 b9 1d e2 00 20 f8 92 50 07 53 3e ff 73 17 d7 24 0a 1e e6 e9 81 cb f7 16 0e 7e ce b1 75 5f d8 b7 2c 34 f7 58 c5 IEEE 802.1X RX: version=3D1 type=3D3 length=3D127 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 d9 ed fe 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ef ff ff 39 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d ac c1 51 6a 30 a9 ae 08 72 15 65 49 b9 1d e2 00 20 f8 92 50 07 53 3e ff 73 17 d7 24 0a 1e e6 e9 81 cb f7 16 0e 7e ce b1 75 5f d8 b7 2c 34 f7 58 c5 State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: RX message 1 of Group Key Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: Group Key - hexdump(len=3D32): [REMOVED] WPA: Installing GTK to the driver (keyidx=3D1 tx=3D0). WPA: RSC - hexdump(len=3D6): 39 3b 00 00 00 00 wpa_driver_wext_set_key: alg=3D2 key_idx=3D1 set_tx=3D0 seq_len=3D6 key_len= =3D32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 0c 8a 3d 83 37 16 82 49 42 ab d2 a5 ea 80 64 00 00 WPA: Key negotiation completed with 00:90:4b:36:b8:66 [PTK=3DTKIP GTK=3DTKI= P] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:90:4b:36:b8:66 completed (auth) EAPOL: External notification - portValid=3D1 EAPOL: External notification - EAP success=3D1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:90:4b:36:b8:66 into blacklist State: COMPLETED -> DISCONNECTED EAPOL: External notification - portEnabled=3D0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D1 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D2 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D3 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=3D12): 4e 65 74 77 6f 72 6b 34 48 6f 6d 65 Network4Home RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=3D0x8b19 len=3D8 Received 284 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:90:4b:36:b8:66 ssid=3D'dapt' wpa_ie_len=3D24 rsn_ie_len=3D0 caps=3D0x= 11 selected based on WPA IE Trying to associate with 00:90:4b:36:b8:66 (SSID=3D'dapt' freq=3D2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_associate ioctl[SIOCSIWFREQ]: Invalid argument Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=3D0 EAPOL: External notification - EAP fail=3D0 EAPOL: External notification - portControl=3DAuto Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:90:4b:36:b8:66 State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=3D00:90:4b:36:b8:66 No keys have been configured - skip key clearing Associated with 00:90:4b:36:b8:66 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 EAPOL: External notification - portEnabled=3D1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ef ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 ef ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=3D32): a0 57 d4 eb 48 a3 56 8e d7 09 e6 ab 64 bc 6d d4 30 16 b7 e2 ff fc 50 ac 41 0b 54 d0 a0 e9 1c 8e WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 a0 57 d4 eb 48 a3 56 8e d7 09 e6 ab 64 bc 6d d4 30 16 b7 e2 ff fc 50 ac 41 0b 54 d0 a0 e9 1c 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 97 52 29 46 24 47 89 0f ea 27 b0 9d 61 a5 63 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f0 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f0 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 a0 57 d4 eb 48 a3 56 8e d7 09 e6 ab 64 bc 6d d4 30 16 b7 e2 ff fc 50 ac 41 0b 54 d0 a0 e9 1c 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3a c2 f7 a6 28 8e 16 d7 63 b3 b8 a6 0a 9d 53 25 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f0 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db 5e 26 20 2d d2 e7 81 df 04 4d ae 70 6d 7b 27 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=3D1 type=3D3 length=3D119 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f0 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db 5e 26 20 2d d2 e7 81 df 04 4d ae 70 6d 7b 27 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: IE KeyData - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 cf 07 5c 2c 87 65 94 ab 42 63 40 b0 6a 85 c2 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=3D6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3D2 key_idx=3D0 set_tx=3D1 seq_len=3D6 key_len= =3D32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 d9 ed fe 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f1 ff ff 3a 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 64 39 b4 b3 ac 7a b7 f8 9c 30 18 58 54 27 3d 00 20 c0 94 18 c8 df 26 bd 58 1f e5 21 e1 bd 59 08 15 0e 47 d7 55 b2 c5 40 80 55 5b 17 62 c4 ff f4 21 IEEE 802.1X RX: version=3D1 type=3D3 length=3D127 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 d9 ed fe 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f1 ff ff 3a 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 64 39 b4 b3 ac 7a b7 f8 9c 30 18 58 54 27 3d 00 20 c0 94 18 c8 df 26 bd 58 1f e5 21 e1 bd 59 08 15 0e 47 d7 55 b2 c5 40 80 55 5b 17 62 c4 ff f4 21 State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: RX message 1 of Group Key Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: Group Key - hexdump(len=3D32): [REMOVED] WPA: Installing GTK to the driver (keyidx=3D1 tx=3D0). WPA: RSC - hexdump(len=3D6): 3a 3b 00 00 00 00 wpa_driver_wext_set_key: alg=3D2 key_idx=3D1 set_tx=3D0 seq_len=3D6 key_len= =3D32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 c4 2b 3e 40 da 49 ba 1c b8 08 7c cb 3e 1c 20 00 00 WPA: Key negotiation completed with 00:90:4b:36:b8:66 [PTK=3DTKIP GTK=3DTKI= P] Cancelling authentication timeout Removed BSSID 00:90:4b:36:b8:66 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:90:4b:36:b8:66 completed (reauth) EAPOL: External notification - portValid=3D1 EAPOL: External notification - EAP success=3D1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:90:4b:36:b8:66 into blacklist State: COMPLETED -> DISCONNECTED EAPOL: External notification - portEnabled=3D0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D1 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D2 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D3 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Wireless event: cmd=3D0x8b19 len=3D8 Received 284 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:90:4b:36:b8:66 ssid=3D'dapt' wpa_ie_len=3D24 rsn_ie_len=3D0 caps=3D0x= 11 selected based on WPA IE Trying to associate with 00:90:4b:36:b8:66 (SSID=3D'dapt' freq=3D2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_associate ioctl[SIOCSIWFREQ]: Invalid argument Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=3D0 EAPOL: External notification - EAP fail=3D0 EAPOL: External notification - portControl=3DAuto RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:90:4b:36:b8:66 State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=3D00:90:4b:36:b8:66 No keys have been configured - skip key clearing Associated with 00:90:4b:36:b8:66 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 EAPOL: External notification - portEnabled=3D1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=3D1 len=3D0) Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec BSSID 00:90:4b:36:b8:66 blacklist count incremented to 2 State: ASSOCIATED -> DISCONNECTED EAPOL: External notification - portEnabled=3D0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D1 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D2 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D3 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=3D4): 64 61 70 74 dapt RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=3D0x8b19 len=3D8 Received 284 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:90:4b:36:b8:66 ssid=3D'dapt' wpa_ie_len=3D24 rsn_ie_len=3D0 caps=3D0x= 11 skip - blacklisted No APs found - clear blacklist and try again Removed BSSID 00:90:4b:36:b8:66 from blacklist (clear) Selecting BSS from priority group 0 0: 00:90:4b:36:b8:66 ssid=3D'dapt' wpa_ie_len=3D24 rsn_ie_len=3D0 caps=3D0x= 11 selected based on WPA IE Trying to associate with 00:90:4b:36:b8:66 (SSID=3D'dapt' freq=3D2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_associate ioctl[SIOCSIWFREQ]: Invalid argument Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=3D0 EAPOL: External notification - EAP fail=3D0 EAPOL: External notification - portControl=3DAuto Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:90:4b:36:b8:66 State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=3D00:90:4b:36:b8:66 No keys have been configured - skip key clearing Associated with 00:90:4b:36:b8:66 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 EAPOL: External notification - portEnabled=3D1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f2 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f2 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=3D32): a8 26 b2 7e 8d 71 44 9e 2b d7 db 13 bd 83 5f f0 33 fa 12 36 60 91 f8 3a 5d 39 80 fb ee 38 e8 bc WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 a8 26 b2 7e 8d 71 44 9e 2b d7 db 13 bd 83 5f f0 33 fa 12 36 60 91 f8 3a 5d 39 80 fb ee 38 e8 bc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 52 1f 95 b8 a6 19 0e 8d a4 bc e0 d0 5a 2b 4d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f2 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f2 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 a8 26 b2 7e 8d 71 44 9e 2b d7 db 13 bd 83 5f f0 33 fa 12 36 60 91 f8 3a 5d 39 80 fb ee 38 e8 bc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 71 58 a2 dd 01 fd 1a de f1 b2 ec ff 6c 7f 5c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f2 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 03 c9 fd dd 68 81 7c 34 ea 6d 48 77 13 dd 3f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 IEEE 802.1X RX: version=3D1 type=3D3 length=3D119 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f2 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 03 c9 fd dd 68 81 7c 34 ea 6d 48 77 13 dd 3f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: IE KeyData - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a7 d9 cc 79 be 9f 9d 68 56 97 a3 c2 0f e9 00 4d 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=3D6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3D2 key_idx=3D0 set_tx=3D1 seq_len=3D6 key_len= =3D32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f3 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f3 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: GROUP_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Renewed SNonce - hexdump(len=3D32): 2c 86 a1 f4 4d e0 d8 ca cb 8d 66 84 75 56 b7 88 19 30 11 cb df 05 74 26 c5 19 35 6a d5 28 d8 81 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 2c 86 a1 f4 4d e0 d8 ca cb 8d 66 84 75 56 b7 88 19 30 11 cb df 05 74 26 c5 19 35 6a d5 28 d8 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 97 b1 86 9b 76 b6 12 3f d3 38 0f 9b 68 f7 34 73 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f3 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f3 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 2c 86 a1 f4 4d e0 d8 ca cb 8d 66 84 75 56 b7 88 19 30 11 cb df 05 74 26 c5 19 35 6a d5 28 d8 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 70 d7 ba 72 7b 83 1c 5a 74 ed 90 80 1c cb d0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:90:4b:36:b8:66 RX EAPOL - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f3 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IEEE 802.1X RX: version=3D1 type=3D3 length=3D95 EAPOL-Key type=3D254 WPA: RX EAPOL-Key - hexdump(len=3D99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 0e f6 98 a9 28 b0 4d d5 43 f1 ce 35 48 be c4 ba 3a 2d 46 a8 69 d7 12 fc 72 ed 43 64 72 f3 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=3D1) WPA: WPA IE for msg 2/4 - hexdump(len=3D24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: PMK - hexdump(len=3D32): [REMOVED] WPA: PTK - hexdump(len=3D64): [REMOVED] WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=3D123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 2c 86 a1 f4 4d e0 d8 ca cb 8d 66 84 75 56 b7 88 19 30 11 cb df 05 74 26 c5 19 35 6a d5 28 d8 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 78 e7 a2 b1 75 8b fb 81 13 35 54 9b d3 63 07 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 EAPOL: startWhen --> 0 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=3D1 len=3D0) Authentication with 00:90:4b:36:b8:66 timed out. Added BSSID 00:90:4b:36:b8:66 into blacklist State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_wext_disassociate wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D1 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D2 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D3 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 EAPOL: External notification - portEnabled=3D0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=3D0 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=3D12): 4e 65 74 77 6f 72 6b 34 48 6f 6d 65 Network4Home Wireless event: cmd=3D0x8b15 len=3D20 Wireless event: new AP: 00:00:00:00:00:00 BSSID 00:90:4b:36:b8:66 blacklist count incremented to 2 State: SCANNING -> DISCONNECTED EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 EAPOL: External notification - EAP success=3D0 CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D1 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D2 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D3 set_tx=3D0 seq_len=3D0 key_len= =3D0 wpa_driver_wext_set_key: alg=3D0 key_idx=3D0 set_tx=3D0 seq_len=3D0 key_len= =3D0 CTRL-EVENT-TERMINATING - signal 2 received RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Removing interface wlan0 State: DISCONNECTED -> DISCONNECTED No keys have been configured - skip key clearing EAPOL: External notification - portEnabled=3D0 EAPOL: External notification - portValid=3D0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing Removed BSSID 00:90:4b:36:b8:66 from blacklist (clear) Cancelling scan request Script done on Mon 20 Mar 2006 10:07:36 AM CST On 3/20/06, Jouni Malinen <jkm...@cc...> wrote: > On Mon, Mar 20, 2006 at 01:31:05AM -0600, John H. wrote: > > > I don't know what's wrong, it's just not working anymore, but same > > router works in XP. Currently using .67 of zd1211 driver and > > wpa_supplicant .4.8, but get same results from .5.2. > > > /usr/src/wpasupplicant/wpa_supplicant -w -i wlan0 -c > > /etc/wpa_supplicant.conf -Dwext > > Please send more verbose debug log (i.e., add -dd to the command line). > > > WPA: Key negotiation completed with 00:90:4b:36:b8:66 [PTK=3DTKIP GTK= =3DTKIP] > > CTRL-EVENT-CONNECTED - Connection to 00:90:4b:36:b8:66 completed (auth) > > At least the initial connection worked fine, so the basic functionality > seems to be available. > > > WPA: EAPOL-Key Replay Counter did not increase - dropping packet > > This is most commonly triggered if the driver does not report > disconnection to the supplicant. More verbose debug could help in > figuring out whether that is the case, but one may need to take a look > at wireless capture log of the frames sent at this point to figure out > what exactly happened unless the driver provides useful debug > information about associations. > > -- > Jouni Malinen PGP id EFC895FA > |