Re: How to connect to a WPA network that uses 10 hexadecimal digits as password



On Thu, Apr 9, 2009 at 16:26, Dan Williams <dcbw redhat com> wrote:
> On Thu, 2009-04-09 at 09:05 +0200, Jaap A. Haitsma wrote:
>> >>
>> >> Instructions of the hotel are the following
>> >>
>> >> SSID: STI WiFi
>> >> key: a531bc531d
>> >> PC: Network Key
>> >> MAC: WPA 10 digits
>> >
>> > Could you try turning off NM, killing wpa_supplicant, and using
>> > 'iwconfig' to association with WEP instead?
>> >
>> > killall -TERM NetworkManager
>> > killall -TERM wpa_supplicant
>> > iwconfig wlan0 key a531bc531d essid "STI WiFi"
>> >
>> > you  might need to try the iwconfig a few times; then if you do an
>> > 'iwconfig' on its own, look for the "AP:" address to be valid, and if it
>> > does, try dhclient.
>> >
>> > If that doesn't work, there are a few things with wpa_supplicant we can
>> > try.
>> >
>> > Dan
>> >
>>
>> I tried this but iwconfig says it is not associated with the accesspoint.
>
> Ok, lets try the supplicant alone.  Kill NM and wpa_supplicant, then
> create a file /tmp/sup.conf with;
>
> ap_scan=1
> network={
>        ssid="STI WiFi"
>        scan_ssid=1
>        key_mgmt=WPA-PSK
>        proto=WPA RSN
>        psk="a531bc531d"
> }
>
> and then run "wpa_supplicant -dddt -i wlan0 -D wext -c /tmp/sup.conf"
> and let that run for 30 seconds or so, and reply with the output.
>

I've tried this morning to do this and get output as in the attached
file. I've now checked out of the hotel so I won't be able to do any
more testing. I hope the attached file will help to fix the issue.
Anyway I'd like to thank everybody that tried to help

Jaap
1239293694.822424: Initializing interface 'wlan0' conf '/tmp/sup.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
1239293694.822536: Configuration file '/tmp/sup.conf' -> '/tmp/sup.conf'
1239293694.822546: Reading configuration file '/tmp/sup.conf'
1239293694.822631: ap_scan=1
1239293694.822638: Line: 2 - start of a new network block
1239293694.822662: ssid - hexdump_ascii(len=8):
     53 54 49 20 57 69 46 69                           STI WiFi        
1239293694.822686: scan_ssid=1 (0x1)
1239293694.822694: key_mgmt: 0x2
1239293694.822700: proto: 0x3
1239293694.822706: PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
1239293694.854399: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1239293694.854463: Priority group 0
1239293694.854470:    id=0 ssid='STI WiFi'
1239293694.854475: Initializing interface (2) 'wlan0'
1239293694.984076: Interface wlan0 set UP - waiting a second for the driver to complete initialization
1239293695.984232: SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
1239293695.984238:   capabilities: key_mgmt 0xf enc 0xf flags 0x0
1239293695.985386: WEXT: Operstate: linkmode=1, operstate=5
1239293695.988467: Own MAC address: 00:16:ea:6a:b9:0a
1239293695.988483: wpa_driver_wext_set_wpa
1239293695.988491: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293695.988502: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1239293695.988510: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1239293695.988518: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1239293695.988525: wpa_driver_wext_set_countermeasures
1239293695.988530: wpa_driver_wext_set_drop_unencrypted
1239293695.988535: RSN: flushing PMKID list in the driver
1239293695.988564: Setting scan request: 0 sec 100000 usec
1239293695.993377: EAPOL: SUPP_PAE entering state DISCONNECTED
1239293695.993383: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1239293695.993391: EAPOL: SUPP_BE entering state INITIALIZE
1239293695.993401: EAP: EAP entering state DISABLED
1239293695.993416: Added interface wlan0
1239293695.993463: Ignore event for foreign ifindex 3
1239293695.993478: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293695.993489: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293695.993507: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293695.993513: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293695.993517: Wireless event: cmd=0x8b06 len=8
1239293696.088938: State: DISCONNECTED -> SCANNING
1239293696.088969: Starting AP scan (specific SSID)
1239293696.088974: Scan SSID - hexdump_ascii(len=8):
     53 54 49 20 57 69 46 69                           STI WiFi        
1239293696.088989: Trying to get current scan results first without requesting a new scan to speed up initial association
1239293696.089035: Received 285 bytes of scan results (1 BSSes)
1239293696.089064: CTRL-EVENT-SCAN-RESULTS 
1239293696.089069: Selecting BSS from priority group 0
1239293696.089079: Try to find WPA-enabled AP
1239293696.089084: 0: 00:50:18:3d:08:90 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
1239293696.089092:    skip - no WPA/RSN IE
1239293696.089096: Try to find non-WPA AP
1239293696.089100: 0: 00:50:18:3d:08:90 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
1239293696.089107:    skip - SSID mismatch
1239293696.089111: No suitable AP found.
1239293696.089118: Setting scan request: 0 sec 0 usec
1239293696.089135: Starting AP scan (broadcast SSID)
1239293696.089158: Scan requested (ret=0) - scan timeout 5 seconds
1239293696.994587: EAPOL: disable timer tick
1239293697.725849: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293697.725870: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293697.725878: Wireless event: cmd=0x8b19 len=8
1239293697.725996: Received 2636 bytes of scan results (7 BSSes)
1239293697.726018: CTRL-EVENT-SCAN-RESULTS 
1239293697.726024: Selecting BSS from priority group 0
1239293697.726028: Try to find WPA-enabled AP
1239293697.726033: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293697.726414:    selected based on WPA IE
1239293697.726422:    selected WPA AP 00:1f:41:0f:fe:59 ssid='STI WiFi'
1239293697.726444: Trying to associate with 00:1f:41:0f:fe:59 (SSID='STI WiFi' freq=2462 MHz)
1239293697.726458: Cancelling scan request
1239293697.726463: WPA: clearing own WPA/RSN IE
1239293697.726478: Automatic auth_alg selection: 0x1
1239293697.726488: WPA: using IEEE 802.11i/D3.0
1239293697.726492: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
1239293697.726500: WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293697.726520: WPA: clearing AP RSN IE
1239293697.726525: WPA: using GTK TKIP
1239293697.726530: WPA: using PTK TKIP
1239293697.726534: WPA: using KEY_MGMT WPA-PSK
1239293697.726539: WPA: not using MGMT group cipher
1239293697.726544: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293697.726563: No keys have been configured - skip key clearing
1239293697.726567: wpa_driver_wext_set_drop_unencrypted
1239293697.726573: State: SCANNING -> ASSOCIATING
1239293697.726578: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293697.726583: WEXT: Operstate: linkmode=-1, operstate=5
1239293697.726604: wpa_driver_wext_associate
1239293697.726626: wpa_driver_wext_set_psk
1239293697.727478: Setting authentication timeout: 10 sec 0 usec
1239293697.727496: EAPOL: External notification - EAP success=0
1239293697.727503: EAPOL: External notification - EAP fail=0
1239293697.727508: EAPOL: External notification - portControl=Auto
1239293697.727541: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293697.727549: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293697.727555: Wireless event: cmd=0x8b06 len=8
1239293697.727563: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293697.727568: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293697.727572: Wireless event: cmd=0x8b04 len=12
1239293699.340329: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293699.340350: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293699.340359: Wireless event: cmd=0x8b19 len=8
1239293699.340533: Received 2929 bytes of scan results (8 BSSes)
1239293699.340562: CTRL-EVENT-SCAN-RESULTS 
1239293699.340567: Selecting BSS from priority group 0
1239293699.340571: Try to find WPA-enabled AP
1239293699.340577: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293699.340592:    selected based on WPA IE
1239293699.340595:    selected WPA AP 00:1f:41:0f:fe:59 ssid='STI WiFi'
1239293699.340603: Already associated with the selected AP.
1239293699.347338: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293699.347350: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293699.347357: Wireless event: cmd=0x8c02 len=227
1239293699.347362: WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00085354492057694669010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010482848b9632080c1218243048606cdd0900037f01010000ff7fdd080013920100010500)'
1239293699.347384: Association info event
1239293699.347388: req_ies - hexdump(len=59): 00 08 53 54 49 20 57 69 46 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
1239293699.347425: resp_ies - hexdump(len=37): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c dd 09 00 03 7f 01 01 00 00 ff 7f dd 08 00 13 92 01 00 01 05 00
1239293699.347451: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293699.351191: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293699.351204: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293699.351210: Wireless event: cmd=0x8b15 len=20
1239293699.351215: Wireless event: new AP: 00:1f:41:0f:fe:59
1239293699.351234: State: ASSOCIATING -> ASSOCIATED
1239293699.351239: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293699.351421: WEXT: Operstate: linkmode=-1, operstate=5
1239293699.351453: Associated to a new BSS: BSSID=00:1f:41:0f:fe:59
1239293699.351460: No keys have been configured - skip key clearing
1239293699.351467: Associated with 00:1f:41:0f:fe:59
1239293699.351472: WPA: Association event - clear replay counter
1239293699.351482: WPA: Clear old PTK
1239293699.351486: EAPOL: External notification - portEnabled=0
1239293699.351494: EAPOL: External notification - portValid=0
1239293699.351498: EAPOL: External notification - EAP success=0
1239293699.351502: EAPOL: External notification - portEnabled=1
1239293699.351506: EAPOL: SUPP_PAE entering state CONNECTING
1239293699.351509: EAPOL: enable timer tick
1239293699.351517: EAPOL: SUPP_BE entering state IDLE
1239293699.351524: Setting authentication timeout: 10 sec 0 usec
1239293699.351532: Cancelling scan request
1239293699.352118: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293699.352127: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293701.351210: RX EAPOL from 00:1f:41:0f:fe:59
1239293701.351230: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293701.351299: Setting authentication timeout: 10 sec 0 usec
1239293701.351325: IEEE 802.1X RX: version=1 type=3 length=95
1239293701.351336:   EAPOL-Key type=254
1239293701.351340:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293701.351348:   key_length=32 key_data_length=0
1239293701.351352:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1239293701.351362:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af
1239293701.351383:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293701.351396:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293701.351405:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293701.351414:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293701.351431: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293701.351511: State: ASSOCIATED -> 4WAY_HANDSHAKE
1239293701.351518: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293701.354099: WPA: Renewed SNonce - hexdump(len=32): 85 23 40 c2 a2 44 97 5d 15 8b 2b ed 99 b7 dd 02 61 5d ae 60 8b 63 a9 af 75 b8 88 97 8d 9f 2d ac
1239293701.354159: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293701.354173: WPA: PMK - hexdump(len=32): [REMOVED]
1239293701.354177: WPA: PTK - hexdump(len=64): [REMOVED]
1239293701.354182: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293701.354208: WPA: Sending EAPOL-Key 2/4
1239293701.354231: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 85 23 40 c2 a2 44 97 5d 15 8b 2b ed 99 b7 dd 02 61 5d ae 60 8b 63 a9 af 75 b8 88 97 8d 9f 2d ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 99 59 5f 32 06 a0 02 f7 13 2a eb c2 56 0b 9b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293702.355635: EAPOL: startWhen --> 0
1239293702.355651: EAPOL: disable timer tick
1239293702.355657: EAPOL: SUPP_PAE entering state CONNECTING
1239293702.355661: EAPOL: enable timer tick
1239293702.355668: EAPOL: txStart
1239293702.355672: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1239293703.350516: RX EAPOL from 00:1f:41:0f:fe:59
1239293703.350536: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293703.350725: IEEE 802.1X RX: version=1 type=3 length=95
1239293703.350732:   EAPOL-Key type=254
1239293703.350736:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293703.350744:   key_length=32 key_data_length=0
1239293703.350749:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1239293703.350759:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af
1239293703.350779:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293703.350792:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293703.350801:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293703.350810:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293703.350828: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293703.350902: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293703.350908: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293703.350940: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293703.350948: WPA: PMK - hexdump(len=32): [REMOVED]
1239293703.350952: WPA: PTK - hexdump(len=64): [REMOVED]
1239293703.350957: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293703.350976: WPA: Sending EAPOL-Key 2/4
1239293703.350987: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 85 23 40 c2 a2 44 97 5d 15 8b 2b ed 99 b7 dd 02 61 5d ae 60 8b 63 a9 af 75 b8 88 97 8d 9f 2d ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 5f 34 66 51 a6 06 9e c8 2f 78 c6 35 2c 34 92 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293705.349994: RX EAPOL from 00:1f:41:0f:fe:59
1239293705.350014: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293705.350077: IEEE 802.1X RX: version=1 type=3 length=95
1239293705.350084:   EAPOL-Key type=254
1239293705.350088:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293705.350096:   key_length=32 key_data_length=0
1239293705.350100:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
1239293705.350110:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af
1239293705.350130:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293705.350143:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293705.350152:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293705.350161:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293705.350177: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293705.350254: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293705.350259: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293705.350406: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293705.350416: WPA: PMK - hexdump(len=32): [REMOVED]
1239293705.350421: WPA: PTK - hexdump(len=64): [REMOVED]
1239293705.350426: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293705.350447: WPA: Sending EAPOL-Key 2/4
1239293705.350459: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 85 23 40 c2 a2 44 97 5d 15 8b 2b ed 99 b7 dd 02 61 5d ae 60 8b 63 a9 af 75 b8 88 97 8d 9f 2d ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 29 fa ef 23 ca a0 2d ed f3 14 41 f1 6a 6b 92 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293705.351072: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293705.351084: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293705.351091: Wireless event: cmd=0x8b15 len=20
1239293705.351096: Wireless event: new AP: 00:00:00:00:00:00
1239293705.351109: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
1239293705.351116: Setting scan request: 0 sec 100000 usec
1239293705.351124: Added BSSID 00:1f:41:0f:fe:59 into blacklist
1239293705.351132: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1239293705.351136: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293705.351152: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1239293705.351159: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1239293705.351167: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1239293705.351174: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293705.351299: Driver did not support SIOCSIWENCODEEXT
1239293705.351305: State: 4WAY_HANDSHAKE -> DISCONNECTED
1239293705.351310: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293705.351316: WEXT: Operstate: linkmode=-1, operstate=5
1239293705.351331: EAPOL: External notification - portEnabled=0
1239293705.351336: EAPOL: SUPP_PAE entering state DISCONNECTED
1239293705.351340: EAPOL: SUPP_BE entering state INITIALIZE
1239293705.351346: EAPOL: External notification - portValid=0
1239293705.351350: EAPOL: External notification - EAP success=0
1239293705.354876: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293705.354891: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293705.451298: State: DISCONNECTED -> SCANNING
1239293705.451315: Starting AP scan (specific SSID)
1239293705.451320: Scan SSID - hexdump_ascii(len=8):
     53 54 49 20 57 69 46 69                           STI WiFi        
1239293705.451358: Scan requested (ret=0) - scan timeout 30 seconds
1239293706.361099: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293706.361120: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293706.361129: Wireless event: cmd=0x8c02 len=227
1239293706.361137: WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00085354492057694669010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010482848b9632080c1218243048606cdd0900037f01010000ff7fdd080013920100010500)'
1239293706.361148: Association info event
1239293706.361152: req_ies - hexdump(len=59): 00 08 53 54 49 20 57 69 46 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
1239293706.361227: resp_ies - hexdump(len=37): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c dd 09 00 03 7f 01 01 00 00 ff 7f dd 08 00 13 92 01 00 01 05 00
1239293706.361253: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293706.369763: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293706.369784: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293706.369793: Wireless event: cmd=0x8b15 len=20
1239293706.369798: Wireless event: new AP: 00:1f:41:0f:fe:59
1239293706.369807: State: SCANNING -> ASSOCIATED
1239293706.369938: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293706.369945: WEXT: Operstate: linkmode=-1, operstate=5
1239293706.369989: Associated to a new BSS: BSSID=00:1f:41:0f:fe:59
1239293706.369996: No keys have been configured - skip key clearing
1239293706.370004: Associated with 00:1f:41:0f:fe:59
1239293706.370008: WPA: Association event - clear replay counter
1239293706.370012: WPA: Clear old PTK
1239293706.370016: EAPOL: External notification - portEnabled=0
1239293706.370025: EAPOL: External notification - portValid=0
1239293706.370029: EAPOL: External notification - EAP success=0
1239293706.370033: EAPOL: External notification - portEnabled=1
1239293706.370037: EAPOL: SUPP_PAE entering state CONNECTING
1239293706.370041: EAPOL: SUPP_BE entering state IDLE
1239293706.370048: Setting authentication timeout: 10 sec 0 usec
1239293706.370058: Cancelling scan request
1239293706.370935: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293706.370953: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293706.371064: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293706.371072: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293706.371077: Wireless event: cmd=0x8b19 len=8
1239293706.371156: Received 1999 bytes of scan results (6 BSSes)
1239293706.371207: CTRL-EVENT-SCAN-RESULTS 
1239293706.371213: Selecting BSS from priority group 0
1239293706.371217: Try to find WPA-enabled AP
1239293706.371221: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293706.371232:    selected based on WPA IE
1239293706.371236:    selected WPA AP 00:1f:41:0f:fe:59 ssid='STI WiFi'
1239293706.371243: Already associated with the selected AP.
1239293706.371270: RX EAPOL from 00:1f:41:0f:fe:59
1239293706.371277: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293706.371339: Setting authentication timeout: 10 sec 0 usec
1239293706.371347: IEEE 802.1X RX: version=1 type=3 length=95
1239293706.371352:   EAPOL-Key type=254
1239293706.371357:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293706.371363:   key_length=32 key_data_length=0
1239293706.371368:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1239293706.371378:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1
1239293706.371402:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293706.371415:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293706.371424:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293706.371433:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293706.371448: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293706.371514: State: ASSOCIATED -> 4WAY_HANDSHAKE
1239293706.371519: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293706.374009: WPA: Renewed SNonce - hexdump(len=32): db e0 ca 42 7e d2 aa e8 15 47 7b 3a 17 f2 98 cb 30 a6 39 5e cd 52 30 25 8a 6f f9 51 c8 cb 91 7b
1239293706.374056: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293706.374064: WPA: PMK - hexdump(len=32): [REMOVED]
1239293706.374069: WPA: PTK - hexdump(len=64): [REMOVED]
1239293706.374074: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293706.374094: WPA: Sending EAPOL-Key 2/4
1239293706.374105: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 db e0 ca 42 7e d2 aa e8 15 47 7b 3a 17 f2 98 cb 30 a6 39 5e cd 52 30 25 8a 6f f9 51 c8 cb 91 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 e4 82 1d bc e7 96 ec 14 45 88 74 80 0d 06 f8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293708.367947: RX EAPOL from 00:1f:41:0f:fe:59
1239293708.367967: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293708.368032: IEEE 802.1X RX: version=1 type=3 length=95
1239293708.368037:   EAPOL-Key type=254
1239293708.368041:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293708.368049:   key_length=32 key_data_length=0
1239293708.368053:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1239293708.368063:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1
1239293708.368083:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293708.368096:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293708.368105:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293708.368114:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293708.368130: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293708.368205: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293708.368211: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293708.368242: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293708.368250: WPA: PMK - hexdump(len=32): [REMOVED]
1239293708.368254: WPA: PTK - hexdump(len=64): [REMOVED]
1239293708.368259: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293708.368278: WPA: Sending EAPOL-Key 2/4
1239293708.368289: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 db e0 ca 42 7e d2 aa e8 15 47 7b 3a 17 f2 98 cb 30 a6 39 5e cd 52 30 25 8a 6f f9 51 c8 cb 91 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 76 2e 0e 2f 98 67 62 38 18 ec 60 76 32 9e 13 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293709.362023: EAPOL: startWhen --> 0
1239293709.362038: EAPOL: disable timer tick
1239293709.362043: EAPOL: SUPP_PAE entering state CONNECTING
1239293709.362047: EAPOL: enable timer tick
1239293709.362054: EAPOL: txStart
1239293709.362058: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1239293710.368539: RX EAPOL from 00:1f:41:0f:fe:59
1239293710.368558: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293710.368623: IEEE 802.1X RX: version=1 type=3 length=95
1239293710.368629:   EAPOL-Key type=254
1239293710.368633:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293710.368641:   key_length=32 key_data_length=0
1239293710.368646:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1239293710.368655:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1
1239293710.368675:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293710.368805:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293710.368815:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293710.368824:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293710.368840: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293710.368948: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293710.368954: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293710.368988: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293710.368996: WPA: PMK - hexdump(len=32): [REMOVED]
1239293710.369001: WPA: PTK - hexdump(len=64): [REMOVED]
1239293710.369005: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293710.369026: WPA: Sending EAPOL-Key 2/4
1239293710.369037: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 db e0 ca 42 7e d2 aa e8 15 47 7b 3a 17 f2 98 cb 30 a6 39 5e cd 52 30 25 8a 6f f9 51 c8 cb 91 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 8c 8e 6b 71 74 06 59 fd 38 df 80 b3 34 31 37 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293712.367680: RX EAPOL from 00:1f:41:0f:fe:59
1239293712.367699: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293712.367763: IEEE 802.1X RX: version=1 type=3 length=95
1239293712.367769:   EAPOL-Key type=254
1239293712.367773:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293712.367781:   key_length=32 key_data_length=0
1239293712.367825:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
1239293712.367835:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1
1239293712.367856:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293712.367869:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293712.367877:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293712.367886:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293712.367904: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293712.367978: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293712.367983: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293712.368016: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293712.368024: WPA: PMK - hexdump(len=32): [REMOVED]
1239293712.368029: WPA: PTK - hexdump(len=64): [REMOVED]
1239293712.368034: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293712.368054: WPA: Sending EAPOL-Key 2/4
1239293712.368065: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 db e0 ca 42 7e d2 aa e8 15 47 7b 3a 17 f2 98 cb 30 a6 39 5e cd 52 30 25 8a 6f f9 51 c8 cb 91 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 0c c9 39 c5 b3 ca 29 70 3f c0 1c 63 a0 1d 41 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293712.368363: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293712.368533: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293712.368541: Wireless event: cmd=0x8b15 len=20
1239293712.368546: Wireless event: new AP: 00:00:00:00:00:00
1239293712.368561: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
1239293712.368569: Setting scan request: 0 sec 100000 usec
1239293712.368576: BSSID 00:1f:41:0f:fe:59 blacklist count incremented to 2
1239293712.368584: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1239293712.368589: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293712.368605: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1239293712.368613: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1239293712.368620: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1239293712.368628: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293712.368729: Driver did not support SIOCSIWENCODEEXT
1239293712.368735: State: 4WAY_HANDSHAKE -> DISCONNECTED
1239293712.368741: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293712.368746: WEXT: Operstate: linkmode=-1, operstate=5
1239293712.368764: EAPOL: External notification - portEnabled=0
1239293712.368769: EAPOL: SUPP_PAE entering state DISCONNECTED
1239293712.368772: EAPOL: SUPP_BE entering state INITIALIZE
1239293712.368778: EAPOL: External notification - portValid=0
1239293712.368782: EAPOL: External notification - EAP success=0
1239293712.372949: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293712.372961: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293712.468765: State: DISCONNECTED -> SCANNING
1239293712.468785: Starting AP scan (broadcast SSID)
1239293712.468811: Scan requested (ret=0) - scan timeout 30 seconds
1239293713.378651: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293713.378675: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293713.378683: Wireless event: cmd=0x8c02 len=227
1239293713.378693: WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00085354492057694669010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010482848b9632080c1218243048606cdd0900037f01010000ff7fdd080013920100010500)'
1239293713.378704: Association info event
1239293713.378709: req_ies - hexdump(len=59): 00 08 53 54 49 20 57 69 46 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
1239293713.378746: resp_ies - hexdump(len=37): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c dd 09 00 03 7f 01 01 00 00 ff 7f dd 08 00 13 92 01 00 01 05 00
1239293713.378804: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293713.379783: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293713.379794: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293713.379800: Wireless event: cmd=0x8b15 len=20
1239293713.379804: Wireless event: new AP: 00:1f:41:0f:fe:59
1239293713.379812: State: SCANNING -> ASSOCIATED
1239293713.379818: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293713.379824: WEXT: Operstate: linkmode=-1, operstate=5
1239293713.379857: Associated to a new BSS: BSSID=00:1f:41:0f:fe:59
1239293713.379862: No keys have been configured - skip key clearing
1239293713.379869: Associated with 00:1f:41:0f:fe:59
1239293713.379874: WPA: Association event - clear replay counter
1239293713.379877: WPA: Clear old PTK
1239293713.379881: EAPOL: External notification - portEnabled=0
1239293713.379916: EAPOL: External notification - portValid=0
1239293713.379921: EAPOL: External notification - EAP success=0
1239293713.379924: EAPOL: External notification - portEnabled=1
1239293713.379928: EAPOL: SUPP_PAE entering state CONNECTING
1239293713.379932: EAPOL: SUPP_BE entering state IDLE
1239293713.379939: Setting authentication timeout: 10 sec 0 usec
1239293713.379948: Cancelling scan request
1239293713.379956: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293713.380060: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293713.380066: Wireless event: cmd=0x8b19 len=8
1239293713.380101: Received 353 bytes of scan results (1 BSSes)
1239293713.380110: CTRL-EVENT-SCAN-RESULTS 
1239293713.380115: Selecting BSS from priority group 0
1239293713.380119: Try to find WPA-enabled AP
1239293713.380124: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293713.380133:    skip - blacklisted
1239293713.380136: Try to find non-WPA AP
1239293713.380141: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293713.380149:    skip - blacklisted
1239293713.380152: No APs found - clear blacklist and try again
1239293713.380156: Removed BSSID 00:1f:41:0f:fe:59 from blacklist (clear)
1239293713.380162: Selecting BSS from priority group 0
1239293713.380166: Try to find WPA-enabled AP
1239293713.380170: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293713.380179:    selected based on WPA IE
1239293713.380183:    selected WPA AP 00:1f:41:0f:fe:59 ssid='STI WiFi'
1239293713.380190: Already associated with the selected AP.
1239293713.381966: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293713.381976: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293715.380108: RX EAPOL from 00:1f:41:0f:fe:59
1239293715.380129: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293715.380198: Setting authentication timeout: 10 sec 0 usec
1239293715.380208: IEEE 802.1X RX: version=1 type=3 length=95
1239293715.380214:   EAPOL-Key type=254
1239293715.380218:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293715.380226:   key_length=32 key_data_length=0
1239293715.380230:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1239293715.380240:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2
1239293715.380260:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293715.380274:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293715.380282:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293715.380291:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293715.380308: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293715.380380: State: ASSOCIATED -> 4WAY_HANDSHAKE
1239293715.380386: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293715.382784: WPA: Renewed SNonce - hexdump(len=32): 2a 15 ed cd 47 08 7f a1 9e b8 d4 70 c9 14 08 99 a2 f5 1e 26 93 c0 d2 5f 39 13 dd 67 8e b5 78 29
1239293715.382833: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293715.382841: WPA: PMK - hexdump(len=32): [REMOVED]
1239293715.382846: WPA: PTK - hexdump(len=64): [REMOVED]
1239293715.382850: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293715.382870: WPA: Sending EAPOL-Key 2/4
1239293715.382880: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 2a 15 ed cd 47 08 7f a1 9e b8 d4 70 c9 14 08 99 a2 f5 1e 26 93 c0 d2 5f 39 13 dd 67 8e b5 78 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd e3 cb 84 2e ca d6 91 61 15 70 c3 ee 44 26 a8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293716.370704: EAPOL: startWhen --> 0
1239293716.370720: EAPOL: disable timer tick
1239293716.370834: EAPOL: SUPP_PAE entering state CONNECTING
1239293716.370839: EAPOL: enable timer tick
1239293716.370848: EAPOL: txStart
1239293716.370851: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1239293717.380400: RX EAPOL from 00:1f:41:0f:fe:59
1239293717.380419: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293717.380482: IEEE 802.1X RX: version=1 type=3 length=95
1239293717.380488:   EAPOL-Key type=254
1239293717.380492:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293717.380500:   key_length=32 key_data_length=0
1239293717.380504:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1239293717.380514:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2
1239293717.380533:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293717.380546:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293717.380555:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293717.380564:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293717.380580: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293717.380654: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293717.380660: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293717.380691: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293717.380699: WPA: PMK - hexdump(len=32): [REMOVED]
1239293717.380704: WPA: PTK - hexdump(len=64): [REMOVED]
1239293717.380708: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293717.380728: WPA: Sending EAPOL-Key 2/4
1239293717.380739: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 2a 15 ed cd 47 08 7f a1 9e b8 d4 70 c9 14 08 99 a2 f5 1e 26 93 c0 d2 5f 39 13 dd 67 8e b5 78 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 be 0a eb 0d 06 f8 25 ad c3 59 45 d1 91 0c 82 b5 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293719.380121: RX EAPOL from 00:1f:41:0f:fe:59
1239293719.380140: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293719.380206: IEEE 802.1X RX: version=1 type=3 length=95
1239293719.380212:   EAPOL-Key type=254
1239293719.380216:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293719.380224:   key_length=32 key_data_length=0
1239293719.380228:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
1239293719.380238:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2
1239293719.380297:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293719.380310:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293719.380319:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293719.380328:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293719.380344: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293719.380542: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293719.380549: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293719.380582: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293719.380590: WPA: PMK - hexdump(len=32): [REMOVED]
1239293719.380595: WPA: PTK - hexdump(len=64): [REMOVED]
1239293719.380600: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293719.380620: WPA: Sending EAPOL-Key 2/4
1239293719.380631: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 2a 15 ed cd 47 08 7f a1 9e b8 d4 70 c9 14 08 99 a2 f5 1e 26 93 c0 d2 5f 39 13 dd 67 8e b5 78 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 4e 00 af 6a fc b3 0a 41 ac 31 4e 40 13 1a f9 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293719.384485: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293719.384501: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293719.384509: Wireless event: cmd=0x8b15 len=20
1239293719.384515: Wireless event: new AP: 00:00:00:00:00:00
1239293719.384528: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
1239293719.384535: Setting scan request: 0 sec 100000 usec
1239293719.384543: Added BSSID 00:1f:41:0f:fe:59 into blacklist
1239293719.384550: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1239293719.384555: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293719.384571: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1239293719.384578: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1239293719.384586: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1239293719.384593: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293719.384675: Driver did not support SIOCSIWENCODEEXT
1239293719.384681: State: 4WAY_HANDSHAKE -> DISCONNECTED
1239293719.384686: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293719.384692: WEXT: Operstate: linkmode=-1, operstate=5
1239293719.384708: EAPOL: External notification - portEnabled=0
1239293719.384713: EAPOL: SUPP_PAE entering state DISCONNECTED
1239293719.384716: EAPOL: SUPP_BE entering state INITIALIZE
1239293719.384722: EAPOL: External notification - portValid=0
1239293719.384726: EAPOL: External notification - EAP success=0
1239293719.389436: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293719.389451: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293719.490232: State: DISCONNECTED -> SCANNING
1239293719.490246: Starting AP scan (specific SSID)
1239293719.490251: Scan SSID - hexdump_ascii(len=8):
     53 54 49 20 57 69 46 69                           STI WiFi        
1239293719.490287: Scan requested (ret=0) - scan timeout 30 seconds
1239293720.390495: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293720.390512: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293720.390520: Wireless event: cmd=0x8c02 len=227
1239293720.390529: WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00085354492057694669010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010482848b9632080c1218243048606cdd0900037f01010000ff7fdd080013920100010500)'
1239293720.390540: Association info event
1239293720.390545: req_ies - hexdump(len=59): 00 08 53 54 49 20 57 69 46 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
1239293720.390582: resp_ies - hexdump(len=37): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c dd 09 00 03 7f 01 01 00 00 ff 7f dd 08 00 13 92 01 00 01 05 00
1239293720.390609: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293720.403668: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293720.403688: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293720.403697: Wireless event: cmd=0x8b15 len=20
1239293720.403702: Wireless event: new AP: 00:1f:41:0f:fe:59
1239293720.403710: State: SCANNING -> ASSOCIATED
1239293720.403716: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293720.403723: WEXT: Operstate: linkmode=-1, operstate=5
1239293720.403759: Associated to a new BSS: BSSID=00:1f:41:0f:fe:59
1239293720.403765: No keys have been configured - skip key clearing
1239293720.403772: Associated with 00:1f:41:0f:fe:59
1239293720.403777: WPA: Association event - clear replay counter
1239293720.403781: WPA: Clear old PTK
1239293720.403785: EAPOL: External notification - portEnabled=0
1239293720.403793: EAPOL: External notification - portValid=0
1239293720.403800: EAPOL: External notification - EAP success=0
1239293720.403804: EAPOL: External notification - portEnabled=1
1239293720.403809: EAPOL: SUPP_PAE entering state CONNECTING
1239293720.403813: EAPOL: SUPP_BE entering state IDLE
1239293720.403820: Setting authentication timeout: 10 sec 0 usec
1239293720.403828: Cancelling scan request
1239293720.403903: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293720.403912: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293720.403918: Wireless event: cmd=0x8b19 len=8
1239293720.403952: Received 352 bytes of scan results (1 BSSes)
1239293720.403961: CTRL-EVENT-SCAN-RESULTS 
1239293720.403965: Selecting BSS from priority group 0
1239293720.403969: Try to find WPA-enabled AP
1239293720.403974: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293720.403985:    selected based on WPA IE
1239293720.403988:    selected WPA AP 00:1f:41:0f:fe:59 ssid='STI WiFi'
1239293720.403995: Already associated with the selected AP.
1239293720.404511: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293720.404520: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293722.394293: RX EAPOL from 00:1f:41:0f:fe:59
1239293722.394313: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293722.394381: Setting authentication timeout: 10 sec 0 usec
1239293722.394392: IEEE 802.1X RX: version=1 type=3 length=95
1239293722.394397:   EAPOL-Key type=254
1239293722.394401:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293722.394409:   key_length=32 key_data_length=0
1239293722.394414:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1239293722.394423:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3
1239293722.394443:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293722.394456:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293722.394465:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293722.394474:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293722.394490: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293722.394564: State: ASSOCIATED -> 4WAY_HANDSHAKE
1239293722.394570: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293722.396922: WPA: Renewed SNonce - hexdump(len=32): f6 c1 fd d8 fd 41 58 65 de bc d8 b2 26 64 2c f9 a4 7a 44 9f 8a 70 15 7d f6 7b 83 59 a6 88 00 b4
1239293722.396970: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293722.396978: WPA: PMK - hexdump(len=32): [REMOVED]
1239293722.397098: WPA: PTK - hexdump(len=64): [REMOVED]
1239293722.397103: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293722.397125: WPA: Sending EAPOL-Key 2/4
1239293722.397137: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 f6 c1 fd d8 fd 41 58 65 de bc d8 b2 26 64 2c f9 a4 7a 44 9f 8a 70 15 7d f6 7b 83 59 a6 88 00 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b2 80 6e fc 0c 6b 47 fe ad 0e 04 75 c9 7f 94 5f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293723.378125: EAPOL: startWhen --> 0
1239293723.378142: EAPOL: disable timer tick
1239293723.378148: EAPOL: SUPP_PAE entering state CONNECTING
1239293723.378151: EAPOL: enable timer tick
1239293723.378159: EAPOL: txStart
1239293723.378163: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1239293724.393920: RX EAPOL from 00:1f:41:0f:fe:59
1239293724.393939: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293724.394003: IEEE 802.1X RX: version=1 type=3 length=95
1239293724.394009:   EAPOL-Key type=254
1239293724.394013:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293724.394021:   key_length=32 key_data_length=0
1239293724.394025:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1239293724.394035:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3
1239293724.394054:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293724.394068:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293724.394076:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293724.394085:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293724.394101: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293724.394177: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293724.394182: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293724.394214: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293724.394221: WPA: PMK - hexdump(len=32): [REMOVED]
1239293724.394226: WPA: PTK - hexdump(len=64): [REMOVED]
1239293724.394231: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293724.394250: WPA: Sending EAPOL-Key 2/4
1239293724.394261: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 f6 c1 fd d8 fd 41 58 65 de bc d8 b2 26 64 2c f9 a4 7a 44 9f 8a 70 15 7d f6 7b 83 59 a6 88 00 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a e0 95 60 59 54 75 94 b4 5d cc 3b b5 73 71 a5 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293726.237371: RX EAPOL from 00:1f:41:0f:fe:59
1239293726.237391: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293726.237456: IEEE 802.1X RX: version=1 type=3 length=95
1239293726.237462:   EAPOL-Key type=254
1239293726.237466:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
1239293726.237473:   key_length=32 key_data_length=0
1239293726.237653:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
1239293726.237665:   key_nonce - hexdump(len=32): 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3
1239293726.237686:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293726.237699:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293726.237708:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1239293726.237717:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293726.237735: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 66 22 cf 9f 1e 78 60 df 58 c7 9e c3 cf 23 9b 12 f2 b5 ae 11 8a 3d 0a 8c 38 57 39 37 73 00 de b3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1239293726.237809: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1239293726.237815: WPA: RX message 1 of 4-Way Handshake from 00:1f:41:0f:fe:59 (ver=1)
1239293726.237849: WPA: PTK derivation - A1=00:16:ea:6a:b9:0a A2=00:1f:41:0f:fe:59
1239293726.237858: WPA: PMK - hexdump(len=32): [REMOVED]
1239293726.237863: WPA: PTK - hexdump(len=64): [REMOVED]
1239293726.237867: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293726.237889: WPA: Sending EAPOL-Key 2/4
1239293726.237899: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 f6 c1 fd d8 fd 41 58 65 de bc d8 b2 26 64 2c f9 a4 7a 44 9f 8a 70 15 7d f6 7b 83 59 a6 88 00 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 84 b2 b3 75 0e 4d b2 50 81 b0 b4 8e d0 b2 c1 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293726.238424: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293726.238441: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293726.238449: Wireless event: cmd=0x8b15 len=20
1239293726.238455: Wireless event: new AP: 00:00:00:00:00:00
1239293726.238469: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
1239293726.238476: Setting scan request: 0 sec 100000 usec
1239293726.238484: BSSID 00:1f:41:0f:fe:59 blacklist count incremented to 2
1239293726.238493: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1239293726.238497: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293726.238515: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1239293726.238523: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1239293726.238531: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1239293726.238538: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1239293726.238641: Driver did not support SIOCSIWENCODEEXT
1239293726.238648: State: 4WAY_HANDSHAKE -> DISCONNECTED
1239293726.238653: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293726.238659: WEXT: Operstate: linkmode=-1, operstate=5
1239293726.238675: EAPOL: External notification - portEnabled=0
1239293726.238680: EAPOL: SUPP_PAE entering state DISCONNECTED
1239293726.238683: EAPOL: SUPP_BE entering state INITIALIZE
1239293726.238689: EAPOL: External notification - portValid=0
1239293726.238693: EAPOL: External notification - EAP success=0
1239293726.240452: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293726.240467: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293726.338620: State: DISCONNECTED -> SCANNING
1239293726.338641: Starting AP scan (broadcast SSID)
1239293726.338664: Scan requested (ret=0) - scan timeout 30 seconds
1239293727.245884: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1239293727.245900: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293727.245909: Wireless event: cmd=0x8c02 len=227
1239293727.245917: WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00085354492057694669010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202dd070050f202000100 RespIEs=010482848b9632080c1218243048606cdd0900037f01010000ff7fdd080013920100010500)'
1239293727.246000: Association info event
1239293727.246006: req_ies - hexdump(len=59): 00 08 53 54 49 20 57 69 46 69 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
1239293727.246075: resp_ies - hexdump(len=37): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c dd 09 00 03 7f 01 01 00 00 ff 7f dd 08 00 13 92 01 00 01 05 00
1239293727.246101: WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
1239293727.264940: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293727.264961: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293727.264970: Wireless event: cmd=0x8b15 len=20
1239293727.264975: Wireless event: new AP: 00:1f:41:0f:fe:59
1239293727.264984: State: SCANNING -> ASSOCIATED
1239293727.264989: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293727.264996: WEXT: Operstate: linkmode=-1, operstate=5
1239293727.265033: Associated to a new BSS: BSSID=00:1f:41:0f:fe:59
1239293727.265041: No keys have been configured - skip key clearing
1239293727.265048: Associated with 00:1f:41:0f:fe:59
1239293727.265056: WPA: Association event - clear replay counter
1239293727.265060: WPA: Clear old PTK
1239293727.265064: EAPOL: External notification - portEnabled=0
1239293727.265071: EAPOL: External notification - portValid=0
1239293727.265075: EAPOL: External notification - EAP success=0
1239293727.265079: EAPOL: External notification - portEnabled=1
1239293727.265083: EAPOL: SUPP_PAE entering state CONNECTING
1239293727.265087: EAPOL: SUPP_BE entering state IDLE
1239293727.265094: Setting authentication timeout: 10 sec 0 usec
1239293727.265102: Cancelling scan request
1239293727.265211: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293727.265222: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293727.265228: Wireless event: cmd=0x8b19 len=8
1239293727.265745: Received 352 bytes of scan results (1 BSSes)
1239293727.265759: CTRL-EVENT-SCAN-RESULTS 
1239293727.265764: Selecting BSS from priority group 0
1239293727.265769: Try to find WPA-enabled AP
1239293727.265774: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293727.265783:    skip - blacklisted
1239293727.265787: Try to find non-WPA AP
1239293727.265791: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293727.265799:    skip - blacklisted
1239293727.265803: No APs found - clear blacklist and try again
1239293727.265807: Removed BSSID 00:1f:41:0f:fe:59 from blacklist (clear)
1239293727.265813: Selecting BSS from priority group 0
1239293727.265816: Try to find WPA-enabled AP
1239293727.265820: 0: 00:1f:41:0f:fe:59 ssid='STI WiFi' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
1239293727.265830:    selected based on WPA IE
1239293727.265833:    selected WPA AP 00:1f:41:0f:fe:59 ssid='STI WiFi'
1239293727.265839: Already associated with the selected AP.
1239293727.265849: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1239293727.265855: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1239293729.226788: CTRL-EVENT-TERMINATING - signal 2 received
1239293729.226805: Removing interface wlan0
1239293729.226810: State: ASSOCIATED -> DISCONNECTED
1239293729.226816: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1239293729.226821: WEXT: Operstate: linkmode=-1, operstate=5
1239293729.226848: wpa_driver_wext_deauthenticate
1239293729.229018: No keys have been configured - skip key clearing
1239293729.229032: EAPOL: External notification - portEnabled=0
1239293729.229037: EAPOL: SUPP_PAE entering state DISCONNECTED
1239293729.229041: EAPOL: SUPP_BE entering state INITIALIZE
1239293729.229047: EAPOL: External notification - portValid=0
1239293729.229052: wpa_driver_wext_set_wpa
1239293729.229061: wpa_driver_wext_set_drop_unencrypted
1239293729.229066: wpa_driver_wext_set_countermeasures
1239293729.229071: No keys have been configured - skip key clearing
1239293729.230895: Cancelling scan request
1239293729.230905: Cancelling authentication timeout
1239293729.231719: WEXT: Operstate: linkmode=0, operstate=6


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]