tech-net archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: ral(4) and wpa_supplicant?



On Mon, May 25, 2009 at 03:54:21PM +0100, Roy Marples wrote:
> Well that shows that the interface is has associated (which is what the
> patch fixed) and you now have a different error.


FWIW, I tried using OpenBSD with the same ral(4) card and the same AP, and it
was able to associate with my AP succesfully, using both WPA-PSK and WPA2-PSK
(however OpenBSD uses ifconfig(8) arguments to configure wpa).  This excludes
problems with the hardware or the AP configuration.


> Try adding the wpa_supplicant -d flag to enable more debugging.  But I
> can't really help anymore as I don't know the actual guts of wireless.


wpa_supplicant debugging output is attached for those who can read it...


        Geert


-- 
Geert Hendrickx  -=-  ghen%telenet.be@localhost  -=-  PGP: 0xC4BB9E9F
This e-mail was composed using 100% recycled spam messages!
Initializing interface 'ral0' conf '/etc/wpa_supplicant.conf' driver 'default' 
ctrl_interface 'N/A' bridge 'N/A'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0' (DEPRECATED)
ap_scan=1
Priority group 0
   id=0 ssid='hendrickx44'
Initializing interface (2) 'ral0'
Own MAC address: 00:11:d8:33:94:2d
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
wpa_driver_bsd_del_key: keyidx=0
wpa_driver_bsd_del_key: keyidx=1
wpa_driver_bsd_del_key: keyidx=2
wpa_driver_bsd_del_key: keyidx=3
wpa_driver_bsd_set_countermeasures: enabled=0
wpa_driver_bsd_set_drop_unencrypted: enabled=1
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=0
Added interface ral0
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=11):
     68 65 6e 64 72 69 63 6b 78 34 34                  hendrickx44     
Trying to get current scan results first without requesting a new scan to speed 
up initial association
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
RTM_IFINFO: Interface 'ral0' UP
CTRL_IFACE monitor attached - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 
74 72 6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6
RTM_IEEE80211: scan result (105)
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
CTRL-EVENT-SCAN-RESULTS 
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 5 sec 0 usec
EAPOL: disable timer tick
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=11):
     68 65 6e 64 72 69 63 6b 78 34 34                  hendrickx44     
RTM_IEEE80211: scan result (105)
Received 76 bytes of scan results (1 BSSes)
Scan results: 1
CTRL-EVENT-SCAN-RESULTS 
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:22:b0:cf:6d:35 ssid='hendrickx44'
Trying to associate with 00:22:b0:cf:6d:35 (SSID='hendrickx44' freq=2447 MHz)
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_bsd_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'hendrickx44' wpa ie len 22 pairwise 3 group 3 
key mgmt 1
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RX EAPOL from 00:22:b0:cf:6d:35
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:cf:6d:35 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 be 83 71 94 37 23 a3 
0b 79 8d 63 51 01 97 ba 61
RSN: PMKID from Authenticator - hexdump(len=16): be 83 71 94 37 23 a3 0b 79 8d 
63 51 01 97 ba 61
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 03 bd be f0 30 9d f8 f8 3d b6 83 91 88 
81 61 ad 08 17 75 f9 2c a1 20 25 bd 24 4a 16 bc ba ac b5
WPA: PTK derivation - A1=00:11:d8:33:94:2d A2=00:00:00:00:00:00
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: Use BSSID (00:22:b0:cf:6d:35) as the destination for EAPOL-Key
RTM_IEEE80211: (re)assoc (101)
State: 4WAY_HANDSHAKE -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:cf:6d:35
No keys have been configured - skip key clearing
Associated with 00:22:b0:cf:6d:35
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8903
RTM_IEEE80211: disassoc (102)
Setting scan request: 0 sec 100000 usec
Added BSSID 00:22:b0:cf:6d:35 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_driver_bsd_del_key: keyidx=0
wpa_driver_bsd_del_key: keyidx=1
wpa_driver_bsd_del_key: keyidx=2
wpa_driver_bsd_del_key: keyidx=3
wpa_driver_bsd_del_key: addr=00:22:b0:cf:6d:35 keyidx=0
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RTM_IEEE80211: scan result (105)
Received 76 bytes of scan results (1 BSSes)
Scan results: 1
CTRL-EVENT-SCAN-RESULTS 
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:22:b0:cf:6d:35 ssid='hendrickx44'
Trying to associate with 00:22:b0:cf:6d:35 (SSID='hendrickx44' freq=2447 MHz)
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_bsd_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'hendrickx44' wpa ie len 22 pairwise 3 group 3 
key mgmt 1
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RX EAPOL from 00:22:b0:cf:6d:35
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:cf:6d:35 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 be 83 71 94 37 23 a3 
0b 79 8d 63 51 01 97 ba 61
RSN: PMKID from Authenticator - hexdump(len=16): be 83 71 94 37 23 a3 0b 79 8d 
63 51 01 97 ba 61
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 0f ad 70 19 21 18 9d 47 01 2d ac d5 ec 
d2 1e 5f 65 78 e5 a2 a9 c6 9e d7 c8 9f fb 36 77 43 2a 00
WPA: PTK derivation - A1=00:11:d8:33:94:2d A2=00:22:b0:cf:6d:35
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RTM_IEEE80211: (re)assoc (101)
State: 4WAY_HANDSHAKE -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:cf:6d:35
No keys have been configured - skip key clearing
Associated with 00:22:b0:cf:6d:35
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
RX EAPOL from 00:22:b0:cf:6d:35
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c0
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): e0 0c 42 ef 37 de ae 25 f8 d3 60 e1 a6 cd 5d fb
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c0
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): e0 0c 42 ef 37 de ae 25 f8 d3 60 e1 a6 cd 5d fb
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c0
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): e0 0c 42 ef 37 de ae 25 f8 d3 60 e1 a6 cd 5d fb
WPA: Could not verify EAPOL-Key MIC - dropping packet
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RTM_IEEE80211: disassoc (102)
Setting scan request: 0 sec 100000 usec
BSSID 00:22:b0:cf:6d:35 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_driver_bsd_del_key: keyidx=0
wpa_driver_bsd_del_key: keyidx=1
wpa_driver_bsd_del_key: keyidx=2
wpa_driver_bsd_del_key: keyidx=3
wpa_driver_bsd_del_key: addr=00:22:b0:cf:6d:35 keyidx=0
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=11):
     68 65 6e 64 72 69 63 6b 78 34 34                  hendrickx44     
RTM_IEEE80211: scan result (105)
Received 76 bytes of scan results (1 BSSes)
Scan results: 1
CTRL-EVENT-SCAN-RESULTS 
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   skip - blacklisted
Try to find non-WPA AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 00:22:b0:cf:6d:35 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:22:b0:cf:6d:35 ssid='hendrickx44'
Trying to associate with 00:22:b0:cf:6d:35 (SSID='hendrickx44' freq=2447 MHz)
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_bsd_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'hendrickx44' wpa ie len 22 pairwise 3 group 3 
key mgmt 1
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:cf:6d:35 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 be 83 71 94 37 23 a3 
0b 79 8d 63 51 01 97 ba 61
RSN: PMKID from Authenticator - hexdump(len=16): be 83 71 94 37 23 a3 0b 79 8d 
63 51 01 97 ba 61
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 1a cc 9e 98 c1 bf 0e 5f d6 42 e7 ce f8 
4b f1 26 87 99 56 13 c4 1f ce f5 3b 83 87 f1 5e e8 d1 47
WPA: PTK derivation - A1=00:11:d8:33:94:2d A2=00:22:b0:cf:6d:35
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RTM_IEEE80211: (re)assoc (101)
State: 4WAY_HANDSHAKE -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:cf:6d:35
No keys have been configured - skip key clearing
Associated with 00:22:b0:cf:6d:35
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
RX EAPOL from 00:22:b0:cf:6d:35
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c2
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): b8 a8 0a 3c 27 68 8e f2 e6 df c1 d6 43 35 55 17
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c2
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): b8 a8 0a 3c 27 68 8e f2 e6 df c1 d6 43 35 55 17
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c2
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): b8 a8 0a 3c 27 68 8e f2 e6 df c1 d6 43 35 55 17
WPA: Could not verify EAPOL-Key MIC - dropping packet
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RTM_IEEE80211: disassoc (102)
Setting scan request: 0 sec 100000 usec
Added BSSID 00:22:b0:cf:6d:35 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_driver_bsd_del_key: keyidx=0
wpa_driver_bsd_del_key: keyidx=1
wpa_driver_bsd_del_key: keyidx=2
wpa_driver_bsd_del_key: keyidx=3
wpa_driver_bsd_del_key: addr=00:22:b0:cf:6d:35 keyidx=0
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_IEEE80211: scan result (105)
Received 76 bytes of scan results (1 BSSes)
Scan results: 1
CTRL-EVENT-SCAN-RESULTS 
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:22:b0:cf:6d:35 ssid='hendrickx44'
Trying to associate with 00:22:b0:cf:6d:35 (SSID='hendrickx44' freq=2447 MHz)
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_bsd_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'hendrickx44' wpa ie len 22 pairwise 3 group 3 
key mgmt 1
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:cf:6d:35 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 be 83 71 94 37 23 a3 
0b 79 8d 63 51 01 97 ba 61
RSN: PMKID from Authenticator - hexdump(len=16): be 83 71 94 37 23 a3 0b 79 8d 
63 51 01 97 ba 61
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): bf 04 ba 7a a3 6f df 53 bb b2 f9 4c f4 
ca 0d 36 bb a2 36 65 55 08 29 2d cb e2 fb 65 80 c4 0c 98
WPA: PTK derivation - A1=00:11:d8:33:94:2d A2=00:22:b0:cf:6d:35
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RTM_IEEE80211: (re)assoc (101)
State: 4WAY_HANDSHAKE -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:cf:6d:35
No keys have been configured - skip key clearing
Associated with 00:22:b0:cf:6d:35
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
RX EAPOL from 00:22:b0:cf:6d:35
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c4
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 85 95 7f 1e 45 7c 5c 4c 80 14 1b 18 1b ac 26 60
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c4
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 85 95 7f 1e 45 7c 5c 4c 80 14 1b 18 1b ac 26 60
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c4
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 85 95 7f 1e 45 7c 5c 4c 80 14 1b 18 1b ac 26 60
WPA: Could not verify EAPOL-Key MIC - dropping packet
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RTM_IEEE80211: disassoc (102)
Setting scan request: 0 sec 100000 usec
BSSID 00:22:b0:cf:6d:35 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_driver_bsd_del_key: keyidx=0
wpa_driver_bsd_del_key: keyidx=1
wpa_driver_bsd_del_key: keyidx=2
wpa_driver_bsd_del_key: keyidx=3
wpa_driver_bsd_del_key: addr=00:22:b0:cf:6d:35 keyidx=0
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=11):
     68 65 6e 64 72 69 63 6b 78 34 34                  hendrickx44     
RX ctrl_iface - hexdump_ascii(len=4):
     50 49 4e 47                                       PING            
RTM_IEEE80211: scan result (105)
Received 76 bytes of scan results (1 BSSes)
Scan results: 1
CTRL-EVENT-SCAN-RESULTS 
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   skip - blacklisted
Try to find non-WPA AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 00:22:b0:cf:6d:35 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:22:b0:cf:6d:35 ssid='hendrickx44' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:22:b0:cf:6d:35 ssid='hendrickx44'
Trying to associate with 00:22:b0:cf:6d:35 (SSID='hendrickx44' freq=2447 MHz)
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_bsd_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'hendrickx44' wpa ie len 22 pairwise 3 group 3 
key mgmt 1
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RX EAPOL from 00:22:b0:cf:6d:35
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:22:b0:cf:6d:35 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 be 83 71 94 37 23 a3 
0b 79 8d 63 51 01 97 ba 61
RSN: PMKID from Authenticator - hexdump(len=16): be 83 71 94 37 23 a3 0b 79 8d 
63 51 01 97 ba 61
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): bb 9f 98 a9 1f cd bd f0 7c ea ec 07 28 
94 9e 40 87 a8 a5 b2 49 6c 64 16 08 7a b5 87 ba 18 b8 a3
WPA: PTK derivation - A1=00:11:d8:33:94:2d A2=00:22:b0:cf:6d:35
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RTM_IEEE80211: (re)assoc (101)
State: 4WAY_HANDSHAKE -> ASSOCIATED
Associated to a new BSS: BSSID=00:22:b0:cf:6d:35
No keys have been configured - skip key clearing
Associated with 00:22:b0:cf:6d:35
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_IFINFO: Interface '' if=ffff8943 drv=ffff8943
RX EAPOL from 00:22:b0:cf:6d:35
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 29 2b 73 5b 72 cd db c5 09 65 8f 0f b7 13 3b 84 
cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd b8
  key_iv - hexdump(len=16): cb 04 2a 17 04 d6 8b 81 7d ba ce 4d 2a 4e bd c6
  key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): c7 1e dc 5f d0 84 62 60 38 2f c8 1c 67 83 dc 79
WPA: Could not verify EAPOL-Key MIC - dropping packet
CTRL-EVENT-TERMINATING - signal 2 received
CTRL_IFACE monitor send - hexdump(len=105): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 
6c 5f 34 39 37 36 2d 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Removing interface ral0
State: ASSOCIATED -> DISCONNECTED
wpa_driver_bsd_deauthenticate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_bsd_set_wpa: enabled=0
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
wpa_driver_bsd_set_drop_unencrypted: enabled=0
wpa_driver_bsd_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
CTRL_IFACE wait for attached monitors to receive messages
Cancelling scan request
Cancelling authentication timeout
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0


Home | Main Index | Thread Index | Old Index