FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Debian > Debian User

 
 
LinkBack Thread Tools
 
Old 05-03-2012, 07:24 AM
Yuanle Song
 
Default wpa_supplicant drops connection frequently

In the last two days, my wireless connection is very unstable. It drops
every few minutes and when it is connected, it's very slow and
unusable. Could you help me to debug this problem?

Here is the hardware, software and network info:
- thinkpad x201 with Intel Corporation Centrino Advanced-N 6200
(used non-free firmware)
- Debian GNU/Linux 6.0.4 (squeeze)
- wpasupplicant 0.6.10-2.1
- wireless AP with SSID "1216" is provided on a TP-LINK router.
using WPA2-PSK security.

Here is some of the non-debug outputs:
- seesion 1
# /sbin/wpa_supplicant -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
Associated with d8:5d:4c:58:2a:32
WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (auth) [id=2 id_str=nantong-1216]
WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
WPA: Invalid EAPOL-Key MIC - dropping packet

- session 2
# /sbin/wpa_supplicant -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
Associated with d8:5d:4c:58:2a:32
WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
WPA: EAPOL-Key Replay Counter did not increase - dropping packet
WPA: EAPOL-Key Replay Counter did not increase - dropping packet
WPA: Invalid EAPOL-Key MIC - dropping packet
WPA: EAPOL-Key Replay Counter did not increase - dropping packet
WPA: EAPOL-Key Replay Counter did not increase - dropping packet

google did not turn too much helpful information, but did suggest a
debug run of wpa_supplicant. So I did a debug run using -ddt and also
run iwevent at the same time. the output is attached in this email.


I have been on this network for a few months, with no problem like this
before. Other laptops on this network running Windows XP/7 have no such
problem, i.e. their wireless connection is stable just as before.

I have also attached my wpa_supplicant.conf with passwords removed if
that is helpful. I haven't changed it recently.

I have also used to ping to test the network. packet loss and big
latency (800ms+) is very usual, which reflects why it's just unusable
even when connected.


Thanks,
Yuanle
root@sylecn:/home/sylecn/d/t2# /sbin/wpa_supplicant -ddt -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
1336023993.215649: Initializing interface 'wlan0' conf '/home/sylecn/texts/config/wpa_current.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
1336023993.215701: Configuration file '/home/sylecn/texts/config/wpa_current.conf' -> '/home/sylecn/texts/config/wpa_current.conf'
1336023993.215709: Reading configuration file '/home/sylecn/texts/config/wpa_current.conf'
1336023993.215757: fast_reauth=0
1336023993.215765: Line: 17 - start of a new network block
1336023993.215778: ssid - hexdump_ascii(len=3):
41 56 50 AVP
1336023993.215797: key_mgmt: 0x2
1336023993.215803: PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
1336023993.215812: priority=20 (0x14)
1336023993.215822: id_str - hexdump_ascii(len=3):
41 56 50 AVP
1336023993.226865: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1336023993.226891: Line: 30 - start of a new network block
1336023993.226897: ssid - hexdump_ascii(len=21):
72 65 73 74 72 69 63 74 65 64 2e 75 74 65 78 61 restricted.utexa
73 2e 65 64 75 s.edu
1336023993.226907: key_mgmt: 0x1
1336023993.226910: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
1336023993.226916: ca_cert - hexdump_ascii(len=30):
2f 68 6f 6d 65 2f 73 79 6c 65 63 6e 2f 74 65 78 /home/sylecn/tex
74 73 2f 63 61 63 65 72 74 73 2e 70 65 6d ts/cacerts.pem
1336023993.226924: subject_match - hexdump_ascii(len=24):
43 4e 3d 72 65 73 74 72 69 63 74 65 64 2e 75 74 CN=restricted.ut
65 78 61 73 2e 65 64 75 exas.edu
1336023993.226933: anonymous_identity - hexdump_ascii(len=9):
61 6e 6f 6e 79 6d 6f 75 73 anonymous
1336023993.226938: identity - hexdump_ascii(len=6):
79 73 34 35 37 33 ys4573
1336023993.226942: password - hexdump_ascii(len=9): [REMOVED]
1336023993.226945: phase2 - hexdump_ascii(len=13):
61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2
1336023993.226951: priority=20 (0x14)
1336023993.226953: Line: 47 - start of a new network block
1336023993.226955: ssid - hexdump_ascii(len=4):
31 32 31 36 1216
1336023993.226959: key_mgmt: 0x2
1336023993.226961: PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
1336023993.226963: proto: 0x3
1336023993.226966: priority=20 (0x14)
1336023993.226969: id_str - hexdump_ascii(len=12):
6e 61 6e 74 6f 6e 67 2d 31 32 31 36 nantong-1216
1336023993.235005: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1336023993.235023: Line: 57 - start of a new network block
1336023993.235028: ssid - hexdump_ascii(len=3):
31 38 38 188
1336023993.235035: key_mgmt: 0x4
1336023993.235050: wep_key0 - hexdump(len=13): [REMOVED]
1336023993.235055: wep_tx_keyidx=0 (0x0)
1336023993.235058: priority=20 (0x14)
1336023993.235061: id_str - hexdump_ascii(len=10):
6b 65 71 69 61 6f 2d 31 38 38 keqiao-188
1336023993.235067: Line: 78 - start of a new network block
1336023993.235072: ssid - hexdump_ascii(len=13):
79 78 79 2d 33 72 64 2d 66 6c 6f 6f 72 yxy-3rd-floor
1336023993.235078: key_mgmt: 0x2
1336023993.235080: PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
1336023993.235083: proto: 0x3
1336023993.235085: priority=19 (0x13)
1336023993.235089: id_str - hexdump_ascii(len=13):
79 78 79 2d 33 72 64 2d 66 6c 6f 6f 72 yxy-3rd-floor
1336023993.243017: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1336023993.243032: Line: 90 - start of a new network block
1336023993.243038: key_mgmt: 0x4
1336023993.243044: priority=1 (0x1)
1336023993.243070: Priority group 20
1336023993.243073: id=0 ssid='AVP'
1336023993.243075: id=1 ssid='restricted.utexas.edu'
1336023993.243076: id=2 ssid='1216'
1336023993.243078: id=3 ssid='188'
1336023993.243079: Priority group 19
1336023993.243081: id=4 ssid='yxy-3rd-floor'
1336023993.243082: Priority group 1
1336023993.243083: id=5 ssid='
1336023993.243086: Initializing interface (2) 'wlan0'
1336023993.243122: WEXT: cfg80211-based driver detected
1336023993.326592: Interface wlan0 set UP - waiting a second for the driver to complete initialization
1336023994.326802: SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
1336023994.326821: capabilities: key_mgmt 0xf enc 0xf flags 0x0
1336023994.328479: WEXT: Operstate: linkmode=1, operstate=5
1336023994.341774: Own MAC address: 00:27:10:25:55:50
1336023994.341793: wpa_driver_wext_set_wpa
1336023994.341803: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336023994.341815: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336023994.341823: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336023994.341831: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336023994.341838: wpa_driver_wext_set_countermeasures
1336023994.341844: wpa_driver_wext_set_drop_unencrypted
1336023994.341849: RSN: flushing PMKID list in the driver
1336023994.341866: Setting scan request: 0 sec 100000 usec
1336023994.341887: WPS: UUID based on MAC address - hexdump(len=16): bd f0 5a 85 4b 8c 55 6f 88 36 22 11 92 9f 09 2f
1336023994.341901: WPS: Build Beacon and Probe Response IEs
1336023994.341908: WPS: * Version
1336023994.341913: WPS: * Wi-Fi Protected Setup State (0)
1336023994.341918: WPS: * Version
1336023994.341920: WPS: * Wi-Fi Protected Setup State (0)
1336023994.341923: WPS: * Response Type (2)
1336023994.341926: WPS: * UUID-E
1336023994.341930: WPS: * Manufacturer
1336023994.341933: WPS: * Model Name
1336023994.341935: WPS: * Model Number
1336023994.341938: WPS: * Serial Number
1336023994.341940: WPS: * Primary Device Type
1336023994.341943: WPS: * Device Name
1336023994.341945: WPS: * Config Methods (0)
1336023994.341948: WPS: * RF Bands (3)
1336023994.343174: EAPOL: SUPP_PAE entering state DISCONNECTED
1336023994.343183: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1336023994.343186: EAPOL: SUPP_BE entering state INITIALIZE
1336023994.343192: EAP: EAP entering state DISABLED
1336023994.343201: Added interface wlan0
1336023994.343231: RTM_NEWLINK: operstate=0 ifi_flags=0x1102 ()
1336023994.343238: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023994.343246: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023994.343251: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023994.343257: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023994.343261: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023994.343264: Wireless event: cmd=0x8b06 len=12
1336023994.442071: State: DISCONNECTED -> SCANNING
1336023994.442093: Starting AP scan (broadcast SSID)
1336023994.442097: Trying to get current scan results first without requesting a new scan to speed up initial association
1336023994.442123: Received 0 bytes of scan results (0 BSSes)
1336023994.442139: Cached scan results are empty - not posting
1336023994.442145: Selecting BSS from priority group 20
1336023994.442148: Try to find WPA-enabled AP
1336023994.442151: Try to find non-WPA AP
1336023994.442154: Selecting BSS from priority group 19
1336023994.442157: Try to find WPA-enabled AP
1336023994.442159: Try to find non-WPA AP
1336023994.442162: Selecting BSS from priority group 1
1336023994.442165: Try to find WPA-enabled AP
1336023994.442167: Try to find non-WPA AP
1336023994.442170: No suitable AP found.
1336023994.442174: Setting scan request: 0 sec 0 usec
1336023994.442182: Starting AP scan (broadcast SSID)
1336023994.442608: Scan requested (ret=0) - scan timeout 5 seconds
1336023995.344179: EAPOL: disable timer tick
1336023997.669444: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023997.669466: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.669473: Wireless event: cmd=0x8b19 len=16
1336023997.669532: Received 2607 bytes of scan results (5 BSSes)
1336023997.669548: New scan results available
1336023997.669560: WPS: attr type=0x104a len=1
1336023997.669565: WPS: attr type=0x1044 len=1
1336023997.669569: WPS: attr type=0x103b len=1
1336023997.669572: WPS: attr type=0x1047 len=16
1336023997.669574: WPS: attr type=0x1021 len=7
1336023997.669577: WPS: attr type=0x1023 len=9
1336023997.669580: WPS: attr type=0x1024 len=3
1336023997.669583: WPS: attr type=0x1042 len=3
1336023997.669586: WPS: attr type=0x1054 len=8
1336023997.669589: WPS: attr type=0x1011 len=25
1336023997.669592: WPS: attr type=0x1008 len=2
1336023997.669594: WPS: attr type=0x103c len=1
1336023997.669598: WPS: attr type=0x104a len=1
1336023997.669600: WPS: attr type=0x1044 len=1
1336023997.669603: WPS: attr type=0x103b len=1
1336023997.669606: WPS: attr type=0x1047 len=16
1336023997.669608: WPS: attr type=0x1021 len=7
1336023997.669611: WPS: attr type=0x1023 len=9
1336023997.669614: WPS: attr type=0x1024 len=3
1336023997.669616: WPS: attr type=0x1042 len=3
1336023997.669619: WPS: attr type=0x1054 len=8
1336023997.669622: WPS: attr type=0x1011 len=25
1336023997.669624: WPS: attr type=0x1008 len=2
1336023997.669627: WPS: attr type=0x103c len=1
1336023997.669631: Selecting BSS from priority group 20
1336023997.669634: Try to find WPA-enabled AP
1336023997.669637: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336023997.669643: skip - SSID mismatch
1336023997.669646: skip - SSID mismatch
1336023997.669653: selected based on RSN IE
1336023997.669656: selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336023997.669676: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336023997.669683: Cancelling scan request
1336023997.669687: WPA: clearing own WPA/RSN IE
1336023997.669699: Automatic auth_alg selection: 0x1
1336023997.669710: RSN: using IEEE 802.11i/D9.0
1336023997.669713: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336023997.669720: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336023997.669732: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336023997.669743: WPA: using GTK TKIP
1336023997.669746: WPA: using PTK CCMP
1336023997.669749: WPA: using KEY_MGMT WPA-PSK
1336023997.669753: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336023997.669763: No keys have been configured - skip key clearing
1336023997.669767: wpa_driver_wext_set_drop_unencrypted
1336023997.669771: State: SCANNING -> ASSOCIATING
1336023997.669775: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336023997.669779: WEXT: Operstate: linkmode=-1, operstate=5
1336023997.669795: wpa_driver_wext_associate
1336023997.669806: wpa_driver_wext_set_psk
1336023997.669832: Setting authentication timeout: 10 sec 0 usec
1336023997.669840: EAPOL: External notification - EAP success=0
1336023997.669848: EAPOL: External notification - EAP fail=0
1336023997.669854: EAPOL: External notification - portControl=Auto
1336023997.669865: RSN: Ignored PMKID candidate without preauth flag
1336023997.669903: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023997.669914: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.669918: Wireless event: cmd=0x8b06 len=12
1336023997.669924: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023997.669928: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.669932: Wireless event: cmd=0x8b04 len=16
1336023997.685667: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336023997.685694: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.685708: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336023997.685717: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.685723: Wireless event: cmd=0x8c08 len=193
1336023997.685730: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023997.685818: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336023997.685827: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.685834: Wireless event: cmd=0x8b15 len=24
1336023997.685841: Wireless event: new AP: d8:5d:4c:58:2a:32
1336023997.685850: Association info event
1336023997.685855: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023997.685943: State: ASSOCIATING -> ASSOCIATED
1336023997.685954: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336023997.685961: WEXT: Operstate: linkmode=-1, operstate=5
1336023997.685986: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336023997.685992: No keys have been configured - skip key clearing
1336023997.685998: Associated with d8:5d:4c:58:2a:32
1336023997.686002: WPA: Association event - clear replay counter
1336023997.686006: WPA: Clear old PTK
1336023997.686009: EAPOL: External notification - portEnabled=0
1336023997.686016: EAPOL: External notification - portValid=0
1336023997.686020: EAPOL: External notification - EAP success=0
1336023997.686023: EAPOL: External notification - portEnabled=1
1336023997.686027: EAPOL: SUPP_PAE entering state CONNECTING
1336023997.686030: EAPOL: enable timer tick
1336023997.686034: EAPOL: SUPP_BE entering state IDLE
1336023997.686039: Setting authentication timeout: 10 sec 0 usec
1336023997.686045: Cancelling scan request
1336023998.685084: RX EAPOL from d8:5d:4c:58:2a:32
1336023998.685104: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685140: Setting authentication timeout: 10 sec 0 usec
1336023998.685154: IEEE 802.1X RX: version=2 type=3 length=95
1336023998.685160: EAPOL-Key type=2
1336023998.685163: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336023998.685168: key_length=16 key_data_length=0
1336023998.685172: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336023998.685177: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b
1336023998.685187: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685193: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336023998.685198: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336023998.685203: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685213: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685254: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336023998.685260: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336023998.685265: RSN: msg 1/4 key data - hexdump(len=0):
1336023998.686309: WPA: Renewed SNonce - hexdump(len=32): 21 21 d9 63 a9 2d e4 6b f8 46 c8 bb 84 a1 c6 9b ef 43 0f 12 67 3f 5c e3 f6 8d de 05 1e 1e 8b bb
1336023998.686338: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336023998.686343: WPA: PMK - hexdump(len=32): [REMOVED]
1336023998.686346: WPA: PTK - hexdump(len=48): [REMOVED]
1336023998.686350: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336023998.686363: WPA: Sending EAPOL-Key 2/4
1336023998.686369: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 21 21 d9 63 a9 2d e4 6b f8 46 c8 bb 84 a1 c6 9b ef 43 0f 12 67 3f 5c e3 f6 8d de 05 1e 1e 8b bb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b e9 d0 08 f9 fb 44 01 77 a0 11 e9 1e 34 4f c1 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336023998.686425: EAPOL: startWhen --> 0
1336023998.686430: EAPOL: disable timer tick
1336023998.686433: EAPOL: SUPP_PAE entering state CONNECTING
1336023998.686436: EAPOL: enable timer tick
1336023998.686439: EAPOL: txStart
1336023998.686442: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336023998.691153: RX EAPOL from d8:5d:4c:58:2a:32
1336023998.691167: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 ca 5c d2 5f a7 23 e5 77 8b 2f 92 2e 1c 6f 8e 00 68 db 44 9e 81 fc e8 42 2a d1 a8 3e c0 80 40 b0 85 63 2a 93 c9 4b 22 9b f6 a0 98 c7 75 e4 91 f7 29 a4 0c d6 76 c3 e5 c0 94 cb 21 4d 31 46 04 8b 69 cc 50 c4 a2 c8 5c da 08 8f 4c 2f 68 c9 00 10 79 71 88 6c 2c c6 f3 fd f5 57 7b 1a 28 4c f1 33 97 c1 e4 21 cd 40 12 c9 1f 50 77 8f a0 7e e2 ad a4 2d 2c f2 bf dd 73 b0 02
1336023998.691230: IEEE 802.1X RX: version=2 type=3 length=199
1336023998.691236: EAPOL-Key type=2
1336023998.691239: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336023998.691246: key_length=16 key_data_length=104
1336023998.691250: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336023998.691256: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b
1336023998.691268: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.691277: key_rsc - hexdump(len=8): e0 56 00 00 00 00 00 00
1336023998.691282: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336023998.691288: key_mic - hexdump(len=16): 08 ca 5c d2 5f a7 23 e5 77 8b 2f 92 2e 1c 6f 8e
1336023998.691297: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 ca 5c d2 5f a7 23 e5 77 8b 2f 92 2e 1c 6f 8e 00 68 db 44 9e 81 fc e8 42 2a d1 a8 3e c0 80 40 b0 85 63 2a 93 c9 4b 22 9b f6 a0 98 c7 75 e4 91 f7 29 a4 0c d6 76 c3 e5 c0 94 cb 21 4d 31 46 04 8b 69 cc 50 c4 a2 c8 5c da 08 8f 4c 2f 68 c9 00 10 79 71 88 6c 2c c6 f3 fd f5 57 7b 1a 28 4c f1 33 97 c1 e4 21 cd 40 12 c9 1f 50 77 8f a0 7e e2 ad a4 2d 2c f2 bf dd 73 b0 02
1336023998.691364: RSN: encrypted key data - hexdump(len=104): db 44 9e 81 fc e8 42 2a d1 a8 3e c0 80 40 b0 85 63 2a 93 c9 4b 22 9b f6 a0 98 c7 75 e4 91 f7 29 a4 0c d6 76 c3 e5 c0 94 cb 21 4d 31 46 04 8b 69 cc 50 c4 a2 c8 5c da 08 8f 4c 2f 68 c9 00 10 79 71 88 6c 2c c6 f3 fd f5 57 7b 1a 28 4c f1 33 97 c1 e4 21 cd 40 12 c9 1f 50 77 8f a0 7e e2 ad a4 2d 2c f2 bf dd 73 b0 02
1336023998.691435: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336023998.691442: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336023998.691446: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336023998.691452: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336023998.691486: WPA: Sending EAPOL-Key 4/4
1336023998.691493: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 66 2c 10 68 75 6b 36 89 78 53 12 e9 33 7d 6d 00 00
1336023998.691545: WPA: Installing PTK to the driver.
1336023998.691551: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336023998.691579: EAPOL: External notification - portValid=1
1336023998.691585: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336023998.691589: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336023998.691594: WPA: Group Key - hexdump(len=32): [REMOVED]
1336023998.691598: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336023998.691602: WPA: RSC - hexdump(len=6): e0 56 00 00 00 00
1336023998.691608: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336023998.691622: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336023998.691629: Cancelling authentication timeout
1336023998.691633: State: GROUP_HANDSHAKE -> COMPLETED
1336023998.691639: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (auth) [id=2 id_str=nantong-1216]
1336023998.691644: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336023998.691649: WEXT: Operstate: linkmode=-1, operstate=6
1336023998.692394: EAPOL: External notification - portValid=1
1336023998.692404: EAPOL: External notification - EAP success=1
1336023998.692408: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336023998.692411: EAPOL: SUPP_BE entering state SUCCESS
1336023998.692415: EAP: EAP entering state DISABLED
1336023998.692418: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336023998.692421: EAPOL: SUPP_BE entering state IDLE
1336023998.692425: EAPOL authentication completed successfully
1336023998.692441: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336023998.692448: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024028.715938: EAPOL: startWhen --> 0
1336024028.715957: EAPOL: disable timer tick
1336024300.904892: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024300.904914: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024300.936349: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024300.936364: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024300.936372: Wireless event: cmd=0x8b15 len=24
1336024300.936378: Wireless event: new AP: 00:00:00:00:00:00
1336024300.936394: Setting scan request: 0 sec 100000 usec
1336024300.936405: Added BSSID d8:5d:4c:58:2a:32 into blacklist
1336024300.936413: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1336024300.936419: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024300.936438: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024300.936449: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024300.936459: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024300.936469: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024300.936479: State: COMPLETED -> DISCONNECTED
1336024300.936486: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024300.936493: WEXT: Operstate: linkmode=-1, operstate=5
1336024300.936508: EAPOL: External notification - portEnabled=0
1336024300.936515: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024300.936520: EAPOL: SUPP_BE entering state INITIALIZE
1336024300.936527: EAPOL: External notification - portValid=0
1336024300.936533: EAPOL: External notification - EAP success=0
1336024301.036605: State: DISCONNECTED -> SCANNING
1336024301.036628: Starting AP scan (broadcast SSID)
1336024301.037041: Scan requested (ret=0) - scan timeout 30 seconds
1336024304.242219: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024304.242242: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.242251: Wireless event: cmd=0x8b19 len=16
1336024304.242293: Received 694 bytes of scan results (1 BSSes)
1336024304.242302: New scan results available
1336024304.242309: WPS: attr type=0x104a len=1
1336024304.242313: WPS: attr type=0x1044 len=1
1336024304.242317: WPS: attr type=0x103b len=1
1336024304.242320: WPS: attr type=0x1047 len=16
1336024304.242324: WPS: attr type=0x1021 len=7
1336024304.242327: WPS: attr type=0x1023 len=9
1336024304.242330: WPS: attr type=0x1024 len=3
1336024304.242334: WPS: attr type=0x1042 len=3
1336024304.242337: WPS: attr type=0x1054 len=8
1336024304.242341: WPS: attr type=0x1011 len=25
1336024304.242344: WPS: attr type=0x1008 len=2
1336024304.242348: WPS: attr type=0x103c len=1
1336024304.242352: WPS: attr type=0x104a len=1
1336024304.242355: WPS: attr type=0x1044 len=1
1336024304.242358: WPS: attr type=0x103b len=1
1336024304.242361: WPS: attr type=0x1047 len=16
1336024304.242365: WPS: attr type=0x1021 len=7
1336024304.242368: WPS: attr type=0x1023 len=9
1336024304.242371: WPS: attr type=0x1024 len=3
1336024304.242375: WPS: attr type=0x1042 len=3
1336024304.242378: WPS: attr type=0x1054 len=8
1336024304.242381: WPS: attr type=0x1011 len=25
1336024304.242385: WPS: attr type=0x1008 len=2
1336024304.242388: WPS: attr type=0x103c len=1
1336024304.242392: Selecting BSS from priority group 20
1336024304.242396: Try to find WPA-enabled AP
1336024304.242399: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336024304.242406: skip - SSID mismatch
1336024304.242410: skip - SSID mismatch
1336024304.242415: selected based on RSN IE
1336024304.242418: selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336024304.242428: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336024304.242434: Cancelling scan request
1336024304.242438: WPA: clearing own WPA/RSN IE
1336024304.242449: Automatic auth_alg selection: 0x1
1336024304.242458: RSN: using IEEE 802.11i/D9.0
1336024304.242462: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336024304.242468: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336024304.242482: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336024304.242495: WPA: using GTK TKIP
1336024304.242499: WPA: using PTK CCMP
1336024304.242502: WPA: using KEY_MGMT WPA-PSK
1336024304.242507: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024304.242518: No keys have been configured - skip key clearing
1336024304.242522: wpa_driver_wext_set_drop_unencrypted
1336024304.242527: State: SCANNING -> ASSOCIATING
1336024304.242531: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024304.242536: WEXT: Operstate: linkmode=-1, operstate=5
1336024304.242550: wpa_driver_wext_associate
1336024304.242563: wpa_driver_wext_set_psk
1336024304.242590: Setting authentication timeout: 10 sec 0 usec
1336024304.242597: EAPOL: External notification - EAP success=0
1336024304.242604: EAPOL: External notification - EAP fail=0
1336024304.242608: EAPOL: External notification - portControl=Auto
1336024304.242746: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024304.242754: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.242759: Wireless event: cmd=0x8b06 len=12
1336024304.242765: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024304.242769: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.242774: Wireless event: cmd=0x8b04 len=16
1336024304.258639: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024304.258660: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.258670: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024304.258675: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.258680: Wireless event: cmd=0x8c08 len=193
1336024304.258685: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.258746: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024304.258752: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.258756: Wireless event: cmd=0x8b15 len=24
1336024304.258760: Wireless event: new AP: d8:5d:4c:58:2a:32
1336024304.258765: Association info event
1336024304.258768: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.258826: State: ASSOCIATING -> ASSOCIATED
1336024304.258831: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024304.258837: WEXT: Operstate: linkmode=-1, operstate=5
1336024304.258859: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336024304.258865: No keys have been configured - skip key clearing
1336024304.258870: Associated with d8:5d:4c:58:2a:32
1336024304.258874: WPA: Association event - clear replay counter
1336024304.258878: WPA: Clear old PTK
1336024304.258882: EAPOL: External notification - portEnabled=0
1336024304.258888: EAPOL: External notification - portValid=0
1336024304.258892: EAPOL: External notification - EAP success=0
1336024304.258896: EAPOL: External notification - portEnabled=1
1336024304.258899: EAPOL: SUPP_PAE entering state CONNECTING
1336024304.258903: EAPOL: enable timer tick
1336024304.258907: EAPOL: SUPP_BE entering state IDLE
1336024304.258912: Setting authentication timeout: 10 sec 0 usec
1336024304.258918: Cancelling scan request
1336024304.456352: RX EAPOL from d8:5d:4c:58:2a:32
1336024304.456374: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456417: Setting authentication timeout: 10 sec 0 usec
1336024304.456426: IEEE 802.1X RX: version=2 type=3 length=95
1336024304.456432: EAPOL-Key type=2
1336024304.456436: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024304.456442: key_length=16 key_data_length=0
1336024304.456446: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1336024304.456452: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e
1336024304.456464: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456472: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024304.456478: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024304.456484: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456496: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456543: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336024304.456550: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024304.456556: RSN: msg 1/4 key data - hexdump(len=0):
1336024304.457930: WPA: Renewed SNonce - hexdump(len=32): a6 10 d5 d3 f7 c8 9d 09 be 7b 04 d6 c1 65 31 ec 5c 8c ab 3b f8 dc f0 43 51 f2 da ef 3e 15 80 85
1336024304.457964: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024304.457971: WPA: PMK - hexdump(len=32): [REMOVED]
1336024304.457974: WPA: PTK - hexdump(len=48): [REMOVED]
1336024304.457979: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024304.457990: WPA: Sending EAPOL-Key 2/4
1336024304.457998: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 a6 10 d5 d3 f7 c8 9d 09 be 7b 04 d6 c1 65 31 ec 5c 8c ab 3b f8 dc f0 43 51 f2 da ef 3e 15 80 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b ef 56 2d 7b 9d e7 52 2e 17 fa 08 ba f4 dc 88 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024305.258190: RX EAPOL from d8:5d:4c:58:2a:32
1336024305.258209: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258242: IEEE 802.1X RX: version=2 type=3 length=95
1336024305.258247: EAPOL-Key type=2
1336024305.258250: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024305.258256: key_length=16 key_data_length=0
1336024305.258259: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336024305.258264: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e
1336024305.258275: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258281: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024305.258286: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024305.258291: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258301: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258340: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024305.258346: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024305.258351: RSN: msg 1/4 key data - hexdump(len=0):
1336024305.258370: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024305.258375: WPA: PMK - hexdump(len=32): [REMOVED]
1336024305.258378: WPA: PTK - hexdump(len=48): [REMOVED]
1336024305.258382: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024305.258392: WPA: Sending EAPOL-Key 2/4
1336024305.258398: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 a6 10 d5 d3 f7 c8 9d 09 be 7b 04 d6 c1 65 31 ec 5c 8c ab 3b f8 dc f0 43 51 f2 da ef 3e 15 80 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 1e 2d 0c 33 82 6c 9f ca dd 2d 2c f2 e6 e5 f9 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024305.258966: EAPOL: startWhen --> 0
1336024305.258972: EAPOL: disable timer tick
1336024305.258975: EAPOL: SUPP_PAE entering state CONNECTING
1336024305.258978: EAPOL: enable timer tick
1336024305.258982: EAPOL: txStart
1336024305.258984: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336024305.263516: RX EAPOL from d8:5d:4c:58:2a:32
1336024305.263531: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec a2 bb 1e 53 14 85 b3 aa bc a1 b4 42 78 20 b1 00 68 70 14 47 d6 8c d3 82 e5 ee a7 ad be 8f 1e b1 aa be 35 b3 db 45 24 83 9d b3 67 bd c2 82 ad f0 96 96 62 88 3f 2e d1 a3 e0 de 29 75 9c 22 3a 49 ea bc 0e 5c 79 23 6d 2a 12 3f 11 37 9d ed f7 20 a6 ac 73 cd f7 a6 46 37 58 6c 43 23 ca 6f bc 6c 95 0c b4 a3 8a 42 70 a5 4e af 50 ec 10 aa c4 52 05 da 41 05 fe 02 57 4c 08
1336024305.263595: IEEE 802.1X RX: version=2 type=3 length=199
1336024305.263601: EAPOL-Key type=2
1336024305.263604: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336024305.263611: key_length=16 key_data_length=104
1336024305.263615: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336024305.263621: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e
1336024305.263633: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.263641: key_rsc - hexdump(len=8): a6 57 00 00 00 00 00 00
1336024305.263647: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024305.263653: key_mic - hexdump(len=16): ec a2 bb 1e 53 14 85 b3 aa bc a1 b4 42 78 20 b1
1336024305.263662: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec a2 bb 1e 53 14 85 b3 aa bc a1 b4 42 78 20 b1 00 68 70 14 47 d6 8c d3 82 e5 ee a7 ad be 8f 1e b1 aa be 35 b3 db 45 24 83 9d b3 67 bd c2 82 ad f0 96 96 62 88 3f 2e d1 a3 e0 de 29 75 9c 22 3a 49 ea bc 0e 5c 79 23 6d 2a 12 3f 11 37 9d ed f7 20 a6 ac 73 cd f7 a6 46 37 58 6c 43 23 ca 6f bc 6c 95 0c b4 a3 8a 42 70 a5 4e af 50 ec 10 aa c4 52 05 da 41 05 fe 02 57 4c 08
1336024305.263729: RSN: encrypted key data - hexdump(len=104): 70 14 47 d6 8c d3 82 e5 ee a7 ad be 8f 1e b1 aa be 35 b3 db 45 24 83 9d b3 67 bd c2 82 ad f0 96 96 62 88 3f 2e d1 a3 e0 de 29 75 9c 22 3a 49 ea bc 0e 5c 79 23 6d 2a 12 3f 11 37 9d ed f7 20 a6 ac 73 cd f7 a6 46 37 58 6c 43 23 ca 6f bc 6c 95 0c b4 a3 8a 42 70 a5 4e af 50 ec 10 aa c4 52 05 da 41 05 fe 02 57 4c 08
1336024305.263784: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336024305.263790: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024305.263794: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024305.263800: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336024305.263833: WPA: Sending EAPOL-Key 4/4
1336024305.263840: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 97 3d 90 2a e4 a2 bb 5e 59 c9 48 c3 e3 01 87 c7 00 00
1336024305.263892: WPA: Installing PTK to the driver.
1336024305.263899: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336024305.263928: EAPOL: External notification - portValid=1
1336024305.263934: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336024305.263938: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336024305.263943: WPA: Group Key - hexdump(len=32): [REMOVED]
1336024305.263947: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336024305.263951: WPA: RSC - hexdump(len=6): a6 57 00 00 00 00
1336024305.263956: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336024305.263971: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336024305.263977: Cancelling authentication timeout
1336024305.263982: Removed BSSID d8:5d:4c:58:2a:32 from blacklist
1336024305.263987: State: GROUP_HANDSHAKE -> COMPLETED
1336024305.263993: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
1336024305.263998: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336024305.264003: WEXT: Operstate: linkmode=-1, operstate=6
1336024305.264763: EAPOL: External notification - portValid=1
1336024305.264774: EAPOL: External notification - EAP success=1
1336024305.264778: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336024305.264781: EAPOL: SUPP_BE entering state SUCCESS
1336024305.264785: EAP: EAP entering state DISABLED
1336024305.264788: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336024305.264791: EAPOL: SUPP_BE entering state IDLE
1336024305.264795: EAPOL authentication completed successfully
1336024305.264810: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336024305.264818: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024335.291164: EAPOL: startWhen --> 0
1336024335.291182: EAPOL: disable timer tick
1336024481.296988: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024481.297009: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024481.328372: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024481.328396: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024481.328406: Wireless event: cmd=0x8b15 len=24
1336024481.328414: Wireless event: new AP: 00:00:00:00:00:00
1336024481.328427: Setting scan request: 0 sec 100000 usec
1336024481.328434: Added BSSID d8:5d:4c:58:2a:32 into blacklist
1336024481.328440: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1336024481.328448: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024481.328460: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024481.328464: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024481.328467: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024481.328470: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024481.328473: State: COMPLETED -> DISCONNECTED
1336024481.328477: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024481.328479: WEXT: Operstate: linkmode=-1, operstate=5
1336024481.328488: EAPOL: External notification - portEnabled=0
1336024481.328491: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024481.328493: EAPOL: SUPP_BE entering state INITIALIZE
1336024481.328496: EAPOL: External notification - portValid=0
1336024481.328498: EAPOL: External notification - EAP success=0
1336024481.428617: State: DISCONNECTED -> SCANNING
1336024481.428638: Starting AP scan (broadcast SSID)
1336024481.429050: Scan requested (ret=0) - scan timeout 30 seconds
1336024484.688969: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024484.688992: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.688999: Wireless event: cmd=0x8b19 len=16
1336024484.689063: Received 3991 bytes of scan results (7 BSSes)
1336024484.689077: New scan results available
1336024484.689083: WPS: attr type=0x104a len=1
1336024484.689087: WPS: attr type=0x1044 len=1
1336024484.689090: WPS: attr type=0x103b len=1
1336024484.689093: WPS: attr type=0x1047 len=16
1336024484.689095: WPS: attr type=0x1021 len=7
1336024484.689098: WPS: attr type=0x1023 len=9
1336024484.689101: WPS: attr type=0x1024 len=3
1336024484.689104: WPS: attr type=0x1042 len=3
1336024484.689107: WPS: attr type=0x1054 len=8
1336024484.689110: WPS: attr type=0x1011 len=25
1336024484.689112: WPS: attr type=0x1008 len=2
1336024484.689115: WPS: attr type=0x103c len=1
1336024484.689118: WPS: attr type=0x104a len=1
1336024484.689121: WPS: attr type=0x1044 len=1
1336024484.689124: WPS: attr type=0x103b len=1
1336024484.689126: WPS: attr type=0x1047 len=16
1336024484.689129: WPS: attr type=0x1021 len=7
1336024484.689132: WPS: attr type=0x1023 len=9
1336024484.689135: WPS: attr type=0x1024 len=3
1336024484.689137: WPS: attr type=0x1042 len=3
1336024484.689140: WPS: attr type=0x1054 len=8
1336024484.689143: WPS: attr type=0x1011 len=25
1336024484.689146: WPS: attr type=0x1008 len=2
1336024484.689148: WPS: attr type=0x103c len=1
1336024484.689152: Selecting BSS from priority group 20
1336024484.689155: Try to find WPA-enabled AP
1336024484.689158: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336024484.689164: skip - SSID mismatch
1336024484.689166: skip - SSID mismatch
1336024484.689171: selected based on RSN IE
1336024484.689174: selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336024484.689183: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336024484.689188: Cancelling scan request
1336024484.689192: WPA: clearing own WPA/RSN IE
1336024484.689207: Automatic auth_alg selection: 0x1
1336024484.689219: RSN: using IEEE 802.11i/D9.0
1336024484.689228: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336024484.689234: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336024484.689246: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336024484.689257: WPA: using GTK TKIP
1336024484.689260: WPA: using PTK CCMP
1336024484.689263: WPA: using KEY_MGMT WPA-PSK
1336024484.689267: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024484.689277: No keys have been configured - skip key clearing
1336024484.689280: wpa_driver_wext_set_drop_unencrypted
1336024484.689285: State: SCANNING -> ASSOCIATING
1336024484.689288: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024484.689292: WEXT: Operstate: linkmode=-1, operstate=5
1336024484.689305: wpa_driver_wext_associate
1336024484.689317: wpa_driver_wext_set_psk
1336024484.689342: Setting authentication timeout: 10 sec 0 usec
1336024484.689350: EAPOL: External notification - EAP success=0
1336024484.689358: EAPOL: External notification - EAP fail=0
1336024484.689364: EAPOL: External notification - portControl=Auto
1336024484.689402: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024484.689412: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.689416: Wireless event: cmd=0x8b06 len=12
1336024484.689421: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024484.689425: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.689428: Wireless event: cmd=0x8b04 len=16
1336024484.710822: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024484.710842: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.710848: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024484.710850: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.710852: Wireless event: cmd=0x8c08 len=193
1336024484.710855: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.710884: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024484.710886: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.710888: Wireless event: cmd=0x8b15 len=24
1336024484.710890: Wireless event: new AP: d8:5d:4c:58:2a:32
1336024484.710892: Association info event
1336024484.710894: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.710919: State: ASSOCIATING -> ASSOCIATED
1336024484.710922: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024484.710925: WEXT: Operstate: linkmode=-1, operstate=5
1336024484.710941: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336024484.710944: No keys have been configured - skip key clearing
1336024484.710947: Associated with d8:5d:4c:58:2a:32
1336024484.710949: WPA: Association event - clear replay counter
1336024484.710950: WPA: Clear old PTK
1336024484.710952: EAPOL: External notification - portEnabled=0
1336024484.710957: EAPOL: External notification - portValid=0
1336024484.710959: EAPOL: External notification - EAP success=0
1336024484.710960: EAPOL: External notification - portEnabled=1
1336024484.710962: EAPOL: SUPP_PAE entering state CONNECTING
1336024484.710963: EAPOL: enable timer tick
1336024484.710966: EAPOL: SUPP_BE entering state IDLE
1336024484.710968: Setting authentication timeout: 10 sec 0 usec
1336024484.710971: Cancelling scan request
1336024484.901203: RX EAPOL from d8:5d:4c:58:2a:32
1336024484.901223: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901259: Setting authentication timeout: 10 sec 0 usec
1336024484.901267: IEEE 802.1X RX: version=2 type=3 length=95
1336024484.901272: EAPOL-Key type=2
1336024484.901275: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024484.901281: key_length=16 key_data_length=0
1336024484.901284: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1336024484.901289: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20
1336024484.901299: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901306: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024484.901311: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024484.901316: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901326: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901364: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336024484.901370: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024484.901375: RSN: msg 1/4 key data - hexdump(len=0):
1336024484.902500: WPA: Renewed SNonce - hexdump(len=32): f7 dc 43 da 46 5f fe cd b2 08 70 fb 7d 9f ea a1 ab f2 4a 12 a1 e2 ba 18 8a 6b a3 9a 15 3c 10 fc
1336024484.902528: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024484.902533: WPA: PMK - hexdump(len=32): [REMOVED]
1336024484.902537: WPA: PTK - hexdump(len=48): [REMOVED]
1336024484.902540: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024484.902550: WPA: Sending EAPOL-Key 2/4
1336024484.902556: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 f7 dc 43 da 46 5f fe cd b2 08 70 fb 7d 9f ea a1 ab f2 4a 12 a1 e2 ba 18 8a 6b a3 9a 15 3c 10 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 0f ae f1 54 c9 db 78 c7 9f 29 e2 d1 df 88 ae 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024485.706891: RX EAPOL from d8:5d:4c:58:2a:32
1336024485.706910: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.706944: IEEE 802.1X RX: version=2 type=3 length=95
1336024485.706949: EAPOL-Key type=2
1336024485.706952: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024485.706957: key_length=16 key_data_length=0
1336024485.706961: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336024485.706966: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20
1336024485.706976: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.706983: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024485.706988: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024485.706993: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.707003: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.707042: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024485.707048: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024485.707053: RSN: msg 1/4 key data - hexdump(len=0):
1336024485.707072: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024485.707077: WPA: PMK - hexdump(len=32): [REMOVED]
1336024485.707080: WPA: PTK - hexdump(len=48): [REMOVED]
1336024485.707084: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024485.707094: WPA: Sending EAPOL-Key 2/4
1336024485.707100: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 f7 dc 43 da 46 5f fe cd b2 08 70 fb 7d 9f ea a1 ab f2 4a 12 a1 e2 ba 18 8a 6b a3 9a 15 3c 10 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 3e 1d 18 bd 1b 1f d0 0e 4c 9f c3 d6 0c c1 ce 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024485.711039: EAPOL: startWhen --> 0
1336024485.711054: EAPOL: disable timer tick
1336024485.711061: EAPOL: SUPP_PAE entering state CONNECTING
1336024485.711068: EAPOL: enable timer tick
1336024485.711075: EAPOL: txStart
1336024485.711082: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336024485.713406: RX EAPOL from d8:5d:4c:58:2a:32
1336024485.713414: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 8a 4f 72 82 9b f7 32 d8 1d 9e a3 a7 44 a9 8a 00 68 06 d4 40 59 28 87 ba 56 df 95 85 a2 c3 0f 4c b6 65 a6 ef 6b 55 31 9e c2 5d 11 ab ae fb db 7f 3d bf 3d 95 95 72 7f 97 e3 78 35 28 0f 8b ec 11 44 b6 04 12 f0 93 c3 98 33 12 12 89 b2 96 24 8a 41 01 57 01 d9 fa cd 5b 1d 6a 46 82 18 f0 1a ab 6c 99 80 57 e0 64 8d f6 c8 66 17 1d b7 6b 24 f1 a6 a4 cc 4f 0e 8b 91 02 3c
1336024485.713463: IEEE 802.1X RX: version=2 type=3 length=199
1336024485.713467: EAPOL-Key type=2
1336024485.713469: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336024485.713474: key_length=16 key_data_length=104
1336024485.713476: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336024485.713480: key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20
1336024485.713489: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.713494: key_rsc - hexdump(len=8): 25 58 00 00 00 00 00 00
1336024485.713498: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024485.713503: key_mic - hexdump(len=16): 01 8a 4f 72 82 9b f7 32 d8 1d 9e a3 a7 44 a9 8a
1336024485.713509: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 8a 4f 72 82 9b f7 32 d8 1d 9e a3 a7 44 a9 8a 00 68 06 d4 40 59 28 87 ba 56 df 95 85 a2 c3 0f 4c b6 65 a6 ef 6b 55 31 9e c2 5d 11 ab ae fb db 7f 3d bf 3d 95 95 72 7f 97 e3 78 35 28 0f 8b ec 11 44 b6 04 12 f0 93 c3 98 33 12 12 89 b2 96 24 8a 41 01 57 01 d9 fa cd 5b 1d 6a 46 82 18 f0 1a ab 6c 99 80 57 e0 64 8d f6 c8 66 17 1d b7 6b 24 f1 a6 a4 cc 4f 0e 8b 91 02 3c
1336024485.713561: RSN: encrypted key data - hexdump(len=104): 06 d4 40 59 28 87 ba 56 df 95 85 a2 c3 0f 4c b6 65 a6 ef 6b 55 31 9e c2 5d 11 ab ae fb db 7f 3d bf 3d 95 95 72 7f 97 e3 78 35 28 0f 8b ec 11 44 b6 04 12 f0 93 c3 98 33 12 12 89 b2 96 24 8a 41 01 57 01 d9 fa cd 5b 1d 6a 46 82 18 f0 1a ab 6c 99 80 57 e0 64 8d f6 c8 66 17 1d b7 6b 24 f1 a6 a4 cc 4f 0e 8b 91 02 3c
1336024485.713601: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336024485.713605: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024485.713608: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024485.713612: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336024485.713638: WPA: Sending EAPOL-Key 4/4
1336024485.713643: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 76 84 74 41 b1 02 c3 fe 03 1a ca 11 45 aa d5 00 00
1336024485.713683: WPA: Installing PTK to the driver.
1336024485.713688: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336024485.713709: EAPOL: External notification - portValid=1
1336024485.713715: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336024485.713717: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336024485.713721: WPA: Group Key - hexdump(len=32): [REMOVED]
1336024485.713724: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336024485.713727: WPA: RSC - hexdump(len=6): 25 58 00 00 00 00
1336024485.713731: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336024485.713742: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336024485.713747: Cancelling authentication timeout
1336024485.713750: Removed BSSID d8:5d:4c:58:2a:32 from blacklist
1336024485.713754: State: GROUP_HANDSHAKE -> COMPLETED
1336024485.713759: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
1336024485.713762: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336024485.713766: WEXT: Operstate: linkmode=-1, operstate=6
1336024485.714287: EAPOL: External notification - portValid=1
1336024485.714296: EAPOL: External notification - EAP success=1
1336024485.714299: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336024485.714302: EAPOL: SUPP_BE entering state SUCCESS
1336024485.714304: EAP: EAP entering state DISABLED
1336024485.714307: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336024485.714309: EAPOL: SUPP_BE entering state IDLE
1336024485.714312: EAPOL authentication completed successfully
1336024485.714325: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336024485.714330: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024515.742384: EAPOL: startWhen --> 0
1336024515.742403: EAPOL: disable timer tick
1336024661.477540: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024661.477565: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024661.508797: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024661.508811: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024661.508820: Wireless event: cmd=0x8b15 len=24
1336024661.508827: Wireless event: new AP: 00:00:00:00:00:00
1336024661.508842: Setting scan request: 0 sec 100000 usec
1336024661.508853: Added BSSID d8:5d:4c:58:2a:32 into blacklist
1336024661.508864: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1336024661.508872: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024661.508893: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024661.508907: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024661.508919: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024661.508932: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024661.508944: State: COMPLETED -> DISCONNECTED
1336024661.508953: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024661.508961: WEXT: Operstate: linkmode=-1, operstate=5
1336024661.508978: EAPOL: External notification - portEnabled=0
1336024661.508987: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024661.508993: EAPOL: SUPP_BE enter
 
Old 05-06-2012, 05:59 AM
Chris Bannister
 
Default wpa_supplicant drops connection frequently

On Thu, May 03, 2012 at 03:24:18PM +0800, Yuanle Song wrote:
> In the last two days, my wireless connection is very unstable. It drops
> every few minutes and when it is connected, it's very slow and
> unusable. Could you help me to debug this problem?
>
> Here is the hardware, software and network info:
> - thinkpad x201 with Intel Corporation Centrino Advanced-N 6200
> (used non-free firmware)
> - Debian GNU/Linux 6.0.4 (squeeze)
> - wpasupplicant 0.6.10-2.1
> - wireless AP with SSID "1216" is provided on a TP-LINK router.
> using WPA2-PSK security.
>
> Here is some of the non-debug outputs:
> - seesion 1
> # /sbin/wpa_supplicant -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
> Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
> Associated with d8:5d:4c:58:2a:32
> WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
> CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (auth) [id=2 id_str=nantong-1216]
> WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
> WPA: Invalid EAPOL-Key MIC - dropping packet
>
> - session 2
> # /sbin/wpa_supplicant -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
> Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
> Associated with d8:5d:4c:58:2a:32
> WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
> CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
> WPA: EAPOL-Key Replay Counter did not increase - dropping packet
> WPA: EAPOL-Key Replay Counter did not increase - dropping packet
> WPA: Invalid EAPOL-Key MIC - dropping packet
> WPA: EAPOL-Key Replay Counter did not increase - dropping packet
> WPA: EAPOL-Key Replay Counter did not increase - dropping packet
>
> google did not turn too much helpful information, but did suggest a
> debug run of wpa_supplicant. So I did a debug run using -ddt and also

You may have better luck here:
http://lists.shmoo.com/mailman/listinfo/hostap

--
"Religion is excellent stuff for keeping common people quiet."
-- Napoleon Bonaparte


--
To UNSUBSCRIBE, email to debian-user-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 20120506055908.GP20227@tal">http://lists.debian.org/20120506055908.GP20227@tal
 

Thread Tools




All times are GMT. The time now is 03:43 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org