The wpa_supplicant log and packet trace are attached.
tcpdump.pcap
Description: application/vnd.tcpdump.pcap
ioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument Initializing interface 'wlan0' conf '/var/lib/wicd/configurations/00211cff6c30' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/var/lib/wicd/configurations/00211cff6c30' -> '/var/lib/wicd/configurations/00211cff6c30' Reading configuration file '/var/lib/wicd/configurations/00211cff6c30' ap_scan=1 ctrl_interface='/var/run/wpa_supplicant' Priority group 0 id=0 ssid='ke_wireless' WEXT: cfg80211-based driver detected SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 Own MAC address: 10:0b:a9:a2:0e:b0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_countermeasures RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec WPS: UUID based on MAC address - hexdump(len=16): a7 0d 0f 77 28 24 52 d8 8a 10 35 f3 4f 65 50 7b EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=11): 6b 65 5f 77 69 72 65 6c 65 73 73 ke_wireless Starting AP scan for specific SSID(s) Scan requested (ret=0) - scan timeout 5 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Scan results did not fit - trying larger buffer (8192 bytes) Received 5355 bytes of scan results (13 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID 00:21:1c:fd:a6:30 SSID 'ke_wireless' BSS: Add new id 1 BSSID 00:21:1c:fd:a6:32 SSID '' BSS: Add new id 2 BSSID 00:21:1c:fd:a6:34 SSID '' BSS: Add new id 3 BSSID 00:21:1c:fd:a6:30 SSID '' BSS: Add new id 4 BSSID 00:21:1c:ff:6c:30 SSID '' BSS: Add new id 5 BSSID 00:21:1c:ff:6c:30 SSID 'ke_wireless' BSS: Add new id 6 BSSID 00:21:1c:ff:6c:33 SSID '' BSS: Add new id 7 BSSID 00:24:6c:ea:03:e1 SSID 'whmobilepac' BSS: Add new id 8 BSSID 00:21:1c:fd:a6:31 SSID 'ke_guest' BSS: Add new id 9 BSSID 00:21:1c:ff:6c:31 SSID 'ke_guest' BSS: Add new id 10 BSSID 00:24:6c:ea:03:e0 SSID 'WHguest_PAC' BSS: Add new id 11 BSSID ea:66:5b:37:24:45 SSID 'airportthru' BSS: Add new id 12 BSSID 00:0b:86:28:45:40 SSID 'WHguest_PAC' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:21:1c:fd:a6:30 ssid='ke_wireless' Trying to associate with 00:21:1c:fd:a6:30 (SSID='ke_wireless' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT 802.1X WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=27 RX EAPOL from 00:21:1c:fd:a6:30 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=51 AssocResp IE wireless event - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:21:1c:fd:a6:30 Association info event resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:21:1c:fd:a6:30 No keys have been configured - skip key clearing Associated with 00:21:1c:fd:a6:30 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from 00:21:1c:fd:a6:30 Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=50): 00 6e 65 74 77 6f 72 6b 69 64 3d 6b 65 5f 77 69 _networkid=ke_wi 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 50 41 2d reless,nasid=PA- 32 31 31 32 2d 57 4c 43 31 2c 70 6f 72 74 69 64 2112-WLC1,portid 3d 31 =1 EAP: using real identity - hexdump_ascii(len=8): 6b 72 69 73 68 6e 61 72 krishnar EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 21 EAP: vendor 0 method 21 not allowed CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 -> NAK EAP: Building EAP-Nak (requested type 21 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=72): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 2e 00 00 00 TLS: using phase1 config options CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x21 EAP-PEAP: Start (server ver=1, own ver=1) EAP-PEAP: Using PEAP version 1 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 237 bytes pending from ssl_out SSL: 237 bytes left to be sent out (of total 237 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=17) - Flags 0x81 SSL: TLS Message Length: 7 SSL: (where=0x4004 ret=0x22a) SSL: SSL3 alert: read (remote end reported an error):fatal:bad certificate SSL: (where=0x1002 ret=0x0) SSL: SSL_connect:failed in SSLv3 read server hello A OpenSSL: openssl_handshake - SSL_connect error:14094412:SSL routines:SSL3_READ_BYTES:sslv3 alert bad certificate SSL: 0 bytes pending from ssl_out SSL: Failed - tls_out available to report error SSL: No data to be sent out SSL: Building ACK (type=25 id=4 ver=1) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Failure EAP: EAP entering state FAILURE CTRL-EVENT-EAP-FAILURE EAP authentication failed EAPOL: SUPP_PAE entering state HELD EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state FAIL EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed unsuccessfully Setting authentication timeout: 2 sec 0 usec EAPOL: startWhen --> 0 Authentication with 00:21:1c:fd:a6:30 timed out. Added BSSID 00:21:1c:fd:a6:30 into blacklist wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: ioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 Disassociation notification Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0 Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Scan results did not fit - trying larger buffer (8192 bytes) Received 6290 bytes of scan results (15 BSSes) BSS: Start scan result update 2 BSS: Add new id 13 BSSID 00:21:1c:fd:a6:33 SSID '' BSS: Add new id 14 BSSID 84:a8:e4:a9:cc:28 SSID 'SONIC-cc28' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:21:1c:fd:a6:30 ssid='ke_wireless' Trying to associate with 00:21:1c:fd:a6:30 (SSID='ke_wireless' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT 802.1X WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 No keys have been configured - skip key clearing State: DISCONNECTED -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=27 RX EAPOL from 00:21:1c:fd:a6:30 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=51 AssocResp IE wireless event - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:21:1c:fd:a6:30 Association info event resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:21:1c:fd:a6:30 No keys have been configured - skip key clearing Associated with 00:21:1c:fd:a6:30 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from 00:21:1c:fd:a6:30 Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=50): 00 6e 65 74 77 6f 72 6b 69 64 3d 6b 65 5f 77 69 _networkid=ke_wi 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 50 41 2d reless,nasid=PA- 32 31 31 32 2d 57 4c 43 31 2c 70 6f 72 74 69 64 2112-WLC1,portid 3d 31 =1 EAP: using real identity - hexdump_ascii(len=8): 6b 72 69 73 68 6e 61 72 krishnar EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 21 EAP: vendor 0 method 21 not allowed CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 -> NAK EAP: Building EAP-Nak (requested type 21 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=72): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 2e 00 00 00 TLS: using phase1 config options CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x21 EAP-PEAP: Start (server ver=1, own ver=1) EAP-PEAP: Using PEAP version 1 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 237 bytes pending from ssl_out SSL: 237 bytes left to be sent out (of total 237 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=17) - Flags 0x81 SSL: TLS Message Length: 7 SSL: (where=0x4004 ret=0x22a) SSL: SSL3 alert: read (remote end reported an error):fatal:bad certificate SSL: (where=0x1002 ret=0x0) SSL: SSL_connect:failed in SSLv3 read server hello A OpenSSL: openssl_handshake - SSL_connect error:14094412:SSL routines:SSL3_READ_BYTES:sslv3 alert bad certificate SSL: 0 bytes pending from ssl_out SSL: Failed - tls_out available to report error SSL: No data to be sent out SSL: Building ACK (type=25 id=4 ver=1) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:fd:a6:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:fd:a6:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Failure EAP: EAP entering state FAILURE CTRL-EVENT-EAP-FAILURE EAP authentication failed EAPOL: SUPP_PAE entering state HELD EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state FAIL EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed unsuccessfully Setting authentication timeout: 2 sec 0 usec EAPOL: startWhen --> 0 Authentication with 00:21:1c:fd:a6:30 timed out. BSSID 00:21:1c:fd:a6:30 blacklist count incremented to 2 wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=11): 6b 65 5f 77 69 72 65 6c 65 73 73 ke_wireless Starting AP scan for specific SSID(s) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: opersioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument tate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 Disassociation notification BSSID 00:00:00:00:00:00 blacklist count incremented to 2 CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0 Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Scan results did not fit - trying larger buffer (8192 bytes) Received 6996 bytes of scan results (17 BSSes) BSS: Start scan result update 3 BSS: Add new id 15 BSSID 00:0b:86:28:45:41 SSID 'whmobilepac' BSS: Add new id 16 BSSID fe:f8:cb:64:a0:df SSID 'A9F1BDF1DAB1NVT4F4F59' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 1: 00:21:1c:fd:a6:32 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 2: 00:21:1c:fd:a6:34 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 3: 00:21:1c:fd:a6:30 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 4: 00:21:1c:fd:a6:33 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 5: 00:21:1c:ff:6c:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:21:1c:ff:6c:30 ssid='ke_wireless' Trying to associate with 00:21:1c:ff:6c:30 (SSID='ke_wireless' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT 802.1X WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 No keys have been configured - skip key clearing State: DISCONNECTED -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=27 RX EAPOL from 00:21:1c:ff:6c:30 Not associated - Delay processing of received EAPOL frame RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c08 len=51 AssocResp IE wireless event - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:21:1c:ff:6c:30 Association info event resp_ies - hexdump(len=35): 01 07 96 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:21:1c:ff:6c:30 No keys have been configured - skip key clearing Associated with 00:21:1c:ff:6c:30 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: deinitialize previously used EAP method (25, PEAP) at INITIALIZE ENGINE: engine deinit EAP: EAP entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request Process pending EAPOL frame that was received just before association notification RX EAPOL from 00:21:1c:ff:6c:30 Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=50): 00 6e 65 74 77 6f 72 6b 69 64 3d 6b 65 5f 77 69 _networkid=ke_wi 72 65 6c 65 73 73 2c 6e 61 73 69 64 3d 50 41 2d reless,nasid=PA- 32 31 31 32 2d 57 4c 43 31 2c 70 6f 72 74 69 64 2112-WLC1,portid 3d 31 =1 EAP: using real identity - hexdump_ascii(len=8): 6b 72 69 73 68 6e 61 72 krishnar EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:ff:6c:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:ff:6c:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=21 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 21 EAP: vendor 0 method 21 not allowed CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 -> NAK EAP: Building EAP-Nak (requested type 21 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:ff:6c:30 EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 RX EAPOL from 00:21:1c:ff:6c:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=72): 00 00 00 00 04 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 17 00 00 00 00 00 00 00 32 00 00 00 00 00 00 00 2e 00 00 00 TLS: using phase1 config options CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x21 EAP-PEAP: Start (server ver=1, own ver=1) EAP-PEAP: Using PEAP version 1 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 237 bytes pending from ssl_out SSL: 237 bytes left to be sent out (of total 237 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:ff:6c:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:ff:6c:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=17) - Flags 0x81 SSL: TLS Message Length: 7 SSL: (where=0x4004 ret=0x22a) SSL: SSL3 alert: read (remote end reported an error):fatal:bad certificate SSL: (where=0x1002 ret=0x0) SSL: SSL_connect:failed in SSLv3 read server hello A OpenSSL: openssl_handshake - SSL_connect error:14094412:SSL routines:SSL3_READ_BYTES:sslv3 alert bad certificate SSL: 0 bytes pending from ssl_out SSL: Failed - tls_out available to report error SSL: No data to be sent out SSL: Building ACK (type=25 id=4 ver=1) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=00:21:1c:ff:6c:30 EAPOL: SUPP_BE entering state RECEIVE RX EAPOL from 00:21:1c:ff:6c:30 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Failure EAP: EAP entering state FAILURE CTRL-EVENT-EAP-FAILURE EAP authentication failed EAPOL: SUPP_PAE entering state HELD EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state FAIL EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed unsuccessfully Setting authentication timeout: 2 sec 0 usec Authentication with 00:21:1c:ff:6c:30 timed out. Added BSSID 00:21:1c:ff:6c:30 into blacklist wpa_driver_wext_disassociate No keys have been configured - skip key clearing State: ASSOCIATED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' ioctl[SIOCSIWENCODEEXT]: Invalid argument ioctl[SIOCSIWENCODEEXT]: Invalid argument added Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:00:00:00:00:00 Disassociation notification BSSID 00:00:00:00:00:00 blacklist count incremented to 3 CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0 Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Scan results did not fit - trying larger buffer (8192 bytes) Received 7394 bytes of scan results (18 BSSes) BSS: Start scan result update 4 BSS: Add new id 17 BSSID 00:21:1c:ff:6c:32 SSID '' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 1: 00:21:1c:fd:a6:33 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 2: 00:21:1c:fd:a6:32 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 3: 00:21:1c:fd:a6:30 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 4: 00:21:1c:fd:a6:34 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 5: 00:21:1c:ff:6c:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:21:1c:ff:6c:30 ssid='ke_wireless' Trying to associate with 00:21:1c:ff:6c:30 (SSID='ke_wireless' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT 802.1X WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 No keys have been configured - skip key clearing State: DISCONNECTED -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=27 EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Authentication with 00:21:1c:ff:6c:30 timed out. BSSID 00:21:1c:ff:6c:30 blacklist count incremented to 2 No keys have been configured - skip key clearing State: ASSOCIATING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=11): 6b 65 5f 77 69 72 65 6c 65 73 73 ke_wireless Starting AP scan for specific SSID(s) Scan requested (ret=0) - scan timeout 30 seconds EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b19 len=16 Received 2950 bytes of scan results (7 BSSes) BSS: Start scan result update 5 New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 1: 00:21:1c:fd:a6:33 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 2: 00:21:1c:ff:6c:32 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 3: 00:21:1c:ff:6c:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 4: 00:21:1c:ff:6c:30 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 5: 00:21:1c:fd:a6:31 ssid='ke_guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE 6: 00:21:1c:ff:6c:31 ssid='ke_guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - no WPA/RSN IE Try to find non-WPA AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 1: 00:21:1c:fd:a6:33 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 2: 00:21:1c:ff:6c:32 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 3: 00:21:1c:ff:6c:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 4: 00:21:1c:ff:6c:30 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - blacklisted 5: 00:21:1c:fd:a6:31 ssid='ke_guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - SSID mismatch 6: 00:21:1c:ff:6c:31 ssid='ke_guest' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 skip - SSID mismatch No APs found - clear blacklist and try again Removed BSSID 00:21:1c:ff:6c:30 from blacklist (clear) Removed BSSID 00:00:00:00:00:00 from blacklist (clear) Removed BSSID 00:21:1c:fd:a6:30 from blacklist (clear) Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 00:21:1c:fd:a6:30 ssid='ke_wireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:21:1c:fd:a6:30 ssid='ke_wireless' Trying to associate with 00:21:1c:fd:a6:30 (SSID='ke_wireless' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT 802.1X WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b1a len=27 EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS EAPOL: Supplicant port status: Unauthorized RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Authentication with 00:21:1c:fd:a6:30 timed out. Added BSSID 00:21:1c:fd:a6:30 into blacklist No keys have been configured - skip key clearing State: ASSOCIATING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds CTRL-EVENT-TERMINATING - signal 2 received Removing interface wlan0 No keys have been configured - skip key clearing State: SCANNING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized wpa_driver_wext_set_countermeasures No keys have been configured - skip key clearing EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit ENGINE: engine deinit Removed BSSID 00:21:1c:fd:a6:30 from blacklist (clear) BSS: Remove id 1 BSSID 00:21:1c:fd:a6:32 SSID '' BSS: Remove id 3 BSSID 00:21:1c:fd:a6:30 SSID '' BSS: Remove id 2 BSSID 00:21:1c:fd:a6:34 SSID '' BSS: Remove id 6 BSSID 00:21:1c:ff:6c:33 SSID '' BSS: Remove id 7 BSSID 00:24:6c:ea:03:e1 SSID 'whmobilepac' BSS: Remove id 15 BSSID 00:0b:86:28:45:41 SSID 'whmobilepac' BSS: Remove id 14 BSSID 84:a8:e4:a9:cc:28 SSID 'SONIC-cc28' BSS: Remove id 16 BSSID fe:f8:cb:64:a0:df SSID 'A9F1BDF1DAB1NVT4F4F59' BSS: Remove id 12 BSSID 00:0b:86:28:45:40 SSID 'WHguest_PAC' BSS: Remove id 11 BSSID ea:66:5b:37:24:45 SSID 'airportthru' BSS: Remove id 10 BSSID 00:24:6c:ea:03:e0 SSID 'WHguest_PAC' BSS: Remove id 0 BSSID 00:21:1c:fd:a6:30 SSID 'ke_wireless' BSS: Remove id 13 BSSID 00:21:1c:fd:a6:33 SSID '' BSS: Remove id 17 BSSID 00:21:1c:ff:6c:32 SSID '' BSS: Remove id 5 BSSID 00:21:1c:ff:6c:30 SSID 'ke_wireless' BSS: Remove id 4 BSSID 00:21:1c:ff:6c:30 SSID '' BSS: Remove id 8 BSSID 00:21:1c:fd:a6:31 SSID 'ke_guest' BSS: Remove id 9 BSSID 00:21:1c:ff:6c:31 SSID 'ke_guest' Cancelling scan request Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6