Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 308289 Details for
Bug 431894
iwl4965 unreliable connecting to LEAP
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Compat Wireless 2008 06 03 Leap connection iwl4965 fc9
leap-iwl4965-fc9-wireless-compat-20080603.txt (text/plain), 59.43 KB, created by
Traxtopel
on 2008-06-03 21:05:03 UTC
(
hide
)
Description:
Compat Wireless 2008 06 03 Leap connection iwl4965 fc9
Filename:
MIME Type:
Creator:
Traxtopel
Created:
2008-06-03 21:05:03 UTC
Size:
59.43 KB
patch
obsolete
>Initializing interface 'wlan0' conf 'leap.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file 'leap.conf' -> '/mnt/5.2-i386/etc/NetworkManager/ibm-test/leap.conf' >Reading configuration file '/mnt/5.2-i386/etc/NetworkManager/ibm-test/leap.conf' >ctrl_interface='/var/run/wpa_supplicant' >ap_scan=1 >Line: 3 - start of a new network block >scan_ssid=1 (0x1) >ssid - hexdump_ascii(len=3): > 49 42 4d IBM >key_mgmt: 0x1 >eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 >identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >password - hexdump_ascii(len=14): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 password >Priority group 0 > id=0 ssid='IBM' >Initializing interface (2) 'wlan0' >Interface wlan0 set UP - waiting a second for the driver to complete initialization >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:1f:3b:39:50:17 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted >RSN: flushing PMKID list in the driver >Setting scan request: 0 sec 100000 usec >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >Try to find non-WPA AP >No suitable AP found. >Setting scan request: 5 sec 0 usec >Ignore event for foreign ifindex 6 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >EAPOL: disable timer tick >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=3): > 49 42 4d IBM >Trying to get current scan results first without requesting a new scan to speed up initial association >Received 0 bytes of scan results (0 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >Try to find non-WPA AP >No suitable AP found. >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Scan results did not fit - trying larger buffer (8192 bytes) >Received 4505 bytes of scan results (19 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:0e:83:39:a6:80 ssid='IBM' wpa_ie_len=24 rsn_ie_len=20 caps=0x11 > selected based on RSN IE > selected WPA AP 00:0e:83:39:a6:80 ssid='IBM' >Try to find non-WPA AP >Trying to associate with 00:0e:83:39:a6:80 (SSID='IBM' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >RSN: using IEEE 802.11i/D9.0 >WPA: Selected cipher suites: group 4 pairwise 16 key_mgmt 1 proto 2 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 >WPA: using GTK WEP104 >WPA: using PTK CCMP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=11 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=153 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000349424d010802040b160c12182432043048606c30140100000fac050100000fac040100000fac010000 RespIEs=010882848b960c12182432043048606c)' >Association info event >req_ies - hexdump(len=43): 00 03 49 42 4d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c >WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 34 74 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:0e:83:39:a6:80 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:0e:83:39:a6:80 >No keys have been configured - skip key clearing >Associated with 00:0e:83:39:a6:80 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 02 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 34 74 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=42): > 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e _networkid=IBM,n > 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 34 74 2d asid=rcx-ap-04t- > 31 2c 70 6f 72 74 69 64 3d 30 1,portid=0 >EAP: using real identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=36): 01 00 00 20 02 02 00 20 01 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 a0 00 2b 11 01 00 08 fb 7a 9c 3f ea 7e 07 52 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=160 method=17 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Request >EAP-LEAP: Challenge from AP - hexdump(len=8): fb 7a 9c 3f ea 7e 07 52 >EAP-LEAP: Generating Challenge Response >EAP-LEAP: Response - hexdump(len=24): bc 29 9e cf 9b e3 0b d4 63 be 89 72 06 65 73 9b 8d cc a9 a0 b1 63 8d 69 >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=63): 01 00 00 3b 02 a0 00 3b 11 01 00 18 bc 29 9e cf 9b e3 0b d4 63 be 89 72 06 65 73 9b 8d cc a9 a0 b1 63 8d 69 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=46): 01 00 00 04 03 a0 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Success >EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 00 67 5f 28 4b 37 08 fc >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=47): 01 00 00 2b 01 a0 00 2b 11 01 00 08 00 67 5f 28 4b 37 08 fc 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=63): 01 00 00 3b 02 a0 00 3b 11 01 00 18 6f 3c 20 7d 73 c3 dc 0a 4b cc c9 90 cf 25 51 a9 bf e8 64 2e 70 49 37 1c 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Response for LEAP method=17 id=160 >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Response >EAP-LEAP: Response from AP - hexdump(len=24): 6f 3c 20 7d 73 c3 dc 0a 4b cc c9 90 cf 25 51 a9 bf e8 64 2e 70 49 37 1c >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED] >EAP-LEAP: peer_challenge - hexdump(len=8): fb 7a 9c 3f ea 7e 07 52 >EAP-LEAP: peer_response - hexdump(len=24): bc 29 9e cf 9b e3 0b d4 63 be 89 72 06 65 73 9b 8d cc a9 a0 b1 63 8d 69 >EAP-LEAP: ap_challenge - hexdump(len=8): 00 67 5f 28 4b 37 08 fc >EAP-LEAP: ap_response - hexdump(len=24): 6f 3c 20 7d 73 c3 dc 0a 4b cc c9 90 cf 25 51 a9 bf e8 64 2e 70 49 37 1c >EAP-LEAP: master key - hexdump(len=16): [REMOVED] >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 af 0f e8 af a7 d2 58 82 0b ba ad 4f 92 07 83 b2 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e5 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 af 0f e8 af a7 d2 58 82 0b ba ad 4f 92 07 83 b2 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0e:83:39:a6:80 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 af 0f e8 af a7 d2 58 82 0b ba ad 4f 92 07 83 b2 >RSN: PMKID from Authenticator - hexdump(len=16): af 0f e8 af a7 d2 58 82 0b ba ad 4f 92 07 83 b2 >RSN: no matching PMKID found >EAPOL: Requested key length (32) not available (len=16) >EAPOL: Successfully fetched key (len=16) >WPA: PMK from EAPOL state machines - hexdump(len=16): [REMOVED] >RSN: added PMKSA cache entry for 00:0e:83:39:a6:80 >RSN: the new PMK matches with the PMKID >WPA: Renewed SNonce - hexdump(len=32): 15 29 29 fd c0 b4 a9 46 ab 64 0a c4 89 b2 22 f8 36 f4 a8 d3 85 06 63 cf 4d e2 fd 54 62 57 f6 6b >WPA: PTK derivation - A1=00:1f:3b:39:50:17 A2=00:0e:83:39:a6:80 >WPA: PMK - hexdump(len=16): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 15 29 29 fd c0 b4 a9 46 ab 64 0a c4 89 b2 22 f8 36 f4 a8 d3 85 06 63 cf 4d e2 fd 54 62 57 f6 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 bb b2 e7 8f 52 34 bb 6b cd 27 bc 61 1a 38 6d 00 16 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 cb b5 ad 35 78 bd 7a 7d bf 2f e8 38 af 5d 24 00 38 c1 6f 2f 5b 63 26 38 19 bc 6f a0 b3 6f e4 e6 20 06 14 dd f6 d5 b6 e6 41 13 77 6e fd 09 49 46 b4 b0 f4 a8 d0 5a 55 c4 ed 80 b2 d9 16 22 47 e6 ce 68 da 79 b6 58 21 d2 16 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=2 type=3 length=151 > EAPOL-Key type=2 > key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) > key_length=16 key_data_length=56 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e5 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 73 cb b5 ad 35 78 bd 7a 7d bf 2f e8 38 af 5d 24 >WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 cb b5 ad 35 78 bd 7a 7d bf 2f e8 38 af 5d 24 00 38 c1 6f 2f 5b 63 26 38 19 bc 6f a0 b3 6f e4 e6 20 06 14 dd f6 d5 b6 e6 41 13 77 6e fd 09 49 46 b4 b0 f4 a8 d0 5a 55 c4 ed 80 b2 d9 16 22 47 e6 ce 68 da 79 b6 58 21 d2 16 >RSN: encrypted key data - hexdump(len=56): c1 6f 2f 5b 63 26 38 19 bc 6f a0 b3 6f e4 e6 20 06 14 dd f6 d5 b6 e6 41 13 77 6e fd 09 49 46 b4 b0 f4 a8 d0 5a 55 c4 ed 80 b2 d9 16 22 47 e6 ce 68 da 79 b6 58 21 d2 16 >WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:0e:83:39:a6:80 (ver=2) >WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 13 00 0f ac 01 02 00 a4 79 c3 c7 91 d5 d5 56 9e f3 32 89 24 dd 00 00 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 55 00 c0 e5 7a 13 70 d0 c3 b0 c6 d0 0b db 0a 00 00 >WPA: Installing PTK to the driver. >wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RSN: received GTK in pairwise handshake - hexdump(len=15): [REMOVED] >WPA: Group Key - hexdump(len=13): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=13). >WPA: RSC - hexdump(len=0): >wpa_driver_wext_set_key: alg=1 key_idx=2 set_tx=0 seq_len=0 key_len=13 >WPA: Key negotiation completed with 00:0e:83:39:a6:80 [PTK=CCMP GTK=WEP-104] >Cancelling scan request >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:0e:83:39:a6:80 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >^CCTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing >EAP: deinitialize previously used EAP method (17, LEAP) at EAP deinit >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6 >c]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test[root@lc4eb0732164145 ibm-test]# c[Kwpa_supplicant -Dwext -iwlan0 -cleap.conf -dd [C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[Creboot[Kwpa_supplicant -Dwext -iwlan0 -cleap.conf -dd [C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[Ccat leap.conf [Kwpa_supplicant -Dwext -iwlan0 -cleap.conf -dd [C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[Cls[Kwpa_supplicant -Dwext -iwlan0 -cleap.conf -dd[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[K[Kpgrep -f wpa | xargs kill -9 >usage: kill [ -s signal | -p ] [ -a ] pid ... > kill -l [ signal ] >]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test[root@lc4eb0732164145 ibm-test]# pgrep -f wpa | xargs kill -9wpa_supplicant -Dwext -iwlan0 -cleap.conf -dd >Initializing interface 'wlan0' conf 'leap.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file 'leap.conf' -> '/mnt/5.2-i386/etc/NetworkManager/ibm-test/leap.conf' >Reading configuration file '/mnt/5.2-i386/etc/NetworkManager/ibm-test/leap.conf' >ctrl_interface='/var/run/wpa_supplicant' >ap_scan=1 >Line: 3 - start of a new network block >scan_ssid=1 (0x1) >ssid - hexdump_ascii(len=3): > 49 42 4d IBM >key_mgmt: 0x1 >eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 >identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >password - hexdump_ascii(len=14): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 password >Priority group 0 > id=0 ssid='IBM' >Initializing interface (2) 'wlan0' >Interface wlan0 set UP - waiting a second for the driver to complete initialization >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:1f:3b:39:50:17 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted >RSN: flushing PMKID list in the driver >Setting scan request: 0 sec 100000 usec >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >Added interface wlan0 >Ignore event for foreign ifindex 6 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Scan results did not fit - trying larger buffer (8192 bytes) >Received 5047 bytes of scan results (21 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:0e:83:39:a6:80 ssid='IBM' wpa_ie_len=24 rsn_ie_len=20 caps=0x11 > selected based on RSN IE > selected WPA AP 00:0e:83:39:a6:80 ssid='IBM' >Try to find non-WPA AP >Trying to associate with 00:0e:83:39:a6:80 (SSID='IBM' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >RSN: using IEEE 802.11i/D9.0 >WPA: Selected cipher suites: group 4 pairwise 16 key_mgmt 1 proto 2 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 >WPA: using GTK WEP104 >WPA: using PTK CCMP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: DISCONNECTED -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=11 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=153 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000349424d010802040b160c12182432043048606c30140100000fac050100000fac040100000fac010000 RespIEs=010882848b960c12182432043048606c)' >Association info event >req_ies - hexdump(len=43): 00 03 49 42 4d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c >WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 34 74 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:0e:83:39:a6:80 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:0e:83:39:a6:80 >No keys have been configured - skip key clearing >Associated with 00:0e:83:39:a6:80 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 02 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 34 74 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=42): > 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e _networkid=IBM,n > 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 34 74 2d asid=rcx-ap-04t- > 31 2c 70 6f 72 74 69 64 3d 30 1,portid=0 >EAP: using real identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=36): 01 00 00 20 02 02 00 20 01 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 41 00 2b 11 01 00 08 c0 8c 0f c5 1a 83 04 bf 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=65 method=17 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Request >EAP-LEAP: Challenge from AP - hexdump(len=8): c0 8c 0f c5 1a 83 04 bf >EAP-LEAP: Generating Challenge Response >EAP-LEAP: Response - hexdump(len=24): cb 6f f3 d4 36 c7 3e 13 fd 61 bb 07 cf a9 90 2e 52 7b 73 54 50 68 21 e6 >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=63): 01 00 00 3b 02 41 00 3b 11 01 00 18 cb 6f f3 d4 36 c7 3e 13 fd 61 bb 07 cf a9 90 2e 52 7b 73 54 50 68 21 e6 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=46): 01 00 00 04 03 41 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Success >EAP-LEAP: Challenge to AP/AS - hexdump(len=8): cf 3e 46 c2 11 21 ac e6 >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:39:a6:80 >TX EAPOL - hexdump(len=47): 01 00 00 2b 01 41 00 2b 11 01 00 08 cf 3e 46 c2 11 21 ac e6 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=63): 01 00 00 3b 02 41 00 3b 11 01 00 18 65 7a 9b a6 c1 69 52 59 60 62 b4 e1 49 49 a7 a8 13 d9 77 df 97 25 a9 29 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Response for LEAP method=17 id=65 >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Response >EAP-LEAP: Response from AP - hexdump(len=24): 65 7a 9b a6 c1 69 52 59 60 62 b4 e1 49 49 a7 a8 13 d9 77 df 97 25 a9 29 >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED] >EAP-LEAP: peer_challenge - hexdump(len=8): c0 8c 0f c5 1a 83 04 bf >EAP-LEAP: peer_response - hexdump(len=24): cb 6f f3 d4 36 c7 3e 13 fd 61 bb 07 cf a9 90 2e 52 7b 73 54 50 68 21 e6 >EAP-LEAP: ap_challenge - hexdump(len=8): cf 3e 46 c2 11 21 ac e6 >EAP-LEAP: ap_response - hexdump(len=24): 65 7a 9b a6 c1 69 52 59 60 62 b4 e1 49 49 a7 a8 13 d9 77 df 97 25 a9 29 >EAP-LEAP: master key - hexdump(len=16): [REMOVED] >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 13 ff 9b e6 39 8e 0a 50 9a 34 18 23 f7 8d 51 9b >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e6 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 13 ff 9b e6 39 8e 0a 50 9a 34 18 23 f7 8d 51 9b >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0e:83:39:a6:80 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 13 ff 9b e6 39 8e 0a 50 9a 34 18 23 f7 8d 51 9b >RSN: PMKID from Authenticator - hexdump(len=16): 13 ff 9b e6 39 8e 0a 50 9a 34 18 23 f7 8d 51 9b >RSN: no matching PMKID found >EAPOL: Requested key length (32) not available (len=16) >EAPOL: Successfully fetched key (len=16) >WPA: PMK from EAPOL state machines - hexdump(len=16): [REMOVED] >RSN: added PMKSA cache entry for 00:0e:83:39:a6:80 >RSN: the new PMK matches with the PMKID >WPA: Renewed SNonce - hexdump(len=32): e7 d3 ab ba 00 89 b0 d6 a1 42 d3 02 56 db f8 c6 8d db 3d b3 cc 72 d5 ff e8 76 c5 67 5d 05 b1 e1 >WPA: PTK derivation - A1=00:1f:3b:39:50:17 A2=00:0e:83:39:a6:80 >WPA: PMK - hexdump(len=16): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 e7 d3 ab ba 00 89 b0 d6 a1 42 d3 02 56 db f8 c6 8d db 3d b3 cc 72 d5 ff e8 76 c5 67 5d 05 b1 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 cf d3 b0 de 61 b2 11 a0 58 0c c0 51 41 96 59 00 16 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >RX EAPOL from 00:0e:83:39:a6:80 >RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 df f2 cd 78 0c 50 8d 3a fe e1 b8 db 7a 8e a8 96 00 38 40 95 a0 64 58 87 b1 5f 99 87 f6 f1 45 43 52 98 e4 6b 7a 25 d9 66 9d d0 6b c0 af a5 ed 8a fc bf 46 4f a9 d0 aa cc 34 86 ed f0 a2 3c c6 77 c3 f2 c7 1c c8 a4 26 eb 72 2a >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=2 type=3 length=151 > EAPOL-Key type=2 > key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) > key_length=16 key_data_length=56 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e6 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): df f2 cd 78 0c 50 8d 3a fe e1 b8 db 7a 8e a8 96 >WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 57 12 1f 40 8c cc 01 64 6c b9 94 56 8a 9c 53 e2 53 d3 39 4b 35 47 e0 51 cc cd f3 4c d9 88 7f e6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 df f2 cd 78 0c 50 8d 3a fe e1 b8 db 7a 8e a8 96 00 38 40 95 a0 64 58 87 b1 5f 99 87 f6 f1 45 43 52 98 e4 6b 7a 25 d9 66 9d d0 6b c0 af a5 ed 8a fc bf 46 4f a9 d0 aa cc 34 86 ed f0 a2 3c c6 77 c3 f2 c7 1c c8 a4 26 eb 72 2a >RSN: encrypted key data - hexdump(len=56): 40 95 a0 64 58 87 b1 5f 99 87 f6 f1 45 43 52 98 e4 6b 7a 25 d9 66 9d d0 6b c0 af a5 ed 8a fc bf 46 4f a9 d0 aa cc 34 86 ed f0 a2 3c c6 77 c3 f2 c7 1c c8 a4 26 eb 72 2a >WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:0e:83:39:a6:80 (ver=2) >WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 13 00 0f ac 01 02 00 a4 79 c3 c7 91 d5 d5 56 9e f3 32 89 24 dd 00 00 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 81 a8 14 12 a7 fc ac 27 3f 26 cc ff da 32 e5 00 00 >WPA: Installing PTK to the driver. >wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RSN: received GTK in pairwise handshake - hexdump(len=15): [REMOVED] >WPA: Group Key - hexdump(len=13): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=13). >WPA: RSC - hexdump(len=0): >wpa_driver_wext_set_key: alg=1 key_idx=2 set_tx=0 seq_len=0 key_len=13 >WPA: Key negotiation completed with 00:0e:83:39:a6:80 [PTK=CCMP GTK=WEP-104] >Cancelling scan request >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:0e:83:39:a6:80 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >^CCTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing >EAP: deinitialize previously used EAP method (17, LEAP) at EAP deinit >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6 >c]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test >[root@lc4eb0732164145 ibm-test]# c >bash: c: command not found >]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test[root@lc4eb0732164145 ibm-test]# >]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test[root@lc4eb0732164145 ibm-test]# pgf[K[Ks -ef | grep wpa >root 10170 10110 0 15:36 pts/2 00:00:00 grep wpa >]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test[root@lc4eb0732164145 ibm-test]# ps -ef | grep wpac[Kwpa_supplicant -Dwext -iwlan0 -cleap.conf -ddddddd >Initializing interface 'wlan0' conf 'leap.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file 'leap.conf' -> '/mnt/5.2-i386/etc/NetworkManager/ibm-test/leap.conf' >Reading configuration file '/mnt/5.2-i386/etc/NetworkManager/ibm-test/leap.conf' >ctrl_interface='/var/run/wpa_supplicant' >ap_scan=1 >Line: 3 - start of a new network block >scan_ssid=1 (0x1) >ssid - hexdump_ascii(len=3): > 49 42 4d IBM >key_mgmt: 0x1 >eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 >identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >password - hexdump_ascii(len=14): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 password >Priority group 0 > id=0 ssid='IBM' >Initializing interface (2) 'wlan0' >Interface wlan0 set UP - waiting a second for the driver to complete initialization >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:1f:3b:39:50:17 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted >RSN: flushing PMKID list in the driver >Setting scan request: 0 sec 100000 usec >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >Try to find non-WPA AP >No suitable AP found. >Setting scan request: 5 sec 0 usec >Ignore event for foreign ifindex 6 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >EAPOL: disable timer tick >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=3): > 49 42 4d IBM >Trying to get current scan results first without requesting a new scan to speed up initial association >Received 0 bytes of scan results (0 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >Try to find non-WPA AP >No suitable AP found. >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Scan results did not fit - trying larger buffer (8192 bytes) >Received 4530 bytes of scan results (19 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:0e:83:60:04:70 ssid='IBM' wpa_ie_len=24 rsn_ie_len=20 caps=0x11 > selected based on RSN IE > selected WPA AP 00:0e:83:60:04:70 ssid='IBM' >Try to find non-WPA AP >Trying to associate with 00:0e:83:60:04:70 (SSID='IBM' freq=2462 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >RSN: using IEEE 802.11i/D9.0 >WPA: Selected cipher suites: group 4 pairwise 16 key_mgmt 1 proto 2 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 >WPA: using GTK WEP104 >WPA: using PTK CCMP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=11 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=153 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000349424d010802040b160c12182432043048606c30140100000fac050100000fac040100000fac010000 RespIEs=010882848b960c12182432043048606c)' >Association info event >req_ies - hexdump(len=43): 00 03 49 42 4d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c >WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 35 31 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:0e:83:60:04:70 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:0e:83:60:04:70 >No keys have been configured - skip key clearing >Associated with 00:0e:83:60:04:70 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:0e:83:60:04:70 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 02 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 35 31 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=42): > 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e _networkid=IBM,n > 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 35 31 2d asid=rcx-ap-051- > 31 2c 70 6f 72 74 69 64 3d 30 1,portid=0 >EAP: using real identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:04:70 >TX EAPOL - hexdump(len=36): 01 00 00 20 02 02 00 20 01 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 92 00 2b 11 01 00 08 e6 32 3c 7b c7 e3 6a 67 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=146 method=17 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Request >EAP-LEAP: Challenge from AP - hexdump(len=8): e6 32 3c 7b c7 e3 6a 67 >EAP-LEAP: Generating Challenge Response >EAP-LEAP: Response - hexdump(len=24): a8 be 48 1b ec ba 29 0b a5 20 53 60 a8 fb b0 cf 65 c9 3f c4 bb 90 01 6d >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:04:70 >TX EAPOL - hexdump(len=63): 01 00 00 3b 02 92 00 3b 11 01 00 18 a8 be 48 1b ec ba 29 0b a5 20 53 60 a8 fb b0 cf 65 c9 3f c4 bb 90 01 6d 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=46): 01 00 00 04 03 92 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Success >EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 15 31 63 43 fe 96 06 02 >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:04:70 >TX EAPOL - hexdump(len=47): 01 00 00 2b 01 92 00 2b 11 01 00 08 15 31 63 43 fe 96 06 02 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=63): 01 00 00 3b 02 92 00 3b 11 01 00 18 99 1d 98 08 13 f2 e4 8e 9d 06 9b 3d 57 3c 48 67 c0 c7 0b 4a da 87 aa 81 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Response for LEAP method=17 id=146 >EAP: EAP entering state METHOD >EAP-LEAP: Processing EAP-Response >EAP-LEAP: Response from AP - hexdump(len=24): 99 1d 98 08 13 f2 e4 8e 9d 06 9b 3d 57 3c 48 67 c0 c7 0b 4a da 87 aa 81 >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED] >EAP-LEAP: peer_challenge - hexdump(len=8): e6 32 3c 7b c7 e3 6a 67 >EAP-LEAP: peer_response - hexdump(len=24): a8 be 48 1b ec ba 29 0b a5 20 53 60 a8 fb b0 cf 65 c9 3f c4 bb 90 01 6d >EAP-LEAP: ap_challenge - hexdump(len=8): 15 31 63 43 fe 96 06 02 >EAP-LEAP: ap_response - hexdump(len=24): 99 1d 98 08 13 f2 e4 8e 9d 06 9b 3d 57 3c 48 67 c0 c7 0b 4a da 87 aa 81 >EAP-LEAP: master key - hexdump(len=16): [REMOVED] >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 1d e4 4a cd 9b 5d 97 b6 82 0d 8e 97 71 9f c4 73 55 a5 a6 d4 1a 1b 9e 00 76 5c 0e 58 d1 db 0d 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d2 4d 0f 6a 9e cd c2 46 6c 66 10 78 d8 20 4f 28 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 1d e4 4a cd 9b 5d 97 b6 82 0d 8e 97 71 9f c4 73 55 a5 a6 d4 1a 1b 9e 00 76 5c 0e 58 d1 db 0d 9e > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 1d e4 4a cd 9b 5d 97 b6 82 0d 8e 97 71 9f c4 73 55 a5 a6 d4 1a 1b 9e 00 76 5c 0e 58 d1 db 0d 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d2 4d 0f 6a 9e cd c2 46 6c 66 10 78 d8 20 4f 28 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0e:83:60:04:70 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d2 4d 0f 6a 9e cd c2 46 6c 66 10 78 d8 20 4f 28 >RSN: PMKID from Authenticator - hexdump(len=16): d2 4d 0f 6a 9e cd c2 46 6c 66 10 78 d8 20 4f 28 >RSN: no matching PMKID found >EAPOL: Requested key length (32) not available (len=16) >EAPOL: Successfully fetched key (len=16) >WPA: PMK from EAPOL state machines - hexdump(len=16): [REMOVED] >RSN: added PMKSA cache entry for 00:0e:83:60:04:70 >RSN: the new PMK matches with the PMKID >WPA: Renewed SNonce - hexdump(len=32): af 99 9b 94 50 05 9b 0d 8d c5 33 74 64 5a d1 5d e2 7d 5c 01 46 94 59 15 91 26 fb 4b 45 ad bd 66 >WPA: PTK derivation - A1=00:1f:3b:39:50:17 A2=00:0e:83:60:04:70 >WPA: PMK - hexdump(len=16): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 af 99 9b 94 50 05 9b 0d 8d c5 33 74 64 5a d1 5d e2 7d 5c 01 46 94 59 15 91 26 fb 4b 45 ad bd 66 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc 5c fa 49 c0 50 17 b4 21 96 24 60 5d 27 81 23 00 16 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 >RX EAPOL from 00:0e:83:60:04:70 >RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 1d e4 4a cd 9b 5d 97 b6 82 0d 8e 97 71 9f c4 73 55 a5 a6 d4 1a 1b 9e 00 76 5c 0e 58 d1 db 0d 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e3 ee bb 64 3f e1 78 67 08 be ed 32 bc ff 84 35 00 38 f1 15 15 d6 17 8c ff 1f 99 db 83 e8 c1 6f 25 09 5a be d2 c8 84 47 9e 4b 42 21 87 b6 0f 0a 9e 4a 50 41 a9 94 65 ac 5f 5c d9 7c ef 44 35 53 4a e6 2b d3 f8 47 bb 66 eb e4 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=2 type=3 length=151 > EAPOL-Key type=2 > key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) > key_length=16 key_data_length=56 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 1d e4 4a cd 9b 5d 97 b6 82 0d 8e 97 71 9f c4 73 55 a5 a6 d4 1a 1b 9e 00 76 5c 0e 58 d1 db 0d 9e > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 01 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): e3 ee bb 64 3f e1 78 67 08 be ed 32 bc ff 84 35 >WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 1d e4 4a cd 9b 5d 97 b6 82 0d 8e 97 71 9f c4 73 55 a5 a6 d4 1a 1b 9e 00 76 5c 0e 58 d1 db 0d 9e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e3 ee bb 64 3f e1 78 67 08 be ed 32 bc ff 84 35 00 38 f1 15 15 d6 17 8c ff 1f 99 db 83 e8 c1 6f 25 09 5a be d2 c8 84 47 9e 4b 42 21 87 b6 0f 0a 9e 4a 50 41 a9 94 65 ac 5f 5c d9 7c ef 44 35 53 4a e6 2b d3 f8 47 bb 66 eb e4 >RSN: encrypted key data - hexdump(len=56): f1 15 15 d6 17 8c ff 1f 99 db 83 e8 c1 6f 25 09 5a be d2 c8 84 47 9e 4b 42 21 87 b6 0f 0a 9e 4a 50 41 a9 94 65 ac 5f 5c d9 7c ef 44 35 53 4a e6 2b d3 f8 47 bb 66 eb e4 >WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:0e:83:60:04:70 (ver=2) >WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 13 00 0f ac 01 02 00 22 00 2b fe 6a 3f a7 70 6e 0f de 6d 28 dd 00 00 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 43 4d 6c 46 f3 f0 f7 a0 53 22 bb 6f 17 a9 c8 00 00 >WPA: Installing PTK to the driver. >wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RSN: received GTK in pairwise handshake - hexdump(len=15): [REMOVED] >WPA: Group Key - hexdump(len=13): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=13). >WPA: RSC - hexdump(len=0): >wpa_driver_wext_set_key: alg=1 key_idx=2 set_tx=0 seq_len=0 key_len=13 >WPA: Key negotiation completed with 00:0e:83:60:04:70 [PTK=CCMP GTK=WEP-104] >Cancelling scan request >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:0e:83:60:04:70 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >^CCTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing >EAP: deinitialize previously used EAP method (17, LEAP) at EAP deinit >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6 >]0;root@lc4eb0732164145:/mnt/5.2-i386/etc/NetworkManager/ibm-test[root@lc4eb0732164145 ibm-test]# exit > >Script done on Tue 03 Jun 2008 03:36:34 PM EDT
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 431894
:
294236
|
294237
|
294238
|
294356
|
306772
| 308289