Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 901574 Details for
Bug 1102365
Qualcomm Atheros AR93xx disconnects immediately
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
"-dd -t" output of wpa_supplicant
wpa_supplicant.log (text/plain), 439.69 KB, created by
Eric Griffith
on 2014-06-03 02:34:27 UTC
(
hide
)
Description:
"-dd -t" output of wpa_supplicant
Filename:
MIME Type:
Creator:
Eric Griffith
Created:
2014-06-03 02:34:27 UTC
Size:
439.69 KB
patch
obsolete
>1401761112.337833: wpa_supplicant v2.0 >1401761112.337951: random: Trying to read entropy from /dev/random >1401761112.339450: dbus: Register D-Bus object '/fi/w1/wpa_supplicant1' >1401761112.340835: Providing DBus service 'fi.w1.wpa_supplicant1'. >1401761112.342043: Providing DBus service 'fi.epitest.hostap.WPASupplicant'. >1401761112.342091: Successfully initialized wpa_supplicant >1401761112.342131: random: Got 20/20 bytes from /dev/random >1401761112.342176: dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) >1401761112.342228: Initializing interface 'wlp2s0' conf 'N/A' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' >1401761112.343075: nl80211: interface wlp2s0 in phy phy0 >1401761112.343125: rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 >1401761112.343237: nl80211: Set mode ifindex 3 iftype 2 (STATION) >1401761112.343308: nl80211: Subscribe to mgmt frames with non-AP handle 0x7fd51bc8dec0 >1401761112.343329: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343346: nl80211: Register frame match - hexdump(len=2): 04 0a >1401761112.343380: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343394: nl80211: Register frame match - hexdump(len=2): 04 0b >1401761112.343420: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343435: nl80211: Register frame match - hexdump(len=2): 04 0c >1401761112.343460: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343474: nl80211: Register frame match - hexdump(len=2): 04 0d >1401761112.343499: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343513: nl80211: Register frame match - hexdump(len=6): 04 09 50 6f 9a 09 >1401761112.343540: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343555: nl80211: Register frame match - hexdump(len=5): 7f 50 6f 9a 09 >1401761112.343580: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343594: nl80211: Register frame match - hexdump(len=1): 06 >1401761112.343618: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343631: nl80211: Register frame match - hexdump(len=2): 0a 07 >1401761112.343656: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8dec0 >1401761112.343669: nl80211: Register frame match - hexdump(len=2): 0a 11 >1401761112.343696: netlink: Operstate: linkmode=1, operstate=5 >1401761112.343812: nl80211: Using driver-based off-channel TX >1401761112.343831: nl80211: Use separate P2P group interface (driver advertised support) >1401761112.343844: nl80211: TDLS supported >1401761112.343856: nl80211: TDLS external setup >1401761112.344073: nl80211: driver param='(null)' >1401761112.344218: nl80211: Regulatory information - country=US >1401761112.344234: nl80211: 2402-2472 @ 40 MHz >1401761112.344249: nl80211: 5170-5250 @ 80 MHz >1401761112.344263: nl80211: 5250-5330 @ 80 MHz >1401761112.344278: nl80211: 5735-5835 @ 80 MHz >1401761112.344292: nl80211: 57240-63720 @ 2160 MHz >1401761112.344316: nl80211: Added 802.11b mode based on 802.11g information >1401761112.352955: wlp2s0: Own MAC address: c0:4a:00:28:7e:c1 >1401761112.353053: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761112.353145: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761112.353203: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761112.353256: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761112.353288: wlp2s0: RSN: flushing PMKID list in the driver >1401761112.353303: nl80211: Flush PMKIDs >1401761112.353362: wlp2s0: State: DISCONNECTED -> INACTIVE >1401761112.353391: WPS: Set UUID for interface wlp2s0 >1401761112.353443: WPS: UUID based on MAC address - hexdump(len=16): 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 >1401761112.356744: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761112.356794: EAPOL: Supplicant port status: Unauthorized >1401761112.356903: EAPOL: KEY_RX entering state NO_KEY_RECEIVE >1401761112.356924: EAPOL: SUPP_BE entering state INITIALIZE >1401761112.356956: EAP: EAP entering state DISABLED >1401761112.356970: EAPOL: Supplicant port status: Unauthorized >1401761112.357027: EAPOL: Supplicant port status: Unauthorized >1401761112.357718: P2P: Own listen channel: 11 >1401761112.358349: P2P: Random operating channel: 81:11 >1401761112.358374: P2P: Add operating class 81 >1401761112.358389: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761112.358406: P2P: Add operating class 115 >1401761112.358419: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761112.358433: P2P: Add operating class 124 >1401761112.358446: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761112.358460: P2P: Add operating class 116 >1401761112.358473: P2P: Channels - hexdump(len=2): 24 2c >1401761112.358486: P2P: Add operating class 117 >1401761112.358499: P2P: Channels - hexdump(len=2): 28 30 >1401761112.358512: P2P: Add operating class 126 >1401761112.358525: P2P: Channels - hexdump(len=2): 95 9d >1401761112.358538: P2P: Add operating class 127 >1401761112.358551: P2P: Channels - hexdump(len=2): 99 a1 >1401761112.359121: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/1' >1401761112.359270: wlp2s0: Added interface wlp2s0 >1401761112.359295: wlp2s0: State: INACTIVE -> DISCONNECTED >1401761112.359307: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761112.359319: netlink: Operstate: linkmode=-1, operstate=5 >1401761112.359460: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) >1401761112.360602: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761112.360737: dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761112.360838: dbus: org.freedesktop.DBus.Introspectable.Introspect (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761112.361912: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761112.362429: dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761112.362493: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761112.364171: Scan requested (ret=0) - scan timeout 10 seconds >1401761112.364347: nl80211: Event message available >1401761112.364380: nl80211: Scan trigger >1401761113.358278: EAPOL: disable timer tick >1401761113.358327: EAPOL: Supplicant port status: Unauthorized >1401761114.035084: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761114.035137: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761114.035212: nl80211: if_removed already cleared - ignore event >1401761114.035232: nl80211: Event message available >1401761114.035264: nl80211: New scan results available >1401761114.035291: wlp2s0: Event SCAN_RESULTS (3) received >1401761114.035459: nl80211: Received scan results (4 BSSes) >1401761114.035569: wlp2s0: BSS: Start scan result update 1 >1401761114.035589: wlp2s0: BSS: Add new id 0 BSSID 40:16:7e:59:a7:44 SSID 'WhoKnows-5Ghz' >1401761114.035605: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' >1401761114.035755: wlp2s0: BSS: Add new id 1 BSSID 40:16:7e:59:a7:40 SSID 'WhoKnows' >1401761114.035803: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' >1401761114.035940: wlp2s0: BSS: Add new id 2 BSSID 28:92:4a:c2:21:81 SSID 'HP-Print-81-Officejet Pro 8600' >1401761114.035960: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' >1401761114.036088: wlp2s0: BSS: Add new id 3 BSSID 00:26:62:e5:b3:e0 SSID 'notwired-bu' >1401761114.036108: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' >1401761114.036221: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761114.036243: wlp2s0: New scan results available >1401761114.036295: wlp2s0: No suitable network found >1401761114.036317: wlp2s0: Short-circuit new scan request since there are no enabled networks >1401761114.036334: wlp2s0: State: DISCONNECTED -> INACTIVE >1401761114.036386: wlp2s0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results >1401761114.040447: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761114.044887: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761114.046383: dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761114.046416: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' >1401761114.046518: scan_ssid=1 (0x1) >1401761114.046534: proto: 0x3 >1401761114.046552: ssid - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761114.046575: BSSID - hexdump(len=6): 40 16 7e 59 a7 40 >1401761114.046591: key_mgmt: 0x2 >1401761114.046606: PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] >1401761114.057835: PSK (from passphrase) - hexdump(len=32): [REMOVED] >1401761114.058158: dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761114.058185: wlp2s0: Setting scan request: 0 sec 0 usec >1401761114.058273: wlp2s0: State: INACTIVE -> SCANNING >1401761114.058299: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761114.058314: wlp2s0: Starting AP scan for wildcard SSID >1401761114.058324: WPS: Building WPS IE for Probe Request >1401761114.058332: WPS: * Version (hardcoded 0x10) >1401761114.058340: WPS: * Request Type >1401761114.058348: WPS: * Config Methods (108) >1401761114.058355: WPS: * UUID-E >1401761114.058363: WPS: * Primary Device Type >1401761114.058371: WPS: * RF Bands (3) >1401761114.058378: WPS: * Association State >1401761114.058386: WPS: * Configuration Error (0) >1401761114.058393: WPS: * Device Password ID (0) >1401761114.058400: WPS: * Device Name >1401761114.058412: P2P: * P2P IE header >1401761114.058419: P2P: * Capability dev=25 group=00 >1401761114.058427: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761114.058453: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761114.058468: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761114.058476: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761114.058543: Scan requested (ret=0) - scan timeout 30 seconds >1401761114.058555: nl80211: Event message available >1401761114.058566: nl80211: Scan trigger >1401761114.063365: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761115.728078: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761115.728129: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761115.728211: nl80211: if_removed already cleared - ignore event >1401761115.728238: nl80211: Event message available >1401761115.728270: nl80211: New scan results available >1401761115.728298: wlp2s0: Event SCAN_RESULTS (3) received >1401761115.728442: nl80211: Received scan results (4 BSSes) >1401761115.728555: wlp2s0: BSS: Start scan result update 2 >1401761115.728604: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761115.728626: wlp2s0: New scan results available >1401761115.728688: wlp2s0: Selecting BSS from priority group 0 >1401761115.728712: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-44 >1401761115.728735: wlp2s0: skip - SSID mismatch >1401761115.728754: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49 >1401761115.728806: wlp2s0: selected based on RSN IE >1401761115.728827: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761115.728849: wlp2s0: Request association: reassociate: 1 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761115.728868: wlp2s0: Automatic auth_alg selection: 0x1 >1401761115.728887: RSN: PMKSA cache search - network_ctx=0x7fd51bcb6020 try_opportunistic=0 >1401761115.728924: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761115.728943: RSN: No PMKSA cache entry found >1401761115.728964: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761115.728985: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761115.729004: wlp2s0: WPA: clearing AP WPA IE >1401761115.729020: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761115.729044: wlp2s0: WPA: using GTK CCMP >1401761115.729061: wlp2s0: WPA: using PTK CCMP >1401761115.729078: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761115.729096: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761115.729123: wlp2s0: Cancelling scan request >1401761115.729140: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761115.729155: wlp2s0: No keys have been configured - skip key clearing >1401761115.729171: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761115.729245: EAPOL: External notification - EAP success=0 >1401761115.729265: EAPOL: Supplicant port status: Unauthorized >1401761115.729368: EAPOL: External notification - EAP fail=0 >1401761115.729390: EAPOL: Supplicant port status: Unauthorized >1401761115.729447: EAPOL: External notification - portControl=Auto >1401761115.729464: EAPOL: Supplicant port status: Unauthorized >1401761115.729517: nl80211: Authenticate (ifindex=3) >1401761115.729534: * bssid=40:16:7e:59:a7:40 >1401761115.729548: * freq=2412 >1401761115.729562: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761115.729587: * IEs - hexdump(len=0): [NULL] >1401761115.729600: * Auth Type 0 >1401761115.734411: nl80211: Authentication request send successfully >1401761115.734454: RSN: Ignored PMKID candidate without preauth flag >1401761115.734483: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761115.734603: nl80211: Event message available >1401761115.734630: nl80211: New station 40:16:7e:59:a7:40 >1401761115.734652: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761115.734729: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761115.734844: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761115.734973: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761116.738104: nl80211: Event message available >1401761116.738174: nl80211: MLME event 37 >1401761116.738189: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 60 55 00 00 02 00 00 00 dd 09 00 10 18 02 05 00 1c 00 00 >1401761116.738220: nl80211: Authenticate event >1401761116.738238: wlp2s0: Event AUTH (11) received >1401761116.738258: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761116.738272: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 05 00 1c 00 00 >1401761116.738293: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761116.738309: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761116.738323: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761116.738337: netlink: Operstate: linkmode=-1, operstate=5 >1401761116.738447: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761116.738475: nl80211: Associate (ifindex=3) >1401761116.738491: * bssid=40:16:7e:59:a7:40 >1401761116.738506: * freq=2412 >1401761116.738519: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761116.738543: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761116.738578: * pairwise=0xfac04 >1401761116.738592: * group=0xfac04 >1401761116.752222: nl80211: Association request send successfully >1401761116.752280: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761116.752402: nl80211: Event message available >1401761116.752430: nl80211: Delete station 40:16:7e:59:a7:40 >1401761116.752455: nl80211: Event message available >1401761116.752475: nl80211: New station 40:16:7e:59:a7:40 >1401761118.757169: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761118.757211: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.757256: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761118.757288: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761118.757302: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.757346: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761118.757371: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761118.757385: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.757429: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761118.760287: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761118.760336: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761118.760416: nl80211: if_removed already cleared - ignore event >1401761118.760444: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761118.760461: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761118.760508: nl80211: if_removed already cleared - ignore event >1401761118.760531: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761118.760549: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761118.760596: nl80211: if_removed already cleared - ignore event >1401761118.760619: nl80211: Event message available >1401761118.760649: nl80211: MLME event 38 >1401761118.760668: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 40 56 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761118.760722: nl80211: Associate event >1401761118.760741: wlp2s0: Event ASSOC (0) received >1401761118.760787: wlp2s0: Association info event >1401761118.760808: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761118.760872: wlp2s0: freq=2412 MHz >1401761118.760895: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761118.760911: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761118.760930: netlink: Operstate: linkmode=-1, operstate=5 >1401761118.761045: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761118.761084: wlp2s0: No keys have been configured - skip key clearing >1401761118.761108: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761118.761126: wlp2s0: WPA: Association event - clear replay counter >1401761118.761143: wlp2s0: WPA: Clear old PTK >1401761118.761161: EAPOL: External notification - portEnabled=0 >1401761118.761178: EAPOL: Supplicant port status: Unauthorized >1401761118.761275: EAPOL: External notification - portValid=0 >1401761118.761301: EAPOL: Supplicant port status: Unauthorized >1401761118.761372: EAPOL: External notification - EAP success=0 >1401761118.761395: EAPOL: Supplicant port status: Unauthorized >1401761118.761461: EAPOL: External notification - portEnabled=1 >1401761118.761486: EAPOL: SUPP_PAE entering state CONNECTING >1401761118.761501: EAPOL: enable timer tick >1401761118.761517: EAPOL: SUPP_BE entering state IDLE >1401761118.761537: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761118.761555: wlp2s0: Cancelling scan request >1401761118.761573: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761118.761591: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761118.761606: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.761657: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761118.761677: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761118.761692: wlp2s0: EAPOL-Key type=2 >1401761118.761708: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761118.761722: wlp2s0: key_length=16 key_data_length=22 >1401761118.761735: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761118.761751: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761118.761787: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761118.761804: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761118.761819: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761118.761834: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761118.761851: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.761900: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761118.761987: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761118.762006: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.762025: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.762047: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761118.762065: wlp2s0: RSN: no matching PMKID found >1401761118.762080: Get randomness: len=32 entropy=9 >1401761118.762781: WPA: Renewed SNonce - hexdump(len=32): 5c 65 ae a2 e1 33 4a db ff 10 f7 f5 2f a2 54 f7 a7 d5 9e d1 02 32 1c bb 71 99 e9 3d f1 81 96 01 >1401761118.762827: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761118.762854: WPA: Nonce1 - hexdump(len=32): 5c 65 ae a2 e1 33 4a db ff 10 f7 f5 2f a2 54 f7 a7 d5 9e d1 02 32 1c bb 71 99 e9 3d f1 81 96 01 >1401761118.762875: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761118.762895: WPA: PMK - hexdump(len=32): [REMOVED] >1401761118.762909: WPA: PTK - hexdump(len=48): [REMOVED] >1401761118.762924: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761118.762944: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761118.762962: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761118.762981: WPA: KCK - hexdump(len=16): [REMOVED] >1401761118.762995: WPA: Derived Key MIC - hexdump(len=16): 5c a2 38 e1 7a 33 7d b2 f4 5e 9b 32 87 20 4f 79 >1401761118.763011: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 5c 65 ae a2 e1 33 4a db ff 10 f7 f5 2f a2 54 f7 a7 d5 9e d1 02 32 1c bb 71 99 e9 3d f1 81 96 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c a2 38 e1 7a 33 7d b2 f4 5e 9b 32 87 20 4f 79 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761118.763102: nl80211: Event message available >1401761118.763131: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761118.766109: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761119.762682: EAPOL: startWhen --> 0 >1401761119.762726: EAPOL: disable timer tick >1401761119.762740: EAPOL: SUPP_PAE entering state CONNECTING >1401761119.762753: EAPOL: enable timer tick >1401761119.762792: EAPOL: txStart >1401761119.762805: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761119.763053: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761119.763097: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 24 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 bf e5 d0 6e 07 9b 6d 3e b7 10 f8 22 70 7c 49 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761119.763152: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761119.763167: wlp2s0: EAPOL-Key type=2 >1401761119.763185: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761119.763200: wlp2s0: key_length=16 key_data_length=56 >1401761119.763213: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >1401761119.763228: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761119.763248: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761119.763264: key_rsc - hexdump(len=8): 24 07 00 00 00 00 00 00 >1401761119.763279: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761119.763294: key_mic - hexdump(len=16): 60 bf e5 d0 6e 07 9b 6d 3e b7 10 f8 22 70 7c 49 >1401761119.763313: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 24 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 bf e5 d0 6e 07 9b 6d 3e b7 10 f8 22 70 7c 49 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761119.763375: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761119.763425: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761119.763461: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761119.763482: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761119.763496: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761119.763521: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761119.763540: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761119.763556: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761119.763575: WPA: KCK - hexdump(len=16): [REMOVED] >1401761119.763589: WPA: Derived Key MIC - hexdump(len=16): 61 28 09 7a 0b d1 88 7c 61 c3 53 9c ef aa d8 d0 >1401761119.763606: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 28 09 7a 0b d1 88 7c 61 c3 53 9c ef aa d8 d0 00 00 >1401761119.763658: wlp2s0: WPA: Installing PTK to the driver >1401761119.763733: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761119.763784: addr=40:16:7e:59:a7:40 >1401761119.835747: EAPOL: External notification - portValid=1 >1401761119.835780: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761119.835829: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761119.835839: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761119.835848: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761119.835854: WPA: RSC - hexdump(len=6): 24 07 00 00 00 00 >1401761119.835994: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761119.836003: broadcast key >1401761119.836047: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761119.836055: wlp2s0: Cancelling authentication timeout >1401761119.836062: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761119.836069: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761119.836075: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761119.836082: netlink: Operstate: linkmode=-1, operstate=6 >1401761119.836136: EAPOL: External notification - portValid=1 >1401761119.836144: EAPOL: External notification - EAP success=1 >1401761119.836150: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761119.836157: EAPOL: SUPP_BE entering state SUCCESS >1401761119.836163: EAP: EAP entering state DISABLED >1401761119.836168: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761119.836174: EAPOL: Supplicant port status: Authorized >1401761119.836202: EAPOL: SUPP_BE entering state IDLE >1401761119.836208: EAPOL authentication completed successfully >1401761119.836234: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761119.836241: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761119.836257: nl80211: if_removed already cleared - ignore event >1401761119.840911: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761120.837078: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761120.837121: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 28 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e 8a c4 10 bd fa e2 0e 91 b7 22 1f 6a d0 a7 ee 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761120.837175: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761120.837191: wlp2s0: EAPOL-Key type=2 >1401761120.837208: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761120.837241: wlp2s0: key_length=16 key_data_length=56 >1401761120.837254: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >1401761120.837270: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761120.837290: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761120.837307: key_rsc - hexdump(len=8): 28 07 00 00 00 00 00 00 >1401761120.837322: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761120.837336: key_mic - hexdump(len=16): 4e 8a c4 10 bd fa e2 0e 91 b7 22 1f 6a d0 a7 ee >1401761120.837355: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 28 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e 8a c4 10 bd fa e2 0e 91 b7 22 1f 6a d0 a7 ee 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761120.837417: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761120.837453: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761120.837471: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761120.837575: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761120.837594: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761120.837622: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761120.837644: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761120.837664: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761120.837689: WPA: KCK - hexdump(len=16): [REMOVED] >1401761120.837706: WPA: Derived Key MIC - hexdump(len=16): d3 af ef 3e 95 76 01 15 fa 29 62 b6 9c 28 39 2a >1401761120.837724: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d3 af ef 3e 95 76 01 15 fa 29 62 b6 9c 28 39 2a 00 00 >1401761120.837788: wlp2s0: WPA: Installing PTK to the driver >1401761120.837865: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761120.837894: addr=40:16:7e:59:a7:40 >1401761120.840268: EAPOL: External notification - portValid=1 >1401761120.840308: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761120.840379: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761120.840397: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761120.840411: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761120.840423: WPA: RSC - hexdump(len=6): 28 07 00 00 00 00 >1401761120.840483: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761120.840505: broadcast key >1401761120.840677: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761120.840695: wlp2s0: Cancelling authentication timeout >1401761120.840707: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761120.840777: EAPOL: External notification - portValid=1 >1401761120.840794: EAPOL: External notification - EAP success=1 >1401761120.840805: EAP: EAP entering state DISABLED >1401761120.840860: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761120.840874: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 2c 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 3d 2f 46 4a dd da cb 81 15 03 0e c2 ff bd be 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761120.840922: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761120.840933: wlp2s0: EAPOL-Key type=2 >1401761120.840946: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761120.840957: wlp2s0: key_length=16 key_data_length=56 >1401761120.840966: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 >1401761120.840977: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761120.840992: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761120.841003: key_rsc - hexdump(len=8): 2c 07 00 00 00 00 00 00 >1401761120.841014: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761120.841024: key_mic - hexdump(len=16): 46 3d 2f 46 4a dd da cb 81 15 03 0e c2 ff bd be >1401761120.841037: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 2c 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 3d 2f 46 4a dd da cb 81 15 03 0e c2 ff bd be 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761120.841082: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761120.841108: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761120.841121: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761120.841174: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761120.841187: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761120.841206: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761120.841222: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761120.841236: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761120.841253: WPA: KCK - hexdump(len=16): [REMOVED] >1401761120.841263: WPA: Derived Key MIC - hexdump(len=16): 3e 1e 3c f7 1a e7 fc fc bb 88 e3 8f 19 7e e2 8f >1401761120.841275: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e 1e 3c f7 1a e7 fc fc bb 88 e3 8f 19 7e e2 8f 00 00 >1401761120.841334: wlp2s0: WPA: Installing PTK to the driver >1401761120.841383: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761120.841399: addr=40:16:7e:59:a7:40 >1401761120.841611: EAPOL: External notification - portValid=1 >1401761120.841628: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761120.841673: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761120.841686: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761120.841700: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761120.841711: WPA: RSC - hexdump(len=6): 2c 07 00 00 00 00 >1401761120.841741: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761120.841754: broadcast key >1401761120.841881: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761120.841901: wlp2s0: Cancelling authentication timeout >1401761120.841913: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761120.841955: EAPOL: External notification - portValid=1 >1401761120.841967: EAPOL: External notification - EAP success=1 >1401761120.841978: EAP: EAP entering state DISABLED >1401761120.842628: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761121.843249: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761121.843290: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 31 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d 22 19 ac 33 82 ab 21 a2 d9 e3 45 99 3e 87 90 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761121.843344: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761121.843360: wlp2s0: EAPOL-Key type=2 >1401761121.843378: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761121.843394: wlp2s0: key_length=16 key_data_length=56 >1401761121.843407: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 >1401761121.843424: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761121.843444: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761121.843461: key_rsc - hexdump(len=8): 31 07 00 00 00 00 00 00 >1401761121.843476: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761121.843492: key_mic - hexdump(len=16): 8d 22 19 ac 33 82 ab 21 a2 d9 e3 45 99 3e 87 90 >1401761121.843511: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 31 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d 22 19 ac 33 82 ab 21 a2 d9 e3 45 99 3e 87 90 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761121.843575: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761121.843612: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761121.843630: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761121.843724: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761121.843740: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761121.843798: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761121.843818: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761121.843835: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761121.843855: WPA: KCK - hexdump(len=16): [REMOVED] >1401761121.843869: WPA: Derived Key MIC - hexdump(len=16): 1f ed 6a d0 c0 21 66 36 c8 33 ad a7 08 57 fa 8c >1401761121.843886: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1f ed 6a d0 c0 21 66 36 c8 33 ad a7 08 57 fa 8c 00 00 >1401761121.843934: wlp2s0: WPA: Installing PTK to the driver >1401761121.844009: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761121.844036: addr=40:16:7e:59:a7:40 >1401761121.846354: EAPOL: External notification - portValid=1 >1401761121.846399: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761121.846474: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761121.846493: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761121.846511: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761121.846525: WPA: RSC - hexdump(len=6): 31 07 00 00 00 00 >1401761121.846585: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761121.846606: broadcast key >1401761121.846735: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761121.846755: wlp2s0: Cancelling authentication timeout >1401761121.846781: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761121.846838: EAPOL: External notification - portValid=1 >1401761121.846855: EAPOL: External notification - EAP success=1 >1401761121.846870: EAP: EAP entering state DISABLED >1401761121.848938: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761122.847189: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761122.847231: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 35 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f ca aa b7 3e cc 47 af d7 e7 1d 78 52 4a 82 d1 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761122.847286: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761122.847302: wlp2s0: EAPOL-Key type=2 >1401761122.847320: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761122.847335: wlp2s0: key_length=16 key_data_length=56 >1401761122.847348: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 >1401761122.847364: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761122.847386: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761122.847403: key_rsc - hexdump(len=8): 35 07 00 00 00 00 00 00 >1401761122.847419: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761122.847435: key_mic - hexdump(len=16): 0f ca aa b7 3e cc 47 af d7 e7 1d 78 52 4a 82 d1 >1401761122.847455: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 35 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f ca aa b7 3e cc 47 af d7 e7 1d 78 52 4a 82 d1 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761122.847519: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761122.847556: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761122.847575: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761122.847683: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761122.847703: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761122.847729: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761122.847749: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761122.847779: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761122.847800: WPA: KCK - hexdump(len=16): [REMOVED] >1401761122.847815: WPA: Derived Key MIC - hexdump(len=16): fa 4c cc 6c 34 b5 06 55 52 da ed bc 59 76 1d 91 >1401761122.847847: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa 4c cc 6c 34 b5 06 55 52 da ed bc 59 76 1d 91 00 00 >1401761122.847899: wlp2s0: WPA: Installing PTK to the driver >1401761122.848110: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761122.848146: addr=40:16:7e:59:a7:40 >1401761122.850347: EAPOL: External notification - portValid=1 >1401761122.850383: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761122.850462: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761122.850483: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761122.850500: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761122.850514: WPA: RSC - hexdump(len=6): 35 07 00 00 00 00 >1401761122.850575: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761122.850599: broadcast key >1401761122.850781: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761122.850813: wlp2s0: Cancelling authentication timeout >1401761122.850826: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761122.850892: EAPOL: External notification - portValid=1 >1401761122.850906: EAPOL: External notification - EAP success=1 >1401761122.850916: EAP: EAP entering state DISABLED >1401761122.852896: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761123.851285: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761123.851328: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 39 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 56 29 07 58 30 96 80 cf 01 4a e6 2f 59 81 07 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761123.851383: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761123.851398: wlp2s0: EAPOL-Key type=2 >1401761123.851416: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761123.851432: wlp2s0: key_length=16 key_data_length=56 >1401761123.851445: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 >1401761123.851461: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761123.851482: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761123.851499: key_rsc - hexdump(len=8): 39 07 00 00 00 00 00 00 >1401761123.851515: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761123.851531: key_mic - hexdump(len=16): 12 56 29 07 58 30 96 80 cf 01 4a e6 2f 59 81 07 >1401761123.851552: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 39 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 56 29 07 58 30 96 80 cf 01 4a e6 2f 59 81 07 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761123.851616: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761123.851653: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761123.851672: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761123.851801: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761123.851838: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761123.851866: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761123.851886: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761123.851903: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761123.851924: WPA: KCK - hexdump(len=16): [REMOVED] >1401761123.851939: WPA: Derived Key MIC - hexdump(len=16): ba 02 5b 0a 1b 4c 1f 9c 22 74 b6 81 9a d1 57 78 >1401761123.851956: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ba 02 5b 0a 1b 4c 1f 9c 22 74 b6 81 9a d1 57 78 00 00 >1401761123.852005: wlp2s0: WPA: Installing PTK to the driver >1401761123.852082: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761123.852112: addr=40:16:7e:59:a7:40 >1401761123.854434: EAPOL: External notification - portValid=1 >1401761123.854473: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761123.854551: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761123.854571: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761123.854588: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761123.854602: WPA: RSC - hexdump(len=6): 39 07 00 00 00 00 >1401761123.854665: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761123.854687: broadcast key >1401761123.854869: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761123.854894: wlp2s0: Cancelling authentication timeout >1401761123.854911: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761123.854981: EAPOL: External notification - portValid=1 >1401761123.855000: EAPOL: External notification - EAP success=1 >1401761123.855013: EAP: EAP entering state DISABLED >1401761123.856846: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761124.855237: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761124.855279: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 3d 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 5a 36 8b aa 96 03 7e 83 54 2e 9f 86 16 87 03 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761124.855335: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761124.855351: wlp2s0: EAPOL-Key type=2 >1401761124.855368: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761124.855384: wlp2s0: key_length=16 key_data_length=56 >1401761124.855397: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08 >1401761124.855414: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761124.855435: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761124.855452: key_rsc - hexdump(len=8): 3d 07 00 00 00 00 00 00 >1401761124.855467: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761124.855483: key_mic - hexdump(len=16): 24 5a 36 8b aa 96 03 7e 83 54 2e 9f 86 16 87 03 >1401761124.855505: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 3d 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 5a 36 8b aa 96 03 7e 83 54 2e 9f 86 16 87 03 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761124.855582: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761124.855621: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761124.855640: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761124.855747: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761124.855792: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761124.855820: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761124.855840: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761124.855857: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761124.855878: WPA: KCK - hexdump(len=16): [REMOVED] >1401761124.855892: WPA: Derived Key MIC - hexdump(len=16): 90 70 b3 53 6a 9e 63 1c c8 4f 55 55 8e 7f 3b ab >1401761124.855909: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 70 b3 53 6a 9e 63 1c c8 4f 55 55 8e 7f 3b ab 00 00 >1401761124.855960: wlp2s0: WPA: Installing PTK to the driver >1401761124.856036: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761124.856068: addr=40:16:7e:59:a7:40 >1401761124.858373: EAPOL: External notification - portValid=1 >1401761124.858410: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761124.858487: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761124.858507: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761124.858523: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761124.858537: WPA: RSC - hexdump(len=6): 3d 07 00 00 00 00 >1401761124.858600: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761124.858624: broadcast key >1401761124.858837: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761124.858856: wlp2s0: Cancelling authentication timeout >1401761124.858868: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761124.858922: EAPOL: External notification - portValid=1 >1401761124.858936: EAPOL: External notification - EAP success=1 >1401761124.858945: EAP: EAP entering state DISABLED >1401761124.860923: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761125.859071: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761125.859112: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 41 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 19 50 ce 97 73 a5 27 c3 87 e8 22 59 c9 b5 ae 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761125.859168: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761125.859184: wlp2s0: EAPOL-Key type=2 >1401761125.859203: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761125.859219: wlp2s0: key_length=16 key_data_length=56 >1401761125.859234: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09 >1401761125.859252: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 >1401761125.859287: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 >1401761125.859306: key_rsc - hexdump(len=8): 41 07 00 00 00 00 00 00 >1401761125.859324: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761125.859342: key_mic - hexdump(len=16): ab 19 50 ce 97 73 a5 27 c3 87 e8 22 59 c9 b5 ae >1401761125.859362: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 81 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 41 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab 19 50 ce 97 73 a5 27 c3 87 e8 22 59 c9 b5 ae 00 38 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761125.859426: RSN: encrypted key data - hexdump(len=56): 34 2a 8d 0c 2c fc 20 2e 26 d7 a1 1d dc 06 b3 e3 0f f4 7a 55 c2 9f d0 11 30 46 fa 7b 18 e8 a2 f3 37 cc ff 26 76 62 77 78 87 7c 89 6c 9c 32 47 75 8d 8b 65 a7 bf d8 19 b5 >1401761125.859464: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761125.859484: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761125.859584: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761125.859601: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761125.859628: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761125.859648: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761125.859665: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761125.859685: WPA: KCK - hexdump(len=16): [REMOVED] >1401761125.859700: WPA: Derived Key MIC - hexdump(len=16): 28 de be cf a1 23 a2 54 18 a9 d9 a3 d5 f6 1f 10 >1401761125.859718: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 de be cf a1 23 a2 54 18 a9 d9 a3 d5 f6 1f 10 00 00 >1401761125.859789: wlp2s0: WPA: Installing PTK to the driver >1401761125.859862: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761125.859890: addr=40:16:7e:59:a7:40 >1401761125.862155: EAPOL: External notification - portValid=1 >1401761125.862173: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761125.862213: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761125.862222: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761125.862231: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761125.862238: WPA: RSC - hexdump(len=6): 41 07 00 00 00 00 >1401761125.862268: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761125.862279: broadcast key >1401761125.862361: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761125.862370: wlp2s0: Cancelling authentication timeout >1401761125.862378: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761125.862406: EAPOL: External notification - portValid=1 >1401761125.862414: EAPOL: External notification - EAP success=1 >1401761125.862421: EAP: EAP entering state DISABLED >1401761125.864798: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761126.866243: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761126.866292: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761126.866367: nl80211: if_removed already cleared - ignore event >1401761126.866667: nl80211: Event message available >1401761126.866702: nl80211: Delete station 40:16:7e:59:a7:40 >1401761126.869900: nl80211: Event message available >1401761126.869969: nl80211: MLME event 39 >1401761126.869984: nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 f0 5f 0f 00 >1401761126.870023: nl80211: Deauthenticate event >1401761126.870043: wlp2s0: Event DEAUTH (12) received >1401761126.870059: wlp2s0: Deauthentication notification >1401761126.870074: wlp2s0: * reason 15 >1401761126.870089: wlp2s0: * address 40:16:7e:59:a7:40 >1401761126.870102: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761126.870119: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=15 >1401761126.870141: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761126.870157: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761126.870172: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761126.870190: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761126.870205: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761126.870339: wlp2s0: Disconnect event - remove keys >1401761126.870420: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761126.875091: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761126.875198: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761126.875258: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761126.875314: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761126.875334: addr=40:16:7e:59:a7:40 >1401761126.875369: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761126.875385: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761126.875400: netlink: Operstate: linkmode=-1, operstate=5 >1401761126.875514: EAPOL: External notification - portEnabled=0 >1401761126.875540: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761126.875555: EAPOL: Supplicant port status: Unauthorized >1401761126.875646: EAPOL: SUPP_BE entering state INITIALIZE >1401761126.875671: EAPOL: Supplicant port status: Unauthorized >1401761126.875741: EAPOL: External notification - portValid=0 >1401761126.875785: EAPOL: Supplicant port status: Unauthorized >1401761126.875859: EAPOL: External notification - EAP success=0 >1401761126.875879: EAPOL: Supplicant port status: Unauthorized >1401761126.875963: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761126.875991: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761126.876038: nl80211: if_removed already cleared - ignore event >1401761126.876059: nl80211: Event message available >1401761126.876085: nl80211: Ignore disconnect event when using userspace SME >1401761126.880577: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761126.885345: nl80211: Event message available >1401761126.885414: nl80211: Regulatory domain change >1401761126.885435: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761126.885604: nl80211: Regulatory information - country=00 >1401761126.885626: nl80211: 2402-2472 @ 40 MHz >1401761126.885642: nl80211: 2457-2482 @ 40 MHz >1401761126.885657: nl80211: 2474-2494 @ 20 MHz >1401761126.885672: nl80211: 5170-5250 @ 80 MHz >1401761126.885686: nl80211: 5735-5835 @ 80 MHz >1401761126.885702: nl80211: 57240-63720 @ 2160 MHz >1401761126.885729: nl80211: Added 802.11b mode based on 802.11g information >1401761126.885745: P2P: Add operating class 81 >1401761126.885771: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761126.885790: P2P: Add operating class 115 >1401761126.885804: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761126.885819: P2P: Add operating class 124 >1401761126.885834: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761126.885850: P2P: Add operating class 116 >1401761126.885864: P2P: Channels - hexdump(len=2): 24 2c >1401761126.885879: P2P: Add operating class 117 >1401761126.885895: P2P: Channels - hexdump(len=2): 28 30 >1401761126.885909: P2P: Add operating class 126 >1401761126.885923: P2P: Channels - hexdump(len=2): 95 9d >1401761126.885950: P2P: Add operating class 127 >1401761126.885966: P2P: Channels - hexdump(len=2): 99 a1 >1401761126.885984: wlp2s0: P2P: Update channel list >1401761126.890142: nl80211: Event message available >1401761126.890197: nl80211: Regulatory domain change >1401761126.890212: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761126.890328: nl80211: Regulatory information - country=US >1401761126.890342: nl80211: 2402-2472 @ 40 MHz >1401761126.890353: nl80211: 5170-5250 @ 80 MHz >1401761126.890363: nl80211: 5250-5330 @ 80 MHz >1401761126.890373: nl80211: 5735-5835 @ 80 MHz >1401761126.890382: nl80211: 57240-63720 @ 2160 MHz >1401761126.890400: nl80211: Added 802.11b mode based on 802.11g information >1401761126.890410: P2P: Add operating class 81 >1401761126.890420: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761126.890432: P2P: Add operating class 115 >1401761126.890441: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761126.890454: P2P: Add operating class 124 >1401761126.890464: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761126.890476: P2P: Add operating class 116 >1401761126.890487: P2P: Channels - hexdump(len=2): 24 2c >1401761126.890498: P2P: Add operating class 117 >1401761126.890509: P2P: Channels - hexdump(len=2): 28 30 >1401761126.890520: P2P: Add operating class 126 >1401761126.890530: P2P: Channels - hexdump(len=2): 95 9d >1401761126.890540: P2P: Add operating class 127 >1401761126.890550: P2P: Channels - hexdump(len=2): 99 a1 >1401761126.890562: wlp2s0: P2P: Update channel list >1401761126.970431: wlp2s0: State: DISCONNECTED -> SCANNING >1401761126.970562: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761126.970594: wlp2s0: Starting AP scan for wildcard SSID >1401761126.970609: WPS: Building WPS IE for Probe Request >1401761126.970623: WPS: * Version (hardcoded 0x10) >1401761126.970636: WPS: * Request Type >1401761126.970649: WPS: * Config Methods (108) >1401761126.970661: WPS: * UUID-E >1401761126.970674: WPS: * Primary Device Type >1401761126.970686: WPS: * RF Bands (3) >1401761126.970698: WPS: * Association State >1401761126.970711: WPS: * Configuration Error (0) >1401761126.970723: WPS: * Device Password ID (0) >1401761126.970736: WPS: * Device Name >1401761126.970753: P2P: * P2P IE header >1401761126.970784: P2P: * Capability dev=25 group=00 >1401761126.970799: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761126.970858: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761126.970884: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761126.970899: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761126.971011: Scan requested (ret=0) - scan timeout 30 seconds >1401761126.971042: nl80211: Event message available >1401761126.971064: nl80211: Scan trigger >1401761126.975801: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761127.770822: EAPOL: Supplicant port status: Unauthorized >1401761128.639962: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761128.640013: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761128.640093: nl80211: if_removed already cleared - ignore event >1401761128.640120: nl80211: Event message available >1401761128.640151: nl80211: New scan results available >1401761128.640177: wlp2s0: Event SCAN_RESULTS (3) received >1401761128.640319: nl80211: Received scan results (4 BSSes) >1401761128.640430: wlp2s0: BSS: Start scan result update 3 >1401761128.640476: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761128.640496: wlp2s0: New scan results available >1401761128.640552: wlp2s0: Selecting BSS from priority group 0 >1401761128.640573: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46 >1401761128.640605: wlp2s0: skip - SSID mismatch >1401761128.640636: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 >1401761128.640656: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761128.640676: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-59 >1401761128.640695: wlp2s0: skip - SSID mismatch >1401761128.640716: wlp2s0: 3: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-70 >1401761128.640732: wlp2s0: skip - SSID mismatch >1401761128.640750: wlp2s0: No APs found - clear blacklist and try again >1401761128.640788: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761128.640810: wlp2s0: Selecting BSS from priority group 0 >1401761128.640831: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46 >1401761128.640850: wlp2s0: skip - SSID mismatch >1401761128.640872: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 >1401761128.640891: wlp2s0: selected based on RSN IE >1401761128.640912: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761128.640935: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761128.640955: wlp2s0: Automatic auth_alg selection: 0x1 >1401761128.640973: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761128.640991: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761128.641008: RSN: No PMKSA cache entry found >1401761128.641026: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761128.641045: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761128.641064: wlp2s0: WPA: clearing AP WPA IE >1401761128.641079: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761128.641106: wlp2s0: WPA: using GTK CCMP >1401761128.641123: wlp2s0: WPA: using PTK CCMP >1401761128.641142: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761128.641160: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761128.641188: wlp2s0: Cancelling scan request >1401761128.641210: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761128.641229: wlp2s0: No keys have been configured - skip key clearing >1401761128.641246: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761128.641329: EAPOL: External notification - EAP success=0 >1401761128.641358: EAPOL: Supplicant port status: Unauthorized >1401761128.641478: EAPOL: External notification - EAP fail=0 >1401761128.641505: EAPOL: Supplicant port status: Unauthorized >1401761128.641582: EAPOL: External notification - portControl=Auto >1401761128.641607: EAPOL: Supplicant port status: Unauthorized >1401761128.641700: nl80211: Authenticate (ifindex=3) >1401761128.641728: * bssid=40:16:7e:59:a7:40 >1401761128.641746: * freq=2412 >1401761128.641781: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761128.641813: * IEs - hexdump(len=0): [NULL] >1401761128.641829: * Auth Type 0 >1401761128.646216: nl80211: Authentication request send successfully >1401761128.646263: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761128.646398: nl80211: Event message available >1401761128.646424: nl80211: New station 40:16:7e:59:a7:40 >1401761128.646448: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761128.646535: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761128.646658: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761128.770974: EAPOL: Supplicant port status: Unauthorized >1401761129.650147: nl80211: Event message available >1401761129.650215: nl80211: MLME event 37 >1401761129.650230: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 d0 61 00 00 02 00 00 00 dd 09 00 10 18 02 05 00 1c 00 00 >1401761129.650255: nl80211: Authenticate event >1401761129.650273: wlp2s0: Event AUTH (11) received >1401761129.650293: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761129.650307: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 05 00 1c 00 00 >1401761129.650328: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761129.650344: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761129.650358: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761129.650372: netlink: Operstate: linkmode=-1, operstate=5 >1401761129.650475: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761129.650504: nl80211: Associate (ifindex=3) >1401761129.650521: * bssid=40:16:7e:59:a7:40 >1401761129.650535: * freq=2412 >1401761129.650549: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761129.650573: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761129.650592: * pairwise=0xfac04 >1401761129.650606: * group=0xfac04 >1401761129.664222: nl80211: Association request send successfully >1401761129.664283: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761129.664407: nl80211: Event message available >1401761129.664433: nl80211: Delete station 40:16:7e:59:a7:40 >1401761129.664457: nl80211: Event message available >1401761129.664475: nl80211: New station 40:16:7e:59:a7:40 >1401761129.771258: EAPOL: Supplicant port status: Unauthorized >1401761130.772503: EAPOL: Supplicant port status: Unauthorized >1401761131.669212: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761131.669255: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.669302: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761131.669332: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761131.669346: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.669392: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761131.669418: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761131.669433: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.669480: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761131.672247: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761131.672282: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761131.672364: nl80211: if_removed already cleared - ignore event >1401761131.672403: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761131.672421: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761131.672461: nl80211: if_removed already cleared - ignore event >1401761131.672479: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761131.672494: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761131.672530: nl80211: if_removed already cleared - ignore event >1401761131.672556: nl80211: Event message available >1401761131.672587: nl80211: MLME event 38 >1401761131.672601: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 20 63 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761131.672649: nl80211: Associate event >1401761131.672665: wlp2s0: Event ASSOC (0) received >1401761131.672680: wlp2s0: Association info event >1401761131.672694: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761131.672736: wlp2s0: freq=2412 MHz >1401761131.672752: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761131.672796: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761131.672813: netlink: Operstate: linkmode=-1, operstate=5 >1401761131.672933: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761131.672968: wlp2s0: No keys have been configured - skip key clearing >1401761131.672988: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761131.673004: wlp2s0: WPA: Association event - clear replay counter >1401761131.673020: wlp2s0: WPA: Clear old PTK >1401761131.673036: EAPOL: External notification - portEnabled=0 >1401761131.673053: EAPOL: Supplicant port status: Unauthorized >1401761131.673166: EAPOL: External notification - portValid=0 >1401761131.673191: EAPOL: Supplicant port status: Unauthorized >1401761131.673268: EAPOL: External notification - EAP success=0 >1401761131.673288: EAPOL: Supplicant port status: Unauthorized >1401761131.673343: EAPOL: External notification - portEnabled=1 >1401761131.673360: EAPOL: SUPP_PAE entering state CONNECTING >1401761131.673373: EAPOL: SUPP_BE entering state IDLE >1401761131.673389: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761131.673406: wlp2s0: Cancelling scan request >1401761131.673422: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761131.673437: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761131.673451: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.673494: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761131.673511: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761131.673526: wlp2s0: EAPOL-Key type=2 >1401761131.673543: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761131.673558: wlp2s0: key_length=16 key_data_length=22 >1401761131.673571: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761131.673587: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761131.673607: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761131.673623: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761131.673651: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761131.673667: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761131.673685: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.673732: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761131.673828: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761131.673848: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.673868: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.673886: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761131.673905: wlp2s0: RSN: no matching PMKID found >1401761131.673918: Get randomness: len=32 entropy=5 >1401761131.674605: WPA: Renewed SNonce - hexdump(len=32): 53 73 0f bb a7 a3 d9 2e 93 92 39 cd 84 a7 dd ac e3 c6 23 7d 7a 6d ff 18 c9 84 8e 78 03 28 0b 67 >1401761131.674645: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761131.674661: WPA: Nonce1 - hexdump(len=32): 53 73 0f bb a7 a3 d9 2e 93 92 39 cd 84 a7 dd ac e3 c6 23 7d 7a 6d ff 18 c9 84 8e 78 03 28 0b 67 >1401761131.674682: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761131.674702: WPA: PMK - hexdump(len=32): [REMOVED] >1401761131.674716: WPA: PTK - hexdump(len=48): [REMOVED] >1401761131.674729: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761131.674748: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761131.674783: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761131.674802: WPA: KCK - hexdump(len=16): [REMOVED] >1401761131.674818: WPA: Derived Key MIC - hexdump(len=16): df b5 5d 1d 22 96 68 b9 30 2d cd 17 fb 09 56 4f >1401761131.674835: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 53 73 0f bb a7 a3 d9 2e 93 92 39 cd 84 a7 dd ac e3 c6 23 7d 7a 6d ff 18 c9 84 8e 78 03 28 0b 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 df b5 5d 1d 22 96 68 b9 30 2d cd 17 fb 09 56 4f 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761131.674930: nl80211: Event message available >1401761131.674958: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761131.678009: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761131.772783: EAPOL: startWhen --> 0 >1401761131.772829: EAPOL: disable timer tick >1401761131.772842: EAPOL: SUPP_PAE entering state CONNECTING >1401761131.772855: EAPOL: enable timer tick >1401761131.772869: EAPOL: txStart >1401761131.772882: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761132.675014: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761132.675054: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 62 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 21 bc 0f 5e 07 22 99 e3 1e 26 19 af 35 96 cd 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761132.675108: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761132.675123: wlp2s0: EAPOL-Key type=2 >1401761132.675140: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761132.675168: wlp2s0: key_length=16 key_data_length=56 >1401761132.675183: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >1401761132.675199: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761132.675219: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761132.675235: key_rsc - hexdump(len=8): 62 07 00 00 00 00 00 00 >1401761132.675250: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761132.675264: key_mic - hexdump(len=16): 7b 21 bc 0f 5e 07 22 99 e3 1e 26 19 af 35 96 cd >1401761132.675283: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 62 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 21 bc 0f 5e 07 22 99 e3 1e 26 19 af 35 96 cd 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761132.675346: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761132.675382: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761132.675400: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761132.675417: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761132.675430: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761132.675455: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761132.675473: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761132.675489: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761132.675508: WPA: KCK - hexdump(len=16): [REMOVED] >1401761132.675522: WPA: Derived Key MIC - hexdump(len=16): 11 1d 54 82 63 82 7c 6c d3 4e 82 2b 42 ea 6c 7a >1401761132.675538: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 1d 54 82 63 82 7c 6c d3 4e 82 2b 42 ea 6c 7a 00 00 >1401761132.675587: wlp2s0: WPA: Installing PTK to the driver >1401761132.675660: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761132.675686: addr=40:16:7e:59:a7:40 >1401761132.678182: EAPOL: External notification - portValid=1 >1401761132.678233: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761132.678326: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761132.678351: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761132.678370: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761132.678387: WPA: RSC - hexdump(len=6): 62 07 00 00 00 00 >1401761132.678465: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761132.678494: broadcast key >1401761132.678598: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761132.678619: wlp2s0: Cancelling authentication timeout >1401761132.678635: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761132.678652: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761132.678666: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761132.678681: netlink: Operstate: linkmode=-1, operstate=6 >1401761132.678846: EAPOL: External notification - portValid=1 >1401761132.678876: EAPOL: External notification - EAP success=1 >1401761132.678892: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761132.678923: EAPOL: SUPP_BE entering state SUCCESS >1401761132.678938: EAP: EAP entering state DISABLED >1401761132.678951: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761132.678964: EAPOL: Supplicant port status: Authorized >1401761132.679064: EAPOL: SUPP_BE entering state IDLE >1401761132.679085: EAPOL authentication completed successfully >1401761132.679137: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761132.679154: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761132.679197: nl80211: if_removed already cleared - ignore event >1401761132.683401: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761133.679210: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761133.679253: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 65 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 4d 73 79 2e 66 b0 85 62 69 61 cd 8b fa 6e f4 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761133.679307: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761133.679322: wlp2s0: EAPOL-Key type=2 >1401761133.679339: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761133.679354: wlp2s0: key_length=16 key_data_length=56 >1401761133.679367: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >1401761133.679383: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761133.679402: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761133.679419: key_rsc - hexdump(len=8): 65 07 00 00 00 00 00 00 >1401761133.679434: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761133.679448: key_mic - hexdump(len=16): 1b 4d 73 79 2e 66 b0 85 62 69 61 cd 8b fa 6e f4 >1401761133.679467: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 65 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 4d 73 79 2e 66 b0 85 62 69 61 cd 8b fa 6e f4 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761133.679530: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761133.679568: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761133.679586: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761133.679687: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761133.679705: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761133.679734: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761133.679756: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761133.679799: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761133.679825: WPA: KCK - hexdump(len=16): [REMOVED] >1401761133.679843: WPA: Derived Key MIC - hexdump(len=16): aa 6c d0 27 a2 b8 7a eb f2 23 6d ee 1e 03 d4 10 >1401761133.679861: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 6c d0 27 a2 b8 7a eb f2 23 6d ee 1e 03 d4 10 00 00 >1401761133.679926: wlp2s0: WPA: Installing PTK to the driver >1401761133.680142: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761133.680170: addr=40:16:7e:59:a7:40 >1401761133.682548: EAPOL: External notification - portValid=1 >1401761133.682593: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761133.682676: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761133.682696: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761133.682715: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761133.682731: WPA: RSC - hexdump(len=6): 65 07 00 00 00 00 >1401761133.682816: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761133.682837: broadcast key >1401761133.682994: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761133.683011: wlp2s0: Cancelling authentication timeout >1401761133.683027: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761133.683081: EAPOL: External notification - portValid=1 >1401761133.683098: EAPOL: External notification - EAP success=1 >1401761133.683114: EAP: EAP entering state DISABLED >1401761133.684924: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761134.683180: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761134.683225: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 71 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 84 50 e0 f4 17 f7 32 59 26 ea 29 99 6d db a7 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761134.683280: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761134.683297: wlp2s0: EAPOL-Key type=2 >1401761134.683315: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761134.683341: wlp2s0: key_length=16 key_data_length=56 >1401761134.683357: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 >1401761134.683376: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761134.683401: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761134.683419: key_rsc - hexdump(len=8): 71 07 00 00 00 00 00 00 >1401761134.683435: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761134.683450: key_mic - hexdump(len=16): 98 84 50 e0 f4 17 f7 32 59 26 ea 29 99 6d db a7 >1401761134.683470: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 71 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 84 50 e0 f4 17 f7 32 59 26 ea 29 99 6d db a7 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761134.683535: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761134.683572: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761134.683592: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761134.683690: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761134.683711: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761134.683738: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761134.683786: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761134.683805: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761134.683828: WPA: KCK - hexdump(len=16): [REMOVED] >1401761134.683843: WPA: Derived Key MIC - hexdump(len=16): e0 9e 1e 93 ef 84 b2 df 4a 60 7b 8f db 72 49 39 >1401761134.683861: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 9e 1e 93 ef 84 b2 df 4a 60 7b 8f db 72 49 39 00 00 >1401761134.683911: wlp2s0: WPA: Installing PTK to the driver >1401761134.683986: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761134.684017: addr=40:16:7e:59:a7:40 >1401761134.686473: EAPOL: External notification - portValid=1 >1401761134.686526: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761134.686614: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761134.686637: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761134.686654: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761134.686669: WPA: RSC - hexdump(len=6): 71 07 00 00 00 00 >1401761134.686742: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761134.686782: broadcast key >1401761134.686962: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761134.686989: wlp2s0: Cancelling authentication timeout >1401761134.687007: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761134.687081: EAPOL: External notification - portValid=1 >1401761134.687100: EAPOL: External notification - EAP success=1 >1401761134.687115: EAP: EAP entering state DISABLED >1401761134.688911: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761135.686964: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761135.687009: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 78 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c6 18 53 db 5d f4 d3 c2 cd 48 7f c6 b8 30 a2 67 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761135.687064: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761135.687080: wlp2s0: EAPOL-Key type=2 >1401761135.687098: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761135.687113: wlp2s0: key_length=16 key_data_length=56 >1401761135.687126: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 >1401761135.687142: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761135.687162: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761135.687178: key_rsc - hexdump(len=8): 78 07 00 00 00 00 00 00 >1401761135.687193: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761135.687208: key_mic - hexdump(len=16): c6 18 53 db 5d f4 d3 c2 cd 48 7f c6 b8 30 a2 67 >1401761135.687227: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 78 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c6 18 53 db 5d f4 d3 c2 cd 48 7f c6 b8 30 a2 67 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761135.687290: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761135.687340: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761135.687359: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761135.687459: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761135.687479: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761135.687505: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761135.687524: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761135.687541: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761135.687561: WPA: KCK - hexdump(len=16): [REMOVED] >1401761135.687575: WPA: Derived Key MIC - hexdump(len=16): f5 2d ee 36 55 ab f3 60 a2 53 cd 49 ff 67 dc 10 >1401761135.687592: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 2d ee 36 55 ab f3 60 a2 53 cd 49 ff 67 dc 10 00 00 >1401761135.687642: wlp2s0: WPA: Installing PTK to the driver >1401761135.687717: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761135.687746: addr=40:16:7e:59:a7:40 >1401761135.690265: EAPOL: External notification - portValid=1 >1401761135.690305: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761135.690373: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761135.690389: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761135.690402: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761135.690412: WPA: RSC - hexdump(len=6): 78 07 00 00 00 00 >1401761135.690468: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761135.690486: broadcast key >1401761135.690613: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761135.690633: wlp2s0: Cancelling authentication timeout >1401761135.690644: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761135.690698: EAPOL: External notification - portValid=1 >1401761135.690711: EAPOL: External notification - EAP success=1 >1401761135.690721: EAP: EAP entering state DISABLED >1401761135.690775: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761135.690789: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 7d 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 e4 11 22 a5 af e7 7f a9 c3 17 a2 1e 4a 70 ad 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761135.690827: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761135.690837: wlp2s0: EAPOL-Key type=2 >1401761135.690849: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761135.690860: wlp2s0: key_length=16 key_data_length=56 >1401761135.690869: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 >1401761135.690880: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761135.690894: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761135.690906: key_rsc - hexdump(len=8): 7d 07 00 00 00 00 00 00 >1401761135.690917: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761135.690927: key_mic - hexdump(len=16): 31 e4 11 22 a5 af e7 7f a9 c3 17 a2 1e 4a 70 ad >1401761135.690939: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 7d 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 e4 11 22 a5 af e7 7f a9 c3 17 a2 1e 4a 70 ad 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761135.690994: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761135.691022: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761135.691035: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761135.691081: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761135.691093: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761135.691112: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761135.691125: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761135.691136: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761135.691150: WPA: KCK - hexdump(len=16): [REMOVED] >1401761135.691160: WPA: Derived Key MIC - hexdump(len=16): e4 65 a0 70 60 57 74 e6 2b 42 41 73 99 96 9e 24 >1401761135.691172: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 65 a0 70 60 57 74 e6 2b 42 41 73 99 96 9e 24 00 00 >1401761135.691229: wlp2s0: WPA: Installing PTK to the driver >1401761135.691274: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761135.691290: addr=40:16:7e:59:a7:40 >1401761135.691425: EAPOL: External notification - portValid=1 >1401761135.691440: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761135.691478: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761135.691490: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761135.691501: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761135.691511: WPA: RSC - hexdump(len=6): 7d 07 00 00 00 00 >1401761135.691540: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761135.691553: broadcast key >1401761135.691652: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761135.691664: wlp2s0: Cancelling authentication timeout >1401761135.691675: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761135.691712: EAPOL: External notification - portValid=1 >1401761135.691723: EAPOL: External notification - EAP success=1 >1401761135.691732: EAP: EAP entering state DISABLED >1401761135.692660: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761136.691058: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761136.691100: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 80 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f 02 6d bb 23 87 c4 79 08 1d c0 32 ed 05 8f d4 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761136.691153: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761136.691169: wlp2s0: EAPOL-Key type=2 >1401761136.691186: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761136.691201: wlp2s0: key_length=16 key_data_length=56 >1401761136.691214: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 >1401761136.691245: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761136.691267: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761136.691283: key_rsc - hexdump(len=8): 80 07 00 00 00 00 00 00 >1401761136.691298: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761136.691313: key_mic - hexdump(len=16): 2f 02 6d bb 23 87 c4 79 08 1d c0 32 ed 05 8f d4 >1401761136.691332: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 80 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f 02 6d bb 23 87 c4 79 08 1d c0 32 ed 05 8f d4 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761136.691395: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761136.691431: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761136.691450: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761136.691551: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761136.691570: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761136.691596: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761136.691615: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761136.691631: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761136.691651: WPA: KCK - hexdump(len=16): [REMOVED] >1401761136.691665: WPA: Derived Key MIC - hexdump(len=16): b1 d9 59 31 59 5c 38 52 48 8a 6a 4a ab fc ba f5 >1401761136.691682: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 d9 59 31 59 5c 38 52 48 8a 6a 4a ab fc ba f5 00 00 >1401761136.691731: wlp2s0: WPA: Installing PTK to the driver >1401761136.691825: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761136.691856: addr=40:16:7e:59:a7:40 >1401761136.694231: EAPOL: External notification - portValid=1 >1401761136.694281: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761136.694369: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761136.694392: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761136.694409: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761136.694422: WPA: RSC - hexdump(len=6): 80 07 00 00 00 00 >1401761136.694494: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761136.694519: broadcast key >1401761136.694702: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761136.694727: wlp2s0: Cancelling authentication timeout >1401761136.694743: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761136.694826: EAPOL: External notification - portValid=1 >1401761136.694845: EAPOL: External notification - EAP success=1 >1401761136.694858: EAP: EAP entering state DISABLED >1401761136.696752: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761137.695158: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761137.695200: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 87 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 79 10 16 30 69 80 bc 02 f5 6d e7 8a 68 a8 98 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761137.695267: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761137.695284: wlp2s0: EAPOL-Key type=2 >1401761137.695302: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761137.695317: wlp2s0: key_length=16 key_data_length=56 >1401761137.695330: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08 >1401761137.695346: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761137.695366: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761137.695383: key_rsc - hexdump(len=8): 87 07 00 00 00 00 00 00 >1401761137.695397: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761137.695412: key_mic - hexdump(len=16): 7f 79 10 16 30 69 80 bc 02 f5 6d e7 8a 68 a8 98 >1401761137.695431: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 87 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 79 10 16 30 69 80 bc 02 f5 6d e7 8a 68 a8 98 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761137.695496: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761137.695533: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761137.695551: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761137.695652: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761137.695678: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761137.695704: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761137.695723: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761137.695740: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761137.695775: WPA: KCK - hexdump(len=16): [REMOVED] >1401761137.695793: WPA: Derived Key MIC - hexdump(len=16): 9b 3e 4a 99 77 d9 dc 79 38 2b 80 d0 dd eb 2a 63 >1401761137.695813: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b 3e 4a 99 77 d9 dc 79 38 2b 80 d0 dd eb 2a 63 00 00 >1401761137.695870: wlp2s0: WPA: Installing PTK to the driver >1401761137.695952: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761137.695981: addr=40:16:7e:59:a7:40 >1401761137.698332: EAPOL: External notification - portValid=1 >1401761137.698369: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761137.698460: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761137.698481: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761137.698500: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761137.698516: WPA: RSC - hexdump(len=6): 87 07 00 00 00 00 >1401761137.698588: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761137.698612: broadcast key >1401761137.698788: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761137.698812: wlp2s0: Cancelling authentication timeout >1401761137.698845: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761137.698910: EAPOL: External notification - portValid=1 >1401761137.698929: EAPOL: External notification - EAP success=1 >1401761137.698945: EAP: EAP entering state DISABLED >1401761137.700709: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761138.699353: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761138.699395: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 8b 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 6b 79 9b 47 cb 8f 0c 2c 00 35 ce 37 20 8a 84 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761138.699460: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761138.699476: wlp2s0: EAPOL-Key type=2 >1401761138.699494: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761138.699509: wlp2s0: key_length=16 key_data_length=56 >1401761138.699523: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09 >1401761138.699539: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 >1401761138.699560: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 >1401761138.699578: key_rsc - hexdump(len=8): 8b 07 00 00 00 00 00 00 >1401761138.699593: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761138.699609: key_mic - hexdump(len=16): d2 6b 79 9b 47 cb 8f 0c 2c 00 35 ce 37 20 8a 84 >1401761138.699630: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 83 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 8b 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 6b 79 9b 47 cb 8f 0c 2c 00 35 ce 37 20 8a 84 00 38 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761138.699694: RSN: encrypted key data - hexdump(len=56): 4b dd 16 2d 55 da c1 53 f4 2b 8c 5a 95 e0 0e 4c a3 cb 31 65 4c 12 d4 da 29 0d c1 77 85 7f e1 37 0b e0 07 7b 57 b1 4f 36 24 2f 2b 6e 00 5d d6 67 55 6a 00 d8 28 f7 d1 7e >1401761138.699731: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761138.699750: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761138.699876: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761138.699896: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761138.699923: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761138.699942: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761138.699959: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761138.699980: WPA: KCK - hexdump(len=16): [REMOVED] >1401761138.699994: WPA: Derived Key MIC - hexdump(len=16): f0 b5 40 b1 f0 13 fc 19 de 80 04 6a 0f 97 bf 4d >1401761138.700012: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 b5 40 b1 f0 13 fc 19 de 80 04 6a 0f 97 bf 4d 00 00 >1401761138.700063: wlp2s0: WPA: Installing PTK to the driver >1401761138.700426: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761138.700467: addr=40:16:7e:59:a7:40 >1401761138.702466: EAPOL: External notification - portValid=1 >1401761138.702508: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761138.702609: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761138.702633: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761138.702651: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761138.702666: WPA: RSC - hexdump(len=6): 8b 07 00 00 00 00 >1401761138.702735: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761138.702758: broadcast key >1401761138.702964: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761138.702989: wlp2s0: Cancelling authentication timeout >1401761138.703006: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761138.703074: EAPOL: External notification - portValid=1 >1401761138.703091: EAPOL: External notification - EAP success=1 >1401761138.703106: EAP: EAP entering state DISABLED >1401761138.704925: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761139.706199: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761139.706256: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761139.706331: nl80211: if_removed already cleared - ignore event >1401761139.706357: nl80211: Event message available >1401761139.706390: nl80211: Delete station 40:16:7e:59:a7:40 >1401761139.709480: nl80211: Event message available >1401761139.709535: nl80211: MLME event 39 >1401761139.709542: nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 80 6d 0f 00 >1401761139.709552: nl80211: Deauthenticate event >1401761139.709561: wlp2s0: Event DEAUTH (12) received >1401761139.709568: wlp2s0: Deauthentication notification >1401761139.709574: wlp2s0: * reason 15 >1401761139.709581: wlp2s0: * address 40:16:7e:59:a7:40 >1401761139.709587: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761139.709594: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=15 >1401761139.709601: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761139.709608: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761139.709615: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761139.709623: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761139.709630: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761139.709705: wlp2s0: Disconnect event - remove keys >1401761139.709734: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761139.713056: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761139.713132: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761139.713179: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761139.713217: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761139.713230: addr=40:16:7e:59:a7:40 >1401761139.713261: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761139.713271: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761139.713280: netlink: Operstate: linkmode=-1, operstate=5 >1401761139.713347: EAPOL: External notification - portEnabled=0 >1401761139.713362: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761139.713368: EAPOL: Supplicant port status: Unauthorized >1401761139.713423: EAPOL: SUPP_BE entering state INITIALIZE >1401761139.713437: EAPOL: Supplicant port status: Unauthorized >1401761139.713473: EAPOL: External notification - portValid=0 >1401761139.713484: EAPOL: Supplicant port status: Unauthorized >1401761139.713518: EAPOL: External notification - EAP success=0 >1401761139.713528: EAPOL: Supplicant port status: Unauthorized >1401761139.713573: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761139.713586: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761139.713612: nl80211: if_removed already cleared - ignore event >1401761139.713622: nl80211: Event message available >1401761139.713636: nl80211: Ignore disconnect event when using userspace SME >1401761139.718456: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761139.719274: nl80211: Event message available >1401761139.719329: nl80211: Regulatory domain change >1401761139.719352: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761139.719504: nl80211: Regulatory information - country=00 >1401761139.719525: nl80211: 2402-2472 @ 40 MHz >1401761139.719542: nl80211: 2457-2482 @ 40 MHz >1401761139.719558: nl80211: 2474-2494 @ 20 MHz >1401761139.719574: nl80211: 5170-5250 @ 80 MHz >1401761139.719591: nl80211: 5735-5835 @ 80 MHz >1401761139.719608: nl80211: 57240-63720 @ 2160 MHz >1401761139.719639: nl80211: Added 802.11b mode based on 802.11g information >1401761139.719656: P2P: Add operating class 81 >1401761139.719672: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761139.719693: P2P: Add operating class 115 >1401761139.719708: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761139.719725: P2P: Add operating class 124 >1401761139.719740: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761139.719756: P2P: Add operating class 116 >1401761139.719800: P2P: Channels - hexdump(len=2): 24 2c >1401761139.719815: P2P: Add operating class 117 >1401761139.719829: P2P: Channels - hexdump(len=2): 28 30 >1401761139.719844: P2P: Add operating class 126 >1401761139.719857: P2P: Channels - hexdump(len=2): 95 9d >1401761139.719873: P2P: Add operating class 127 >1401761139.719888: P2P: Channels - hexdump(len=2): 99 a1 >1401761139.719907: wlp2s0: P2P: Update channel list >1401761139.724703: nl80211: Event message available >1401761139.724788: nl80211: Regulatory domain change >1401761139.724811: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761139.724920: nl80211: Regulatory information - country=US >1401761139.724938: nl80211: 2402-2472 @ 40 MHz >1401761139.724948: nl80211: 5170-5250 @ 80 MHz >1401761139.724957: nl80211: 5250-5330 @ 80 MHz >1401761139.724967: nl80211: 5735-5835 @ 80 MHz >1401761139.724976: nl80211: 57240-63720 @ 2160 MHz >1401761139.724994: nl80211: Added 802.11b mode based on 802.11g information >1401761139.725006: P2P: Add operating class 81 >1401761139.725016: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761139.725028: P2P: Add operating class 115 >1401761139.725038: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761139.725047: P2P: Add operating class 124 >1401761139.725055: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761139.725064: P2P: Add operating class 116 >1401761139.725072: P2P: Channels - hexdump(len=2): 24 2c >1401761139.725082: P2P: Add operating class 117 >1401761139.725090: P2P: Channels - hexdump(len=2): 28 30 >1401761139.725100: P2P: Add operating class 126 >1401761139.725108: P2P: Channels - hexdump(len=2): 95 9d >1401761139.725117: P2P: Add operating class 127 >1401761139.725125: P2P: Channels - hexdump(len=2): 99 a1 >1401761139.725136: wlp2s0: P2P: Update channel list >1401761139.774748: EAPOL: Supplicant port status: Unauthorized >1401761139.809796: wlp2s0: State: DISCONNECTED -> SCANNING >1401761139.809931: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761139.809963: wlp2s0: Starting AP scan for wildcard SSID >1401761139.809978: WPS: Building WPS IE for Probe Request >1401761139.809992: WPS: * Version (hardcoded 0x10) >1401761139.810006: WPS: * Request Type >1401761139.810018: WPS: * Config Methods (108) >1401761139.810030: WPS: * UUID-E >1401761139.810043: WPS: * Primary Device Type >1401761139.810055: WPS: * RF Bands (3) >1401761139.810068: WPS: * Association State >1401761139.810080: WPS: * Configuration Error (0) >1401761139.810093: WPS: * Device Password ID (0) >1401761139.810106: WPS: * Device Name >1401761139.810122: P2P: * P2P IE header >1401761139.810135: P2P: * Capability dev=25 group=00 >1401761139.810149: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761139.810198: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761139.810240: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761139.810257: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761139.810367: Scan requested (ret=0) - scan timeout 30 seconds >1401761139.810398: nl80211: Event message available >1401761139.810420: nl80211: Scan trigger >1401761139.815178: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761140.775894: EAPOL: Supplicant port status: Unauthorized >1401761141.482075: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761141.482126: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761141.482206: nl80211: if_removed already cleared - ignore event >1401761141.482234: nl80211: Event message available >1401761141.482265: nl80211: New scan results available >1401761141.482292: wlp2s0: Event SCAN_RESULTS (3) received >1401761141.482434: nl80211: Received scan results (4 BSSes) >1401761141.482546: wlp2s0: BSS: Start scan result update 4 >1401761141.482588: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761141.482608: wlp2s0: New scan results available >1401761141.482665: wlp2s0: Selecting BSS from priority group 0 >1401761141.482688: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-44 >1401761141.482705: wlp2s0: skip - SSID mismatch >1401761141.482722: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49 >1401761141.482738: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761141.482755: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-60 >1401761141.482797: wlp2s0: skip - SSID mismatch >1401761141.482817: wlp2s0: 3: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-69 >1401761141.482832: wlp2s0: skip - SSID mismatch >1401761141.482847: wlp2s0: No APs found - clear blacklist and try again >1401761141.482860: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761141.482876: wlp2s0: Selecting BSS from priority group 0 >1401761141.482893: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-44 >1401761141.482907: wlp2s0: skip - SSID mismatch >1401761141.482924: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49 >1401761141.482940: wlp2s0: selected based on RSN IE >1401761141.482956: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761141.482976: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761141.482992: wlp2s0: Automatic auth_alg selection: 0x1 >1401761141.483006: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761141.483020: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761141.483034: RSN: No PMKSA cache entry found >1401761141.483047: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761141.483062: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761141.483077: wlp2s0: WPA: clearing AP WPA IE >1401761141.483090: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761141.483111: wlp2s0: WPA: using GTK CCMP >1401761141.483125: wlp2s0: WPA: using PTK CCMP >1401761141.483138: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761141.483152: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761141.483175: wlp2s0: Cancelling scan request >1401761141.483191: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761141.483206: wlp2s0: No keys have been configured - skip key clearing >1401761141.483220: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761141.483295: EAPOL: External notification - EAP success=0 >1401761141.483315: EAPOL: Supplicant port status: Unauthorized >1401761141.483409: EAPOL: External notification - EAP fail=0 >1401761141.483431: EAPOL: Supplicant port status: Unauthorized >1401761141.483485: EAPOL: External notification - portControl=Auto >1401761141.483503: EAPOL: Supplicant port status: Unauthorized >1401761141.483565: nl80211: Authenticate (ifindex=3) >1401761141.483583: * bssid=40:16:7e:59:a7:40 >1401761141.483598: * freq=2412 >1401761141.483612: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761141.483638: * IEs - hexdump(len=0): [NULL] >1401761141.483653: * Auth Type 0 >1401761141.488333: nl80211: Authentication request send successfully >1401761141.488396: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761141.488530: nl80211: Event message available >1401761141.488556: nl80211: New station 40:16:7e:59:a7:40 >1401761141.488581: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761141.488665: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761141.488747: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761141.488880: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761141.776402: EAPOL: Supplicant port status: Unauthorized >1401761142.494217: nl80211: Event message available >1401761142.494287: nl80211: MLME event 37 >1401761142.494304: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 60 6f 00 00 02 00 00 00 dd 09 00 10 18 02 05 00 1c 00 00 >1401761142.494330: nl80211: Authenticate event >1401761142.494348: wlp2s0: Event AUTH (11) received >1401761142.494369: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761142.494384: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 05 00 1c 00 00 >1401761142.494407: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761142.494424: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761142.494439: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761142.494454: netlink: Operstate: linkmode=-1, operstate=5 >1401761142.494558: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761142.494593: nl80211: Associate (ifindex=3) >1401761142.494614: * bssid=40:16:7e:59:a7:40 >1401761142.494633: * freq=2412 >1401761142.494650: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761142.494676: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761142.494697: * pairwise=0xfac04 >1401761142.494711: * group=0xfac04 >1401761142.508217: nl80211: Association request send successfully >1401761142.508278: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761142.508404: nl80211: Event message available >1401761142.508431: nl80211: Delete station 40:16:7e:59:a7:40 >1401761142.508458: nl80211: Event message available >1401761142.508479: nl80211: New station 40:16:7e:59:a7:40 >1401761142.776857: EAPOL: Supplicant port status: Unauthorized >1401761143.778036: EAPOL: Supplicant port status: Unauthorized >1401761144.513236: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761144.513279: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 84 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.513339: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761144.513375: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761144.513391: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.513436: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761144.513461: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761144.513476: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.513520: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761144.513545: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761144.513560: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.513604: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761144.516283: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761144.516337: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761144.516414: nl80211: if_removed already cleared - ignore event >1401761144.516436: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761144.516452: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761144.516490: nl80211: if_removed already cleared - ignore event >1401761144.516507: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761144.516523: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761144.516558: nl80211: if_removed already cleared - ignore event >1401761144.516584: nl80211: Event message available >1401761144.516616: nl80211: MLME event 38 >1401761144.516633: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 30 70 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761144.516682: nl80211: Associate event >1401761144.516700: wlp2s0: Event ASSOC (0) received >1401761144.516717: wlp2s0: Association info event >1401761144.516732: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761144.516806: wlp2s0: freq=2412 MHz >1401761144.516827: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761144.516845: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761144.516863: netlink: Operstate: linkmode=-1, operstate=5 >1401761144.517000: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761144.517037: wlp2s0: No keys have been configured - skip key clearing >1401761144.517058: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761144.517074: wlp2s0: WPA: Association event - clear replay counter >1401761144.517091: wlp2s0: WPA: Clear old PTK >1401761144.517107: EAPOL: External notification - portEnabled=0 >1401761144.517125: EAPOL: Supplicant port status: Unauthorized >1401761144.517243: EAPOL: External notification - portValid=0 >1401761144.517269: EAPOL: Supplicant port status: Unauthorized >1401761144.517330: EAPOL: External notification - EAP success=0 >1401761144.517347: EAPOL: Supplicant port status: Unauthorized >1401761144.517395: EAPOL: External notification - portEnabled=1 >1401761144.517410: EAPOL: SUPP_PAE entering state CONNECTING >1401761144.517423: EAPOL: SUPP_BE entering state IDLE >1401761144.517440: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761144.517456: wlp2s0: Cancelling scan request >1401761144.517471: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761144.517487: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761144.517500: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.517545: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761144.517561: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761144.517576: wlp2s0: EAPOL-Key type=2 >1401761144.517593: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761144.517608: wlp2s0: key_length=16 key_data_length=22 >1401761144.517620: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761144.517636: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761144.517656: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761144.517673: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761144.517688: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761144.517703: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761144.517720: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.517782: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761144.517857: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761144.517872: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.517892: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.517911: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761144.517929: wlp2s0: RSN: no matching PMKID found >1401761144.517944: Get randomness: len=32 entropy=5 >1401761144.518661: WPA: Renewed SNonce - hexdump(len=32): 4b f3 af 4e 9c 80 d3 29 0f 26 15 d6 0f db 50 66 bf 49 9f 47 a2 ac 29 e3 9b 0e b4 f7 14 3d ca 72 >1401761144.518698: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761144.518714: WPA: Nonce1 - hexdump(len=32): 4b f3 af 4e 9c 80 d3 29 0f 26 15 d6 0f db 50 66 bf 49 9f 47 a2 ac 29 e3 9b 0e b4 f7 14 3d ca 72 >1401761144.518735: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761144.518755: WPA: PMK - hexdump(len=32): [REMOVED] >1401761144.518792: WPA: PTK - hexdump(len=48): [REMOVED] >1401761144.518808: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761144.518829: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761144.518847: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761144.518867: WPA: KCK - hexdump(len=16): [REMOVED] >1401761144.518882: WPA: Derived Key MIC - hexdump(len=16): 1e dc d6 bc 58 14 86 65 5a 08 f4 0c 3c a8 82 71 >1401761144.518900: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 4b f3 af 4e 9c 80 d3 29 0f 26 15 d6 0f db 50 66 bf 49 9f 47 a2 ac 29 e3 9b 0e b4 f7 14 3d ca 72 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e dc d6 bc 58 14 86 65 5a 08 f4 0c 3c a8 82 71 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761144.518990: nl80211: Event message available >1401761144.519015: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761144.522078: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761144.778328: EAPOL: startWhen --> 0 >1401761144.778376: EAPOL: disable timer tick >1401761144.778391: EAPOL: SUPP_PAE entering state CONNECTING >1401761144.778405: EAPOL: enable timer tick >1401761144.778421: EAPOL: txStart >1401761144.778435: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761145.519836: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761145.519880: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 a2 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e 83 e1 de db bc 7e 83 3f 8a 4f c0 a7 14 a1 c9 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761145.519935: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761145.519953: wlp2s0: EAPOL-Key type=2 >1401761145.519972: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761145.519988: wlp2s0: key_length=16 key_data_length=56 >1401761145.520003: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >1401761145.520020: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761145.520042: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761145.520060: key_rsc - hexdump(len=8): a2 07 00 00 00 00 00 00 >1401761145.520077: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761145.520093: key_mic - hexdump(len=16): 7e 83 e1 de db bc 7e 83 3f 8a 4f c0 a7 14 a1 c9 >1401761145.520115: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 a2 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e 83 e1 de db bc 7e 83 3f 8a 4f c0 a7 14 a1 c9 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761145.520180: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761145.520219: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761145.520238: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761145.520257: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761145.520271: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761145.520311: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761145.520332: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761145.520350: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761145.520369: WPA: KCK - hexdump(len=16): [REMOVED] >1401761145.520383: WPA: Derived Key MIC - hexdump(len=16): 3d d6 a0 ff 56 36 66 88 75 50 8b b8 47 b2 ec 9e >1401761145.520401: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d d6 a0 ff 56 36 66 88 75 50 8b b8 47 b2 ec 9e 00 00 >1401761145.520453: wlp2s0: WPA: Installing PTK to the driver >1401761145.520529: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761145.520558: addr=40:16:7e:59:a7:40 >1401761145.522190: EAPOL: External notification - portValid=1 >1401761145.522222: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761145.522284: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761145.522298: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761145.522308: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761145.522317: WPA: RSC - hexdump(len=6): a2 07 00 00 00 00 >1401761145.522364: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761145.522379: broadcast key >1401761145.522445: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761145.522455: wlp2s0: Cancelling authentication timeout >1401761145.522465: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761145.522475: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761145.522483: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761145.522492: netlink: Operstate: linkmode=-1, operstate=6 >1401761145.522564: EAPOL: External notification - portValid=1 >1401761145.522575: EAPOL: External notification - EAP success=1 >1401761145.522583: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761145.522591: EAPOL: SUPP_BE entering state SUCCESS >1401761145.522599: EAP: EAP entering state DISABLED >1401761145.522606: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761145.522614: EAPOL: Supplicant port status: Authorized >1401761145.522660: EAPOL: SUPP_BE entering state IDLE >1401761145.522670: EAPOL authentication completed successfully >1401761145.522698: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761145.522708: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761145.522729: nl80211: if_removed already cleared - ignore event >1401761145.527358: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761146.523211: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761146.523254: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 a8 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 41 fe e0 07 a8 5e 1c a9 96 70 99 57 bd 15 c0 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761146.523309: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761146.523325: wlp2s0: EAPOL-Key type=2 >1401761146.523342: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761146.523357: wlp2s0: key_length=16 key_data_length=56 >1401761146.523370: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >1401761146.523386: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761146.523423: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761146.523443: key_rsc - hexdump(len=8): a8 07 00 00 00 00 00 00 >1401761146.523459: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761146.523475: key_mic - hexdump(len=16): 88 41 fe e0 07 a8 5e 1c a9 96 70 99 57 bd 15 c0 >1401761146.523495: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 a8 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 41 fe e0 07 a8 5e 1c a9 96 70 99 57 bd 15 c0 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761146.523558: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761146.523596: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761146.523615: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761146.523714: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761146.523734: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761146.523779: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761146.523800: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761146.523818: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761146.523839: WPA: KCK - hexdump(len=16): [REMOVED] >1401761146.523854: WPA: Derived Key MIC - hexdump(len=16): 69 28 31 ad cb d4 5e 68 5a c1 08 bc 63 4d 8f 4a >1401761146.523872: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 28 31 ad cb d4 5e 68 5a c1 08 bc 63 4d 8f 4a 00 00 >1401761146.523923: wlp2s0: WPA: Installing PTK to the driver >1401761146.523999: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761146.524030: addr=40:16:7e:59:a7:40 >1401761146.526520: EAPOL: External notification - portValid=1 >1401761146.526573: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761146.526661: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761146.526685: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761146.526702: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761146.526717: WPA: RSC - hexdump(len=6): a8 07 00 00 00 00 >1401761146.526807: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761146.526835: broadcast key >1401761146.527010: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761146.527035: wlp2s0: Cancelling authentication timeout >1401761146.527053: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761146.527127: EAPOL: External notification - portValid=1 >1401761146.527147: EAPOL: External notification - EAP success=1 >1401761146.527161: EAP: EAP entering state DISABLED >1401761146.528949: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761147.527206: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761147.527251: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 aa 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 ec eb af 2f 39 d7 fd 84 43 c6 ed f9 2a 65 10 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761147.527326: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761147.527344: wlp2s0: EAPOL-Key type=2 >1401761147.527363: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761147.527378: wlp2s0: key_length=16 key_data_length=56 >1401761147.527392: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 >1401761147.527408: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761147.527429: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761147.527446: key_rsc - hexdump(len=8): aa 07 00 00 00 00 00 00 >1401761147.527462: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761147.527477: key_mic - hexdump(len=16): 26 ec eb af 2f 39 d7 fd 84 43 c6 ed f9 2a 65 10 >1401761147.527496: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 aa 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 26 ec eb af 2f 39 d7 fd 84 43 c6 ed f9 2a 65 10 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761147.527561: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761147.527599: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761147.527618: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761147.527718: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761147.527737: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761147.527789: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761147.527809: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761147.527827: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761147.527848: WPA: KCK - hexdump(len=16): [REMOVED] >1401761147.527862: WPA: Derived Key MIC - hexdump(len=16): e2 68 54 34 e7 70 23 03 ed b1 85 cd 8b fa 77 49 >1401761147.527880: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 68 54 34 e7 70 23 03 ed b1 85 cd 8b fa 77 49 00 00 >1401761147.527930: wlp2s0: WPA: Installing PTK to the driver >1401761147.528007: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761147.528036: addr=40:16:7e:59:a7:40 >1401761147.530502: EAPOL: External notification - portValid=1 >1401761147.530540: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761147.530618: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761147.530639: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761147.530656: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761147.530670: WPA: RSC - hexdump(len=6): aa 07 00 00 00 00 >1401761147.530732: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761147.530755: broadcast key >1401761147.530964: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761147.530989: wlp2s0: Cancelling authentication timeout >1401761147.531006: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761147.531075: EAPOL: External notification - portValid=1 >1401761147.531091: EAPOL: External notification - EAP success=1 >1401761147.531118: EAP: EAP entering state DISABLED >1401761147.531174: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761147.531189: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 b0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b 94 c8 97 72 c8 b0 b3 9e 49 d1 8f 91 52 73 50 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761147.531241: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761147.531257: wlp2s0: EAPOL-Key type=2 >1401761147.531274: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761147.531289: wlp2s0: key_length=16 key_data_length=56 >1401761147.531303: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 >1401761147.531319: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761147.531339: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761147.531355: key_rsc - hexdump(len=8): b0 07 00 00 00 00 00 00 >1401761147.531370: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761147.531384: key_mic - hexdump(len=16): 2b 94 c8 97 72 c8 b0 b3 9e 49 d1 8f 91 52 73 50 >1401761147.531401: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 b0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b 94 c8 97 72 c8 b0 b3 9e 49 d1 8f 91 52 73 50 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761147.531460: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761147.531496: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761147.531513: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761147.531568: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761147.531583: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761147.531609: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761147.531628: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761147.531645: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761147.531663: WPA: KCK - hexdump(len=16): [REMOVED] >1401761147.531677: WPA: Derived Key MIC - hexdump(len=16): 62 28 c2 67 b1 1e 5a 2a 0b 0b 17 23 6e 13 6b a4 >1401761147.531694: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 28 c2 67 b1 1e 5a 2a 0b 0b 17 23 6e 13 6b a4 00 00 >1401761147.531769: wlp2s0: WPA: Installing PTK to the driver >1401761147.531822: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761147.531842: addr=40:16:7e:59:a7:40 >1401761147.532005: EAPOL: External notification - portValid=1 >1401761147.532025: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761147.532079: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761147.532096: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761147.532112: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761147.532126: WPA: RSC - hexdump(len=6): b0 07 00 00 00 00 >1401761147.532177: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761147.532197: broadcast key >1401761147.532326: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761147.532344: wlp2s0: Cancelling authentication timeout >1401761147.532359: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761147.532411: EAPOL: External notification - portValid=1 >1401761147.532427: EAPOL: External notification - EAP success=1 >1401761147.532440: EAP: EAP entering state DISABLED >1401761147.532775: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761148.531341: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761148.531383: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 b4 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9e a3 68 12 ae 9e 3b 5f cd 2d 3f 93 96 be d3 7e 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761148.531438: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761148.531453: wlp2s0: EAPOL-Key type=2 >1401761148.531471: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761148.531486: wlp2s0: key_length=16 key_data_length=56 >1401761148.531499: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 >1401761148.531515: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761148.531535: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761148.531552: key_rsc - hexdump(len=8): b4 07 00 00 00 00 00 00 >1401761148.531566: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761148.531581: key_mic - hexdump(len=16): 9e a3 68 12 ae 9e 3b 5f cd 2d 3f 93 96 be d3 7e >1401761148.531600: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 b4 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9e a3 68 12 ae 9e 3b 5f cd 2d 3f 93 96 be d3 7e 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761148.531664: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761148.531702: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761148.531720: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761148.531840: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761148.531860: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761148.531886: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761148.531905: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761148.531921: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761148.531942: WPA: KCK - hexdump(len=16): [REMOVED] >1401761148.531956: WPA: Derived Key MIC - hexdump(len=16): 28 08 9e b1 1a 2d 56 54 49 18 9a 7c fb 6d ab be >1401761148.531973: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 08 9e b1 1a 2d 56 54 49 18 9a 7c fb 6d ab be 00 00 >1401761148.532039: wlp2s0: WPA: Installing PTK to the driver >1401761148.532251: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761148.532279: addr=40:16:7e:59:a7:40 >1401761148.534496: EAPOL: External notification - portValid=1 >1401761148.534548: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761148.534637: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761148.534659: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761148.534677: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761148.534691: WPA: RSC - hexdump(len=6): b4 07 00 00 00 00 >1401761148.534775: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761148.534802: broadcast key >1401761148.534973: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761148.534997: wlp2s0: Cancelling authentication timeout >1401761148.535014: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761148.535087: EAPOL: External notification - portValid=1 >1401761148.535105: EAPOL: External notification - EAP success=1 >1401761148.535119: EAP: EAP entering state DISABLED >1401761148.536949: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761149.536230: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761149.536273: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 ba 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 cb 96 6d 00 5a d6 3a bc 5c 6b 12 39 17 5e 8e 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761149.536326: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761149.536341: wlp2s0: EAPOL-Key type=2 >1401761149.536359: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761149.536374: wlp2s0: key_length=16 key_data_length=56 >1401761149.536387: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 >1401761149.536403: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761149.536423: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761149.536439: key_rsc - hexdump(len=8): ba 07 00 00 00 00 00 00 >1401761149.536454: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761149.536468: key_mic - hexdump(len=16): a8 cb 96 6d 00 5a d6 3a bc 5c 6b 12 39 17 5e 8e >1401761149.536488: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 ba 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 cb 96 6d 00 5a d6 3a bc 5c 6b 12 39 17 5e 8e 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761149.536551: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761149.536587: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761149.536605: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761149.536704: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761149.536723: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761149.536748: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761149.536802: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761149.536822: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761149.536843: WPA: KCK - hexdump(len=16): [REMOVED] >1401761149.536858: WPA: Derived Key MIC - hexdump(len=16): fd 9f 2c 49 bd 96 cb a8 4d f9 a6 5b 65 8e 9b 1b >1401761149.536874: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd 9f 2c 49 bd 96 cb a8 4d f9 a6 5b 65 8e 9b 1b 00 00 >1401761149.536923: wlp2s0: WPA: Installing PTK to the driver >1401761149.536999: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761149.537028: addr=40:16:7e:59:a7:40 >1401761149.539392: EAPOL: External notification - portValid=1 >1401761149.539445: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761149.539542: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761149.539565: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761149.539581: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761149.539595: WPA: RSC - hexdump(len=6): ba 07 00 00 00 00 >1401761149.539668: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761149.539693: broadcast key >1401761149.539881: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761149.539907: wlp2s0: Cancelling authentication timeout >1401761149.539924: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761149.540000: EAPOL: External notification - portValid=1 >1401761149.540018: EAPOL: External notification - EAP success=1 >1401761149.540032: EAP: EAP entering state DISABLED >1401761149.541842: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761150.541245: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761150.541289: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 bd 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 35 d4 a0 df bf 5d fd bc d3 4e 02 5a 64 5c 6e 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761150.541342: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761150.541357: wlp2s0: EAPOL-Key type=2 >1401761150.541374: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761150.541390: wlp2s0: key_length=16 key_data_length=56 >1401761150.541403: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08 >1401761150.541418: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761150.541438: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761150.541454: key_rsc - hexdump(len=8): bd 07 00 00 00 00 00 00 >1401761150.541469: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761150.541483: key_mic - hexdump(len=16): 4d 35 d4 a0 df bf 5d fd bc d3 4e 02 5a 64 5c 6e >1401761150.541502: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 bd 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 35 d4 a0 df bf 5d fd bc d3 4e 02 5a 64 5c 6e 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761150.541565: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761150.541618: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761150.541638: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761150.541738: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761150.541755: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761150.541810: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761150.541832: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761150.541852: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761150.541874: WPA: KCK - hexdump(len=16): [REMOVED] >1401761150.541889: WPA: Derived Key MIC - hexdump(len=16): 80 93 25 3d ae c4 59 e1 c7 f6 8b ad 51 b9 c7 48 >1401761150.541908: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 93 25 3d ae c4 59 e1 c7 f6 8b ad 51 b9 c7 48 00 00 >1401761150.541958: wlp2s0: WPA: Installing PTK to the driver >1401761150.542031: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761150.542057: addr=40:16:7e:59:a7:40 >1401761150.544461: EAPOL: External notification - portValid=1 >1401761150.544513: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761150.544602: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761150.544628: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761150.544648: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761150.544665: WPA: RSC - hexdump(len=6): bd 07 00 00 00 00 >1401761150.544742: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761150.544783: broadcast key >1401761150.544956: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761150.544981: wlp2s0: Cancelling authentication timeout >1401761150.544998: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761150.545074: EAPOL: External notification - portValid=1 >1401761150.545095: EAPOL: External notification - EAP success=1 >1401761150.545110: EAP: EAP entering state DISABLED >1401761150.546938: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761151.547372: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761151.547405: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 c3 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 d3 77 31 f0 76 ef f0 ba d3 32 3d 58 f9 44 48 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761151.547445: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761151.547457: wlp2s0: EAPOL-Key type=2 >1401761151.547469: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761151.547480: wlp2s0: key_length=16 key_data_length=56 >1401761151.547490: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09 >1401761151.547501: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 >1401761151.547516: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 >1401761151.547528: key_rsc - hexdump(len=8): c3 07 00 00 00 00 00 00 >1401761151.547538: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761151.547549: key_mic - hexdump(len=16): d9 d3 77 31 f0 76 ef f0 ba d3 32 3d 58 f9 44 48 >1401761151.547564: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 86 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 c3 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d9 d3 77 31 f0 76 ef f0 ba d3 32 3d 58 f9 44 48 00 38 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761151.547624: RSN: encrypted key data - hexdump(len=56): 07 1d 65 6d bf 57 04 31 79 7c 9b ce 0f 30 ed dd eb 2c 45 b6 d1 28 10 2c a7 5d 60 ea 47 40 b5 60 a7 74 56 15 da e5 84 41 1e c8 e8 c2 94 8b b4 42 80 c4 18 d7 c7 55 93 fc >1401761151.547654: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761151.547670: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761151.547746: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761151.547782: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761151.547802: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761151.547816: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761151.547829: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761151.547844: WPA: KCK - hexdump(len=16): [REMOVED] >1401761151.547854: WPA: Derived Key MIC - hexdump(len=16): f4 b6 66 fb 05 e3 df 55 84 ff c8 b0 3d a7 ea 17 >1401761151.547866: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 b6 66 fb 05 e3 df 55 84 ff c8 b0 3d a7 ea 17 00 00 >1401761151.547901: wlp2s0: WPA: Installing PTK to the driver >1401761151.547960: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761151.547982: addr=40:16:7e:59:a7:40 >1401761151.550485: EAPOL: External notification - portValid=1 >1401761151.550522: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761151.550604: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761151.550624: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761151.550641: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761151.550656: WPA: RSC - hexdump(len=6): c3 07 00 00 00 00 >1401761151.550718: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761151.550741: broadcast key >1401761151.550941: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761151.550966: wlp2s0: Cancelling authentication timeout >1401761151.550983: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761151.551055: EAPOL: External notification - portValid=1 >1401761151.551074: EAPOL: External notification - EAP success=1 >1401761151.551087: EAP: EAP entering state DISABLED >1401761151.552849: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761152.554388: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761152.554438: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761152.554518: nl80211: if_removed already cleared - ignore event >1401761152.554555: nl80211: Event message available >1401761152.554588: nl80211: Delete station 40:16:7e:59:a7:40 >1401761152.557596: nl80211: Event message available >1401761152.557672: nl80211: MLME event 39 >1401761152.557688: nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 a0 7a 0f 00 >1401761152.557710: nl80211: Deauthenticate event >1401761152.557729: wlp2s0: Event DEAUTH (12) received >1401761152.557745: wlp2s0: Deauthentication notification >1401761152.557780: wlp2s0: * reason 15 >1401761152.557797: wlp2s0: * address 40:16:7e:59:a7:40 >1401761152.557828: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761152.557848: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=15 >1401761152.557865: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761152.557883: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761152.557899: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761152.557917: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761152.557933: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761152.558066: wlp2s0: Disconnect event - remove keys >1401761152.558147: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761152.562094: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761152.562210: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761152.562288: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761152.562362: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761152.562386: addr=40:16:7e:59:a7:40 >1401761152.562426: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761152.562443: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761152.562458: netlink: Operstate: linkmode=-1, operstate=5 >1401761152.562565: EAPOL: External notification - portEnabled=0 >1401761152.562586: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761152.562599: EAPOL: Supplicant port status: Unauthorized >1401761152.562670: EAPOL: SUPP_BE entering state INITIALIZE >1401761152.562690: EAPOL: Supplicant port status: Unauthorized >1401761152.562743: EAPOL: External notification - portValid=0 >1401761152.562778: EAPOL: Supplicant port status: Unauthorized >1401761152.562851: EAPOL: External notification - EAP success=0 >1401761152.562874: EAPOL: Supplicant port status: Unauthorized >1401761152.562961: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761152.562987: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761152.563037: nl80211: if_removed already cleared - ignore event >1401761152.563056: nl80211: Event message available >1401761152.563082: nl80211: Ignore disconnect event when using userspace SME >1401761152.564982: nl80211: Event message available >1401761152.565050: nl80211: Regulatory domain change >1401761152.565071: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761152.565230: nl80211: Regulatory information - country=00 >1401761152.565249: nl80211: 2402-2472 @ 40 MHz >1401761152.565264: nl80211: 2457-2482 @ 40 MHz >1401761152.565278: nl80211: 2474-2494 @ 20 MHz >1401761152.565292: nl80211: 5170-5250 @ 80 MHz >1401761152.565306: nl80211: 5735-5835 @ 80 MHz >1401761152.565320: nl80211: 57240-63720 @ 2160 MHz >1401761152.565345: nl80211: Added 802.11b mode based on 802.11g information >1401761152.565360: P2P: Add operating class 81 >1401761152.565374: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761152.565391: P2P: Add operating class 115 >1401761152.565404: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761152.565419: P2P: Add operating class 124 >1401761152.565432: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761152.565445: P2P: Add operating class 116 >1401761152.565458: P2P: Channels - hexdump(len=2): 24 2c >1401761152.565471: P2P: Add operating class 117 >1401761152.565484: P2P: Channels - hexdump(len=2): 28 30 >1401761152.565497: P2P: Add operating class 126 >1401761152.565510: P2P: Channels - hexdump(len=2): 95 9d >1401761152.565523: P2P: Add operating class 127 >1401761152.565535: P2P: Channels - hexdump(len=2): 99 a1 >1401761152.565551: wlp2s0: P2P: Update channel list >1401761152.567401: nl80211: Event message available >1401761152.567456: nl80211: Regulatory domain change >1401761152.567475: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761152.567625: nl80211: Regulatory information - country=US >1401761152.567642: nl80211: 2402-2472 @ 40 MHz >1401761152.567657: nl80211: 5170-5250 @ 80 MHz >1401761152.567686: nl80211: 5250-5330 @ 80 MHz >1401761152.567702: nl80211: 5735-5835 @ 80 MHz >1401761152.567717: nl80211: 57240-63720 @ 2160 MHz >1401761152.567742: nl80211: Added 802.11b mode based on 802.11g information >1401761152.567757: P2P: Add operating class 81 >1401761152.567791: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761152.567811: P2P: Add operating class 115 >1401761152.567826: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761152.567842: P2P: Add operating class 124 >1401761152.567857: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761152.567872: P2P: Add operating class 116 >1401761152.567886: P2P: Channels - hexdump(len=2): 24 2c >1401761152.567902: P2P: Add operating class 117 >1401761152.567917: P2P: Channels - hexdump(len=2): 28 30 >1401761152.567934: P2P: Add operating class 126 >1401761152.567949: P2P: Channels - hexdump(len=2): 95 9d >1401761152.567964: P2P: Add operating class 127 >1401761152.567979: P2P: Channels - hexdump(len=2): 99 a1 >1401761152.567997: wlp2s0: P2P: Update channel list >1401761152.568021: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761152.658166: wlp2s0: State: DISCONNECTED -> SCANNING >1401761152.658297: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761152.658329: wlp2s0: Starting AP scan for wildcard SSID >1401761152.658344: WPS: Building WPS IE for Probe Request >1401761152.658358: WPS: * Version (hardcoded 0x10) >1401761152.658371: WPS: * Request Type >1401761152.658384: WPS: * Config Methods (108) >1401761152.658397: WPS: * UUID-E >1401761152.658409: WPS: * Primary Device Type >1401761152.658422: WPS: * RF Bands (3) >1401761152.658435: WPS: * Association State >1401761152.658447: WPS: * Configuration Error (0) >1401761152.658460: WPS: * Device Password ID (0) >1401761152.658472: WPS: * Device Name >1401761152.658488: P2P: * P2P IE header >1401761152.658502: P2P: * Capability dev=25 group=00 >1401761152.658515: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761152.658564: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761152.658590: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761152.658605: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761152.658733: Scan requested (ret=0) - scan timeout 30 seconds >1401761152.658779: nl80211: Event message available >1401761152.658802: nl80211: Scan trigger >1401761152.663513: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761152.781463: EAPOL: Supplicant port status: Unauthorized >1401761153.782683: EAPOL: Supplicant port status: Unauthorized >1401761154.330079: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761154.330130: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761154.330205: nl80211: if_removed already cleared - ignore event >1401761154.330225: nl80211: Event message available >1401761154.330257: nl80211: New scan results available >1401761154.330280: wlp2s0: Event SCAN_RESULTS (3) received >1401761154.330419: nl80211: Received scan results (4 BSSes) >1401761154.330541: wlp2s0: BSS: Start scan result update 5 >1401761154.330586: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761154.330607: wlp2s0: New scan results available >1401761154.330672: wlp2s0: Selecting BSS from priority group 0 >1401761154.330698: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-43 >1401761154.330717: wlp2s0: skip - SSID mismatch >1401761154.330739: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46 >1401761154.330757: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761154.330824: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-56 >1401761154.330848: wlp2s0: skip - SSID mismatch >1401761154.330868: wlp2s0: 3: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-70 >1401761154.330884: wlp2s0: skip - SSID mismatch >1401761154.330899: wlp2s0: No APs found - clear blacklist and try again >1401761154.330912: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761154.330929: wlp2s0: Selecting BSS from priority group 0 >1401761154.330947: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-43 >1401761154.330961: wlp2s0: skip - SSID mismatch >1401761154.330979: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-46 >1401761154.330995: wlp2s0: selected based on RSN IE >1401761154.331013: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761154.331033: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761154.331049: wlp2s0: Automatic auth_alg selection: 0x1 >1401761154.331063: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761154.331077: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761154.331091: RSN: No PMKSA cache entry found >1401761154.331105: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761154.331120: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761154.331135: wlp2s0: WPA: clearing AP WPA IE >1401761154.331148: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761154.331169: wlp2s0: WPA: using GTK CCMP >1401761154.331183: wlp2s0: WPA: using PTK CCMP >1401761154.331197: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761154.331211: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761154.331233: wlp2s0: Cancelling scan request >1401761154.331250: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761154.331265: wlp2s0: No keys have been configured - skip key clearing >1401761154.331280: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761154.331348: EAPOL: External notification - EAP success=0 >1401761154.331367: EAPOL: Supplicant port status: Unauthorized >1401761154.331470: EAPOL: External notification - EAP fail=0 >1401761154.331495: EAPOL: Supplicant port status: Unauthorized >1401761154.331557: EAPOL: External notification - portControl=Auto >1401761154.331574: EAPOL: Supplicant port status: Unauthorized >1401761154.331634: nl80211: Authenticate (ifindex=3) >1401761154.331652: * bssid=40:16:7e:59:a7:40 >1401761154.331667: * freq=2412 >1401761154.331681: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761154.331706: * IEs - hexdump(len=0): [NULL] >1401761154.331719: * Auth Type 0 >1401761154.336317: nl80211: Authentication request send successfully >1401761154.336372: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761154.336505: nl80211: Event message available >1401761154.336531: nl80211: New station 40:16:7e:59:a7:40 >1401761154.336555: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761154.336640: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761154.336722: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761154.336832: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761154.782946: EAPOL: Supplicant port status: Unauthorized >1401761155.342114: nl80211: Event message available >1401761155.342182: nl80211: MLME event 37 >1401761155.342215: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 60 7c 00 00 02 00 00 00 dd 09 00 10 18 02 05 00 1c 00 00 >1401761155.342242: nl80211: Authenticate event >1401761155.342261: wlp2s0: Event AUTH (11) received >1401761155.342280: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761155.342295: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 05 00 1c 00 00 >1401761155.342317: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761155.342333: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761155.342347: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761155.342361: netlink: Operstate: linkmode=-1, operstate=5 >1401761155.342468: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761155.342501: nl80211: Associate (ifindex=3) >1401761155.342520: * bssid=40:16:7e:59:a7:40 >1401761155.342539: * freq=2412 >1401761155.342556: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761155.342582: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761155.342602: * pairwise=0xfac04 >1401761155.342615: * group=0xfac04 >1401761155.353319: nl80211: Association request send successfully >1401761155.353380: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761155.353509: nl80211: Event message available >1401761155.353543: nl80211: Delete station 40:16:7e:59:a7:40 >1401761155.353573: nl80211: Event message available >1401761155.353595: nl80211: New station 40:16:7e:59:a7:40 >1401761155.783556: EAPOL: Supplicant port status: Unauthorized >1401761156.784754: EAPOL: Supplicant port status: Unauthorized >1401761157.358121: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761157.358164: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.358210: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761157.358240: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761157.358255: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.358300: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761157.358326: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761157.358340: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.358385: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761157.358409: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761157.358423: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.358482: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761157.361191: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761157.361243: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761157.361319: nl80211: if_removed already cleared - ignore event >1401761157.361341: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761157.361356: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761157.361392: nl80211: if_removed already cleared - ignore event >1401761157.361409: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761157.361423: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761157.361457: nl80211: if_removed already cleared - ignore event >1401761157.361474: nl80211: Event message available >1401761157.361503: nl80211: MLME event 38 >1401761157.361518: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 a0 7d 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761157.361566: nl80211: Associate event >1401761157.361584: wlp2s0: Event ASSOC (0) received >1401761157.361600: wlp2s0: Association info event >1401761157.361613: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761157.361655: wlp2s0: freq=2412 MHz >1401761157.361670: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761157.361684: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761157.361698: netlink: Operstate: linkmode=-1, operstate=5 >1401761157.361821: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761157.361854: wlp2s0: No keys have been configured - skip key clearing >1401761157.361873: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761157.361889: wlp2s0: WPA: Association event - clear replay counter >1401761157.361903: wlp2s0: WPA: Clear old PTK >1401761157.361917: EAPOL: External notification - portEnabled=0 >1401761157.361932: EAPOL: Supplicant port status: Unauthorized >1401761157.362022: EAPOL: External notification - portValid=0 >1401761157.362041: EAPOL: Supplicant port status: Unauthorized >1401761157.362095: EAPOL: External notification - EAP success=0 >1401761157.362111: EAPOL: Supplicant port status: Unauthorized >1401761157.362162: EAPOL: External notification - portEnabled=1 >1401761157.362178: EAPOL: SUPP_PAE entering state CONNECTING >1401761157.362190: EAPOL: SUPP_BE entering state IDLE >1401761157.362207: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761157.362223: wlp2s0: Cancelling scan request >1401761157.362238: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761157.362254: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761157.362268: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.362311: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761157.362328: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761157.362342: wlp2s0: EAPOL-Key type=2 >1401761157.362359: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761157.362391: wlp2s0: key_length=16 key_data_length=22 >1401761157.362406: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761157.362422: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 >1401761157.362443: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761157.362460: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761157.362475: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761157.362490: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761157.362507: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.362554: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761157.362638: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761157.362656: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.362677: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.362696: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761157.362716: wlp2s0: RSN: no matching PMKID found >1401761157.362730: Get randomness: len=32 entropy=5 >1401761157.363442: WPA: Renewed SNonce - hexdump(len=32): c5 c1 b8 ab 50 f2 8c 78 27 65 55 66 87 ff 5c 89 d7 aa cd 82 44 18 ef 2e c5 9a 83 0e e3 1b 86 61 >1401761157.363484: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761157.363500: WPA: Nonce1 - hexdump(len=32): c5 c1 b8 ab 50 f2 8c 78 27 65 55 66 87 ff 5c 89 d7 aa cd 82 44 18 ef 2e c5 9a 83 0e e3 1b 86 61 >1401761157.363521: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 >1401761157.363541: WPA: PMK - hexdump(len=32): [REMOVED] >1401761157.363555: WPA: PTK - hexdump(len=48): [REMOVED] >1401761157.363568: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761157.363588: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 >1401761157.363606: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761157.363625: WPA: KCK - hexdump(len=16): [REMOVED] >1401761157.363639: WPA: Derived Key MIC - hexdump(len=16): 3b 39 95 be 75 fb a9 12 5e bc 90 d9 10 6f 32 05 >1401761157.363655: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 c5 c1 b8 ab 50 f2 8c 78 27 65 55 66 87 ff 5c 89 d7 aa cd 82 44 18 ef 2e c5 9a 83 0e e3 1b 86 61 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 39 95 be 75 fb a9 12 5e bc 90 d9 10 6f 32 05 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761157.363748: nl80211: Event message available >1401761157.363795: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761157.366899: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761157.784865: EAPOL: startWhen --> 0 >1401761157.784912: EAPOL: disable timer tick >1401761157.784926: EAPOL: SUPP_PAE entering state CONNECTING >1401761157.784938: EAPOL: enable timer tick >1401761157.784953: EAPOL: txStart >1401761157.784967: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761158.120996: nl80211: Event message available >1401761158.321984: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761158.322013: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8a dc 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8c c0 62 48 88 12 22 88 15 d5 13 0d 99 17 70 2e 00 38 4b 17 aa 2e 5e e6 af 93 5c 3c 7a 52 51 2d cd 0b 88 e1 0b fe c4 1e 2a b3 15 99 e9 a9 8b f3 c6 2f eb 5b b8 73 84 76 18 a7 33 e9 72 e5 08 eb 3a 2f cf 26 3c 2e 33 fa 53 29 >1401761158.322046: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761158.322054: wlp2s0: EAPOL-Key type=2 >1401761158.322063: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761158.322070: wlp2s0: key_length=16 key_data_length=56 >1401761158.322076: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >1401761158.322084: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 >1401761158.322093: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8a >1401761158.322101: key_rsc - hexdump(len=8): dc 07 00 00 00 00 00 00 >1401761158.322108: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761158.322115: key_mic - hexdump(len=16): 8c c0 62 48 88 12 22 88 15 d5 13 0d 99 17 70 2e >1401761158.322125: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 89 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8a dc 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8c c0 62 48 88 12 22 88 15 d5 13 0d 99 17 70 2e 00 38 4b 17 aa 2e 5e e6 af 93 5c 3c 7a 52 51 2d cd 0b 88 e1 0b fe c4 1e 2a b3 15 99 e9 a9 8b f3 c6 2f eb 5b b8 73 84 76 18 a7 33 e9 72 e5 08 eb 3a 2f cf 26 3c 2e 33 fa 53 29 >1401761158.322157: RSN: encrypted key data - hexdump(len=56): 4b 17 aa 2e 5e e6 af 93 5c 3c 7a 52 51 2d cd 0b 88 e1 0b fe c4 1e 2a b3 15 99 e9 a9 8b f3 c6 2f eb 5b b8 73 84 76 18 a7 33 e9 72 e5 08 eb 3a 2f cf 26 3c 2e 33 fa 53 29 >1401761158.322175: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761158.322184: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761158.322193: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761158.322200: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761158.322213: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761158.322223: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761158.322231: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761158.322242: WPA: KCK - hexdump(len=16): [REMOVED] >1401761158.322249: WPA: Derived Key MIC - hexdump(len=16): 61 39 9a bb 8a e7 ec 39 19 69 35 6b 3b 30 b9 69 >1401761158.322258: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 39 9a bb 8a e7 ec 39 19 69 35 6b 3b 30 b9 69 00 00 >1401761158.322286: wlp2s0: WPA: Installing PTK to the driver >1401761158.322334: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761158.322353: addr=40:16:7e:59:a7:40 >1401761158.325019: EAPOL: External notification - portValid=1 >1401761158.325042: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761158.325094: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761158.325106: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761158.325114: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761158.325120: WPA: RSC - hexdump(len=6): dc 07 00 00 00 00 >1401761158.325158: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761158.325171: broadcast key >1401761158.325224: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761158.325235: wlp2s0: Cancelling authentication timeout >1401761158.325252: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761158.325260: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761158.325268: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761158.325275: netlink: Operstate: linkmode=-1, operstate=6 >1401761158.325353: EAPOL: External notification - portValid=1 >1401761158.325369: EAPOL: External notification - EAP success=1 >1401761158.325375: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761158.325381: EAPOL: SUPP_BE entering state SUCCESS >1401761158.325388: EAP: EAP entering state DISABLED >1401761158.325394: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761158.325399: EAPOL: Supplicant port status: Authorized >1401761158.325457: EAPOL: SUPP_BE entering state IDLE >1401761158.325468: EAPOL authentication completed successfully >1401761158.325494: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761158.325504: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761158.325526: nl80211: if_removed already cleared - ignore event >1401761158.330172: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761159.110996: nl80211: Event message available >1401761160.111073: nl80211: Event message available >1401761160.612122: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761160.612171: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761160.612253: nl80211: if_removed already cleared - ignore event >1401761160.621067: nl80211: Event message available >1401761160.621137: nl80211: Delete station 40:16:7e:59:a7:40 >1401761160.624231: nl80211: Event message available >1401761160.624301: nl80211: MLME event 39 >1401761160.624317: nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 40 16 7e 59 a7 40 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 00 00 04 00 >1401761160.624340: nl80211: Deauthenticate event >1401761160.624360: wlp2s0: Event DEAUTH (12) received >1401761160.624377: wlp2s0: Deauthentication notification >1401761160.624393: wlp2s0: * reason 4 (locally generated) >1401761160.624409: wlp2s0: * address 40:16:7e:59:a7:40 >1401761160.624423: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761160.624442: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=4 locally_generated=1 >1401761160.624459: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761160.624475: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761160.624491: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761160.624510: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761160.624526: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761160.624662: wlp2s0: Disconnect event - remove keys >1401761160.624743: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761160.624998: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761160.625100: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761160.625176: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761160.625251: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761160.625282: addr=40:16:7e:59:a7:40 >1401761160.625327: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761160.625346: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761160.625363: netlink: Operstate: linkmode=-1, operstate=5 >1401761160.625472: EAPOL: External notification - portEnabled=0 >1401761160.625496: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761160.625510: EAPOL: Supplicant port status: Unauthorized >1401761160.625611: EAPOL: SUPP_BE entering state INITIALIZE >1401761160.625635: EAPOL: Supplicant port status: Unauthorized >1401761160.625686: EAPOL: External notification - portValid=0 >1401761160.625701: EAPOL: Supplicant port status: Unauthorized >1401761160.625748: EAPOL: External notification - EAP success=0 >1401761160.625799: EAPOL: Supplicant port status: Unauthorized >1401761160.625880: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761160.625901: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761160.625940: nl80211: if_removed already cleared - ignore event >1401761160.625958: nl80211: Event message available >1401761160.625980: nl80211: Ignore disconnect event when using userspace SME >1401761160.629428: nl80211: Event message available >1401761160.629481: nl80211: Regulatory domain change >1401761160.629498: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761160.629618: nl80211: Regulatory information - country=00 >1401761160.629634: nl80211: 2402-2472 @ 40 MHz >1401761160.629645: nl80211: 2457-2482 @ 40 MHz >1401761160.629655: nl80211: 2474-2494 @ 20 MHz >1401761160.629665: nl80211: 5170-5250 @ 80 MHz >1401761160.629675: nl80211: 5735-5835 @ 80 MHz >1401761160.629685: nl80211: 57240-63720 @ 2160 MHz >1401761160.629703: nl80211: Added 802.11b mode based on 802.11g information >1401761160.629713: P2P: Add operating class 81 >1401761160.629723: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761160.629736: P2P: Add operating class 115 >1401761160.629745: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761160.629755: P2P: Add operating class 124 >1401761160.629774: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761160.629784: P2P: Add operating class 116 >1401761160.629793: P2P: Channels - hexdump(len=2): 24 2c >1401761160.629803: P2P: Add operating class 117 >1401761160.629812: P2P: Channels - hexdump(len=2): 28 30 >1401761160.629821: P2P: Add operating class 126 >1401761160.629831: P2P: Channels - hexdump(len=2): 95 9d >1401761160.629842: P2P: Add operating class 127 >1401761160.629853: P2P: Channels - hexdump(len=2): 99 a1 >1401761160.629866: wlp2s0: P2P: Update channel list >1401761160.630532: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761160.632744: nl80211: Event message available >1401761160.632802: nl80211: Regulatory domain change >1401761160.632818: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761160.632923: nl80211: Regulatory information - country=US >1401761160.632937: nl80211: 2402-2472 @ 40 MHz >1401761160.632950: nl80211: 5170-5250 @ 80 MHz >1401761160.632962: nl80211: 5250-5330 @ 80 MHz >1401761160.632974: nl80211: 5735-5835 @ 80 MHz >1401761160.632984: nl80211: 57240-63720 @ 2160 MHz >1401761160.633002: nl80211: Added 802.11b mode based on 802.11g information >1401761160.633013: P2P: Add operating class 81 >1401761160.633023: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761160.633036: P2P: Add operating class 115 >1401761160.633046: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761160.633056: P2P: Add operating class 124 >1401761160.633066: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761160.633076: P2P: Add operating class 116 >1401761160.633085: P2P: Channels - hexdump(len=2): 24 2c >1401761160.633095: P2P: Add operating class 117 >1401761160.633104: P2P: Channels - hexdump(len=2): 28 30 >1401761160.633116: P2P: Add operating class 126 >1401761160.633127: P2P: Channels - hexdump(len=2): 95 9d >1401761160.633139: P2P: Add operating class 127 >1401761160.633150: P2P: Channels - hexdump(len=2): 99 a1 >1401761160.633164: wlp2s0: P2P: Update channel list >1401761160.724798: wlp2s0: State: DISCONNECTED -> SCANNING >1401761160.724927: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761160.724960: wlp2s0: Starting AP scan for wildcard SSID >1401761160.724975: WPS: Building WPS IE for Probe Request >1401761160.724989: WPS: * Version (hardcoded 0x10) >1401761160.725002: WPS: * Request Type >1401761160.725015: WPS: * Config Methods (108) >1401761160.725028: WPS: * UUID-E >1401761160.725040: WPS: * Primary Device Type >1401761160.725053: WPS: * RF Bands (3) >1401761160.725065: WPS: * Association State >1401761160.725078: WPS: * Configuration Error (0) >1401761160.725091: WPS: * Device Password ID (0) >1401761160.725103: WPS: * Device Name >1401761160.725138: P2P: * P2P IE header >1401761160.725152: P2P: * Capability dev=25 group=00 >1401761160.725166: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761160.725218: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761160.725244: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761160.725260: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761160.725382: Scan requested (ret=0) - scan timeout 30 seconds >1401761160.725413: nl80211: Event message available >1401761160.725436: nl80211: Scan trigger >1401761160.730144: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761160.786497: EAPOL: Supplicant port status: Unauthorized >1401761161.787692: EAPOL: Supplicant port status: Unauthorized >1401761162.396112: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761162.396154: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761162.396213: nl80211: if_removed already cleared - ignore event >1401761162.396229: nl80211: Event message available >1401761162.396253: nl80211: New scan results available >1401761162.396270: wlp2s0: Event SCAN_RESULTS (3) received >1401761162.396379: nl80211: Received scan results (4 BSSes) >1401761162.396537: wlp2s0: BSS: Start scan result update 6 >1401761162.396570: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761162.396586: wlp2s0: New scan results available >1401761162.396635: wlp2s0: Selecting BSS from priority group 0 >1401761162.396655: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46 >1401761162.396670: wlp2s0: skip - SSID mismatch >1401761162.396686: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 >1401761162.396700: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761162.396715: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-60 >1401761162.396727: wlp2s0: skip - SSID mismatch >1401761162.396742: wlp2s0: 3: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-68 >1401761162.396756: wlp2s0: skip - SSID mismatch >1401761162.396804: wlp2s0: No APs found - clear blacklist and try again >1401761162.396820: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761162.396838: wlp2s0: Selecting BSS from priority group 0 >1401761162.396857: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46 >1401761162.396873: wlp2s0: skip - SSID mismatch >1401761162.396892: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 >1401761162.396910: wlp2s0: selected based on RSN IE >1401761162.396928: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761162.396949: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761162.396967: wlp2s0: Automatic auth_alg selection: 0x1 >1401761162.396982: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761162.396997: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761162.397012: RSN: No PMKSA cache entry found >1401761162.397028: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761162.397044: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761162.397060: wlp2s0: WPA: clearing AP WPA IE >1401761162.397075: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761162.397097: wlp2s0: WPA: using GTK CCMP >1401761162.397112: wlp2s0: WPA: using PTK CCMP >1401761162.397127: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761162.397142: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761162.397181: wlp2s0: Cancelling scan request >1401761162.397201: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761162.397217: wlp2s0: No keys have been configured - skip key clearing >1401761162.397233: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761162.397305: EAPOL: External notification - EAP success=0 >1401761162.397331: EAPOL: Supplicant port status: Unauthorized >1401761162.397435: EAPOL: External notification - EAP fail=0 >1401761162.397459: EAPOL: Supplicant port status: Unauthorized >1401761162.397519: EAPOL: External notification - portControl=Auto >1401761162.397536: EAPOL: Supplicant port status: Unauthorized >1401761162.397599: nl80211: Authenticate (ifindex=3) >1401761162.397618: * bssid=40:16:7e:59:a7:40 >1401761162.397633: * freq=2412 >1401761162.397647: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761162.397673: * IEs - hexdump(len=0): [NULL] >1401761162.397688: * Auth Type 0 >1401761162.402264: nl80211: Authentication request send successfully >1401761162.402300: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761162.402375: nl80211: Event message available >1401761162.402393: nl80211: New station 40:16:7e:59:a7:40 >1401761162.402407: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761162.402453: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761162.402500: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761162.402551: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761162.788262: EAPOL: Supplicant port status: Unauthorized >1401761163.406191: nl80211: Event message available >1401761163.406261: nl80211: MLME event 37 >1401761163.406276: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 70 84 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761163.406301: nl80211: Authenticate event >1401761163.406319: wlp2s0: Event AUTH (11) received >1401761163.406339: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761163.406353: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761163.406375: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761163.406390: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761163.406404: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761163.406419: netlink: Operstate: linkmode=-1, operstate=5 >1401761163.406527: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761163.406556: nl80211: Associate (ifindex=3) >1401761163.406573: * bssid=40:16:7e:59:a7:40 >1401761163.406587: * freq=2412 >1401761163.406601: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761163.406625: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761163.406645: * pairwise=0xfac04 >1401761163.406658: * group=0xfac04 >1401761163.420276: nl80211: Association request send successfully >1401761163.420336: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761163.420458: nl80211: Event message available >1401761163.420484: nl80211: Delete station 40:16:7e:59:a7:40 >1401761163.420507: nl80211: Event message available >1401761163.420525: nl80211: New station 40:16:7e:59:a7:40 >1401761163.788837: EAPOL: Supplicant port status: Unauthorized >1401761164.790023: EAPOL: Supplicant port status: Unauthorized >1401761165.425045: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761165.425073: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.425094: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761165.425110: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761165.425117: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.425136: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761165.425147: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761165.425153: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.425172: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761165.428154: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761165.428176: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761165.428222: nl80211: if_removed already cleared - ignore event >1401761165.428232: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761165.428239: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761165.428256: nl80211: if_removed already cleared - ignore event >1401761165.428264: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761165.428271: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761165.428286: nl80211: if_removed already cleared - ignore event >1401761165.428294: nl80211: Event message available >1401761165.428312: nl80211: MLME event 38 >1401761165.428319: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 c0 85 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761165.428340: nl80211: Associate event >1401761165.428348: wlp2s0: Event ASSOC (0) received >1401761165.428356: wlp2s0: Association info event >1401761165.428362: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761165.428380: wlp2s0: freq=2412 MHz >1401761165.428387: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761165.428394: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761165.428400: netlink: Operstate: linkmode=-1, operstate=5 >1401761165.428462: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761165.428479: wlp2s0: No keys have been configured - skip key clearing >1401761165.428487: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761165.428494: wlp2s0: WPA: Association event - clear replay counter >1401761165.428511: wlp2s0: WPA: Clear old PTK >1401761165.428518: EAPOL: External notification - portEnabled=0 >1401761165.428525: EAPOL: Supplicant port status: Unauthorized >1401761165.428574: EAPOL: External notification - portValid=0 >1401761165.428585: EAPOL: Supplicant port status: Unauthorized >1401761165.428612: EAPOL: External notification - EAP success=0 >1401761165.428619: EAPOL: Supplicant port status: Unauthorized >1401761165.428644: EAPOL: External notification - portEnabled=1 >1401761165.428652: EAPOL: SUPP_PAE entering state CONNECTING >1401761165.428658: EAPOL: SUPP_BE entering state IDLE >1401761165.428665: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761165.428672: wlp2s0: Cancelling scan request >1401761165.428679: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761165.428686: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761165.428691: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.428710: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761165.428717: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761165.428724: wlp2s0: EAPOL-Key type=2 >1401761165.428731: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761165.428737: wlp2s0: key_length=16 key_data_length=22 >1401761165.428743: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >1401761165.428750: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c >1401761165.428758: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761165.428789: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761165.428797: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761165.428806: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761165.428816: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.428841: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761165.428924: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761165.428946: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.428968: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.428986: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761165.429007: wlp2s0: RSN: no matching PMKID found >1401761165.429021: Get randomness: len=32 entropy=5 >1401761165.429712: WPA: Renewed SNonce - hexdump(len=32): 39 39 23 ef c8 10 c8 ee 8c 47 22 d9 5f 60 90 92 d4 50 a9 18 f9 46 65 72 bb b2 d6 1e 62 e0 1c 73 >1401761165.429755: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761165.429791: WPA: Nonce1 - hexdump(len=32): 39 39 23 ef c8 10 c8 ee 8c 47 22 d9 5f 60 90 92 d4 50 a9 18 f9 46 65 72 bb b2 d6 1e 62 e0 1c 73 >1401761165.429814: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c >1401761165.429834: WPA: PMK - hexdump(len=32): [REMOVED] >1401761165.429848: WPA: PTK - hexdump(len=48): [REMOVED] >1401761165.429862: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761165.429881: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 >1401761165.429913: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761165.429933: WPA: KCK - hexdump(len=16): [REMOVED] >1401761165.429949: WPA: Derived Key MIC - hexdump(len=16): cd f0 47 97 3b 3c ba 3a ed ff 1a 70 fb 22 2e 53 >1401761165.429966: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 39 39 23 ef c8 10 c8 ee 8c 47 22 d9 5f 60 90 92 d4 50 a9 18 f9 46 65 72 bb b2 d6 1e 62 e0 1c 73 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cd f0 47 97 3b 3c ba 3a ed ff 1a 70 fb 22 2e 53 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761165.430058: nl80211: Event message available >1401761165.430088: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761165.433669: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761165.790569: EAPOL: startWhen --> 0 >1401761165.790615: EAPOL: disable timer tick >1401761165.790629: EAPOL: SUPP_PAE entering state CONNECTING >1401761165.790642: EAPOL: enable timer tick >1401761165.790657: EAPOL: txStart >1401761165.790671: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761166.431259: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761166.431302: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8d 03 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 b5 9b 6c 02 a6 fc 1a 04 2e d0 1a d9 73 44 bf 00 38 67 02 b2 1b d5 f4 ce 0d 00 54 38 4d 63 f6 e1 5c 7c 61 ab 0c 11 79 f7 fc 53 03 c4 c1 8e 8d f5 d4 9d 82 19 80 42 ae 9d fe 27 9c 6e db b7 68 ae c2 6a 99 6a c0 a6 d1 23 c8 >1401761166.431357: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761166.431372: wlp2s0: EAPOL-Key type=2 >1401761166.431390: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761166.431405: wlp2s0: key_length=16 key_data_length=56 >1401761166.431418: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >1401761166.431434: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c >1401761166.431454: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8d >1401761166.431470: key_rsc - hexdump(len=8): 03 08 00 00 00 00 00 00 >1401761166.431485: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761166.431500: key_mic - hexdump(len=16): d5 b5 9b 6c 02 a6 fc 1a 04 2e d0 1a d9 73 44 bf >1401761166.431519: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8c 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8d 03 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 b5 9b 6c 02 a6 fc 1a 04 2e d0 1a d9 73 44 bf 00 38 67 02 b2 1b d5 f4 ce 0d 00 54 38 4d 63 f6 e1 5c 7c 61 ab 0c 11 79 f7 fc 53 03 c4 c1 8e 8d f5 d4 9d 82 19 80 42 ae 9d fe 27 9c 6e db b7 68 ae c2 6a 99 6a c0 a6 d1 23 c8 >1401761166.431582: RSN: encrypted key data - hexdump(len=56): 67 02 b2 1b d5 f4 ce 0d 00 54 38 4d 63 f6 e1 5c 7c 61 ab 0c 11 79 f7 fc 53 03 c4 c1 8e 8d f5 d4 9d 82 19 80 42 ae 9d fe 27 9c 6e db b7 68 ae c2 6a 99 6a c0 a6 d1 23 c8 >1401761166.431618: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761166.431636: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761166.431652: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761166.431666: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761166.431691: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761166.431709: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761166.431743: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761166.431796: WPA: KCK - hexdump(len=16): [REMOVED] >1401761166.431814: WPA: Derived Key MIC - hexdump(len=16): 97 b3 30 ff a7 8e e8 89 78 5e 40 8d f8 1e ca 16 >1401761166.431832: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 97 b3 30 ff a7 8e e8 89 78 5e 40 8d f8 1e ca 16 00 00 >1401761166.431883: wlp2s0: WPA: Installing PTK to the driver >1401761166.431960: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761166.431988: addr=40:16:7e:59:a7:40 >1401761166.434347: EAPOL: External notification - portValid=1 >1401761166.434400: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761166.434493: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761166.434517: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761166.434535: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761166.434550: WPA: RSC - hexdump(len=6): 03 08 00 00 00 00 >1401761166.434625: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761166.434651: broadcast key >1401761166.434781: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761166.434805: wlp2s0: Cancelling authentication timeout >1401761166.434823: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761166.434840: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761166.434856: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761166.434871: netlink: Operstate: linkmode=-1, operstate=6 >1401761166.434998: EAPOL: External notification - portValid=1 >1401761166.435021: EAPOL: External notification - EAP success=1 >1401761166.435036: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761166.435050: EAPOL: SUPP_BE entering state SUCCESS >1401761166.435064: EAP: EAP entering state DISABLED >1401761166.435078: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761166.435091: EAPOL: Supplicant port status: Authorized >1401761166.435176: EAPOL: SUPP_BE entering state IDLE >1401761166.435197: EAPOL authentication completed successfully >1401761166.435248: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761166.435266: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761166.435309: nl80211: if_removed already cleared - ignore event >1401761166.439702: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761169.111051: nl80211: Event message available >1401761169.612942: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761169.612989: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761169.613063: nl80211: if_removed already cleared - ignore event >1401761169.617871: nl80211: Event message available >1401761169.617939: nl80211: Delete station 40:16:7e:59:a7:40 >1401761169.621041: nl80211: Event message available >1401761169.621112: nl80211: MLME event 39 >1401761169.621128: nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 40 16 7e 59 a7 40 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 00 00 04 00 >1401761169.621152: nl80211: Deauthenticate event >1401761169.621172: wlp2s0: Event DEAUTH (12) received >1401761169.621189: wlp2s0: Deauthentication notification >1401761169.621205: wlp2s0: * reason 4 (locally generated) >1401761169.621222: wlp2s0: * address 40:16:7e:59:a7:40 >1401761169.621236: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761169.621254: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=4 locally_generated=1 >1401761169.621270: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761169.621287: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761169.621303: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761169.621321: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761169.621353: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761169.621493: wlp2s0: Disconnect event - remove keys >1401761169.621581: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761169.625042: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761169.625146: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761169.625211: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761169.625267: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761169.625287: addr=40:16:7e:59:a7:40 >1401761169.625322: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761169.625338: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761169.625353: netlink: Operstate: linkmode=-1, operstate=5 >1401761169.625458: EAPOL: External notification - portEnabled=0 >1401761169.625483: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761169.625498: EAPOL: Supplicant port status: Unauthorized >1401761169.625591: EAPOL: SUPP_BE entering state INITIALIZE >1401761169.625619: EAPOL: Supplicant port status: Unauthorized >1401761169.625689: EAPOL: External notification - portValid=0 >1401761169.625712: EAPOL: Supplicant port status: Unauthorized >1401761169.625804: EAPOL: External notification - EAP success=0 >1401761169.625829: EAPOL: Supplicant port status: Unauthorized >1401761169.625928: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761169.625956: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761169.626006: nl80211: if_removed already cleared - ignore event >1401761169.626027: nl80211: Event message available >1401761169.626054: nl80211: Ignore disconnect event when using userspace SME >1401761169.629865: nl80211: Event message available >1401761169.629935: nl80211: Regulatory domain change >1401761169.629959: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761169.630129: nl80211: Regulatory information - country=00 >1401761169.630157: nl80211: 2402-2472 @ 40 MHz >1401761169.630174: nl80211: 2457-2482 @ 40 MHz >1401761169.630192: nl80211: 2474-2494 @ 20 MHz >1401761169.630209: nl80211: 5170-5250 @ 80 MHz >1401761169.630226: nl80211: 5735-5835 @ 80 MHz >1401761169.630242: nl80211: 57240-63720 @ 2160 MHz >1401761169.630274: nl80211: Added 802.11b mode based on 802.11g information >1401761169.630293: P2P: Add operating class 81 >1401761169.630309: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761169.630330: P2P: Add operating class 115 >1401761169.630346: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761169.630363: P2P: Add operating class 124 >1401761169.630379: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761169.630396: P2P: Add operating class 116 >1401761169.630410: P2P: Channels - hexdump(len=2): 24 2c >1401761169.630425: P2P: Add operating class 117 >1401761169.630440: P2P: Channels - hexdump(len=2): 28 30 >1401761169.630456: P2P: Add operating class 126 >1401761169.630472: P2P: Channels - hexdump(len=2): 95 9d >1401761169.630489: P2P: Add operating class 127 >1401761169.630504: P2P: Channels - hexdump(len=2): 99 a1 >1401761169.630523: wlp2s0: P2P: Update channel list >1401761169.630552: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761169.634024: nl80211: Event message available >1401761169.634095: nl80211: Regulatory domain change >1401761169.634116: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761169.634272: nl80211: Regulatory information - country=US >1401761169.634290: nl80211: 2402-2472 @ 40 MHz >1401761169.634305: nl80211: 5170-5250 @ 80 MHz >1401761169.634319: nl80211: 5250-5330 @ 80 MHz >1401761169.634334: nl80211: 5735-5835 @ 80 MHz >1401761169.634348: nl80211: 57240-63720 @ 2160 MHz >1401761169.634373: nl80211: Added 802.11b mode based on 802.11g information >1401761169.634387: P2P: Add operating class 81 >1401761169.634401: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761169.634434: P2P: Add operating class 115 >1401761169.634449: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761169.634463: P2P: Add operating class 124 >1401761169.634476: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761169.634491: P2P: Add operating class 116 >1401761169.634503: P2P: Channels - hexdump(len=2): 24 2c >1401761169.634517: P2P: Add operating class 117 >1401761169.634529: P2P: Channels - hexdump(len=2): 28 30 >1401761169.634543: P2P: Add operating class 126 >1401761169.634555: P2P: Channels - hexdump(len=2): 95 9d >1401761169.634569: P2P: Add operating class 127 >1401761169.634581: P2P: Channels - hexdump(len=2): 99 a1 >1401761169.634597: wlp2s0: P2P: Update channel list >1401761169.721426: wlp2s0: State: DISCONNECTED -> SCANNING >1401761169.721528: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761169.721556: wlp2s0: Starting AP scan for wildcard SSID >1401761169.721567: WPS: Building WPS IE for Probe Request >1401761169.721577: WPS: * Version (hardcoded 0x10) >1401761169.721586: WPS: * Request Type >1401761169.721595: WPS: * Config Methods (108) >1401761169.721604: WPS: * UUID-E >1401761169.721613: WPS: * Primary Device Type >1401761169.721622: WPS: * RF Bands (3) >1401761169.721631: WPS: * Association State >1401761169.721640: WPS: * Configuration Error (0) >1401761169.721649: WPS: * Device Password ID (0) >1401761169.721658: WPS: * Device Name >1401761169.721670: P2P: * P2P IE header >1401761169.721679: P2P: * Capability dev=25 group=00 >1401761169.721689: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761169.721727: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761169.721745: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761169.721756: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761169.721859: Scan requested (ret=0) - scan timeout 30 seconds >1401761169.721883: nl80211: Event message available >1401761169.721899: nl80211: Scan trigger >1401761169.726665: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761169.792957: EAPOL: Supplicant port status: Unauthorized >1401761170.794004: EAPOL: Supplicant port status: Unauthorized >1401761171.394091: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761171.394142: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761171.394222: nl80211: if_removed already cleared - ignore event >1401761171.394250: nl80211: Event message available >1401761171.394282: nl80211: New scan results available >1401761171.394309: wlp2s0: Event SCAN_RESULTS (3) received >1401761171.394452: nl80211: Received scan results (4 BSSes) >1401761171.394574: wlp2s0: BSS: Start scan result update 7 >1401761171.394613: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761171.394633: wlp2s0: New scan results available >1401761171.394702: wlp2s0: Selecting BSS from priority group 0 >1401761171.394729: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46 >1401761171.394749: wlp2s0: skip - SSID mismatch >1401761171.394795: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49 >1401761171.394813: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761171.394833: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-61 >1401761171.394850: wlp2s0: skip - SSID mismatch >1401761171.394873: wlp2s0: 3: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-69 >1401761171.394891: wlp2s0: skip - SSID mismatch >1401761171.394907: wlp2s0: No APs found - clear blacklist and try again >1401761171.394940: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761171.394963: wlp2s0: Selecting BSS from priority group 0 >1401761171.394984: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-46 >1401761171.395004: wlp2s0: skip - SSID mismatch >1401761171.395026: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-49 >1401761171.395046: wlp2s0: selected based on RSN IE >1401761171.395068: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761171.395090: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761171.395109: wlp2s0: Automatic auth_alg selection: 0x1 >1401761171.395125: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761171.395139: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761171.395153: RSN: No PMKSA cache entry found >1401761171.395168: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761171.395183: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761171.395198: wlp2s0: WPA: clearing AP WPA IE >1401761171.395212: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761171.395233: wlp2s0: WPA: using GTK CCMP >1401761171.395247: wlp2s0: WPA: using PTK CCMP >1401761171.395262: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761171.395275: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761171.395298: wlp2s0: Cancelling scan request >1401761171.395314: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761171.395329: wlp2s0: No keys have been configured - skip key clearing >1401761171.395344: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761171.395418: EAPOL: External notification - EAP success=0 >1401761171.395444: EAPOL: Supplicant port status: Unauthorized >1401761171.395554: EAPOL: External notification - EAP fail=0 >1401761171.395579: EAPOL: Supplicant port status: Unauthorized >1401761171.395637: EAPOL: External notification - portControl=Auto >1401761171.395654: EAPOL: Supplicant port status: Unauthorized >1401761171.395715: nl80211: Authenticate (ifindex=3) >1401761171.395732: * bssid=40:16:7e:59:a7:40 >1401761171.395747: * freq=2412 >1401761171.395774: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761171.395800: * IEs - hexdump(len=0): [NULL] >1401761171.395814: * Auth Type 0 >1401761171.400342: nl80211: Authentication request send successfully >1401761171.400374: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761171.400447: nl80211: Event message available >1401761171.400465: nl80211: New station 40:16:7e:59:a7:40 >1401761171.400478: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761171.400523: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761171.400569: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761171.794581: EAPOL: Supplicant port status: Unauthorized >1401761172.406172: nl80211: Event message available >1401761172.406239: nl80211: MLME event 37 >1401761172.406254: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 b0 8d 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761172.406280: nl80211: Authenticate event >1401761172.406298: wlp2s0: Event AUTH (11) received >1401761172.406318: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761172.406332: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761172.406353: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761172.406387: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761172.406403: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761172.406418: netlink: Operstate: linkmode=-1, operstate=5 >1401761172.406521: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761172.406556: nl80211: Associate (ifindex=3) >1401761172.406576: * bssid=40:16:7e:59:a7:40 >1401761172.406594: * freq=2412 >1401761172.406610: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761172.406636: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761172.406656: * pairwise=0xfac04 >1401761172.406669: * group=0xfac04 >1401761172.420147: nl80211: Association request send successfully >1401761172.420205: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761172.420331: nl80211: Event message available >1401761172.420362: nl80211: Delete station 40:16:7e:59:a7:40 >1401761172.420389: nl80211: Event message available >1401761172.420410: nl80211: New station 40:16:7e:59:a7:40 >1401761172.795148: EAPOL: Supplicant port status: Unauthorized >1401761173.796357: EAPOL: Supplicant port status: Unauthorized >1401761174.425178: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761174.425221: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.425268: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761174.425298: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761174.425312: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.425357: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761174.425382: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761174.425397: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.425441: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761174.428226: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761174.428260: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761174.428338: nl80211: if_removed already cleared - ignore event >1401761174.428361: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761174.428377: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761174.428414: nl80211: if_removed already cleared - ignore event >1401761174.428431: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761174.428446: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761174.428482: nl80211: if_removed already cleared - ignore event >1401761174.428507: nl80211: Event message available >1401761174.428537: nl80211: MLME event 38 >1401761174.428553: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 90 8e 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761174.428616: nl80211: Associate event >1401761174.428634: wlp2s0: Event ASSOC (0) received >1401761174.428650: wlp2s0: Association info event >1401761174.428664: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761174.428707: wlp2s0: freq=2412 MHz >1401761174.428722: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761174.428737: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761174.428751: netlink: Operstate: linkmode=-1, operstate=5 >1401761174.428896: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761174.428926: wlp2s0: No keys have been configured - skip key clearing >1401761174.428949: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761174.428968: wlp2s0: WPA: Association event - clear replay counter >1401761174.428985: wlp2s0: WPA: Clear old PTK >1401761174.429001: EAPOL: External notification - portEnabled=0 >1401761174.429020: EAPOL: Supplicant port status: Unauthorized >1401761174.429129: EAPOL: External notification - portValid=0 >1401761174.429150: EAPOL: Supplicant port status: Unauthorized >1401761174.429218: EAPOL: External notification - EAP success=0 >1401761174.429238: EAPOL: Supplicant port status: Unauthorized >1401761174.429290: EAPOL: External notification - portEnabled=1 >1401761174.429307: EAPOL: SUPP_PAE entering state CONNECTING >1401761174.429319: EAPOL: SUPP_BE entering state IDLE >1401761174.429336: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761174.429352: wlp2s0: Cancelling scan request >1401761174.429367: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761174.429383: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761174.429396: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.429440: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761174.429457: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761174.429471: wlp2s0: EAPOL-Key type=2 >1401761174.429488: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761174.429503: wlp2s0: key_length=16 key_data_length=22 >1401761174.429516: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >1401761174.429531: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f >1401761174.429551: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761174.429567: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761174.429582: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761174.429597: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761174.429614: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.429660: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761174.429743: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761174.429797: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.429824: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.429846: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761174.429866: wlp2s0: RSN: no matching PMKID found >1401761174.429880: Get randomness: len=32 entropy=5 >1401761174.430568: WPA: Renewed SNonce - hexdump(len=32): 4b 0e 0b bc 2c 80 fb 18 9b c9 5c fe 8b 5b 73 7b d6 ba ba eb f0 4c 98 1e f2 81 f8 45 e7 a1 08 eb >1401761174.430608: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761174.430624: WPA: Nonce1 - hexdump(len=32): 4b 0e 0b bc 2c 80 fb 18 9b c9 5c fe 8b 5b 73 7b d6 ba ba eb f0 4c 98 1e f2 81 f8 45 e7 a1 08 eb >1401761174.430644: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f >1401761174.430664: WPA: PMK - hexdump(len=32): [REMOVED] >1401761174.430678: WPA: PTK - hexdump(len=48): [REMOVED] >1401761174.430691: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761174.430711: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 >1401761174.430729: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761174.430747: WPA: KCK - hexdump(len=16): [REMOVED] >1401761174.430777: WPA: Derived Key MIC - hexdump(len=16): be 23 dd 01 1f d7 ac e5 2d e8 ce 3d 5a ec 2c fa >1401761174.430795: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 4b 0e 0b bc 2c 80 fb 18 9b c9 5c fe 8b 5b 73 7b d6 ba ba eb f0 4c 98 1e f2 81 f8 45 e7 a1 08 eb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 be 23 dd 01 1f d7 ac e5 2d e8 ce 3d 5a ec 2c fa 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761174.430882: nl80211: Event message available >1401761174.430909: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761174.433973: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761174.796896: EAPOL: startWhen --> 0 >1401761174.796942: EAPOL: disable timer tick >1401761174.796956: EAPOL: SUPP_PAE entering state CONNECTING >1401761174.796969: EAPOL: enable timer tick >1401761174.796984: EAPOL: txStart >1401761174.796997: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761175.431119: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761175.431153: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 90 2c 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 1e 5c 51 aa e9 6c b7 a1 5c db 0b 42 a6 ed 1d 00 38 b7 cb 61 2e 70 2e c4 19 1a 81 64 d0 6f 18 bd 80 17 64 ef 15 9a 07 ba 51 1a 11 f3 bb 84 71 70 9d d5 59 29 d8 d4 72 54 9a 38 96 70 77 9c ff c6 f6 81 f5 be c7 e0 53 7d 14 >1401761175.431192: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761175.431202: wlp2s0: EAPOL-Key type=2 >1401761175.431215: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761175.431226: wlp2s0: key_length=16 key_data_length=56 >1401761175.431235: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 >1401761175.431246: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f >1401761175.431261: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 90 >1401761175.431272: key_rsc - hexdump(len=8): 2c 08 00 00 00 00 00 00 >1401761175.431283: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761175.431294: key_mic - hexdump(len=16): ac 1e 5c 51 aa e9 6c b7 a1 5c db 0b 42 a6 ed 1d >1401761175.431308: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 8f 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 90 2c 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 1e 5c 51 aa e9 6c b7 a1 5c db 0b 42 a6 ed 1d 00 38 b7 cb 61 2e 70 2e c4 19 1a 81 64 d0 6f 18 bd 80 17 64 ef 15 9a 07 ba 51 1a 11 f3 bb 84 71 70 9d d5 59 29 d8 d4 72 54 9a 38 96 70 77 9c ff c6 f6 81 f5 be c7 e0 53 7d 14 >1401761175.431365: RSN: encrypted key data - hexdump(len=56): b7 cb 61 2e 70 2e c4 19 1a 81 64 d0 6f 18 bd 80 17 64 ef 15 9a 07 ba 51 1a 11 f3 bb 84 71 70 9d d5 59 29 d8 d4 72 54 9a 38 96 70 77 9c ff c6 f6 81 f5 be c7 e0 53 7d 14 >1401761175.431393: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761175.431406: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761175.431418: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761175.431428: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761175.431445: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761175.431459: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761175.431471: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761175.431484: WPA: KCK - hexdump(len=16): [REMOVED] >1401761175.431494: WPA: Derived Key MIC - hexdump(len=16): e5 c7 f8 34 9a bc 54 25 2c 05 bd a4 99 6a 72 ed >1401761175.431506: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e5 c7 f8 34 9a bc 54 25 2c 05 bd a4 99 6a 72 ed 00 00 >1401761175.431544: wlp2s0: WPA: Installing PTK to the driver >1401761175.431602: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761175.431624: addr=40:16:7e:59:a7:40 >1401761175.434261: EAPOL: External notification - portValid=1 >1401761175.434301: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761175.434368: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761175.434386: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761175.434400: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761175.434413: WPA: RSC - hexdump(len=6): 2c 08 00 00 00 00 >1401761175.434473: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761175.434496: broadcast key >1401761175.434587: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761175.434604: wlp2s0: Cancelling authentication timeout >1401761175.434616: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761175.434628: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761175.434638: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761175.434649: netlink: Operstate: linkmode=-1, operstate=6 >1401761175.434748: EAPOL: External notification - portValid=1 >1401761175.434777: EAPOL: External notification - EAP success=1 >1401761175.434790: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761175.434800: EAPOL: SUPP_BE entering state SUCCESS >1401761175.434812: EAP: EAP entering state DISABLED >1401761175.434823: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761175.434834: EAPOL: Supplicant port status: Authorized >1401761175.434908: EAPOL: SUPP_BE entering state IDLE >1401761175.434925: EAPOL authentication completed successfully >1401761175.434963: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761175.434976: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761175.435008: nl80211: if_removed already cleared - ignore event >1401761175.439498: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761178.122969: nl80211: Event message available >1401761178.624162: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761178.624209: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761178.624284: nl80211: if_removed already cleared - ignore event >1401761178.629034: nl80211: Event message available >1401761178.629100: nl80211: Delete station 40:16:7e:59:a7:40 >1401761178.632287: nl80211: Event message available >1401761178.632356: nl80211: MLME event 39 >1401761178.632371: nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 40 16 7e 59 a7 40 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 00 00 04 00 >1401761178.632393: nl80211: Deauthenticate event >1401761178.632411: wlp2s0: Event DEAUTH (12) received >1401761178.632427: wlp2s0: Deauthentication notification >1401761178.632441: wlp2s0: * reason 4 (locally generated) >1401761178.632456: wlp2s0: * address 40:16:7e:59:a7:40 >1401761178.632469: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761178.632486: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=4 locally_generated=1 >1401761178.632501: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761178.632516: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761178.632531: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761178.632548: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761178.632562: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761178.632695: wlp2s0: Disconnect event - remove keys >1401761178.632798: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761178.643180: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761178.643299: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761178.643377: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761178.643455: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761178.643480: addr=40:16:7e:59:a7:40 >1401761178.643521: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761178.643541: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761178.643558: netlink: Operstate: linkmode=-1, operstate=5 >1401761178.643675: EAPOL: External notification - portEnabled=0 >1401761178.643704: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761178.643720: EAPOL: Supplicant port status: Unauthorized >1401761178.643848: EAPOL: SUPP_BE entering state INITIALIZE >1401761178.643876: EAPOL: Supplicant port status: Unauthorized >1401761178.643932: EAPOL: External notification - portValid=0 >1401761178.643949: EAPOL: Supplicant port status: Unauthorized >1401761178.643998: EAPOL: External notification - EAP success=0 >1401761178.644012: EAPOL: Supplicant port status: Unauthorized >1401761178.644081: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761178.644099: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761178.644134: nl80211: if_removed already cleared - ignore event >1401761178.644150: nl80211: Event message available >1401761178.644171: nl80211: Ignore disconnect event when using userspace SME >1401761178.647758: nl80211: Event message available >1401761178.647843: nl80211: Regulatory domain change >1401761178.647866: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761178.648042: nl80211: Regulatory information - country=00 >1401761178.648070: nl80211: 2402-2472 @ 40 MHz >1401761178.648088: nl80211: 2457-2482 @ 40 MHz >1401761178.648104: nl80211: 2474-2494 @ 20 MHz >1401761178.648121: nl80211: 5170-5250 @ 80 MHz >1401761178.648138: nl80211: 5735-5835 @ 80 MHz >1401761178.648155: nl80211: 57240-63720 @ 2160 MHz >1401761178.648189: nl80211: Added 802.11b mode based on 802.11g information >1401761178.648210: P2P: Add operating class 81 >1401761178.648227: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761178.648247: P2P: Add operating class 115 >1401761178.648263: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761178.648278: P2P: Add operating class 124 >1401761178.648307: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761178.648328: P2P: Add operating class 116 >1401761178.648346: P2P: Channels - hexdump(len=2): 24 2c >1401761178.648364: P2P: Add operating class 117 >1401761178.648380: P2P: Channels - hexdump(len=2): 28 30 >1401761178.648398: P2P: Add operating class 126 >1401761178.648414: P2P: Channels - hexdump(len=2): 95 9d >1401761178.648432: P2P: Add operating class 127 >1401761178.648447: P2P: Channels - hexdump(len=2): 99 a1 >1401761178.648468: wlp2s0: P2P: Update channel list >1401761178.648743: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761178.651856: nl80211: Event message available >1401761178.651911: nl80211: Regulatory domain change >1401761178.651933: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761178.652083: nl80211: Regulatory information - country=US >1401761178.652103: nl80211: 2402-2472 @ 40 MHz >1401761178.652120: nl80211: 5170-5250 @ 80 MHz >1401761178.652137: nl80211: 5250-5330 @ 80 MHz >1401761178.652154: nl80211: 5735-5835 @ 80 MHz >1401761178.652171: nl80211: 57240-63720 @ 2160 MHz >1401761178.652200: nl80211: Added 802.11b mode based on 802.11g information >1401761178.652217: P2P: Add operating class 81 >1401761178.652234: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761178.652254: P2P: Add operating class 115 >1401761178.652269: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761178.652286: P2P: Add operating class 124 >1401761178.652300: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761178.652316: P2P: Add operating class 116 >1401761178.652331: P2P: Channels - hexdump(len=2): 24 2c >1401761178.652347: P2P: Add operating class 117 >1401761178.652363: P2P: Channels - hexdump(len=2): 28 30 >1401761178.652379: P2P: Add operating class 126 >1401761178.652394: P2P: Channels - hexdump(len=2): 95 9d >1401761178.652409: P2P: Add operating class 127 >1401761178.652423: P2P: Channels - hexdump(len=2): 99 a1 >1401761178.652440: wlp2s0: P2P: Update channel list >1401761178.732846: wlp2s0: State: DISCONNECTED -> SCANNING >1401761178.732978: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761178.733011: wlp2s0: Starting AP scan for wildcard SSID >1401761178.733026: WPS: Building WPS IE for Probe Request >1401761178.733040: WPS: * Version (hardcoded 0x10) >1401761178.733054: WPS: * Request Type >1401761178.733067: WPS: * Config Methods (108) >1401761178.733079: WPS: * UUID-E >1401761178.733092: WPS: * Primary Device Type >1401761178.733105: WPS: * RF Bands (3) >1401761178.733118: WPS: * Association State >1401761178.733130: WPS: * Configuration Error (0) >1401761178.733143: WPS: * Device Password ID (0) >1401761178.733156: WPS: * Device Name >1401761178.733173: P2P: * P2P IE header >1401761178.733186: P2P: * Capability dev=25 group=00 >1401761178.733200: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761178.733249: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761178.733275: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761178.733291: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761178.733413: Scan requested (ret=0) - scan timeout 30 seconds >1401761178.733442: nl80211: Event message available >1401761178.733464: nl80211: Scan trigger >1401761178.738210: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761178.799034: EAPOL: Supplicant port status: Unauthorized >1401761179.800220: EAPOL: Supplicant port status: Unauthorized >1401761180.406110: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761180.406160: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761180.406251: nl80211: if_removed already cleared - ignore event >1401761180.406272: nl80211: Event message available >1401761180.406306: nl80211: New scan results available >1401761180.406329: wlp2s0: Event SCAN_RESULTS (3) received >1401761180.406476: nl80211: Received scan results (4 BSSes) >1401761180.406599: wlp2s0: BSS: Start scan result update 8 >1401761180.406640: BSS: last_scan_res_used=4/32 last_scan_full=0 >1401761180.406660: wlp2s0: New scan results available >1401761180.406725: wlp2s0: Selecting BSS from priority group 0 >1401761180.406753: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-44 >1401761180.406795: wlp2s0: skip - SSID mismatch >1401761180.406817: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45 >1401761180.406835: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761180.406854: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-60 >1401761180.406870: wlp2s0: skip - SSID mismatch >1401761180.406892: wlp2s0: 3: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-69 >1401761180.406914: wlp2s0: skip - SSID mismatch >1401761180.406931: wlp2s0: No APs found - clear blacklist and try again >1401761180.406945: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761180.406962: wlp2s0: Selecting BSS from priority group 0 >1401761180.406979: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-44 >1401761180.406994: wlp2s0: skip - SSID mismatch >1401761180.407012: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-45 >1401761180.407028: wlp2s0: selected based on RSN IE >1401761180.407046: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761180.407065: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761180.407082: wlp2s0: Automatic auth_alg selection: 0x1 >1401761180.407097: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761180.407111: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761180.407125: RSN: No PMKSA cache entry found >1401761180.407139: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761180.407155: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761180.407170: wlp2s0: WPA: clearing AP WPA IE >1401761180.407183: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761180.407205: wlp2s0: WPA: using GTK CCMP >1401761180.407219: wlp2s0: WPA: using PTK CCMP >1401761180.407233: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761180.407246: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761180.407269: wlp2s0: Cancelling scan request >1401761180.407286: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761180.407301: wlp2s0: No keys have been configured - skip key clearing >1401761180.407316: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761180.407387: EAPOL: External notification - EAP success=0 >1401761180.407411: EAPOL: Supplicant port status: Unauthorized >1401761180.407518: EAPOL: External notification - EAP fail=0 >1401761180.407542: EAPOL: Supplicant port status: Unauthorized >1401761180.407600: EAPOL: External notification - portControl=Auto >1401761180.407616: EAPOL: Supplicant port status: Unauthorized >1401761180.407678: nl80211: Authenticate (ifindex=3) >1401761180.407695: * bssid=40:16:7e:59:a7:40 >1401761180.407710: * freq=2412 >1401761180.407723: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761180.407747: * IEs - hexdump(len=0): [NULL] >1401761180.407779: * Auth Type 0 >1401761180.412267: nl80211: Authentication request send successfully >1401761180.412300: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761180.412383: nl80211: Event message available >1401761180.412402: nl80211: New station 40:16:7e:59:a7:40 >1401761180.412415: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761180.412462: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761180.412510: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761180.800636: EAPOL: Supplicant port status: Unauthorized >1401761181.418182: nl80211: Event message available >1401761181.418252: nl80211: MLME event 37 >1401761181.418268: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 a0 96 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761181.418293: nl80211: Authenticate event >1401761181.418311: wlp2s0: Event AUTH (11) received >1401761181.418331: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761181.418344: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761181.418366: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761181.418381: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761181.418396: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761181.418410: netlink: Operstate: linkmode=-1, operstate=5 >1401761181.418517: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761181.418545: nl80211: Associate (ifindex=3) >1401761181.418562: * bssid=40:16:7e:59:a7:40 >1401761181.418578: * freq=2412 >1401761181.418592: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761181.418617: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761181.418636: * pairwise=0xfac04 >1401761181.418649: * group=0xfac04 >1401761181.429248: nl80211: Association request send successfully >1401761181.429308: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761181.429438: nl80211: Event message available >1401761181.429468: nl80211: Delete station 40:16:7e:59:a7:40 >1401761181.429493: nl80211: Event message available >1401761181.429512: nl80211: New station 40:16:7e:59:a7:40 >1401761181.801193: EAPOL: Supplicant port status: Unauthorized >1401761182.801876: EAPOL: Supplicant port status: Unauthorized >1401761183.433204: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761183.433247: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.433292: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761183.433323: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761183.433338: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 04 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 91 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.433381: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761183.433405: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761183.433419: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 91 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.433478: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761183.433504: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761183.433518: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.433562: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761183.436267: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761183.436318: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761183.436400: nl80211: if_removed already cleared - ignore event >1401761183.436429: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761183.436446: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761183.436489: nl80211: if_removed already cleared - ignore event >1401761183.436512: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761183.436530: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761183.436574: nl80211: if_removed already cleared - ignore event >1401761183.436608: nl80211: Event message available >1401761183.436637: nl80211: MLME event 38 >1401761183.436657: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 e0 97 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761183.436711: nl80211: Associate event >1401761183.436731: wlp2s0: Event ASSOC (0) received >1401761183.436750: wlp2s0: Association info event >1401761183.436811: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761183.436861: wlp2s0: freq=2412 MHz >1401761183.436882: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761183.436899: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761183.436917: netlink: Operstate: linkmode=-1, operstate=5 >1401761183.437032: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761183.437069: wlp2s0: No keys have been configured - skip key clearing >1401761183.437090: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761183.437107: wlp2s0: WPA: Association event - clear replay counter >1401761183.437125: wlp2s0: WPA: Clear old PTK >1401761183.437143: EAPOL: External notification - portEnabled=0 >1401761183.437160: EAPOL: Supplicant port status: Unauthorized >1401761183.437267: EAPOL: External notification - portValid=0 >1401761183.437288: EAPOL: Supplicant port status: Unauthorized >1401761183.437358: EAPOL: External notification - EAP success=0 >1401761183.437376: EAPOL: Supplicant port status: Unauthorized >1401761183.437429: EAPOL: External notification - portEnabled=1 >1401761183.437446: EAPOL: SUPP_PAE entering state CONNECTING >1401761183.437459: EAPOL: SUPP_BE entering state IDLE >1401761183.437476: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761183.437493: wlp2s0: Cancelling scan request >1401761183.437508: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761183.437540: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761183.437555: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.437599: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761183.437617: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761183.437632: wlp2s0: EAPOL-Key type=2 >1401761183.437649: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761183.437664: wlp2s0: key_length=16 key_data_length=22 >1401761183.437678: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 >1401761183.437693: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 >1401761183.437714: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761183.437730: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761183.437746: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761183.437783: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761183.437803: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.437852: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761183.437941: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761183.437960: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.437979: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.437998: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761183.438017: wlp2s0: RSN: no matching PMKID found >1401761183.438031: Get randomness: len=32 entropy=5 >1401761183.438717: WPA: Renewed SNonce - hexdump(len=32): ef 82 60 0b 86 ae 16 d6 af e0 3c e0 49 2c 2c 63 77 a4 eb ca 74 e0 41 63 67 cf 71 58 c8 eb 06 3a >1401761183.438756: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761183.438789: WPA: Nonce1 - hexdump(len=32): ef 82 60 0b 86 ae 16 d6 af e0 3c e0 49 2c 2c 63 77 a4 eb ca 74 e0 41 63 67 cf 71 58 c8 eb 06 3a >1401761183.438810: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 >1401761183.438830: WPA: PMK - hexdump(len=32): [REMOVED] >1401761183.438843: WPA: PTK - hexdump(len=48): [REMOVED] >1401761183.438857: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761183.438876: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05 >1401761183.438894: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761183.438913: WPA: KCK - hexdump(len=16): [REMOVED] >1401761183.438927: WPA: Derived Key MIC - hexdump(len=16): f0 40 a7 d5 b4 fd 78 73 08 9c 03 58 c9 7e 85 41 >1401761183.438943: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 05 ef 82 60 0b 86 ae 16 d6 af e0 3c e0 49 2c 2c 63 77 a4 eb ca 74 e0 41 63 67 cf 71 58 c8 eb 06 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 40 a7 d5 b4 fd 78 73 08 9c 03 58 c9 7e 85 41 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761183.439030: nl80211: Event message available >1401761183.439055: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761183.442110: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761183.802440: EAPOL: startWhen --> 0 >1401761183.802485: EAPOL: disable timer tick >1401761183.802500: EAPOL: SUPP_PAE entering state CONNECTING >1401761183.802513: EAPOL: enable timer tick >1401761183.802528: EAPOL: txStart >1401761183.802541: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761184.439313: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761184.439358: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 93 55 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 75 a8 79 1f fb 27 7e 91 ea 7c c9 94 bf b4 bd 00 38 78 c2 86 60 90 1a 06 2e 66 07 66 ce e6 36 ac 58 8f 43 26 d9 f2 20 66 1c b6 40 14 0e 15 ef 6f 5c 0f 6a 4d 9f 03 bc fc 8b ba 48 26 bb 69 46 87 df 5c a8 ba 72 43 df 26 af >1401761184.439412: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761184.439427: wlp2s0: EAPOL-Key type=2 >1401761184.439445: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761184.439460: wlp2s0: key_length=16 key_data_length=56 >1401761184.439473: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 >1401761184.439489: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 >1401761184.439510: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 93 >1401761184.439526: key_rsc - hexdump(len=8): 55 08 00 00 00 00 00 00 >1401761184.439541: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761184.439556: key_mic - hexdump(len=16): 74 75 a8 79 1f fb 27 7e 91 ea 7c c9 94 bf b4 bd >1401761184.439576: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 92 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 93 55 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 75 a8 79 1f fb 27 7e 91 ea 7c c9 94 bf b4 bd 00 38 78 c2 86 60 90 1a 06 2e 66 07 66 ce e6 36 ac 58 8f 43 26 d9 f2 20 66 1c b6 40 14 0e 15 ef 6f 5c 0f 6a 4d 9f 03 bc fc 8b ba 48 26 bb 69 46 87 df 5c a8 ba 72 43 df 26 af >1401761184.439639: RSN: encrypted key data - hexdump(len=56): 78 c2 86 60 90 1a 06 2e 66 07 66 ce e6 36 ac 58 8f 43 26 d9 f2 20 66 1c b6 40 14 0e 15 ef 6f 5c 0f 6a 4d 9f 03 bc fc 8b ba 48 26 bb 69 46 87 df 5c a8 ba 72 43 df 26 af >1401761184.439676: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761184.439694: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761184.439711: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761184.439725: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761184.439751: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761184.439782: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761184.439800: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761184.439819: WPA: KCK - hexdump(len=16): [REMOVED] >1401761184.439833: WPA: Derived Key MIC - hexdump(len=16): 61 d3 7e eb a5 05 38 4d c9 98 0f df eb 91 af 91 >1401761184.439850: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 d3 7e eb a5 05 38 4d c9 98 0f df eb 91 af 91 00 00 >1401761184.439901: wlp2s0: WPA: Installing PTK to the driver >1401761184.439976: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761184.440007: addr=40:16:7e:59:a7:40 >1401761184.442434: EAPOL: External notification - portValid=1 >1401761184.442502: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761184.442597: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761184.442623: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761184.442643: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761184.442660: WPA: RSC - hexdump(len=6): 55 08 00 00 00 00 >1401761184.442738: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761184.442785: broadcast key >1401761184.442892: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761184.442915: wlp2s0: Cancelling authentication timeout >1401761184.442932: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761184.442949: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761184.442963: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761184.442978: netlink: Operstate: linkmode=-1, operstate=6 >1401761184.443107: EAPOL: External notification - portValid=1 >1401761184.443135: EAPOL: External notification - EAP success=1 >1401761184.443151: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761184.443166: EAPOL: SUPP_BE entering state SUCCESS >1401761184.443182: EAP: EAP entering state DISABLED >1401761184.443198: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761184.443211: EAPOL: Supplicant port status: Authorized >1401761184.443308: EAPOL: SUPP_BE entering state IDLE >1401761184.443331: EAPOL authentication completed successfully >1401761184.443381: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761184.443400: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761184.443443: nl80211: if_removed already cleared - ignore event >1401761184.447728: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761187.119028: nl80211: Event message available >1401761187.620113: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761187.620165: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761187.620242: nl80211: if_removed already cleared - ignore event >1401761187.626079: nl80211: Event message available >1401761187.626149: nl80211: Delete station 40:16:7e:59:a7:40 >1401761187.629340: nl80211: Event message available >1401761187.629408: nl80211: MLME event 39 >1401761187.629424: nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 40 16 7e 59 a7 40 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 00 00 04 00 >1401761187.629446: nl80211: Deauthenticate event >1401761187.629465: wlp2s0: Event DEAUTH (12) received >1401761187.629481: wlp2s0: Deauthentication notification >1401761187.629496: wlp2s0: * reason 4 (locally generated) >1401761187.629512: wlp2s0: * address 40:16:7e:59:a7:40 >1401761187.629525: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761187.629542: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=4 locally_generated=1 >1401761187.629557: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761187.629573: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761187.629588: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761187.629606: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761187.629621: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761187.629756: wlp2s0: Disconnect event - remove keys >1401761187.629871: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761187.638174: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761187.638285: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761187.638345: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761187.638401: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761187.638421: addr=40:16:7e:59:a7:40 >1401761187.638456: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761187.638488: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761187.638505: netlink: Operstate: linkmode=-1, operstate=5 >1401761187.638613: EAPOL: External notification - portEnabled=0 >1401761187.638640: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761187.638656: EAPOL: Supplicant port status: Unauthorized >1401761187.638745: EAPOL: SUPP_BE entering state INITIALIZE >1401761187.638795: EAPOL: Supplicant port status: Unauthorized >1401761187.638864: EAPOL: External notification - portValid=0 >1401761187.638884: EAPOL: Supplicant port status: Unauthorized >1401761187.638936: EAPOL: External notification - EAP success=0 >1401761187.638953: EAPOL: Supplicant port status: Unauthorized >1401761187.639025: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761187.639045: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761187.639084: nl80211: if_removed already cleared - ignore event >1401761187.639102: nl80211: Event message available >1401761187.639125: nl80211: Ignore disconnect event when using userspace SME >1401761187.642748: nl80211: Event message available >1401761187.642844: nl80211: Regulatory domain change >1401761187.642865: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761187.643020: nl80211: Regulatory information - country=00 >1401761187.643039: nl80211: 2402-2472 @ 40 MHz >1401761187.643054: nl80211: 2457-2482 @ 40 MHz >1401761187.643069: nl80211: 2474-2494 @ 20 MHz >1401761187.643084: nl80211: 5170-5250 @ 80 MHz >1401761187.643099: nl80211: 5735-5835 @ 80 MHz >1401761187.643114: nl80211: 57240-63720 @ 2160 MHz >1401761187.643139: nl80211: Added 802.11b mode based on 802.11g information >1401761187.643155: P2P: Add operating class 81 >1401761187.643169: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761187.643187: P2P: Add operating class 115 >1401761187.643200: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761187.643216: P2P: Add operating class 124 >1401761187.643229: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761187.643243: P2P: Add operating class 116 >1401761187.643257: P2P: Channels - hexdump(len=2): 24 2c >1401761187.643271: P2P: Add operating class 117 >1401761187.643285: P2P: Channels - hexdump(len=2): 28 30 >1401761187.643298: P2P: Add operating class 126 >1401761187.643311: P2P: Channels - hexdump(len=2): 95 9d >1401761187.643325: P2P: Add operating class 127 >1401761187.643339: P2P: Channels - hexdump(len=2): 99 a1 >1401761187.643355: wlp2s0: P2P: Update channel list >1401761187.643673: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761187.647309: nl80211: Event message available >1401761187.647381: nl80211: Regulatory domain change >1401761187.647402: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761187.647559: nl80211: Regulatory information - country=US >1401761187.647578: nl80211: 2402-2472 @ 40 MHz >1401761187.647593: nl80211: 5170-5250 @ 80 MHz >1401761187.647607: nl80211: 5250-5330 @ 80 MHz >1401761187.647622: nl80211: 5735-5835 @ 80 MHz >1401761187.647636: nl80211: 57240-63720 @ 2160 MHz >1401761187.647661: nl80211: Added 802.11b mode based on 802.11g information >1401761187.647676: P2P: Add operating class 81 >1401761187.647690: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761187.647707: P2P: Add operating class 115 >1401761187.647721: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761187.647735: P2P: Add operating class 124 >1401761187.647748: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761187.647784: P2P: Add operating class 116 >1401761187.647798: P2P: Channels - hexdump(len=2): 24 2c >1401761187.647813: P2P: Add operating class 117 >1401761187.647828: P2P: Channels - hexdump(len=2): 28 30 >1401761187.647844: P2P: Add operating class 126 >1401761187.647861: P2P: Channels - hexdump(len=2): 95 9d >1401761187.647877: P2P: Add operating class 127 >1401761187.647892: P2P: Channels - hexdump(len=2): 99 a1 >1401761187.647911: wlp2s0: P2P: Update channel list >1401761187.729857: wlp2s0: State: DISCONNECTED -> SCANNING >1401761187.729982: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761187.730036: wlp2s0: Starting AP scan for wildcard SSID >1401761187.730055: WPS: Building WPS IE for Probe Request >1401761187.730072: WPS: * Version (hardcoded 0x10) >1401761187.730088: WPS: * Request Type >1401761187.730102: WPS: * Config Methods (108) >1401761187.730115: WPS: * UUID-E >1401761187.730127: WPS: * Primary Device Type >1401761187.730140: WPS: * RF Bands (3) >1401761187.730153: WPS: * Association State >1401761187.730166: WPS: * Configuration Error (0) >1401761187.730178: WPS: * Device Password ID (0) >1401761187.730193: WPS: * Device Name >1401761187.730210: P2P: * P2P IE header >1401761187.730224: P2P: * Capability dev=25 group=00 >1401761187.730238: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761187.730296: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761187.730330: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761187.730348: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761187.730462: Scan requested (ret=0) - scan timeout 30 seconds >1401761187.730495: nl80211: Event message available >1401761187.730516: nl80211: Scan trigger >1401761187.735227: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761187.804804: EAPOL: Supplicant port status: Unauthorized >1401761188.805994: EAPOL: Supplicant port status: Unauthorized >1401761189.398923: nl80211: Event message available >1401761189.398992: nl80211: New scan results available >1401761189.399017: wlp2s0: Event SCAN_RESULTS (3) received >1401761189.399161: nl80211: Received scan results (5 BSSes) >1401761189.399356: wlp2s0: BSS: Start scan result update 9 >1401761189.399394: wlp2s0: BSS: Add new id 4 BSSID 20:e5:2a:08:16:29 SSID 'NETGEAR22' >1401761189.399411: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' >1401761189.399577: BSS: last_scan_res_used=5/32 last_scan_full=0 >1401761189.399603: wlp2s0: New scan results available >1401761189.399653: WPS: AP 20:e5:2a:08:16:29 type 0 added >1401761189.399671: WPS: AP[0] 20:e5:2a:08:16:29 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 >1401761189.399691: wlp2s0: Selecting BSS from priority group 0 >1401761189.399711: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-49 >1401761189.399727: wlp2s0: skip - SSID mismatch >1401761189.399747: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44 >1401761189.399784: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761189.399803: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-60 >1401761189.399819: wlp2s0: skip - SSID mismatch >1401761189.399839: wlp2s0: 3: 20:e5:2a:08:16:29 ssid='NETGEAR22' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72 wps >1401761189.399854: wlp2s0: skip - SSID mismatch >1401761189.399872: wlp2s0: 4: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-71 >1401761189.399887: wlp2s0: skip - SSID mismatch >1401761189.399902: wlp2s0: No APs found - clear blacklist and try again >1401761189.399916: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761189.399932: wlp2s0: Selecting BSS from priority group 0 >1401761189.399950: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-49 >1401761189.399965: wlp2s0: skip - SSID mismatch >1401761189.399984: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-44 >1401761189.400000: wlp2s0: selected based on RSN IE >1401761189.400018: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761189.400056: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761189.400074: wlp2s0: Automatic auth_alg selection: 0x1 >1401761189.400090: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761189.400104: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761189.400119: RSN: No PMKSA cache entry found >1401761189.400134: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761189.400150: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761189.400165: wlp2s0: WPA: clearing AP WPA IE >1401761189.400179: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761189.400201: wlp2s0: WPA: using GTK CCMP >1401761189.400215: wlp2s0: WPA: using PTK CCMP >1401761189.400230: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761189.400244: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761189.400267: wlp2s0: Cancelling scan request >1401761189.400284: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761189.400299: wlp2s0: No keys have been configured - skip key clearing >1401761189.400315: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761189.400375: EAPOL: External notification - EAP success=0 >1401761189.400393: EAPOL: Supplicant port status: Unauthorized >1401761189.400509: EAPOL: External notification - EAP fail=0 >1401761189.400532: EAPOL: Supplicant port status: Unauthorized >1401761189.400591: EAPOL: External notification - portControl=Auto >1401761189.400608: EAPOL: Supplicant port status: Unauthorized >1401761189.400671: nl80211: Authenticate (ifindex=3) >1401761189.400689: * bssid=40:16:7e:59:a7:40 >1401761189.400704: * freq=2412 >1401761189.400718: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761189.400744: * IEs - hexdump(len=0): [NULL] >1401761189.400758: * Auth Type 0 >1401761189.405780: nl80211: Authentication request send successfully >1401761189.405844: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761189.405986: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761189.406006: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761189.406058: nl80211: if_removed already cleared - ignore event >1401761189.406076: nl80211: Event message available >1401761189.406099: nl80211: New station 40:16:7e:59:a7:40 >1401761189.406121: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761189.406201: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761189.406271: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761189.806617: EAPOL: Supplicant port status: Unauthorized >1401761190.410177: nl80211: Event message available >1401761190.410247: nl80211: MLME event 37 >1401761190.410263: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 30 a0 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761190.410289: nl80211: Authenticate event >1401761190.410306: wlp2s0: Event AUTH (11) received >1401761190.410326: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761190.410340: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761190.410361: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761190.410377: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761190.410391: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761190.410406: netlink: Operstate: linkmode=-1, operstate=5 >1401761190.410513: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761190.410558: nl80211: Associate (ifindex=3) >1401761190.410577: * bssid=40:16:7e:59:a7:40 >1401761190.410592: * freq=2412 >1401761190.410606: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761190.410630: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761190.410650: * pairwise=0xfac04 >1401761190.410663: * group=0xfac04 >1401761190.424294: nl80211: Association request send successfully >1401761190.424357: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761190.424487: nl80211: Event message available >1401761190.424514: nl80211: Delete station 40:16:7e:59:a7:40 >1401761190.424537: nl80211: Event message available >1401761190.424556: nl80211: New station 40:16:7e:59:a7:40 >1401761190.807092: EAPOL: Supplicant port status: Unauthorized >1401761191.808285: EAPOL: Supplicant port status: Unauthorized >1401761192.430152: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761192.430196: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 93 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.430242: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761192.430272: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761192.430287: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.430330: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761192.430355: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761192.430369: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.430411: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761192.433196: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761192.433249: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761192.433324: nl80211: if_removed already cleared - ignore event >1401761192.433345: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761192.433361: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761192.433398: nl80211: if_removed already cleared - ignore event >1401761192.433415: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761192.433430: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761192.433464: nl80211: if_removed already cleared - ignore event >1401761192.433489: nl80211: Event message available >1401761192.433520: nl80211: MLME event 38 >1401761192.433535: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 60 a1 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761192.433585: nl80211: Associate event >1401761192.433619: wlp2s0: Event ASSOC (0) received >1401761192.433636: wlp2s0: Association info event >1401761192.433650: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761192.433693: wlp2s0: freq=2412 MHz >1401761192.433709: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761192.433723: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761192.433738: netlink: Operstate: linkmode=-1, operstate=5 >1401761192.433874: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761192.433909: wlp2s0: No keys have been configured - skip key clearing >1401761192.433931: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761192.433951: wlp2s0: WPA: Association event - clear replay counter >1401761192.433968: wlp2s0: WPA: Clear old PTK >1401761192.433984: EAPOL: External notification - portEnabled=0 >1401761192.434001: EAPOL: Supplicant port status: Unauthorized >1401761192.434109: EAPOL: External notification - portValid=0 >1401761192.434136: EAPOL: Supplicant port status: Unauthorized >1401761192.434215: EAPOL: External notification - EAP success=0 >1401761192.434235: EAPOL: Supplicant port status: Unauthorized >1401761192.434291: EAPOL: External notification - portEnabled=1 >1401761192.434307: EAPOL: SUPP_PAE entering state CONNECTING >1401761192.434320: EAPOL: SUPP_BE entering state IDLE >1401761192.434337: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761192.434354: wlp2s0: Cancelling scan request >1401761192.434369: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761192.434385: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761192.434399: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.434442: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761192.434460: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761192.434475: wlp2s0: EAPOL-Key type=2 >1401761192.434492: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761192.434507: wlp2s0: key_length=16 key_data_length=22 >1401761192.434520: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 >1401761192.434536: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 >1401761192.434556: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761192.434573: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761192.434587: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761192.434602: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761192.434619: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.434665: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761192.434746: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761192.434782: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.434806: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.434828: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761192.434862: wlp2s0: RSN: no matching PMKID found >1401761192.434877: Get randomness: len=32 entropy=6 >1401761192.435563: WPA: Renewed SNonce - hexdump(len=32): 3f a6 37 37 74 f9 41 c8 91 aa e0 f1 a2 c8 83 fb 1c 6b 07 da 77 a5 6f 57 f7 54 6c b2 da c4 cf 5f >1401761192.435603: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761192.435619: WPA: Nonce1 - hexdump(len=32): 3f a6 37 37 74 f9 41 c8 91 aa e0 f1 a2 c8 83 fb 1c 6b 07 da 77 a5 6f 57 f7 54 6c b2 da c4 cf 5f >1401761192.435639: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 >1401761192.435659: WPA: PMK - hexdump(len=32): [REMOVED] >1401761192.435673: WPA: PTK - hexdump(len=48): [REMOVED] >1401761192.435686: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761192.435706: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 06 >1401761192.435723: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761192.435742: WPA: KCK - hexdump(len=16): [REMOVED] >1401761192.435756: WPA: Derived Key MIC - hexdump(len=16): 82 54 ce f1 1e 44 79 01 8e 50 da 6c 6a c1 2b 34 >1401761192.435792: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 06 3f a6 37 37 74 f9 41 c8 91 aa e0 f1 a2 c8 83 fb 1c 6b 07 da 77 a5 6f 57 f7 54 6c b2 da c4 cf 5f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 82 54 ce f1 1e 44 79 01 8e 50 da 6c 6a c1 2b 34 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761192.435883: nl80211: Event message available >1401761192.435910: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761192.438959: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761192.808848: EAPOL: startWhen --> 0 >1401761192.808894: EAPOL: disable timer tick >1401761192.808908: EAPOL: SUPP_PAE entering state CONNECTING >1401761192.808921: EAPOL: enable timer tick >1401761192.808936: EAPOL: txStart >1401761192.808949: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761193.435270: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761193.435313: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 96 81 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 23 1a 18 62 ef 73 56 f4 05 09 74 2e dd 47 c4 00 38 e0 de 19 d4 38 30 8c 17 36 7b 8b 50 a1 90 be 91 e9 dd 9d 53 4b 6a b3 91 fa 66 de d1 63 b1 03 e5 01 dd 0b a8 20 d3 27 87 c6 4d 8e 44 bc b9 0a 7a d6 14 e4 63 f5 45 cf 11 >1401761193.435370: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761193.435386: wlp2s0: EAPOL-Key type=2 >1401761193.435403: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761193.435419: wlp2s0: key_length=16 key_data_length=56 >1401761193.435432: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 >1401761193.435448: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 >1401761193.435469: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 96 >1401761193.435487: key_rsc - hexdump(len=8): 81 08 00 00 00 00 00 00 >1401761193.435503: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761193.435519: key_mic - hexdump(len=16): 60 23 1a 18 62 ef 73 56 f4 05 09 74 2e dd 47 c4 >1401761193.435539: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 95 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 96 81 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 23 1a 18 62 ef 73 56 f4 05 09 74 2e dd 47 c4 00 38 e0 de 19 d4 38 30 8c 17 36 7b 8b 50 a1 90 be 91 e9 dd 9d 53 4b 6a b3 91 fa 66 de d1 63 b1 03 e5 01 dd 0b a8 20 d3 27 87 c6 4d 8e 44 bc b9 0a 7a d6 14 e4 63 f5 45 cf 11 >1401761193.435619: RSN: encrypted key data - hexdump(len=56): e0 de 19 d4 38 30 8c 17 36 7b 8b 50 a1 90 be 91 e9 dd 9d 53 4b 6a b3 91 fa 66 de d1 63 b1 03 e5 01 dd 0b a8 20 d3 27 87 c6 4d 8e 44 bc b9 0a 7a d6 14 e4 63 f5 45 cf 11 >1401761193.435658: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761193.435677: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761193.435694: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761193.435708: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761193.435734: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761193.435753: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761193.435800: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761193.435821: WPA: KCK - hexdump(len=16): [REMOVED] >1401761193.435835: WPA: Derived Key MIC - hexdump(len=16): cb 4e 0f e8 e5 f4 52 82 d4 dc cd c6 7c 76 3c b6 >1401761193.435853: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cb 4e 0f e8 e5 f4 52 82 d4 dc cd c6 7c 76 3c b6 00 00 >1401761193.435904: wlp2s0: WPA: Installing PTK to the driver >1401761193.435979: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761193.436010: addr=40:16:7e:59:a7:40 >1401761193.438403: EAPOL: External notification - portValid=1 >1401761193.438438: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761193.438534: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761193.438552: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761193.438568: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761193.438582: WPA: RSC - hexdump(len=6): 81 08 00 00 00 00 >1401761193.438642: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761193.438662: broadcast key >1401761193.438739: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761193.438756: wlp2s0: Cancelling authentication timeout >1401761193.438787: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761193.438804: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761193.438819: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761193.438833: netlink: Operstate: linkmode=-1, operstate=6 >1401761193.438938: EAPOL: External notification - portValid=1 >1401761193.438955: EAPOL: External notification - EAP success=1 >1401761193.438969: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761193.438982: EAPOL: SUPP_BE entering state SUCCESS >1401761193.438995: EAP: EAP entering state DISABLED >1401761193.439008: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761193.439021: EAPOL: Supplicant port status: Authorized >1401761193.439082: EAPOL: SUPP_BE entering state IDLE >1401761193.439098: EAPOL authentication completed successfully >1401761193.439143: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761193.439160: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761193.439197: nl80211: if_removed already cleared - ignore event >1401761193.443742: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761196.123123: nl80211: Event message available >1401761196.624144: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761196.624195: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761196.624273: nl80211: if_removed already cleared - ignore event >1401761196.633063: nl80211: Event message available >1401761196.633133: nl80211: Delete station 40:16:7e:59:a7:40 >1401761196.636283: nl80211: Event message available >1401761196.636352: nl80211: MLME event 39 >1401761196.636368: nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 40 16 7e 59 a7 40 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 00 00 04 00 >1401761196.636390: nl80211: Deauthenticate event >1401761196.636409: wlp2s0: Event DEAUTH (12) received >1401761196.636425: wlp2s0: Deauthentication notification >1401761196.636440: wlp2s0: * reason 4 (locally generated) >1401761196.636456: wlp2s0: * address 40:16:7e:59:a7:40 >1401761196.636469: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761196.636487: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=4 locally_generated=1 >1401761196.636502: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761196.636518: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761196.636533: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761196.636551: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761196.636566: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761196.636699: wlp2s0: Disconnect event - remove keys >1401761196.636795: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761196.643021: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761196.643143: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761196.643221: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761196.643300: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761196.643326: addr=40:16:7e:59:a7:40 >1401761196.643368: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761196.643388: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761196.643405: netlink: Operstate: linkmode=-1, operstate=5 >1401761196.643520: EAPOL: External notification - portEnabled=0 >1401761196.643550: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761196.643565: EAPOL: Supplicant port status: Unauthorized >1401761196.643644: EAPOL: SUPP_BE entering state INITIALIZE >1401761196.643662: EAPOL: Supplicant port status: Unauthorized >1401761196.643712: EAPOL: External notification - portValid=0 >1401761196.643727: EAPOL: Supplicant port status: Unauthorized >1401761196.643799: EAPOL: External notification - EAP success=0 >1401761196.643817: EAPOL: Supplicant port status: Unauthorized >1401761196.643885: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761196.643904: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761196.643940: nl80211: if_removed already cleared - ignore event >1401761196.643957: nl80211: Event message available >1401761196.643979: nl80211: Ignore disconnect event when using userspace SME >1401761196.647449: nl80211: Event message available >1401761196.647515: nl80211: Regulatory domain change >1401761196.647537: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761196.647698: nl80211: Regulatory information - country=00 >1401761196.647720: nl80211: 2402-2472 @ 40 MHz >1401761196.647735: nl80211: 2457-2482 @ 40 MHz >1401761196.647750: nl80211: 2474-2494 @ 20 MHz >1401761196.647787: nl80211: 5170-5250 @ 80 MHz >1401761196.647804: nl80211: 5735-5835 @ 80 MHz >1401761196.647819: nl80211: 57240-63720 @ 2160 MHz >1401761196.647847: nl80211: Added 802.11b mode based on 802.11g information >1401761196.647865: P2P: Add operating class 81 >1401761196.647881: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761196.647905: P2P: Add operating class 115 >1401761196.647921: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761196.647938: P2P: Add operating class 124 >1401761196.647954: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761196.647973: P2P: Add operating class 116 >1401761196.647988: P2P: Channels - hexdump(len=2): 24 2c >1401761196.648005: P2P: Add operating class 117 >1401761196.648022: P2P: Channels - hexdump(len=2): 28 30 >1401761196.648040: P2P: Add operating class 126 >1401761196.648068: P2P: Channels - hexdump(len=2): 95 9d >1401761196.648086: P2P: Add operating class 127 >1401761196.648102: P2P: Channels - hexdump(len=2): 99 a1 >1401761196.648123: wlp2s0: P2P: Update channel list >1401761196.648581: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761196.651636: nl80211: Event message available >1401761196.651707: nl80211: Regulatory domain change >1401761196.651727: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761196.651921: nl80211: Regulatory information - country=US >1401761196.651939: nl80211: 2402-2472 @ 40 MHz >1401761196.651951: nl80211: 5170-5250 @ 80 MHz >1401761196.651965: nl80211: 5250-5330 @ 80 MHz >1401761196.651978: nl80211: 5735-5835 @ 80 MHz >1401761196.651990: nl80211: 57240-63720 @ 2160 MHz >1401761196.652014: nl80211: Added 802.11b mode based on 802.11g information >1401761196.652027: P2P: Add operating class 81 >1401761196.652039: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761196.652055: P2P: Add operating class 115 >1401761196.652066: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761196.652080: P2P: Add operating class 124 >1401761196.652092: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761196.652103: P2P: Add operating class 116 >1401761196.652114: P2P: Channels - hexdump(len=2): 24 2c >1401761196.652127: P2P: Add operating class 117 >1401761196.652138: P2P: Channels - hexdump(len=2): 28 30 >1401761196.652152: P2P: Add operating class 126 >1401761196.652165: P2P: Channels - hexdump(len=2): 95 9d >1401761196.652176: P2P: Add operating class 127 >1401761196.652186: P2P: Channels - hexdump(len=2): 99 a1 >1401761196.652200: wlp2s0: P2P: Update channel list >1401761196.736810: wlp2s0: State: DISCONNECTED -> SCANNING >1401761196.736941: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761196.736975: wlp2s0: Starting AP scan for wildcard SSID >1401761196.736990: WPS: Building WPS IE for Probe Request >1401761196.737004: WPS: * Version (hardcoded 0x10) >1401761196.737018: WPS: * Request Type >1401761196.737030: WPS: * Config Methods (108) >1401761196.737043: WPS: * UUID-E >1401761196.737056: WPS: * Primary Device Type >1401761196.737069: WPS: * RF Bands (3) >1401761196.737082: WPS: * Association State >1401761196.737095: WPS: * Configuration Error (0) >1401761196.737107: WPS: * Device Password ID (0) >1401761196.737121: WPS: * Device Name >1401761196.737138: P2P: * P2P IE header >1401761196.737152: P2P: * Capability dev=25 group=00 >1401761196.737166: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761196.737222: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761196.737249: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761196.737265: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761196.737378: Scan requested (ret=0) - scan timeout 30 seconds >1401761196.737409: nl80211: Event message available >1401761196.737431: nl80211: Scan trigger >1401761196.742159: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761196.811321: EAPOL: Supplicant port status: Unauthorized >1401761197.812497: EAPOL: Supplicant port status: Unauthorized >1401761198.407074: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761198.407124: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761198.407200: nl80211: if_removed already cleared - ignore event >1401761198.407220: nl80211: Event message available >1401761198.407253: nl80211: New scan results available >1401761198.407276: wlp2s0: Event SCAN_RESULTS (3) received >1401761198.407426: nl80211: Received scan results (5 BSSes) >1401761198.407549: wlp2s0: BSS: Start scan result update 10 >1401761198.407613: BSS: last_scan_res_used=5/32 last_scan_full=0 >1401761198.407635: wlp2s0: New scan results available >1401761198.407709: WPS: AP 20:e5:2a:08:16:29 type 0 added >1401761198.407735: WPS: AP[0] 20:e5:2a:08:16:29 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 >1401761198.407778: wlp2s0: Selecting BSS from priority group 0 >1401761198.407804: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-50 >1401761198.407823: wlp2s0: skip - SSID mismatch >1401761198.407843: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-43 >1401761198.407861: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761198.407884: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-38 >1401761198.407904: wlp2s0: skip - SSID mismatch >1401761198.407923: wlp2s0: 3: 20:e5:2a:08:16:29 ssid='NETGEAR22' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-72 wps >1401761198.407939: wlp2s0: skip - SSID mismatch >1401761198.407957: wlp2s0: 4: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-68 >1401761198.407972: wlp2s0: skip - SSID mismatch >1401761198.407987: wlp2s0: No APs found - clear blacklist and try again >1401761198.408001: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761198.408018: wlp2s0: Selecting BSS from priority group 0 >1401761198.408035: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-50 >1401761198.408050: wlp2s0: skip - SSID mismatch >1401761198.408067: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-43 >1401761198.408084: wlp2s0: selected based on RSN IE >1401761198.408101: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761198.408121: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761198.408138: wlp2s0: Automatic auth_alg selection: 0x1 >1401761198.408152: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761198.408166: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761198.408180: RSN: No PMKSA cache entry found >1401761198.408194: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761198.408210: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761198.408225: wlp2s0: WPA: clearing AP WPA IE >1401761198.408238: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761198.408260: wlp2s0: WPA: using GTK CCMP >1401761198.408274: wlp2s0: WPA: using PTK CCMP >1401761198.408289: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761198.408303: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761198.408325: wlp2s0: Cancelling scan request >1401761198.408342: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761198.408357: wlp2s0: No keys have been configured - skip key clearing >1401761198.408372: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761198.408442: EAPOL: External notification - EAP success=0 >1401761198.408466: EAPOL: Supplicant port status: Unauthorized >1401761198.408570: EAPOL: External notification - EAP fail=0 >1401761198.408594: EAPOL: Supplicant port status: Unauthorized >1401761198.408650: EAPOL: External notification - portControl=Auto >1401761198.408667: EAPOL: Supplicant port status: Unauthorized >1401761198.408727: nl80211: Authenticate (ifindex=3) >1401761198.408746: * bssid=40:16:7e:59:a7:40 >1401761198.408783: * freq=2412 >1401761198.408799: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761198.408825: * IEs - hexdump(len=0): [NULL] >1401761198.408838: * Auth Type 0 >1401761198.413238: nl80211: Authentication request send successfully >1401761198.413274: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761198.413356: nl80211: Event message available >1401761198.413375: nl80211: New station 40:16:7e:59:a7:40 >1401761198.413389: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761198.413434: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761198.413482: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761198.413532: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761198.813075: EAPOL: Supplicant port status: Unauthorized >1401761199.418084: nl80211: Event message available >1401761199.418154: nl80211: MLME event 37 >1401761199.418170: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 70 a9 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761199.418195: nl80211: Authenticate event >1401761199.418213: wlp2s0: Event AUTH (11) received >1401761199.418233: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761199.418247: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761199.418269: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761199.418285: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761199.418299: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761199.418313: netlink: Operstate: linkmode=-1, operstate=5 >1401761199.418422: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761199.418450: nl80211: Associate (ifindex=3) >1401761199.418470: * bssid=40:16:7e:59:a7:40 >1401761199.418488: * freq=2412 >1401761199.418504: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761199.418533: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761199.418557: * pairwise=0xfac04 >1401761199.418572: * group=0xfac04 >1401761199.432325: nl80211: Association request send successfully >1401761199.432386: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761199.432509: nl80211: Event message available >1401761199.432535: nl80211: Delete station 40:16:7e:59:a7:40 >1401761199.432558: nl80211: Event message available >1401761199.432576: nl80211: New station 40:16:7e:59:a7:40 >1401761199.813644: EAPOL: Supplicant port status: Unauthorized >1401761200.814824: EAPOL: Supplicant port status: Unauthorized >1401761201.436938: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761201.436979: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.437027: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761201.437058: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761201.437072: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 07 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.437118: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761201.437143: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761201.437158: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 97 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.437216: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761201.437246: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761201.437261: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.437304: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761201.440015: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761201.440034: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761201.440082: nl80211: if_removed already cleared - ignore event >1401761201.440092: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761201.440100: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761201.440118: nl80211: if_removed already cleared - ignore event >1401761201.440126: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761201.440134: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761201.440151: nl80211: if_removed already cleared - ignore event >1401761201.440163: nl80211: Event message available >1401761201.440181: nl80211: MLME event 38 >1401761201.440188: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 a0 aa 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761201.440213: nl80211: Associate event >1401761201.440221: wlp2s0: Event ASSOC (0) received >1401761201.440229: wlp2s0: Association info event >1401761201.440236: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761201.440256: wlp2s0: freq=2412 MHz >1401761201.440264: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761201.440271: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761201.440278: netlink: Operstate: linkmode=-1, operstate=5 >1401761201.440341: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761201.440353: wlp2s0: No keys have been configured - skip key clearing >1401761201.440362: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761201.440370: wlp2s0: WPA: Association event - clear replay counter >1401761201.440377: wlp2s0: WPA: Clear old PTK >1401761201.440384: EAPOL: External notification - portEnabled=0 >1401761201.440391: EAPOL: Supplicant port status: Unauthorized >1401761201.440428: EAPOL: External notification - portValid=0 >1401761201.440436: EAPOL: Supplicant port status: Unauthorized >1401761201.440461: EAPOL: External notification - EAP success=0 >1401761201.440468: EAPOL: Supplicant port status: Unauthorized >1401761201.440492: EAPOL: External notification - portEnabled=1 >1401761201.440500: EAPOL: SUPP_PAE entering state CONNECTING >1401761201.440506: EAPOL: SUPP_BE entering state IDLE >1401761201.440514: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761201.440529: wlp2s0: Cancelling scan request >1401761201.440537: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761201.440545: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761201.440552: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.440573: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761201.440582: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761201.440589: wlp2s0: EAPOL-Key type=2 >1401761201.440597: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761201.440605: wlp2s0: key_length=16 key_data_length=22 >1401761201.440611: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08 >1401761201.440619: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 >1401761201.440629: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761201.440637: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761201.440644: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761201.440651: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761201.440660: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 08 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.440682: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761201.440709: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761201.440717: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.440727: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.440736: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761201.440744: wlp2s0: RSN: no matching PMKID found >1401761201.440751: Get randomness: len=32 entropy=6 >1401761201.441109: WPA: Renewed SNonce - hexdump(len=32): 18 00 c8 61 94 51 78 ca 61 82 7d 92 2f b7 2d 4e ff 89 ca ab 78 5c d1 c5 9a af 59 81 1a b5 13 7a >1401761201.441130: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761201.441138: WPA: Nonce1 - hexdump(len=32): 18 00 c8 61 94 51 78 ca 61 82 7d 92 2f b7 2d 4e ff 89 ca ab 78 5c d1 c5 9a af 59 81 1a b5 13 7a >1401761201.441149: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 >1401761201.441159: WPA: PMK - hexdump(len=32): [REMOVED] >1401761201.441166: WPA: PTK - hexdump(len=48): [REMOVED] >1401761201.441172: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761201.441182: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 08 >1401761201.441191: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761201.441201: WPA: KCK - hexdump(len=16): [REMOVED] >1401761201.441208: WPA: Derived Key MIC - hexdump(len=16): 82 44 3a 8e 6d 40 8b e0 8a 34 56 d4 68 3c 0b 75 >1401761201.441217: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 08 18 00 c8 61 94 51 78 ca 61 82 7d 92 2f b7 2d 4e ff 89 ca ab 78 5c d1 c5 9a af 59 81 1a b5 13 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 82 44 3a 8e 6d 40 8b e0 8a 34 56 d4 68 3c 0b 75 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761201.441262: nl80211: Event message available >1401761201.441275: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761201.445412: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761201.815416: EAPOL: startWhen --> 0 >1401761201.815492: EAPOL: disable timer tick >1401761201.815509: EAPOL: SUPP_PAE entering state CONNECTING >1401761201.815522: EAPOL: enable timer tick >1401761201.815537: EAPOL: txStart >1401761201.815551: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761202.443265: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761202.443308: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 99 aa 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 4d 62 cb 17 cd 85 b9 12 3e 43 b3 b1 3e b7 ac 00 38 bd ce 5c ee ad e3 34 b1 ae da 5d ff 78 ec 57 8a 89 eb ff 79 7c e6 97 40 59 c9 d7 7b 01 dd cc 33 56 f8 d5 ea 90 63 bf ac de 83 0f dc 03 d8 c9 d9 2f 74 46 76 18 a4 7f c4 >1401761202.443364: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761202.443380: wlp2s0: EAPOL-Key type=2 >1401761202.443398: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761202.443414: wlp2s0: key_length=16 key_data_length=56 >1401761202.443428: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09 >1401761202.443445: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 >1401761202.443466: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 99 >1401761202.443483: key_rsc - hexdump(len=8): aa 08 00 00 00 00 00 00 >1401761202.443499: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761202.443516: key_mic - hexdump(len=16): 16 4d 62 cb 17 cd 85 b9 12 3e 43 b3 b1 3e b7 ac >1401761202.443536: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 98 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 99 aa 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 4d 62 cb 17 cd 85 b9 12 3e 43 b3 b1 3e b7 ac 00 38 bd ce 5c ee ad e3 34 b1 ae da 5d ff 78 ec 57 8a 89 eb ff 79 7c e6 97 40 59 c9 d7 7b 01 dd cc 33 56 f8 d5 ea 90 63 bf ac de 83 0f dc 03 d8 c9 d9 2f 74 46 76 18 a4 7f c4 >1401761202.443600: RSN: encrypted key data - hexdump(len=56): bd ce 5c ee ad e3 34 b1 ae da 5d ff 78 ec 57 8a 89 eb ff 79 7c e6 97 40 59 c9 d7 7b 01 dd cc 33 56 f8 d5 ea 90 63 bf ac de 83 0f dc 03 d8 c9 d9 2f 74 46 76 18 a4 7f c4 >1401761202.443638: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761202.443657: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761202.443674: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761202.443688: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761202.443713: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761202.443732: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761202.443749: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761202.443802: WPA: KCK - hexdump(len=16): [REMOVED] >1401761202.443819: WPA: Derived Key MIC - hexdump(len=16): c9 11 99 86 04 b6 34 13 e9 b7 96 96 83 52 e6 46 >1401761202.443836: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c9 11 99 86 04 b6 34 13 e9 b7 96 96 83 52 e6 46 00 00 >1401761202.443886: wlp2s0: WPA: Installing PTK to the driver >1401761202.443962: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761202.444005: addr=40:16:7e:59:a7:40 >1401761202.446339: EAPOL: External notification - portValid=1 >1401761202.446376: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761202.446467: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761202.446492: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761202.446512: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761202.446530: WPA: RSC - hexdump(len=6): aa 08 00 00 00 00 >1401761202.446598: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761202.446625: broadcast key >1401761202.446726: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761202.446748: wlp2s0: Cancelling authentication timeout >1401761202.446779: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761202.446797: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761202.446812: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761202.446827: netlink: Operstate: linkmode=-1, operstate=6 >1401761202.446964: EAPOL: External notification - portValid=1 >1401761202.446992: EAPOL: External notification - EAP success=1 >1401761202.447009: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761202.447024: EAPOL: SUPP_BE entering state SUCCESS >1401761202.447040: EAP: EAP entering state DISABLED >1401761202.447053: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761202.447066: EAPOL: Supplicant port status: Authorized >1401761202.447158: EAPOL: SUPP_BE entering state IDLE >1401761202.447179: EAPOL authentication completed successfully >1401761202.447230: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761202.447248: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761202.447291: nl80211: if_removed already cleared - ignore event >1401761202.451676: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761205.119054: nl80211: Event message available >1401761205.620262: RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >1401761205.620313: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761205.620530: nl80211: if_removed already cleared - ignore event >1401761205.625006: nl80211: Event message available >1401761205.625073: nl80211: Delete station 40:16:7e:59:a7:40 >1401761205.628250: nl80211: Event message available >1401761205.628290: nl80211: MLME event 39 >1401761205.628307: nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 40 16 7e 59 a7 40 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 00 00 04 00 >1401761205.628329: nl80211: Deauthenticate event >1401761205.628349: wlp2s0: Event DEAUTH (12) received >1401761205.628365: wlp2s0: Deauthentication notification >1401761205.628381: wlp2s0: * reason 4 (locally generated) >1401761205.628397: wlp2s0: * address 40:16:7e:59:a7:40 >1401761205.628410: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761205.628428: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=4 locally_generated=1 >1401761205.628444: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761205.628460: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761205.628475: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761205.628494: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761205.628509: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761205.628645: wlp2s0: Disconnect event - remove keys >1401761205.628726: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761205.635089: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761205.635215: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761205.635296: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761205.635372: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761205.635416: addr=40:16:7e:59:a7:40 >1401761205.635463: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761205.635483: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761205.635501: netlink: Operstate: linkmode=-1, operstate=5 >1401761205.635613: EAPOL: External notification - portEnabled=0 >1401761205.635643: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761205.635661: EAPOL: Supplicant port status: Unauthorized >1401761205.635779: EAPOL: SUPP_BE entering state INITIALIZE >1401761205.635811: EAPOL: Supplicant port status: Unauthorized >1401761205.635891: EAPOL: External notification - portValid=0 >1401761205.635914: EAPOL: Supplicant port status: Unauthorized >1401761205.635976: EAPOL: External notification - EAP success=0 >1401761205.635995: EAPOL: Supplicant port status: Unauthorized >1401761205.636069: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761205.636091: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761205.636138: nl80211: if_removed already cleared - ignore event >1401761205.636160: nl80211: Event message available >1401761205.636185: nl80211: Ignore disconnect event when using userspace SME >1401761205.639645: nl80211: Event message available >1401761205.639710: nl80211: Regulatory domain change >1401761205.639733: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761205.639929: nl80211: Regulatory information - country=00 >1401761205.639954: nl80211: 2402-2472 @ 40 MHz >1401761205.639972: nl80211: 2457-2482 @ 40 MHz >1401761205.639989: nl80211: 2474-2494 @ 20 MHz >1401761205.640005: nl80211: 5170-5250 @ 80 MHz >1401761205.640022: nl80211: 5735-5835 @ 80 MHz >1401761205.640040: nl80211: 57240-63720 @ 2160 MHz >1401761205.640073: nl80211: Added 802.11b mode based on 802.11g information >1401761205.640092: P2P: Add operating class 81 >1401761205.640108: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d >1401761205.640128: P2P: Add operating class 115 >1401761205.640143: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761205.640160: P2P: Add operating class 124 >1401761205.640176: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761205.640192: P2P: Add operating class 116 >1401761205.640206: P2P: Channels - hexdump(len=2): 24 2c >1401761205.640223: P2P: Add operating class 117 >1401761205.640239: P2P: Channels - hexdump(len=2): 28 30 >1401761205.640255: P2P: Add operating class 126 >1401761205.640270: P2P: Channels - hexdump(len=2): 95 9d >1401761205.640286: P2P: Add operating class 127 >1401761205.640301: P2P: Channels - hexdump(len=2): 99 a1 >1401761205.640319: wlp2s0: P2P: Update channel list >1401761205.640680: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761205.642608: nl80211: Event message available >1401761205.642679: nl80211: Regulatory domain change >1401761205.642700: wlp2s0: Event CHANNEL_LIST_CHANGED (31) received >1401761205.642888: nl80211: Regulatory information - country=US >1401761205.642915: nl80211: 2402-2472 @ 40 MHz >1401761205.642932: nl80211: 5170-5250 @ 80 MHz >1401761205.642951: nl80211: 5250-5330 @ 80 MHz >1401761205.642969: nl80211: 5735-5835 @ 80 MHz >1401761205.642987: nl80211: 57240-63720 @ 2160 MHz >1401761205.643017: nl80211: Added 802.11b mode based on 802.11g information >1401761205.643036: P2P: Add operating class 81 >1401761205.643054: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761205.643074: P2P: Add operating class 115 >1401761205.643089: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761205.643106: P2P: Add operating class 124 >1401761205.643121: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761205.643138: P2P: Add operating class 116 >1401761205.643152: P2P: Channels - hexdump(len=2): 24 2c >1401761205.643168: P2P: Add operating class 117 >1401761205.643182: P2P: Channels - hexdump(len=2): 28 30 >1401761205.643198: P2P: Add operating class 126 >1401761205.643212: P2P: Channels - hexdump(len=2): 95 9d >1401761205.643227: P2P: Add operating class 127 >1401761205.643242: P2P: Channels - hexdump(len=2): 99 a1 >1401761205.643260: wlp2s0: P2P: Update channel list >1401761205.728799: wlp2s0: State: DISCONNECTED -> SCANNING >1401761205.728930: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761205.728963: wlp2s0: Starting AP scan for wildcard SSID >1401761205.728978: WPS: Building WPS IE for Probe Request >1401761205.728992: WPS: * Version (hardcoded 0x10) >1401761205.729006: WPS: * Request Type >1401761205.729018: WPS: * Config Methods (108) >1401761205.729031: WPS: * UUID-E >1401761205.729044: WPS: * Primary Device Type >1401761205.729057: WPS: * RF Bands (3) >1401761205.729070: WPS: * Association State >1401761205.729083: WPS: * Configuration Error (0) >1401761205.729096: WPS: * Device Password ID (0) >1401761205.729109: WPS: * Device Name >1401761205.729125: P2P: * P2P IE header >1401761205.729138: P2P: * Capability dev=25 group=00 >1401761205.729152: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761205.729203: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761205.729230: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761205.729246: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761205.729354: Scan requested (ret=0) - scan timeout 30 seconds >1401761205.729386: nl80211: Event message available >1401761205.729408: nl80211: Scan trigger >1401761205.734146: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761205.818239: EAPOL: Supplicant port status: Unauthorized >1401761206.819468: EAPOL: Supplicant port status: Unauthorized >1401761207.400073: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761207.400124: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761207.400204: nl80211: if_removed already cleared - ignore event >1401761207.400232: nl80211: Event message available >1401761207.400262: nl80211: New scan results available >1401761207.400290: wlp2s0: Event SCAN_RESULTS (3) received >1401761207.400436: nl80211: Received scan results (5 BSSes) >1401761207.400550: wlp2s0: BSS: Start scan result update 11 >1401761207.400598: BSS: last_scan_res_used=5/32 last_scan_full=0 >1401761207.400619: wlp2s0: New scan results available >1401761207.400679: WPS: AP 20:e5:2a:08:16:29 type 0 added >1401761207.400699: WPS: AP[0] 20:e5:2a:08:16:29 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 >1401761207.400720: wlp2s0: Selecting BSS from priority group 0 >1401761207.400740: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48 >1401761207.400756: wlp2s0: skip - SSID mismatch >1401761207.400811: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 >1401761207.400830: wlp2s0: skip - blacklisted (count=1 limit=0) >1401761207.400848: wlp2s0: 2: 28:92:4a:c2:21:81 ssid='HP-Print-81-Officejet Pro 8600' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-58 >1401761207.400864: wlp2s0: skip - SSID mismatch >1401761207.400882: wlp2s0: 3: 20:e5:2a:08:16:29 ssid='NETGEAR22' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-71 wps >1401761207.400898: wlp2s0: skip - SSID mismatch >1401761207.400915: wlp2s0: 4: 00:26:62:e5:b3:e0 ssid='notwired-bu' wpa_ie_len=0 rsn_ie_len=0 caps=0x431 level=-69 >1401761207.400930: wlp2s0: skip - SSID mismatch >1401761207.400944: wlp2s0: No APs found - clear blacklist and try again >1401761207.400958: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761207.400976: wlp2s0: Selecting BSS from priority group 0 >1401761207.400993: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48 >1401761207.401008: wlp2s0: skip - SSID mismatch >1401761207.401025: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-48 >1401761207.401056: wlp2s0: selected based on RSN IE >1401761207.401076: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761207.401099: wlp2s0: Request association: reassociate: 0 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761207.401119: wlp2s0: Automatic auth_alg selection: 0x1 >1401761207.401137: RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 >1401761207.401155: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761207.401172: RSN: No PMKSA cache entry found >1401761207.401190: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761207.401209: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761207.401227: wlp2s0: WPA: clearing AP WPA IE >1401761207.401244: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761207.401272: wlp2s0: WPA: using GTK CCMP >1401761207.401288: wlp2s0: WPA: using PTK CCMP >1401761207.401305: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761207.401322: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761207.401345: wlp2s0: Cancelling scan request >1401761207.401363: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761207.401378: wlp2s0: No keys have been configured - skip key clearing >1401761207.401393: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761207.401466: EAPOL: External notification - EAP success=0 >1401761207.401487: EAPOL: Supplicant port status: Unauthorized >1401761207.401590: EAPOL: External notification - EAP fail=0 >1401761207.401609: EAPOL: Supplicant port status: Unauthorized >1401761207.401659: EAPOL: External notification - portControl=Auto >1401761207.401674: EAPOL: Supplicant port status: Unauthorized >1401761207.401728: nl80211: Authenticate (ifindex=3) >1401761207.401745: * bssid=40:16:7e:59:a7:40 >1401761207.401774: * freq=2412 >1401761207.401791: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761207.401816: * IEs - hexdump(len=0): [NULL] >1401761207.401830: * Auth Type 0 >1401761207.406319: nl80211: Authentication request send successfully >1401761207.406363: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761207.406485: nl80211: Event message available >1401761207.406509: nl80211: New station 40:16:7e:59:a7:40 >1401761207.406530: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0 >1401761207.406604: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1 >1401761207.406675: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2 >1401761207.406747: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4 >1401761207.406858: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3 >1401761207.820097: EAPOL: Supplicant port status: Unauthorized >1401761208.410217: nl80211: Event message available >1401761208.410285: nl80211: MLME event 37 >1401761208.410301: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 50 b2 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761208.410325: nl80211: Authenticate event >1401761208.410343: wlp2s0: Event AUTH (11) received >1401761208.410362: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761208.410376: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761208.410397: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761208.410413: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761208.410442: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761208.410459: netlink: Operstate: linkmode=-1, operstate=5 >1401761208.410563: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761208.410599: nl80211: Associate (ifindex=3) >1401761208.410620: * bssid=40:16:7e:59:a7:40 >1401761208.410638: * freq=2412 >1401761208.410655: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761208.410680: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761208.410700: * pairwise=0xfac04 >1401761208.410713: * group=0xfac04 >1401761208.424266: nl80211: Association request send successfully >1401761208.424327: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761208.424451: nl80211: Event message available >1401761208.424479: nl80211: Delete station 40:16:7e:59:a7:40 >1401761208.424505: nl80211: Event message available >1401761208.424526: nl80211: New station 40:16:7e:59:a7:40 >1401761208.820670: EAPOL: Supplicant port status: Unauthorized >1401761209.821914: EAPOL: Supplicant port status: Unauthorized >1401761210.429187: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761210.429230: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.429278: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761210.429307: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761210.429322: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.429366: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761210.429390: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761210.429405: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.429448: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761210.432269: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761210.432320: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761210.432396: nl80211: if_removed already cleared - ignore event >1401761210.432416: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761210.432432: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761210.432469: nl80211: if_removed already cleared - ignore event >1401761210.432485: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761210.432500: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761210.432535: nl80211: if_removed already cleared - ignore event >1401761210.432551: nl80211: Event message available >1401761210.432582: nl80211: MLME event 38 >1401761210.432598: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 30 b3 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761210.432663: nl80211: Associate event >1401761210.432682: wlp2s0: Event ASSOC (0) received >1401761210.432699: wlp2s0: Association info event >1401761210.432713: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761210.432755: wlp2s0: freq=2412 MHz >1401761210.432811: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761210.432827: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761210.432845: netlink: Operstate: linkmode=-1, operstate=5 >1401761210.432963: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761210.432996: wlp2s0: No keys have been configured - skip key clearing >1401761210.433019: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761210.433039: wlp2s0: WPA: Association event - clear replay counter >1401761210.433057: wlp2s0: WPA: Clear old PTK >1401761210.433074: EAPOL: External notification - portEnabled=0 >1401761210.433088: EAPOL: Supplicant port status: Unauthorized >1401761210.433188: EAPOL: External notification - portValid=0 >1401761210.433209: EAPOL: Supplicant port status: Unauthorized >1401761210.433278: EAPOL: External notification - EAP success=0 >1401761210.433299: EAPOL: Supplicant port status: Unauthorized >1401761210.433352: EAPOL: External notification - portEnabled=1 >1401761210.433368: EAPOL: SUPP_PAE entering state CONNECTING >1401761210.433381: EAPOL: SUPP_BE entering state IDLE >1401761210.433398: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761210.433414: wlp2s0: Cancelling scan request >1401761210.433430: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761210.433446: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761210.433460: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.433503: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761210.433520: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761210.433535: wlp2s0: EAPOL-Key type=2 >1401761210.433552: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761210.433567: wlp2s0: key_length=16 key_data_length=22 >1401761210.433580: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09 >1401761210.433595: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b >1401761210.433615: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761210.433632: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761210.433647: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761210.433662: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761210.433679: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 09 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.433725: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761210.433818: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761210.433841: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.433879: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.433902: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761210.433923: wlp2s0: RSN: no matching PMKID found >1401761210.433938: Get randomness: len=32 entropy=6 >1401761210.434622: WPA: Renewed SNonce - hexdump(len=32): a7 71 d4 63 a6 e0 42 d9 c6 35 04 9e c2 60 3f e4 25 74 30 00 5c 3c 7f 25 14 1c db 85 7c 36 14 31 >1401761210.434664: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761210.434680: WPA: Nonce1 - hexdump(len=32): a7 71 d4 63 a6 e0 42 d9 c6 35 04 9e c2 60 3f e4 25 74 30 00 5c 3c 7f 25 14 1c db 85 7c 36 14 31 >1401761210.434700: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b >1401761210.434721: WPA: PMK - hexdump(len=32): [REMOVED] >1401761210.434735: WPA: PTK - hexdump(len=48): [REMOVED] >1401761210.434748: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761210.434792: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 09 >1401761210.434811: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761210.434831: WPA: KCK - hexdump(len=16): [REMOVED] >1401761210.434846: WPA: Derived Key MIC - hexdump(len=16): ef 53 6e ee c8 61 62 db 2b 18 7b 78 2d b6 0b 53 >1401761210.434862: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 09 a7 71 d4 63 a6 e0 42 d9 c6 35 04 9e c2 60 3f e4 25 74 30 00 5c 3c 7f 25 14 1c db 85 7c 36 14 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ef 53 6e ee c8 61 62 db 2b 18 7b 78 2d b6 0b 53 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761210.434954: nl80211: Event message available >1401761210.434983: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761210.438164: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761210.822478: EAPOL: startWhen --> 0 >1401761210.822524: EAPOL: disable timer tick >1401761210.822538: EAPOL: SUPP_PAE entering state CONNECTING >1401761210.822550: EAPOL: enable timer tick >1401761210.822565: EAPOL: txStart >1401761210.822578: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >1401761211.435263: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761211.435308: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 0a 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c ce 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 7a 86 1e ef 2c fb 10 f6 da 9c 37 0f bb f8 be 00 38 d9 98 a1 f1 f3 08 8e 64 9f e3 7e 7a b3 0c df ab 52 66 1b 0a 01 ff 1a 3d e4 b0 72 79 29 08 f3 14 76 b1 53 ea 20 c9 21 31 9a 07 33 21 2f 5a 61 a8 54 e1 32 21 45 c6 9b af >1401761211.435361: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761211.435377: wlp2s0: EAPOL-Key type=2 >1401761211.435394: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761211.435409: wlp2s0: key_length=16 key_data_length=56 >1401761211.435422: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a >1401761211.435438: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b >1401761211.435458: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c >1401761211.435475: key_rsc - hexdump(len=8): ce 08 00 00 00 00 00 00 >1401761211.435490: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761211.435505: key_mic - hexdump(len=16): f0 7a 86 1e ef 2c fb 10 f6 da 9c 37 0f bb f8 be >1401761211.435524: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 0a 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c ce 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 7a 86 1e ef 2c fb 10 f6 da 9c 37 0f bb f8 be 00 38 d9 98 a1 f1 f3 08 8e 64 9f e3 7e 7a b3 0c df ab 52 66 1b 0a 01 ff 1a 3d e4 b0 72 79 29 08 f3 14 76 b1 53 ea 20 c9 21 31 9a 07 33 21 2f 5a 61 a8 54 e1 32 21 45 c6 9b af >1401761211.435602: RSN: encrypted key data - hexdump(len=56): d9 98 a1 f1 f3 08 8e 64 9f e3 7e 7a b3 0c df ab 52 66 1b 0a 01 ff 1a 3d e4 b0 72 79 29 08 f3 14 76 b1 53 ea 20 c9 21 31 9a 07 33 21 2f 5a 61 a8 54 e1 32 21 45 c6 9b af >1401761211.435640: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761211.435658: wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >1401761211.435675: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761211.435689: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761211.435714: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761211.435733: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761211.435749: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761211.435791: WPA: KCK - hexdump(len=16): [REMOVED] >1401761211.435805: WPA: Derived Key MIC - hexdump(len=16): 38 24 84 fd b8 41 f1 0d 9c ad 68 f5 84 38 59 17 >1401761211.435822: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 24 84 fd b8 41 f1 0d 9c ad 68 f5 84 38 59 17 00 00 >1401761211.435874: wlp2s0: WPA: Installing PTK to the driver >1401761211.435946: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761211.435973: addr=40:16:7e:59:a7:40 >1401761211.438485: EAPOL: External notification - portValid=1 >1401761211.438537: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761211.438626: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761211.438647: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761211.438664: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761211.438678: WPA: RSC - hexdump(len=6): ce 08 00 00 00 00 >1401761211.438751: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761211.438802: broadcast key >1401761211.438905: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761211.438925: wlp2s0: Cancelling authentication timeout >1401761211.438942: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761211.438959: wlp2s0: CTRL-EVENT-CONNECTED - Connection to 40:16:7e:59:a7:40 completed [id=0 id_str=] >1401761211.438973: wpa_driver_nl80211_set_operstate: operstate 0->1 (UP) >1401761211.438987: netlink: Operstate: linkmode=-1, operstate=6 >1401761211.439115: EAPOL: External notification - portValid=1 >1401761211.439142: EAPOL: External notification - EAP success=1 >1401761211.439156: EAPOL: SUPP_PAE entering state AUTHENTICATING >1401761211.439169: EAPOL: SUPP_BE entering state SUCCESS >1401761211.439182: EAP: EAP entering state DISABLED >1401761211.439195: EAPOL: SUPP_PAE entering state AUTHENTICATED >1401761211.439208: EAPOL: Supplicant port status: Authorized >1401761211.439297: EAPOL: SUPP_BE entering state IDLE >1401761211.439316: EAPOL authentication completed successfully >1401761211.439366: RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >1401761211.439384: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761211.439427: nl80211: if_removed already cleared - ignore event >1401761211.443701: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761212.439284: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761212.439328: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 0b 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c d5 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 d3 6d dd 87 81 6d 6d 09 30 b1 f8 4b 72 cf 6a 00 38 d9 98 a1 f1 f3 08 8e 64 9f e3 7e 7a b3 0c df ab 52 66 1b 0a 01 ff 1a 3d e4 b0 72 79 29 08 f3 14 76 b1 53 ea 20 c9 21 31 9a 07 33 21 2f 5a 61 a8 54 e1 32 21 45 c6 9b af >1401761212.439397: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151 >1401761212.439413: wlp2s0: EAPOL-Key type=2 >1401761212.439431: wlp2s0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) >1401761212.439446: wlp2s0: key_length=16 key_data_length=56 >1401761212.439460: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b >1401761212.439476: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b >1401761212.439497: key_iv - hexdump(len=16): 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c >1401761212.439513: key_rsc - hexdump(len=8): d5 08 00 00 00 00 00 00 >1401761212.439529: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761212.439544: key_mic - hexdump(len=16): 81 d3 6d dd 87 81 6d 6d 09 30 b1 f8 4b 72 cf 6a >1401761212.439563: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 0b 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9b 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c d5 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 d3 6d dd 87 81 6d 6d 09 30 b1 f8 4b 72 cf 6a 00 38 d9 98 a1 f1 f3 08 8e 64 9f e3 7e 7a b3 0c df ab 52 66 1b 0a 01 ff 1a 3d e4 b0 72 79 29 08 f3 14 76 b1 53 ea 20 c9 21 31 9a 07 33 21 2f 5a 61 a8 54 e1 32 21 45 c6 9b af >1401761212.439628: RSN: encrypted key data - hexdump(len=56): d9 98 a1 f1 f3 08 8e 64 9f e3 7e 7a b3 0c df ab 52 66 1b 0a 01 ff 1a 3d e4 b0 72 79 29 08 f3 14 76 b1 53 ea 20 c9 21 31 9a 07 33 21 2f 5a 61 a8 54 e1 32 21 45 c6 9b af >1401761212.439665: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] >1401761212.439683: wlp2s0: State: COMPLETED -> 4WAY_HANDSHAKE >1401761212.439792: wlp2s0: WPA: RX message 3 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761212.439810: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a5 37 ae 6b 9f 6f bb b9 aa 94 f0 18 1d 6b d1 ef dd 00 >1401761212.439839: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761212.439862: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] >1401761212.439881: wlp2s0: WPA: Sending EAPOL-Key 4/4 >1401761212.439902: WPA: KCK - hexdump(len=16): [REMOVED] >1401761212.439917: WPA: Derived Key MIC - hexdump(len=16): 21 2f f4 d4 34 66 92 35 30 4c 37 7e 46 73 a0 6b >1401761212.439934: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 2f f4 d4 34 66 92 35 30 4c 37 7e 46 73 a0 6b 00 00 >1401761212.439983: wlp2s0: WPA: Installing PTK to the driver >1401761212.440056: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd51bc92ce8 key_idx=0 set_tx=1 seq_len=6 key_len=16 >1401761212.440082: addr=40:16:7e:59:a7:40 >1401761212.442477: EAPOL: External notification - portValid=1 >1401761212.442529: wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >1401761212.442621: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] >1401761212.442647: WPA: Group Key - hexdump(len=16): [REMOVED] >1401761212.442666: wlp2s0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) >1401761212.442683: WPA: RSC - hexdump(len=6): d5 08 00 00 00 00 >1401761212.442776: wpa_driver_nl80211_set_key: ifindex=3 alg=3 addr=0x7fd519d3bcfe key_idx=2 set_tx=0 seq_len=6 key_len=16 >1401761212.442806: broadcast key >1401761212.443012: wlp2s0: WPA: Key negotiation completed with 40:16:7e:59:a7:40 [PTK=CCMP GTK=CCMP] >1401761212.443037: wlp2s0: Cancelling authentication timeout >1401761212.443055: wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED >1401761212.443132: EAPOL: External notification - portValid=1 >1401761212.443154: EAPOL: External notification - EAP success=1 >1401761212.443170: EAP: EAP entering state DISABLED >1401761212.444938: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/1 >1401761212.780710: nl80211: Ignore event for foreign ifindex 2 >1401761212.783332: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761212.783363: wlp2s0: Request to deauthenticate - bssid=40:16:7e:59:a7:40 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED >1401761212.783376: wpa_driver_nl80211_deauthenticate(addr=40:16:7e:59:a7:40 reason_code=3) >1401761213.186528: wlp2s0: Event DEAUTH (12) received >1401761213.186571: wlp2s0: Deauthentication notification >1401761213.186587: wlp2s0: * reason 3 (locally generated) >1401761213.186601: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761213.186619: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=3 locally_generated=1 >1401761213.186635: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=9) >1401761213.186652: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761213.186668: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761213.186686: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761213.186702: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761213.187044: wlp2s0: Disconnect event - remove keys >1401761213.187296: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761213.191133: nl80211: set_key failed; err=-100 Network is down) >1401761213.191202: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761213.191248: nl80211: set_key failed; err=-100 Network is down) >1401761213.191282: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761213.191321: nl80211: set_key failed; err=-100 Network is down) >1401761213.191346: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761213.191367: nl80211: set_key failed; err=-100 Network is down) >1401761213.191389: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bc919f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761213.191400: addr=40:16:7e:59:a7:40 >1401761213.191417: nl80211: set_key failed; err=-100 Network is down) >1401761213.191430: wlp2s0: State: COMPLETED -> DISCONNECTED >1401761213.191440: wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT) >1401761213.191449: netlink: Operstate: linkmode=-1, operstate=5 >1401761213.191519: EAPOL: External notification - portEnabled=0 >1401761213.191538: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761213.191546: EAPOL: Supplicant port status: Unauthorized >1401761213.191608: EAPOL: SUPP_BE entering state INITIALIZE >1401761213.191625: EAPOL: Supplicant port status: Unauthorized >1401761213.191667: EAPOL: External notification - portValid=0 >1401761213.191680: EAPOL: Supplicant port status: Unauthorized >1401761213.192845: EAPOL: External notification - EAP success=0 >1401761213.192869: EAPOL: Supplicant port status: Unauthorized >1401761213.192938: wlp2s0: No keys have been configured - skip key clearing >1401761213.192956: wlp2s0: State: DISCONNECTED -> DISCONNECTED >1401761213.192965: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761213.192973: netlink: Operstate: linkmode=-1, operstate=5 >1401761213.192987: EAPOL: External notification - portEnabled=0 >1401761213.192996: EAPOL: Supplicant port status: Unauthorized >1401761213.193042: EAPOL: External notification - portValid=0 >1401761213.193056: EAPOL: Supplicant port status: Unauthorized >1401761213.193188: dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761213.193225: dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/1/Networks/0' >1401761213.193287: EAPOL: Supplicant port status: Unauthorized >1401761213.193407: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/1) >1401761213.193468: dbus: fi.w1.wpa_supplicant1.RemoveInterface (/fi/w1/wpa_supplicant1) >1401761213.193484: wlp2s0: Removing interface wlp2s0 >1401761213.193494: wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED >1401761213.193502: wlp2s0: No keys have been configured - skip key clearing >1401761213.193510: wlp2s0: State: DISCONNECTED -> DISCONNECTED >1401761213.193518: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761213.193525: netlink: Operstate: linkmode=-1, operstate=5 >1401761213.193540: EAPOL: External notification - portEnabled=0 >1401761213.193550: EAPOL: Supplicant port status: Unauthorized >1401761213.198006: EAPOL: External notification - portValid=0 >1401761213.198028: EAPOL: Supplicant port status: Unauthorized >1401761213.198057: wlp2s0: No keys have been configured - skip key clearing >1401761213.206038: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761213.206119: wlp2s0: BSS: Remove id 0 BSSID 40:16:7e:59:a7:44 SSID 'WhoKnows-5Ghz' due to wpa_bss_flush >1401761213.206129: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/0' >1401761213.206173: wlp2s0: BSS: Remove id 1 BSSID 40:16:7e:59:a7:40 SSID 'WhoKnows' due to wpa_bss_flush >1401761213.206181: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/1' >1401761213.206203: wlp2s0: BSS: Remove id 2 BSSID 28:92:4a:c2:21:81 SSID 'HP-Print-81-Officejet Pro 8600' due to wpa_bss_flush >1401761213.206212: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/2' >1401761213.206232: wlp2s0: BSS: Remove id 4 BSSID 20:e5:2a:08:16:29 SSID 'NETGEAR22' due to wpa_bss_flush >1401761213.206241: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/4' >1401761213.206260: wlp2s0: BSS: Remove id 3 BSSID 00:26:62:e5:b3:e0 SSID 'notwired-bu' due to wpa_bss_flush >1401761213.206269: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/3' >1401761213.206287: wlp2s0: Cancelling scan request >1401761213.206295: wlp2s0: Cancelling authentication timeout >1401761213.206306: wlp2s0: P2P: Disable P2P since removing the management interface is being removed >1401761213.206318: wlp2s0: P2P: Stopping find >1401761213.206328: wlp2s0: P2P: Clear timeout (state=IDLE) >1401761213.206336: wlp2s0: P2P: State IDLE -> IDLE >1401761213.214795: netlink: Operstate: linkmode=0, operstate=6 >1401761213.214842: nl80211: Set mode ifindex 3 iftype 2 (STATION) >1401761213.214963: nl80211: Unsubscribe mgmt frames handle 0x7fd51bc8dec0 (mode change) >1401761213.214990: dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/1' >1401761213.215055: nl80211: Ignore event for foreign ifindex 3 >1401761213.215065: nl80211: Ignore event for foreign ifindex 3 >1401761213.215074: nl80211: Ignore event for foreign ifindex 3 >1401761213.215081: nl80211: Event message available >1401761213.215095: nl80211: Event message available >1401761213.215106: nl80211: Event message available >1401761213.215116: nl80211: Event message available >1401761213.215127: nl80211: Event message available >1401761213.236934: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1) >1401761213.337006: nl80211: Ignore event for foreign ifindex 2 >1401761213.348316: nl80211: Ignore event for foreign ifindex 3 >1401761213.349363: dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) >1401761213.349413: Initializing interface 'wlp2s0' conf 'N/A' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' >1401761213.349537: nl80211: interface wlp2s0 in phy phy0 >1401761213.349581: rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 >1401761213.349661: nl80211: Set mode ifindex 3 iftype 2 (STATION) >1401761213.349784: nl80211: Subscribe to mgmt frames with non-AP handle 0x7fd51bc8cf80 >1401761213.349824: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.349843: nl80211: Register frame match - hexdump(len=2): 04 0a >1401761213.349881: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.349900: nl80211: Register frame match - hexdump(len=2): 04 0b >1401761213.349933: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.349951: nl80211: Register frame match - hexdump(len=2): 04 0c >1401761213.349982: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.350000: nl80211: Register frame match - hexdump(len=2): 04 0d >1401761213.350031: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.350049: nl80211: Register frame match - hexdump(len=6): 04 09 50 6f 9a 09 >1401761213.350082: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.350100: nl80211: Register frame match - hexdump(len=5): 7f 50 6f 9a 09 >1401761213.350130: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.350149: nl80211: Register frame match - hexdump(len=1): 06 >1401761213.350179: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.350196: nl80211: Register frame match - hexdump(len=2): 0a 07 >1401761213.350227: nl80211: Register frame type=0xd0 nl_handle=0x7fd51bc8cf80 >1401761213.350245: nl80211: Register frame match - hexdump(len=2): 0a 11 >1401761213.350280: netlink: Operstate: linkmode=1, operstate=5 >1401761213.350383: nl80211: Using driver-based off-channel TX >1401761213.350403: nl80211: Use separate P2P group interface (driver advertised support) >1401761213.350419: nl80211: TDLS supported >1401761213.350435: nl80211: TDLS external setup >1401761213.350688: nl80211: driver param='(null)' >1401761213.350860: nl80211: Regulatory information - country=US >1401761213.350883: nl80211: 2402-2472 @ 40 MHz >1401761213.350901: nl80211: 5170-5250 @ 80 MHz >1401761213.350918: nl80211: 5250-5330 @ 80 MHz >1401761213.350936: nl80211: 5735-5835 @ 80 MHz >1401761213.350954: nl80211: 57240-63720 @ 2160 MHz >1401761213.350982: nl80211: Added 802.11b mode based on 802.11g information >1401761213.355867: wlp2s0: Own MAC address: c0:4a:00:28:7e:c1 >1401761213.355972: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761213.356069: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761213.356145: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761213.356222: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761213.356272: wlp2s0: RSN: flushing PMKID list in the driver >1401761213.356293: nl80211: Flush PMKIDs >1401761213.356372: wlp2s0: State: DISCONNECTED -> INACTIVE >1401761213.356403: WPS: Set UUID for interface wlp2s0 >1401761213.356431: WPS: UUID based on MAC address - hexdump(len=16): 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 >1401761213.359104: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761213.359135: EAPOL: Supplicant port status: Unauthorized >1401761213.359214: EAPOL: KEY_RX entering state NO_KEY_RECEIVE >1401761213.359225: EAPOL: SUPP_BE entering state INITIALIZE >1401761213.359235: EAP: EAP entering state DISABLED >1401761213.359243: EAPOL: Supplicant port status: Unauthorized >1401761213.359272: EAPOL: Supplicant port status: Unauthorized >1401761213.359635: P2P: Own listen channel: 11 >1401761213.359954: P2P: Random operating channel: 81:6 >1401761213.359965: P2P: Add operating class 81 >1401761213.359974: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b >1401761213.359984: P2P: Add operating class 115 >1401761213.359992: P2P: Channels - hexdump(len=4): 24 28 2c 30 >1401761213.360001: P2P: Add operating class 124 >1401761213.360009: P2P: Channels - hexdump(len=4): 95 99 9d a1 >1401761213.360018: P2P: Add operating class 116 >1401761213.360025: P2P: Channels - hexdump(len=2): 24 2c >1401761213.360033: P2P: Add operating class 117 >1401761213.360040: P2P: Channels - hexdump(len=2): 28 30 >1401761213.360047: P2P: Add operating class 126 >1401761213.360061: P2P: Channels - hexdump(len=2): 95 9d >1401761213.360069: P2P: Add operating class 127 >1401761213.360075: P2P: Channels - hexdump(len=2): 99 a1 >1401761213.360390: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/3' >1401761213.360483: wlp2s0: Added interface wlp2s0 >1401761213.360495: wlp2s0: State: INACTIVE -> DISCONNECTED >1401761213.360503: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761213.360512: netlink: Operstate: linkmode=-1, operstate=5 >1401761213.361110: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761213.361259: dbus: fi.w1.wpa_supplicant1.Interface.NetworkReply (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761213.361810: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761213.362114: dbus: fi.w1.wpa_supplicant1.Interface.Scan (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761213.362157: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761213.362222: Scan requested (ret=0) - scan timeout 10 seconds >1401761213.362316: nl80211: Event message available >1401761213.362334: nl80211: Scan trigger >1401761214.360512: EAPOL: disable timer tick >1401761214.360558: EAPOL: Supplicant port status: Unauthorized >1401761215.033139: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761215.033189: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761215.033267: nl80211: if_removed already cleared - ignore event >1401761215.033287: nl80211: Event message available >1401761215.033320: nl80211: New scan results available >1401761215.033344: wlp2s0: Event SCAN_RESULTS (3) received >1401761215.033489: nl80211: Received scan results (5 BSSes) >1401761215.033601: wlp2s0: BSS: Start scan result update 1 >1401761215.033622: wlp2s0: BSS: Add new id 0 BSSID 40:16:7e:59:a7:44 SSID 'WhoKnows-5Ghz' >1401761215.033639: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/0' >1401761215.033828: wlp2s0: BSS: Add new id 1 BSSID 28:92:4a:c2:21:81 SSID 'HP-Print-81-Officejet Pro 8600' >1401761215.033852: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/1' >1401761215.033968: wlp2s0: BSS: Add new id 2 BSSID 40:16:7e:59:a7:40 SSID 'WhoKnows' >1401761215.033987: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2' >1401761215.034112: wlp2s0: BSS: Add new id 3 BSSID 20:e5:2a:08:16:29 SSID 'NETGEAR22' >1401761215.034131: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/3' >1401761215.034271: wlp2s0: BSS: Add new id 4 BSSID 00:26:62:e5:b3:e0 SSID 'notwired-bu' >1401761215.034290: dbus: Register BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/4' >1401761215.034389: BSS: last_scan_res_used=5/32 last_scan_full=0 >1401761215.034411: wlp2s0: New scan results available >1401761215.034459: WPS: AP 20:e5:2a:08:16:29 type 0 added >1401761215.034477: WPS: AP[0] 20:e5:2a:08:16:29 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 >1401761215.034497: wlp2s0: No suitable network found >1401761215.034514: wlp2s0: Short-circuit new scan request since there are no enabled networks >1401761215.034530: wlp2s0: State: DISCONNECTED -> INACTIVE >1401761215.034577: wlp2s0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results >1401761215.038499: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3 >1401761215.043651: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761215.044825: dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761215.044863: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/3/Networks/0' >1401761215.044978: scan_ssid=1 (0x1) >1401761215.044993: proto: 0x3 >1401761215.045008: ssid - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761215.045028: BSSID - hexdump(len=6): 40 16 7e 59 a7 40 >1401761215.045040: key_mgmt: 0x2 >1401761215.045053: PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] >1401761215.056705: PSK (from passphrase) - hexdump(len=32): [REMOVED] >1401761215.057120: dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761215.057148: wlp2s0: Setting scan request: 0 sec 0 usec >1401761215.057243: wlp2s0: State: INACTIVE -> SCANNING >1401761215.057270: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761215.057287: wlp2s0: Starting AP scan for wildcard SSID >1401761215.057296: WPS: Building WPS IE for Probe Request >1401761215.057304: WPS: * Version (hardcoded 0x10) >1401761215.057312: WPS: * Request Type >1401761215.057319: WPS: * Config Methods (108) >1401761215.057327: WPS: * UUID-E >1401761215.057334: WPS: * Primary Device Type >1401761215.057342: WPS: * RF Bands (3) >1401761215.057351: WPS: * Association State >1401761215.057359: WPS: * Configuration Error (0) >1401761215.057368: WPS: * Device Password ID (0) >1401761215.057377: WPS: * Device Name >1401761215.057388: P2P: * P2P IE header >1401761215.057397: P2P: * Capability dev=25 group=00 >1401761215.057406: P2P: * Listen Channel: Regulatory Class 81 Channel 11 >1401761215.057434: nl80211: Scan SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761215.057448: nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] >1401761215.057457: nl80211: Scan extra IEs - hexdump(len=101): dd 50 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 01 08 10 47 00 10 32 6a 81 17 26 0c 50 d0 90 55 89 19 73 83 6b a1 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 11 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 58 58 04 51 0b >1401761215.057528: Scan requested (ret=0) - scan timeout 30 seconds >1401761215.057542: nl80211: Event message available >1401761215.057554: nl80211: Scan trigger >1401761215.062336: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3 >1401761216.725107: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >1401761216.725157: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761216.725235: nl80211: if_removed already cleared - ignore event >1401761216.725255: nl80211: Event message available >1401761216.725290: nl80211: New scan results available >1401761216.725313: wlp2s0: Event SCAN_RESULTS (3) received >1401761216.725476: nl80211: Received scan results (5 BSSes) >1401761216.725587: wlp2s0: BSS: Start scan result update 2 >1401761216.725626: BSS: last_scan_res_used=5/32 last_scan_full=0 >1401761216.725647: wlp2s0: New scan results available >1401761216.725710: WPS: AP[0] 20:e5:2a:08:16:29 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 >1401761216.725734: wlp2s0: Selecting BSS from priority group 0 >1401761216.725754: wlp2s0: 0: 40:16:7e:59:a7:44 ssid='WhoKnows-5Ghz' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-48 >1401761216.725799: wlp2s0: skip - SSID mismatch >1401761216.725819: wlp2s0: 1: 40:16:7e:59:a7:40 ssid='WhoKnows' wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-30 >1401761216.725836: wlp2s0: selected based on RSN IE >1401761216.725854: wlp2s0: selected BSS 40:16:7e:59:a7:40 ssid='WhoKnows' >1401761216.725874: wlp2s0: Request association: reassociate: 1 selected: 40:16:7e:59:a7:40 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING >1401761216.725891: wlp2s0: Automatic auth_alg selection: 0x1 >1401761216.725906: RSN: PMKSA cache search - network_ctx=0x7fd51bcacc10 try_opportunistic=0 >1401761216.725920: RSN: Search for BSSID 40:16:7e:59:a7:40 >1401761216.725935: RSN: No PMKSA cache entry found >1401761216.725952: wlp2s0: RSN: using IEEE 802.11i/D9.0 >1401761216.725967: wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 >1401761216.725984: wlp2s0: WPA: clearing AP WPA IE >1401761216.725999: WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 >1401761216.726020: wlp2s0: WPA: using GTK CCMP >1401761216.726036: wlp2s0: WPA: using PTK CCMP >1401761216.726050: wlp2s0: WPA: using KEY_MGMT WPA-PSK >1401761216.726065: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761216.726101: wlp2s0: Cancelling scan request >1401761216.726119: wlp2s0: SME: Trying to authenticate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761216.726135: wlp2s0: No keys have been configured - skip key clearing >1401761216.726150: wlp2s0: State: SCANNING -> AUTHENTICATING >1401761216.726216: EAPOL: External notification - EAP success=0 >1401761216.726237: EAPOL: Supplicant port status: Unauthorized >1401761216.726328: EAPOL: External notification - EAP fail=0 >1401761216.726348: EAPOL: Supplicant port status: Unauthorized >1401761216.726402: EAPOL: External notification - portControl=Auto >1401761216.726419: EAPOL: Supplicant port status: Unauthorized >1401761216.726470: nl80211: Authenticate (ifindex=3) >1401761216.726487: * bssid=40:16:7e:59:a7:40 >1401761216.726502: * freq=2412 >1401761216.726515: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761216.726540: * IEs - hexdump(len=0): [NULL] >1401761216.726554: * Auth Type 0 >1401761216.731378: nl80211: Authentication request send successfully >1401761216.731405: RSN: Ignored PMKID candidate without preauth flag >1401761216.731422: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3 >1401761216.731489: nl80211: Event message available >1401761216.731500: nl80211: New station 40:16:7e:59:a7:40 >1401761216.731510: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2 >1401761216.731543: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/1 >1401761216.731574: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3/BSSs/4 >1401761217.736147: nl80211: Event message available >1401761217.736217: nl80211: MLME event 37 >1401761217.736233: nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 80 bb 00 00 02 00 00 00 dd 09 00 10 18 02 06 00 1c 00 00 >1401761217.736258: nl80211: Authenticate event >1401761217.736276: wlp2s0: Event AUTH (11) received >1401761217.736295: wlp2s0: SME: Authentication response: peer=40:16:7e:59:a7:40 auth_type=0 auth_transaction=2 status_code=0 >1401761217.736309: SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 06 00 1c 00 00 >1401761217.736330: wlp2s0: Trying to associate with 40:16:7e:59:a7:40 (SSID='WhoKnows' freq=2412 MHz) >1401761217.736346: wlp2s0: State: AUTHENTICATING -> ASSOCIATING >1401761217.736360: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761217.736374: netlink: Operstate: linkmode=-1, operstate=5 >1401761217.736481: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761217.736510: nl80211: Associate (ifindex=3) >1401761217.736527: * bssid=40:16:7e:59:a7:40 >1401761217.736542: * freq=2412 >1401761217.736556: * SSID - hexdump_ascii(len=8): > 57 68 6f 4b 6e 6f 77 73 WhoKnows >1401761217.736580: * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761217.736600: * pairwise=0xfac04 >1401761217.736613: * group=0xfac04 >1401761217.750253: nl80211: Association request send successfully >1401761217.750299: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3 >1401761217.750389: nl80211: Event message available >1401761217.750408: nl80211: Delete station 40:16:7e:59:a7:40 >1401761217.750425: nl80211: Event message available >1401761217.750438: nl80211: New station 40:16:7e:59:a7:40 >1401761219.753121: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761219.753164: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 11 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.753225: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761219.753256: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761219.753271: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 12 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.753315: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761219.753340: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761219.753354: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 12 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.753397: wlp2s0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00) >1401761219.756236: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761219.756288: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761219.756364: nl80211: if_removed already cleared - ignore event >1401761219.756384: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761219.756400: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761219.756437: nl80211: if_removed already cleared - ignore event >1401761219.756454: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >1401761219.756468: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp2s0' added >1401761219.756504: nl80211: if_removed already cleared - ignore event >1401761219.756530: nl80211: Event message available >1401761219.756561: nl80211: MLME event 38 >1401761219.756575: nl80211: MLME event frame - hexdump(len=145): 10 00 3a 01 c0 4a 00 28 7e c1 40 16 7e 59 a7 40 40 16 7e 59 a7 40 90 bc 11 04 00 00 06 c0 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761219.756624: nl80211: Associate event >1401761219.756641: wlp2s0: Event ASSOC (0) received >1401761219.756657: wlp2s0: Association info event >1401761219.756671: resp_ies - hexdump(len=115): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a bd 19 17 ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 05 00 1c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 >1401761219.756713: wlp2s0: freq=2412 MHz >1401761219.756728: wlp2s0: State: ASSOCIATING -> ASSOCIATED >1401761219.756742: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761219.756757: netlink: Operstate: linkmode=-1, operstate=5 >1401761219.756909: wlp2s0: Associated to a new BSS: BSSID=40:16:7e:59:a7:40 >1401761219.756937: wlp2s0: No keys have been configured - skip key clearing >1401761219.756957: wlp2s0: Associated with 40:16:7e:59:a7:40 >1401761219.756973: wlp2s0: WPA: Association event - clear replay counter >1401761219.756989: wlp2s0: WPA: Clear old PTK >1401761219.757003: EAPOL: External notification - portEnabled=0 >1401761219.757017: EAPOL: Supplicant port status: Unauthorized >1401761219.757112: EAPOL: External notification - portValid=0 >1401761219.757148: EAPOL: Supplicant port status: Unauthorized >1401761219.757211: EAPOL: External notification - EAP success=0 >1401761219.757229: EAPOL: Supplicant port status: Unauthorized >1401761219.757281: EAPOL: External notification - portEnabled=1 >1401761219.757297: EAPOL: SUPP_PAE entering state CONNECTING >1401761219.757310: EAPOL: enable timer tick >1401761219.757323: EAPOL: SUPP_BE entering state IDLE >1401761219.757341: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761219.757356: wlp2s0: Cancelling scan request >1401761219.757374: wlp2s0: Process pending EAPOL frame that was received just before association notification >1401761219.757392: wlp2s0: RX EAPOL from 40:16:7e:59:a7:40 >1401761219.757408: RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 12 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.757455: wlp2s0: Setting authentication timeout: 10 sec 0 usec >1401761219.757476: wlp2s0: IEEE 802.1X RX: version=2 type=3 length=117 >1401761219.757495: wlp2s0: EAPOL-Key type=2 >1401761219.757514: wlp2s0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) >1401761219.757531: wlp2s0: key_length=16 key_data_length=22 >1401761219.757545: replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12 >1401761219.757561: key_nonce - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9d >1401761219.757581: key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761219.757597: key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761219.757611: key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 >1401761219.757626: key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >1401761219.757643: WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 12 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.757688: wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE >1401761219.757775: wlp2s0: WPA: RX message 1 of 4-Way Handshake from 40:16:7e:59:a7:40 (ver=2) >1401761219.757795: RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.757814: WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.757833: RSN: PMKID from Authenticator - hexdump(len=16): 6b 5d b6 c3 60 09 cd 36 c0 c9 e4 30 60 d3 ca e4 >1401761219.757852: wlp2s0: RSN: no matching PMKID found >1401761219.757866: Get randomness: len=32 entropy=11 >1401761219.758554: WPA: Renewed SNonce - hexdump(len=32): 83 52 59 aa 04 31 d7 49 4b 92 8c 9e 6c e7 0d 1f f5 18 6d 0d ba 15 e6 14 c1 f5 ab ba fe 07 28 84 >1401761219.758595: WPA: PTK derivation - A1=c0:4a:00:28:7e:c1 A2=40:16:7e:59:a7:40 >1401761219.758611: WPA: Nonce1 - hexdump(len=32): 83 52 59 aa 04 31 d7 49 4b 92 8c 9e 6c e7 0d 1f f5 18 6d 0d ba 15 e6 14 c1 f5 ab ba fe 07 28 84 >1401761219.758632: WPA: Nonce2 - hexdump(len=32): 7c 27 13 2c 14 25 08 9c bd 74 3d a1 c4 34 ce 68 38 66 0c 7d 63 d4 f4 1c f5 47 3c 9a a4 fc f3 9d >1401761219.758652: WPA: PMK - hexdump(len=32): [REMOVED] >1401761219.758666: WPA: PTK - hexdump(len=48): [REMOVED] >1401761219.758679: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761219.758699: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 12 >1401761219.758716: wlp2s0: WPA: Sending EAPOL-Key 2/4 >1401761219.758735: WPA: KCK - hexdump(len=16): [REMOVED] >1401761219.758749: WPA: Derived Key MIC - hexdump(len=16): da 51 63 ca 12 ea ca d7 6f 8d 2f 2b fe 31 8f ba >1401761219.758791: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 12 83 52 59 aa 04 31 d7 49 4b 92 8c 9e 6c e7 0d 1f f5 18 6d 0d ba 15 e6 14 c1 f5 ab ba fe 07 28 84 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 da 51 63 ca 12 ea ca d7 6f 8d 2f 2b fe 31 8f ba 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >1401761219.758890: nl80211: Event message available >1401761219.758918: nl80211: Ignore connect event (cmd=46) when using userspace SME >1401761219.761988: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/3 >1401761220.669670: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761220.669721: wlp2s0: Request to deauthenticate - bssid=40:16:7e:59:a7:40 pending_bssid=00:00:00:00:00:00 reason=3 state=4WAY_HANDSHAKE >1401761220.669740: wpa_driver_nl80211_deauthenticate(addr=40:16:7e:59:a7:40 reason_code=3) >1401761221.076481: wlp2s0: Event DEAUTH (12) received >1401761221.076527: wlp2s0: Deauthentication notification >1401761221.076543: wlp2s0: * reason 3 (locally generated) >1401761221.076557: Deauthentication frame IE(s) - hexdump(len=0): [NULL] >1401761221.076576: wlp2s0: CTRL-EVENT-DISCONNECTED bssid=40:16:7e:59:a7:40 reason=3 locally_generated=1 >1401761221.076592: wlp2s0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect >1401761221.076609: wlp2s0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="WhoKnows" auth_failures=1 duration=10 >1401761221.076633: wlp2s0: Auto connect enabled: try to reconnect (wps=0 wpa_state=7) >1401761221.076654: wlp2s0: Setting scan request: 0 sec 100000 usec >1401761221.076671: Added BSSID 40:16:7e:59:a7:40 into blacklist >1401761221.076690: wlp2s0: Blacklist count 1 --> request scan in 100 ms >1401761221.076706: wlp2s0: Not rescheduling scan to ensure that specific SSID scans occur >1401761221.076857: wlp2s0: Disconnect event - remove keys >1401761221.076943: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761221.079939: nl80211: set_key failed; err=-100 Network is down) >1401761221.079992: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 >1401761221.080021: nl80211: set_key failed; err=-100 Network is down) >1401761221.080048: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 >1401761221.080070: nl80211: set_key failed; err=-100 Network is down) >1401761221.080095: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 >1401761221.080118: nl80211: set_key failed; err=-100 Network is down) >1401761221.080148: wpa_driver_nl80211_set_key: ifindex=3 alg=0 addr=0x7fd51bcb47f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 >1401761221.080161: addr=40:16:7e:59:a7:40 >1401761221.080182: nl80211: set_key failed; err=-100 Network is down) >1401761221.080198: wlp2s0: State: 4WAY_HANDSHAKE -> DISCONNECTED >1401761221.080206: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761221.080214: netlink: Operstate: linkmode=-1, operstate=5 >1401761221.080277: EAPOL: External notification - portEnabled=0 >1401761221.080296: EAPOL: SUPP_PAE entering state DISCONNECTED >1401761221.080303: EAPOL: Supplicant port status: Unauthorized >1401761221.080360: EAPOL: SUPP_BE entering state INITIALIZE >1401761221.080376: EAPOL: Supplicant port status: Unauthorized >1401761221.080416: EAPOL: External notification - portValid=0 >1401761221.080429: EAPOL: Supplicant port status: Unauthorized >1401761221.080471: EAPOL: External notification - EAP success=0 >1401761221.080485: EAPOL: Supplicant port status: Unauthorized >1401761221.080525: wlp2s0: No keys have been configured - skip key clearing >1401761221.080541: wlp2s0: State: DISCONNECTED -> DISCONNECTED >1401761221.080549: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761221.080556: netlink: Operstate: linkmode=-1, operstate=5 >1401761221.080581: EAPOL: External notification - portEnabled=0 >1401761221.080591: EAPOL: Supplicant port status: Unauthorized >1401761221.080643: EAPOL: External notification - portValid=0 >1401761221.080660: EAPOL: Supplicant port status: Unauthorized >1401761221.080814: dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761221.080844: dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/3/Networks/0' >1401761221.080909: EAPOL: startWhen --> 0 >1401761221.080926: EAPOL: disable timer tick >1401761221.080933: EAPOL: Supplicant port status: Unauthorized >1401761221.081028: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/3) >1401761221.081093: dbus: fi.w1.wpa_supplicant1.RemoveInterface (/fi/w1/wpa_supplicant1) >1401761221.081108: wlp2s0: Removing interface wlp2s0 >1401761221.081119: wlp2s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED >1401761221.081127: wlp2s0: No keys have been configured - skip key clearing >1401761221.081136: wlp2s0: State: DISCONNECTED -> DISCONNECTED >1401761221.081144: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) >1401761221.081152: netlink: Operstate: linkmode=-1, operstate=5 >1401761221.081166: EAPOL: External notification - portEnabled=0 >1401761221.081175: EAPOL: Supplicant port status: Unauthorized >1401761221.081229: EAPOL: External notification - portValid=0 >1401761221.081245: EAPOL: Supplicant port status: Unauthorized >1401761221.081290: wlp2s0: No keys have been configured - skip key clearing >1401761221.089961: Removed BSSID 40:16:7e:59:a7:40 from blacklist (clear) >1401761221.090032: wlp2s0: BSS: Remove id 0 BSSID 40:16:7e:59:a7:44 SSID 'WhoKnows-5Ghz' due to wpa_bss_flush >1401761221.090042: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/0' >1401761221.090093: wlp2s0: BSS: Remove id 2 BSSID 40:16:7e:59:a7:40 SSID 'WhoKnows' due to wpa_bss_flush >1401761221.090102: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/2' >1401761221.090127: wlp2s0: BSS: Remove id 1 BSSID 28:92:4a:c2:21:81 SSID 'HP-Print-81-Officejet Pro 8600' due to wpa_bss_flush >1401761221.090136: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/1' >1401761221.090159: wlp2s0: BSS: Remove id 3 BSSID 20:e5:2a:08:16:29 SSID 'NETGEAR22' due to wpa_bss_flush >1401761221.090168: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/3' >1401761221.090191: wlp2s0: BSS: Remove id 4 BSSID 00:26:62:e5:b3:e0 SSID 'notwired-bu' due to wpa_bss_flush >1401761221.090200: dbus: Unregister BSS object '/fi/w1/wpa_supplicant1/Interfaces/3/BSSs/4' >1401761221.090220: wlp2s0: Cancelling scan request >1401761221.090229: wlp2s0: Cancelling authentication timeout >1401761221.090242: wlp2s0: P2P: Disable P2P since removing the management interface is being removed >1401761221.090251: wlp2s0: P2P: Stopping find >1401761221.090258: wlp2s0: P2P: Clear timeout (state=IDLE) >1401761221.090266: wlp2s0: P2P: State IDLE -> IDLE >1401761221.098870: netlink: Operstate: linkmode=0, operstate=6 >1401761221.098951: nl80211: Set mode ifindex 3 iftype 2 (STATION) >1401761221.099007: nl80211: Unsubscribe mgmt frames handle 0x7fd51bc8cf80 (mode change) >1401761221.099050: dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/3' >1401761221.099179: nl80211: Ignore event for foreign ifindex 3 >1401761221.099208: nl80211: Ignore event for foreign ifindex 3 >1401761221.099227: nl80211: Event message available >1401761221.099262: nl80211: Event message available >1401761221.099289: nl80211: Event message available >1401761221.099317: nl80211: Event message available >1401761221.099341: nl80211: Event message available
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1102365
:
900132
|
901030
| 901574 |
906124
|
910108