NoPaste

killall wpa_supplicant

von Mausklix

SNIPPET_TEXT:
  1. root@Mausklix:~# killall wpa_supplicant
  2. root@Mausklix:~# rm /var/run/wpa_supplicant/wlp2s0
  3. rm: das Entfernen von '/var/run/wpa_supplicant/wlp2s0' ist nicht möglich: Datei oder Verzeichnis nicht gefunden
  4. root@Mausklix:~# wpa_supplicant -iwlp2s0 -Dnl80211 -c/etc/wpa_supplicant/wpa_supplicant.conf -d
  5. wpa_supplicant v2.10
  6. random: getrandom() support available
  7. Successfully initialized wpa_supplicant
  8. Initializing interface 'wlp2s0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
  9. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  10. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  11. ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
  12. update_config=0
  13. Priority group 0
  14.    id=0 ssid='Holzklotz'
  15. nl80211: Supported cipher 00-0f-ac:1
  16. nl80211: Supported cipher 00-0f-ac:5
  17. nl80211: Supported cipher 00-0f-ac:2
  18. nl80211: Supported cipher 00-0f-ac:4
  19. nl80211: Supported cipher 00-0f-ac:10
  20. nl80211: Supported cipher 00-0f-ac:8
  21. nl80211: Supported cipher 00-0f-ac:9
  22. nl80211: Using driver-based off-channel TX
  23. nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
  24. nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 00 00 00 00 00 00 00 40
  25. nl80211: key_mgmt=0x1ff0f enc=0xef auth=0x7 flags=0x840005105b03d0e0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=20
  26. nl80211: interface wlp2s0 in phy phy0
  27. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  28. nl80211: Subscribe to mgmt frames with non-AP handle 0x55da55113880
  29. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0104 multicast=0
  30. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=040a multicast=0
  31. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=040b multicast=0
  32. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=040c multicast=0
  33. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=040d multicast=0
  34. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=090a multicast=0
  35. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=090b multicast=0
  36. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=090c multicast=0
  37. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=090d multicast=0
  38. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0409506f9a09 multicast=0
  39. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=7f506f9a09 multicast=0
  40. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0409506f9a1a multicast=0
  41. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0800 multicast=0
  42. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0801 multicast=0
  43. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=12 multicast=0
  44. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=06 multicast=0
  45. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0a07 multicast=0
  46. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0a11 multicast=0
  47. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0a0b multicast=0
  48. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0a1a multicast=0
  49. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=1101 multicast=0
  50. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=1102 multicast=0
  51. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0505 multicast=0
  52. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=0500 multicast=0
  53. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=1301 multicast=0
  54. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=1305 multicast=0
  55. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x55da55113880 match=7e506f9a1a multicast=0
  56. rfkill: initial event: idx=2 type=1 op=0 soft=0 hard=0
  57. netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
  58. Add interface wlp2s0 to a new radio phy0
  59. nl80211: Regulatory information - country=00
  60. nl80211: 755-928 @ 2 MHz 20 mBm (no IR)
  61. nl80211: 2402-2472 @ 40 MHz 20 mBm
  62. nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
  63. nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
  64. nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
  65. nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
  66. nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
  67. nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
  68. nl80211: 57240-63720 @ 2160 MHz 0 mBm
  69. nl80211: Added 802.11b mode based on 802.11g information
  70. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR]
  71. nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
  72. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR]
  73. wlp2s0: Own MAC address: 10:0b:a9:75:ea:f8
  74. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  75. nl80211: DEL_KEY
  76.    broadcast key
  77. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  78. nl80211: DEL_KEY
  79.    broadcast key
  80. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  81. nl80211: DEL_KEY
  82.    broadcast key
  83. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  84. nl80211: DEL_KEY
  85.    broadcast key
  86. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  87. nl80211: DEL_KEY
  88.    broadcast key
  89. nl80211: set_key failed; err=-22 Invalid argument
  90. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  91. nl80211: DEL_KEY
  92.    broadcast key
  93. nl80211: set_key failed; err=-22 Invalid argument
  94. wlp2s0: RSN: flushing PMKID list in the driver
  95. nl80211: Flush PMKIDs
  96. wlp2s0: Setting scan request: 0.100000 sec
  97. TDLS: TDLS operation not supported by driver
  98. TDLS: Driver uses internal link setup
  99. TDLS: Driver does not support TDLS channel switching
  100. wlp2s0: WPS: UUID based on MAC address: 2ffc9c9d-6d2e-5da8-8190-79294a792bc9
  101. ENGINE: Loading builtin engines
  102. ENGINE: Loading builtin engines
  103. EAPOL: SUPP_PAE entering state DISCONNECTED
  104. EAPOL: Supplicant port status: Unauthorized
  105. nl80211: Skip set_supp_port(unauthorized) while not associated
  106. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  107. EAPOL: SUPP_BE entering state INITIALIZE
  108. EAP: EAP entering state DISABLED
  109. ctrl_interface_group=106 (from group name 'netdev')
  110. MBO: Update non-preferred channels, non_pref_chan=N/A
  111. wlp2s0: Added interface wlp2s0
  112. wlp2s0: State: DISCONNECTED -> DISCONNECTED
  113. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  114. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  115. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
  116. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
  117. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  118. wlp2s0: State: DISCONNECTED -> SCANNING
  119. wlp2s0: Starting AP scan for wildcard SSID
  120. wlp2s0: Add radio work 'scan'@0x55da551836a0
  121. wlp2s0: First radio work item in the queue - schedule start immediately
  122. wlp2s0: Starting radio work 'scan'@0x55da551836a0 after 0.000057 second wait
  123. wlp2s0: nl80211: scan request
  124. Scan requested (ret=0) - scan timeout 10 seconds
  125. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlp2s0
  126. wlp2s0: nl80211: Scan trigger
  127. wlp2s0: Event SCAN_STARTED (47) received
  128. wlp2s0: Own scan request started a scan in 0.000133 seconds
  129. EAPOL: disable timer tick
  130. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  131. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlp2s0
  132. wlp2s0: nl80211: New scan results available
  133. nl80211: Scan probed for SSID ''
  134. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825
  135. wlp2s0: Event SCAN_RESULTS (3) received
  136. wlp2s0: Scan completed in 3.154727 seconds
  137. nl80211: Received scan results (2 BSSes)
  138. wlp2s0: BSS: Start scan result update 1
  139. wlp2s0: BSS: Add new id 0 BSSID 76:0b:b0:7b:dd:5e SSID 'Holzklotz' freq 2437
  140. wlp2s0: BSS: Add new id 1 BSSID 00:1e:c0:63:55:10 SSID 'XR18-63-55-10' freq 2412
  141. BSS: last_scan_res_used=2/32
  142. wlp2s0: New scan results available (own=1 ext=0)
  143. wlp2s0: Radio work 'scan'@0x55da551836a0 done in 3.156198 seconds
  144. wlp2s0: radio_work_free('scan'@0x55da551836a0): num_active_works --> 0
  145. wlp2s0: Selecting BSS from priority group 0
  146. wlp2s0: 0: 76:0b:b0:7b:dd:5e ssid='Holzklotz' wpa_ie_len=0 rsn_ie_len=20 caps=0x1431 level=-32 freq=2437
  147. wlp2s0:    selected based on RSN IE
  148. wlp2s0:    selected BSS 76:0b:b0:7b:dd:5e ssid='Holzklotz'
  149. wlp2s0: Considering connect request: reassociate: 0  selected: 76:0b:b0:7b:dd:5e  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0x55da55113990  current_ssid=(nil)
  150. wlp2s0: Request association with 76:0b:b0:7b:dd:5e
  151. TDLS: TDLS is allowed in the target BSS
  152. TDLS: TDLS channel switch allowed in the target BSS
  153. wlp2s0: No ongoing scan/p2p-scan found to abort
  154. wlp2s0: Add radio work 'sme-connect'@0x55da551836a0
  155. wlp2s0: First radio work item in the queue - schedule start immediately
  156. wlp2s0: Starting radio work 'sme-connect'@0x55da551836a0 after 0.000050 second wait
  157. wlp2s0: WPA: clearing own WPA/RSN IE
  158. wlp2s0: RSN: clearing own RSNXE
  159. wlp2s0: Automatic auth_alg selection: 0x1
  160. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 akmp=0x0
  161. RSN: Search for BSSID 76:0b:b0:7b:dd:5e
  162. RSN: No PMKSA cache entry found
  163. wlp2s0: RSN: using IEEE 802.11i/D9.0
  164. wlp2s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  165. wlp2s0: WPA: Selected mgmt group cipher 32
  166. wlp2s0: WPA: clearing AP WPA IE
  167. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  168. wlp2s0: WPA: clearing AP RSNXE
  169. wlp2s0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
  170. wlp2s0: WPA: using GTK CCMP
  171. wlp2s0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
  172. wlp2s0: WPA: using PTK CCMP
  173. wlp2s0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
  174. wlp2s0: WPA: using KEY_MGMT WPA-PSK
  175. wlp2s0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
  176. wlp2s0: WPA: not using MGMT group cipher
  177. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  178. RSN: Set own RSNXE default - hexdump(len=0):
  179. WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
  180. RRM: Determining whether RRM can be used - device support: 0x10
  181. RRM: No RRM in network
  182. Added supported operating classes IE - hexdump(len=19): 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f
  183. EAPOL: External notification - EAP success=0
  184. EAPOL: External notification - EAP fail=0
  185. EAPOL: External notification - portControl=Auto
  186. wlp2s0: Cancelling scan request
  187. wlp2s0: SME: Trying to authenticate with 76:0b:b0:7b:dd:5e (SSID='Holzklotz' freq=2437 MHz)
  188. EAPOL: External notification - portValid=0
  189. wlp2s0: State: SCANNING -> AUTHENTICATING
  190. Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network
  191. wlp2s0: Determining shared radio frequencies (max len 1)
  192. wlp2s0: Shared frequencies (len=0): completed iteration
  193. nl80211: Authenticate (ifindex=3)
  194.   * bssid=76:0b:b0:7b:dd:5e
  195.   * freq=2437
  196.   * SSID=Holzklotz
  197.   * IEs - hexdump(len=0): [NULL]
  198.   * Auth Type 0
  199. nl80211: Authentication request send successfully
  200. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlp2s0
  201. nl80211: New station 76:0b:b0:7b:dd:5e
  202. nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlp2s0
  203. nl80211: Authenticate event
  204. wlp2s0: Event AUTH (10) received
  205. wlp2s0: SME: Authentication response: peer=76:0b:b0:7b:dd:5e auth_type=0 auth_transaction=2 status_code=0
  206. SME: Association Request IEs - hexdump(len=54): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 0b 00 00 0a 02 01 40 40 40 00 01 20 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f
  207. wlp2s0: Trying to associate with 76:0b:b0:7b:dd:5e (SSID='Holzklotz' freq=2437 MHz)
  208. wlp2s0: State: AUTHENTICATING -> ASSOCIATING
  209. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  210. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  211. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  212. wlp2s0: RSN: clearing own RSNXE
  213. nl80211: Associate (ifindex=3)
  214.   * bssid=76:0b:b0:7b:dd:5e
  215.   * freq=2437
  216.   * SSID=Holzklotz
  217.   * IEs - hexdump(len=54): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 7f 0b 00 00 0a 02 01 40 40 40 00 01 20 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f
  218.   * WPA Versions 0x2
  219.   * pairwise=0xfac04
  220.   * group=0xfac04
  221.   * akm=0xfac02
  222.   * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  223.   * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  224.   * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  225.   * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  226. nl80211: Association request send successfully
  227. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  228. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  229. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  230. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  231. nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlp2s0
  232. nl80211: Associate event
  233. nl80211: Associated on 2437 MHz
  234. nl80211: Associated with 76:0b:b0:7b:dd:5e
  235. nl80211: Set drv->ssid based on scan res info to 'Holzklotz'
  236. wlp2s0: Event ASSOC (0) received
  237. wlp2s0: Association info event
  238. req_ies - hexdump(len=118): 00 09 48 6f 6c 7a 6b 6c 6f 74 7a 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a 7e 10 17 ff ff 00 00 00 00 00 00 00 00 2c 01 01 00 00 00 00 00 00 00 00 00 00 7f 0b 00 00 0a 02 01 40 40 40 00 01 20 3b 11 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f dd 07 00 50 f2 02 00 01 00
  239. resp_ies - hexdump(len=113): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ad 09 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 3d 16 06 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 04 04 00 00 82 dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 0b 8c fd f0 01 01 02 01 00 02 01 01
  240. wlp2s0: freq=2437 MHz
  241. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  242. wlp2s0: RSN: clearing own RSNXE
  243. wlp2s0: State: ASSOCIATING -> ASSOCIATED
  244. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  245. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  246. wlp2s0: Associated to a new BSS: BSSID=76:0b:b0:7b:dd:5e
  247. wlp2s0: Associated with 76:0b:b0:7b:dd:5e
  248. wlp2s0: WPA: Association event - clear replay counter
  249. wlp2s0: WPA: Clear old PTK
  250. TDLS: Remove peers on association
  251. EAPOL: External notification - portEnabled=0
  252. EAPOL: External notification - portValid=0
  253. EAPOL: External notification - EAP success=0
  254. EAPOL: External notification - portEnabled=1
  255. EAPOL: SUPP_PAE entering state CONNECTING
  256. EAPOL: enable timer tick
  257. EAPOL: SUPP_BE entering state IDLE
  258. wlp2s0: Setting authentication timeout: 10 sec 0 usec
  259. wlp2s0: Cancelling scan request
  260. WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
  261. WMM AC: U-APSD queues=0x0
  262. WMM AC: Valid WMM association, WMM AC is enabled
  263. wlp2s0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  264. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlp2s0
  265. nl80211: Ignore connect event (cmd=46) when using userspace SME
  266. nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlp2s0
  267. wlp2s0: Event EAPOL_RX (23) received
  268. wlp2s0: RX EAPOL from 76:0b:b0:7b:dd:5e
  269. wlp2s0: Setting authentication timeout: 10 sec 0 usec
  270. wlp2s0: IEEE 802.1X RX: version=2 type=3 length=95
  271. wlp2s0:   EAPOL-Key type=2
  272. wlp2s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  273. wlp2s0:   key_length=16 key_data_length=0
  274.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  275.   key_nonce - hexdump(len=32): 8e c3 24 a4 15 57 8d 4f a7 8a 4e 4b 0b 57 a6 b4 29 7e 7a 61 b6 64 4a 24 4f 02 24 5c b4 55 07 12
  276.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  277.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  278.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  279.   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  280. wlp2s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  281. wlp2s0: WPA: RX message 1 of 4-Way Handshake from 76:0b:b0:7b:dd:5e (ver=2)
  282. RSN: msg 1/4 key data - hexdump(len=0):
  283. WPA: Renewed SNonce - hexdump(len=32): 97 b1 6f 27 59 76 39 87 7b eb a6 dd e2 3b 97 21 21 5e 0a 3c b1 bc 5b 74 ad e4 71 ce 24 38 88 a1
  284. WPA: PTK derivation using PRF(SHA1)
  285. WPA: PTK derivation - A1=10:0b:a9:75:ea:f8 A2=76:0b:b0:7b:dd:5e
  286. WPA: Nonce1 - hexdump(len=32): 97 b1 6f 27 59 76 39 87 7b eb a6 dd e2 3b 97 21 21 5e 0a 3c b1 bc 5b 74 ad e4 71 ce 24 38 88 a1
  287. WPA: Nonce2 - hexdump(len=32): 8e c3 24 a4 15 57 8d 4f a7 8a 4e 4b 0b 57 a6 b4 29 7e 7a 61 b6 64 4a 24 4f 02 24 5c b4 55 07 12
  288. WPA: PMK - hexdump(len=32): [REMOVED]
  289. WPA: PTK - hexdump(len=48): [REMOVED]
  290. WPA: KCK - hexdump(len=16): [REMOVED]
  291. WPA: KEK - hexdump(len=16): [REMOVED]
  292. WPA: TK - hexdump(len=16): [REMOVED]
  293. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  294. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  295. wlp2s0: WPA: Sending EAPOL-Key 2/4
  296. WPA: Send EAPOL-Key frame to 76:0b:b0:7b:dd:5e ver=2 mic_len=16 key_mgmt=0x2
  297. WPA: EAPOL-Key MIC using HMAC-SHA1
  298. WPA: KCK - hexdump(len=16): [REMOVED]
  299. WPA: Derived Key MIC - hexdump(len=16): 3a be 57 cf 45 ba 3a d1 d6 83 3e 19 d1 9c bb 69
  300. nl80211: Send over control port dest=76:0b:b0:7b:dd:5e proto=0x888e len=121 no_encrypt=1
  301. nl80211: tx_control_port cookie=0x1
  302. nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlp2s0
  303. nl80211: Control port TX status (ack=1), cookie=1
  304. wlp2s0: Event EAPOL_TX_STATUS (37) received
  305. nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlp2s0
  306. wlp2s0: Event EAPOL_RX (23) received
  307. wlp2s0: RX EAPOL from 76:0b:b0:7b:dd:5e
  308. wlp2s0: IEEE 802.1X RX: version=2 type=3 length=151
  309. wlp2s0:   EAPOL-Key type=2
  310. wlp2s0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  311. wlp2s0:   key_length=16 key_data_length=56
  312.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  313.   key_nonce - hexdump(len=32): 8e c3 24 a4 15 57 8d 4f a7 8a 4e 4b 0b 57 a6 b4 29 7e 7a 61 b6 64 4a 24 4f 02 24 5c b4 55 07 12
  314.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  315.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  316.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  317.   key_mic - hexdump(len=16): 05 c1 52 b1 4d b6 32 b9 68 46 26 ec ce be 27 10
  318. WPA: EAPOL-Key MIC using HMAC-SHA1
  319. RSN: encrypted key data - hexdump(len=56): 04 ee 8c f5 7c 3a 2e 5d b3 63 29 67 86 7c 94 66 79 ce ee 11 ed 8d 5e 8a 32 c2 d6 50 bb 60 59 d5 ea fd 09 5c df fb 45 68 76 e2 0b d3 48 d4 21 df 50 8c 36 72 da ed 46 81
  320. WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
  321. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  322. wlp2s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  323. wlp2s0: WPA: RX message 3 of 4-Way Handshake from 76:0b:b0:7b:dd:5e (ver=2)
  324. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 5f 50 96 46 e7 0e 9e 17 db 61 23 66 e1 c1 ed 6a dd 00
  325. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  326. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  327. wlp2s0: WPA: Sending EAPOL-Key 4/4
  328. WPA: Send EAPOL-Key frame to 76:0b:b0:7b:dd:5e ver=2 mic_len=16 key_mgmt=0x2
  329. WPA: EAPOL-Key MIC using HMAC-SHA1
  330. WPA: KCK - hexdump(len=16): [REMOVED]
  331. WPA: Derived Key MIC - hexdump(len=16): e0 b3 20 a1 dd 82 3a 64 86 28 50 87 fb 16 fd 7e
  332. nl80211: Send over control port dest=76:0b:b0:7b:dd:5e proto=0x888e len=99 no_encrypt=1
  333. nl80211: tx_control_port cookie=0x2
  334. wlp2s0: WPA: Installing PTK to the driver
  335. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x55da55139c60 key_idx=0 set_tx=1 seq_len=6 key_len=16 key_flag=0x2c
  336. nl80211: NEW_KEY
  337. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  338. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  339.    addr=76:0b:b0:7b:dd:5e
  340.    pairwise key
  341. EAPOL: External notification - portValid=1
  342. wlp2s0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  343. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  344. WPA: Group Key - hexdump(len=16): [REMOVED]
  345. wlp2s0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  346. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  347. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=3 addr=0x55da54a6c4c0 key_idx=1 set_tx=0 seq_len=6 key_len=16 key_flag=0x14
  348. nl80211: NEW_KEY
  349. nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  350. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  351.    broadcast key
  352. wlp2s0: WPA: Key negotiation completed with 76:0b:b0:7b:dd:5e [PTK=CCMP GTK=CCMP]
  353. wlp2s0: Cancelling authentication timeout
  354. wlp2s0: State: GROUP_HANDSHAKE -> COMPLETED
  355. wlp2s0: Radio work 'sme-connect'@0x55da551836a0 done in 0.242813 seconds
  356. wlp2s0: radio_work_free('sme-connect'@0x55da551836a0): num_active_works --> 0
  357. wlp2s0: CTRL-EVENT-CONNECTED - Connection to 76:0b:b0:7b:dd:5e completed [id=0 id_str=]
  358. nl80211: Set wlp2s0 operstate 0->1 (UP)
  359. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  360. EAPOL: External notification - portValid=1
  361. EAPOL: External notification - EAP success=1
  362. EAPOL: SUPP_PAE entering state AUTHENTICATING
  363. EAPOL: SUPP_BE entering state SUCCESS
  364. EAP: EAP entering state DISABLED
  365. EAPOL: SUPP_PAE entering state AUTHENTICATED
  366. EAPOL: Supplicant port status: Authorized
  367. nl80211: Set supplicant port authorized for 76:0b:b0:7b:dd:5e
  368. EAPOL: SUPP_BE entering state IDLE
  369. EAPOL authentication completed - result=SUCCESS
  370. nl80211: Set rekey offload
  371. RTM_NEWLINK: ifi_index=3 ifname=wlp2s0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  372. nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlp2s0
  373. nl80211: Control port TX status (ack=1), cookie=2
  374. wlp2s0: Event EAPOL_TX_STATUS (37) received
  375. EAPOL: startWhen --> 0
  376. EAPOL: disable timer tick
  377. ^Cwlp2s0: Removing interface wlp2s0
  378. nl80211: Getting wowlan status
  379. nl80211: wowlan is disabled
  380. wlp2s0: Request to deauthenticate - bssid=76:0b:b0:7b:dd:5e pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=COMPLETED
  381. TDLS: Tear down peers
  382. wpa_driver_nl80211_deauthenticate(addr=76:0b:b0:7b:dd:5e reason_code=3)
  383. wlp2s0: Event DEAUTH (11) received
  384. wlp2s0: Deauthentication notification
  385. wlp2s0:  * reason 3 (DEAUTH_LEAVING) locally_generated=1
  386. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  387. wlp2s0: CTRL-EVENT-DISCONNECTED bssid=76:0b:b0:7b:dd:5e reason=3 locally_generated=1
  388. wlp2s0: Auto connect disabled: do not try to re-connect
  389. wlp2s0: Ignore connection failure indication since interface has been put into disconnected state
  390. TDLS: Remove peers on disassociation
  391. wlp2s0: WPA: Clear old PMK and PTK
  392. wlp2s0: Disconnect event - remove keys
  393. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  394. nl80211: DEL_KEY
  395.    broadcast key
  396. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 key_flag=0x10
  397. nl80211: DEL_KEY
  398.    broadcast key
  399. wpa_driver_nl80211_set_key: ifindex=3 (wlp2s0) alg=0 addr=0x55da55110fa0 key_idx=0 set_tx=0 seq_len=0 key_len=0 key_flag=0x20
  400. nl80211: DEL_KEY
  401.    addr=76:0b:b0:7b:dd:5e
  402.    pairwise key
  403. nl80211: Data frame filter flags=0x0
  404. wlp2s0: State: COMPLETED -> DISCONNECTED
  405. nl80211: Set wlp2s0 operstate 1->0 (DORMANT)
  406. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  407. WMM AC: WMM AC is disabled
  408. EAPOL: External notification - portEnabled=0
  409. EAPOL: SUPP_PAE entering state DISCONNECTED
  410. EAPOL: Supplicant port status: Unauthorized
  411. nl80211: Skip set_supp_port(unauthorized) while not associated
  412. EAPOL: SUPP_BE entering state INITIALIZE
  413. EAPOL: External notification - portValid=0
  414. EAPOL: External notification - EAP success=0
  415. nl80211: Data frame filter flags=0x0
  416. wlp2s0: State: DISCONNECTED -> DISCONNECTED
  417. nl80211: Set wlp2s0 operstate 0->0 (DORMANT)
  418. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  419. EAPOL: External notification - portEnabled=0
  420. EAPOL: External notification - portValid=0
  421. QM: Clear all active DSCP policies
  422. wlp2s0: CTRL-EVENT-DSCP-POLICY clear_all
  423. wlp2s0: WPA: Clear old PMK and PTK
  424. wlp2s0: BSS: Remove id 0 BSSID 76:0b:b0:7b:dd:5e SSID 'Holzklotz' due to wpa_bss_flush
  425. wlp2s0: BSS: Remove id 1 BSSID 00:1e:c0:63:55:10 SSID 'XR18-63-55-10' due to wpa_bss_flush
  426. wlp2s0: Cancelling scan request
  427. wlp2s0: Cancelling authentication timeout
  428. Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
  429. nl80211: Data frame filter flags=0x0
  430. HS20: Delete all stored icons
  431. Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
  432. QM: Clear all active DSCP policies
  433. wlp2s0: CTRL-EVENT-DSCP-POLICY clear_all
  434. Remove interface wlp2s0 from radio phy0
  435. Remove radio phy0
  436. nl80211: deinit ifname=wlp2s0 disabled_11b_rates=0
  437. nl80211: Remove monitor interface: refcount=0
  438. netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  439. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  440. nl80211: Unsubscribe mgmt frames handle 0x8888dd52dd99b009 (mode change)
  441. wlp2s0: CTRL-EVENT-TERMINATING

Quellcode

Hier kannst du den Code kopieren und ihn in deinen bevorzugten Editor einfügen. PASTEBIN_DOWNLOAD_SNIPPET_EXPLAIN