Please note: This project is no longer active. The website is kept online for historic purposes only.
If you´re looking for a Linux driver for your Atheros WLAN device, you should continue here .

Ticket #241: r1356_hostapd-rsn.log

File r1356_hostapd-rsn.log, 4.9 kB (added by Stijn Tintel <stijn@linux-ipv6.be>, 14 years ago)

Hostapd + RSN output with r1356

Line 
1 tweety:~# hostapd -dd /etc/hostapd/hostapd.conf
2 Configuration file: /etc/hostapd/hostapd.conf
3 Configure bridge br0 for EAPOL traffic.
4 madwifi_set_iface_flags: dev_up=0
5 Using interface ath0 with hwaddr 00:0d:88:81:72:c9 and ssid 'wlan.hq.linux-ipv6.be'
6 madwifi_set_ieee8021x: enabled=1
7 madwifi_configure_wpa: group key cipher=1
8 madwifi_configure_wpa: pairwise key ciphers=0xa
9 madwifi_configure_wpa: key management algorithms=0x2
10 madwifi_configure_wpa: rsn capabilities=0x0
11 madwifi_configure_wpa: enable WPA= 0x3
12 madwifi_set_iface_flags: dev_up=1
13 madwifi_set_privacy: enabled=1
14 WPA: group state machine entering state GTK_INIT
15 GMK - hexdump(len=32): c1 21 fd ca 45 58 f1 88 cb be 4a d7 38 9c fb ef f7 3b 0a ca 23 3a 8e 73 f9 93 e1 9b 28 a0 e5 1c
16 GTK - hexdump(len=32): 64 be 48 d4 8b 1b b7 a7 0a 8e 16 fc b6 9d 50 e9 c8 6d a4 7e 35 ab 05 71 02 7c 07 5e 7a 3b 85 c7
17 WPA: group state machine entering state SETKEYSDONE
18 madwifi_set_key: alg=TKIP addr=00:00:00:00:00:00 key_idx=1
19 Flushing old station entries
20 madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
21 Deauthenticate all stations
22 l2_packet_receive - recvfrom: Network is down
23 Wireless event: cmd=0x8c03 len=20
24 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.11: associated
25   New STA
26 ath0: STA 00:0e:35:9f:bd:6e WPA: event 1 notification
27 ath0: STA 00:0e:35:9f:bd:6e WPA: start authentication
28 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state INITIALIZE
29 madwifi_del_key: addr=00:0e:35:9f:bd:6e key_idx=0
30 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.1X: unauthorizing port
31 madwifi_set_sta_authorized: addr=00:0e:35:9f:bd:6e authorized=0
32 WPA: 00:0e:35:9f:bd:6e WPA_PTK_GROUP entering state IDLE
33 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state AUTHENTICATION
34 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state AUTHENTICATION2
35 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state INITPSK
36 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state PTKSTART
37 ath0: STA 00:0e:35:9f:bd:6e WPA: sending 1/4 msg of 4-Way Handshake
38 IEEE 802.1X: 121 bytes from 00:0e:35:9f:bd:6e
39    IEEE 802.1X: version=2 type=3 length=117
40 ath0: STA 00:0e:35:9f:bd:6e WPA: WPA IE from (Re)AssocReq did not match with msg 2/4
41 WPA IE in AssocReq - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
42 WPA IE in msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
43 madwifi_sta_deauth: addr=00:0e:35:9f:bd:6e reason_code=2
44 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.11: deauthenticated due to local deauth request
45 Wireless event: cmd=0x8c04 len=20
46 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.11: deassociated
47 Wireless event: cmd=0x8c03 len=20
48 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.11: associated
49   New STA
50 ath0: STA 00:0e:35:9f:bd:6e WPA: event 1 notification
51 ath0: STA 00:0e:35:9f:bd:6e WPA: start authentication
52 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state INITIALIZE
53 madwifi_del_key: addr=00:0e:35:9f:bd:6e key_idx=0
54 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.1X: unauthorizing port
55 madwifi_set_sta_authorized: addr=00:0e:35:9f:bd:6e authorized=0
56 WPA: 00:0e:35:9f:bd:6e WPA_PTK_GROUP entering state IDLE
57 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state AUTHENTICATION
58 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state AUTHENTICATION2
59 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state INITPSK
60 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state PTKSTART
61 ath0: STA 00:0e:35:9f:bd:6e WPA: sending 1/4 msg of 4-Way Handshake
62 IEEE 802.1X: 121 bytes from 00:0e:35:9f:bd:6e
63    IEEE 802.1X: version=2 type=3 length=117
64 ath0: STA 00:0e:35:9f:bd:6e WPA: received EAPOL-Key frame (2/4 Pairwise)
65 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state PTKCALCNEGOTIATING
66 PMK - hexdump(len=32): 67 ed 27 27 5e 1f 3d 63 f7 18 ce 29 57 07 7a b8 cd cb 88 3b f0 d2 4e a5 1f 8b 2e 86 01 08 cb e2
67 PTK - hexdump(len=64): 2e 2d 45 36 0f 8b f0 03 73 9e 79 5e 54 f5 53 e6 d8 98 46 b6 6e ec 8b f6 0c de 56 ed 17 ce 99 ad 99 62 c4 16 56 02 1d bd c9 49
68 75 82 a5 a5 fd 06 93 f9 54 98 b4 e2 18 67 4d c4 37 cd 83 d9 d6 cc
69 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state PTKCALCNEGOTIATING2
70 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state PTKINITNEGOTIATING
71 madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
72 ath0: STA 00:0e:35:9f:bd:6e WPA: sending 3/4 msg of 4-Way Handshake
73 Plaintext EAPOL-Key Key Data - hexdump(len=104): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01
74 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 01 00 64 be 48 d4 8b 1b b7 a7 0a 8e 16 fc b6 9d 50 e9 c8 6d a4 7e 35
75 ab 05 71 02 7c 07 5e 7a 3b 85 c7 dd 00 00 00 00 00 00 00 00 00
76 IEEE 802.1X: 99 bytes from 00:0e:35:9f:bd:6e
77    IEEE 802.1X: version=2 type=3 length=95
78 ath0: STA 00:0e:35:9f:bd:6e WPA: received EAPOL-Key frame (4/4 Pairwise)
79 WPA: 00:0e:35:9f:bd:6e WPA_PTK entering state PTKINITDONE
80 madwifi_set_key: alg=CCMP addr=00:0e:35:9f:bd:6e key_idx=0
81 ath0: STA 00:0e:35:9f:bd:6e IEEE 802.1X: authorizing port
82 madwifi_set_sta_authorized: addr=00:0e:35:9f:bd:6e authorized=1
83 ath0: STA 00:0e:35:9f:bd:6e WPA: pairwise key handshake completed (RSN)
84