Difference between revisions of "Wpa supplicant authentication logs"

From wikieduonline
Jump to navigation Jump to search
(Created page with " Dec 01 13:18:11 HOSTNAME dnsmasq-dhcp[725]: DHCPOFFER(wlp6s0) 10.42.0.180 r8:1c:79:tt:t3:t2 Dec 01 13:18:11 HOSTNAME dnsmasq-dhcp[725]: DHCPDISCOVER(wlp6s0) r8:1c:79:tt:t3:t...")
 
Line 79: Line 79:
 
  Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
 
  Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
 
  Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=r8:1c:79:tt:t3:t2 bssid=ff:ff:ff:ff:ff:ff freq=2462 ssi_signal=-49 fc=0x40 seq_ctrl=0x7c60 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=127
 
  Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=r8:1c:79:tt:t3:t2 bssid=ff:ff:ff:ff:ff:ff freq=2462 ssi_signal=-49 fc=0x40 seq_ctrl=0x7c60 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=127
 +
 +
 +
== See also ==
 +
* {{iw}}

Revision as of 13:25, 1 December 2020

Dec 01 13:18:11 HOSTNAME dnsmasq-dhcp[725]: DHCPOFFER(wlp6s0) 10.42.0.180 r8:1c:79:tt:t3:t2
Dec 01 13:18:11 HOSTNAME dnsmasq-dhcp[725]: DHCPDISCOVER(wlp6s0) r8:1c:79:tt:t3:t2
Dec 01 13:18:11 HOSTNAME dnsmasq-dhcp[725]: DHCPOFFER(wlp6s0) 10.42.0.180 r8:1c:79:tt:t3:t2
Dec 01 13:18:11 HOSTNAME dnsmasq-dhcp[725]: DHCPDISCOVER(wlp6s0) r8:1c:79:tt:t3:t2
Dec 01 13:18:09 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
Dec 01 13:18:09 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=r8:1c:79:tt:t3:t2 bssid=ff:ff:ff:ff:ff:ff freq=2462 ssi_signal=-57 fc=0x40 seq_ctrl=0x8320 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=83
Dec 01 13:18:09 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
Dec 01 13:18:09 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=r8:1c:79:tt:t3:t2 bssid=ff:ff:ff:ff:ff:ff freq=2462 ssi_signal=-53 fc=0x40 seq_ctrl=0x8300 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=83
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - pairwise key handshake completed (RSN)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - authorizing port
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: Set STA flags - ifname=wlp6s0 addr=r8:1c:79:tt:t3:t2 total_flags=0x67 flags_or=0x1 flags_and=0xffffffff authorized=1
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: AP-STA-CONNECTED r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: dbus: Station MAC address 'r8:1c:79:tt:t3:t2' 'StaAuthorized'
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]:    addr=r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state PTKINITDONE
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - received EAPOL-Key frame (4/4 Pairwise)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: Received EAPOL-Key from r8:1c:79:tt:t3:t2 key_info=0x30b type=2 mic_len=16 key_data_length=0
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: IEEE 802.1X: 99 bytes from r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: RX EAPOL from r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: l2_packet_receive: src=r8:1c:79:tt:t3:t2 len=99
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - sending 3/4 msg of 4-Way Handshake
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state PTKINITNEGOTIATING
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state PTKCALCNEGOTIATING2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: PTK derivation - A1=8c:c6:81:6e:cb:70 A2=r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: Searching a PSK for r8:1c:79:tt:t3:t2 prev_psk=(nil)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state PTKCALCNEGOTIATING
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - received EAPOL-Key frame (2/4 Pairwise)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: Received EAPOL-Key from r8:1c:79:tt:t3:t2 key_info=0x10b type=2 mic_len=16 key_data_length=22
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: IEEE 802.1X: 121 bytes from r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: RX EAPOL from r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: l2_packet_receive: src=r8:1c:79:tt:t3:t2 len=121
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for r8:1c:79:tt:t3:t2 (300 seconds - ap_max_inactivity)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - sending 1/4 msg of 4-Way Handshake
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state PTKSTART
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: Searching a PSK for r8:1c:79:tt:t3:t2 prev_psk=(nil)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: Searching a PSK for r8:1c:79:tt:t3:t2 prev_psk=(nil)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state INITPSK
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state AUTHENTICATION2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state AUTHENTICATION
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK_GROUP entering state IDLE
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - unauthorizing port
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: Set STA flags - ifname=wlp6s0 addr=r8:1c:79:tt:t3:t2 total_flags=0x66 flags_or=0x0 flags_and=0xfffffffe authorized=0
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]:    addr=r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: WPA: r8:1c:79:tt:t3:t2 WPA_PTK entering state INITIALIZE
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - start authentication
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]:    addr=r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - event 1 notification
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: Set STA flags - ifname=wlp6s0 addr=r8:1c:79:tt:t3:t2 total_flags=0x66 flags_or=0x6 flags_and=0xfffffff7 authorized=0
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]:    addr=r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - MLME-DELETEKEYS.request(d8:1c:79:dd:d3:f2)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - MLME-ASSOCIATE.indication(d8:1c:79:dd:d3:f2)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - associated (aid 1)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: EVENT_TX_STATUS dst=r8:1c:79:tt:t3:t2 type=0 stype=1
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: Set STA r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: Add associated STA r8:1c:79:tt:t3:t2 (added_unassoc=1 auth_alg=0 ft_over_ds=0 reassoc=0 authorized=0 ft_tk=0 fils_tk=0)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - association OK (aid 1)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: HT: Forty MHz Intolerant is set by STA r8:1c:79:tt:t3:t2 in Association Request
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: update_sta_ht STA r8:1c:79:tt:t3:t2 - 20 MHz HT, num of 20MHz HT STAs 1
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: update_sta_ht STA r8:1c:79:tt:t3:t2 - no greenfield, num of non-gf stations 1
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: HT: STA r8:1c:79:tt:t3:t2 HT Capabilities Info: 0x402d
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: association request: STA=r8:1c:79:tt:t3:t2 capab_info=0x431 listen_interval=20 seq_ctrl=0x7c80
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=8c:c6:81:6e:cb:70 sa=r8:1c:79:tt:t3:t2 bssid=8c:c6:81:6e:cb:70 freq=2462 ssi_signal=-53 fc=0x0 seq_ctrl=0x7c80 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=157
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: Set STA flags - ifname=wlp6s0 addr=r8:1c:79:tt:t3:t2 total_flags=0x20 flags_or=0x0 flags_and=0xfffffff1 authorized=0
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - authenticated
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: EVENT_TX_STATUS dst=r8:1c:79:tt:t3:t2 type=0 stype=11
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: New station r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: authentication reply: STA=r8:1c:79:tt:t3:t2 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) (dbg=handle-auth)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - MLME-DELETEKEYS.request(d8:1c:79:dd:d3:f2)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - MLME-AUTHENTICATE.indication(d8:1c:79:dd:d3:f2, OPEN_SYSTEM)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: hostapd_logger: STA r8:1c:79:tt:t3:t2 - authentication OK (open system)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: Add STA r8:1c:79:tt:t3:t2
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: sta_remove -> DEL_STATION wlp6s0 r8:1c:79:tt:t3:t2 --> -2 (No such file or directory)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: ap_sta_add: register ap_handle_timer timeout for r8:1c:79:tt:t3:t2 (300 seconds - ap_max_inactivity)
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: authentication: STA=r8:1c:79:tt:t3:t2 auth_alg=0 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x7c70
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=8c:c6:81:6e:cb:70 sa=r8:1c:79:tt:t3:t2 bssid=8c:c6:81:6e:cb:70 freq=2462 ssi_signal=-49 fc=0xb0 seq_ctrl=0x7c70 stype=11 (WLAN_FC_STYPE_AUTH) len=54
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: wlp6s0: EVENT_TX_STATUS dst=r8:1c:79:tt:t3:t2 type=0 stype=5
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: send_mlme - da= r8:1c:79:tt:t3:t2 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
Dec 01 13:18:08 HOSTNAME wpa_supplicant[504]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=r8:1c:79:tt:t3:t2 bssid=ff:ff:ff:ff:ff:ff freq=2462 ssi_signal=-49 fc=0x40 seq_ctrl=0x7c60 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=127


See also

Advertising: