Output of `wpa_supplicant -Dwext -i wlan0 -c wpa_supplicant.conf -dd`: wpa_supplicant v1.0 Initializing interface 'wlan0' conf 'wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_supplicant.conf' -> '/home/claudio/wpa_supplicant.conf' Reading configuration file '/home/claudio/wpa_supplicant.conf' Line: 1 - start of a new network block ssid - hexdump_ascii(len=7): 43 35 4f 2d 52 34 52 C5O-R4R proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x10 PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='C5O-R4R' WEXT: cfg80211-based driver detected wext: interface wlan0 phy: phy0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 wlan0: Own MAC address: 00:1f:1f:61:d9:4d wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures wlan0: RSN: flushing PMKID list in the driver wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): a5 9a 09 d8 de d7 52 2a 9c 79 e0 99 12 71 92 13 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized wlan0: Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Received 3283 bytes of scan results (7 BSSes) wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 70:71:bc:c6:04:3e SSID 'UPC278012' wlan0: BSS: Add new id 1 BSSID 00:23:f8:9f:75:4c SSID 'Pruh' wlan0: BSS: Add new id 2 BSSID 00:1f:1f:67:da:48 SSID 'C5O-R4R' wlan0: BSS: Add new id 3 BSSID 74:ea:3a:eb:b6:8a SSID 'Zichac' wlan0: BSS: Add new id 4 BSSID e0:69:95:f2:cf:e3 SSID 'UPC931954' wlan0: BSS: Add new id 5 BSSID 00:23:f8:9f:75:4d SSID 'VOIP' wlan0: BSS: Add new id 6 BSSID c8:6c:87:89:89:d0 SSID 'Internet' wlan0: New scan results available wlan0: Selecting BSS from priority group 0 wlan0: 0: 70:71:bc:c6:04:3e ssid='UPC278012' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-66 wps wlan0: skip - SSID mismatch wlan0: 1: 00:23:f8:9f:75:4c ssid='Pruh' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-70 wlan0: skip - SSID mismatch wlan0: 2: 00:1f:1f:67:da:48 ssid='C5O-R4R' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-70 wlan0: selected based on RSN IE wlan0: selected BSS 00:1f:1f:67:da:48 ssid='C5O-R4R' wlan0: Request association: reassociate: 0 selected: 00:1f:1f:67:da:48 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 00:1f:1f:67:da:48 (SSID='C5O-R4R' freq=2442 MHz) wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk ioctl[SIOCSIWFREQ]: Device or resource busy wlan0: Association request to the driver failed wlan0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=23 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=182 AssocResp IE wireless event - hexdump(len=166): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a ec 01 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 07 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 ec 01 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 07 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 dd 07 00 0c 43 04 00 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:1f:1f:67:da:48 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=166): 01 08 82 84 8b 96 12 24 48 6c 32 04 0c 18 30 60 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 2d 1a ec 01 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 3d 16 07 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1e 00 90 4c 33 ec 01 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c 00 00 00 00 00 dd 1a 00 90 4c 34 07 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 dd 07 00 0c 43 04 00 00 00 wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=00:1f:1f:67:da:48 wlan0: No keys have been configured - skip key clearing wlan0: Associated with 00:1f:1f:67:da:48 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: RX EAPOL from 00:1f:1f:67:da:48 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:1f:1f:67:da:48 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): f2 db b4 bc 9f fb 29 52 fa 13 0d 6e 7e 71 82 e7 04 62 68 bd fe 5e e3 a5 29 2f 1b 69 cf db 17 b9 WPA: PTK derivation - A1=00:1f:1f:61:d9:4d A2=00:1f:1f:67:da:48 WPA: Nonce1 - hexdump(len=32): f2 db b4 bc 9f fb 29 52 fa 13 0d 6e 7e 71 82 e7 04 62 68 bd fe 5e e3 a5 29 2f 1b 69 cf db 17 b9 WPA: Nonce2 - hexdump(len=32): 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 59 6b 72 c9 cb bc ef 17 af d3 ac 97 73 13 22 c3 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 f2 db b4 bc 9f fb 29 52 fa 13 0d 6e 7e 71 82 e7 04 62 68 bd fe 5e e3 a5 29 2f 1b 69 cf db 17 b9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 6b 72 c9 cb bc ef 17 af d3 ac 97 73 13 22 c3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 wlan0: RX EAPOL from 00:1f:1f:67:da:48 RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a 51 df d0 a8 b9 2a b2 13 f3 14 5e 24 b4 a3 31 00 38 d6 80 86 cb 3b 51 44 18 7e 23 03 8a 48 aa 33 c4 18 74 52 bc 30 0e d1 8e 44 9a 38 a0 fa 83 9c 99 04 f4 d1 fa a1 86 fa 13 8f 86 e8 57 e3 a5 90 5e 96 09 3c c2 e4 dc 16 31 wlan0: IEEE 802.1X RX: version=1 type=3 length=151 wlan0: EAPOL-Key type=2 wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlan0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): b8 02 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 9a 51 df d0 a8 b9 2a b2 13 f3 14 5e 24 b4 a3 31 WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 6d 26 b6 8c a9 24 2b 7f 52 b6 c0 13 df bf bc 61 b2 c8 fd 65 ce df a2 5d 3a 77 c6 d8 ba 3e e1 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a 51 df d0 a8 b9 2a b2 13 f3 14 5e 24 b4 a3 31 00 38 d6 80 86 cb 3b 51 44 18 7e 23 03 8a 48 aa 33 c4 18 74 52 bc 30 0e d1 8e 44 9a 38 a0 fa 83 9c 99 04 f4 d1 fa a1 86 fa 13 8f 86 e8 57 e3 a5 90 5e 96 09 3c c2 e4 dc 16 31 RSN: encrypted key data - hexdump(len=56): d6 80 86 cb 3b 51 44 18 7e 23 03 8a 48 aa 33 c4 18 74 52 bc 30 0e d1 8e 44 9a 38 a0 fa 83 9c 99 04 f4 d1 fa a1 86 fa 13 8f 86 e8 57 e3 a5 90 5e 96 09 3c c2 e4 dc 16 31 WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 3 of 4-Way Handshake from 00:1f:1f:67:da:48 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 de f2 f5 86 8e 48 60 b5 63 c7 7d 32 40 db 2c 67 dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] wlan0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): b0 8f c1 d6 1b 0d 9b 85 6a 9f 04 e9 9d d5 48 da WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 8f c1 d6 1b 0d 9b 85 6a 9f 04 e9 9d d5 48 da 00 00 wlan0: WPA: Installing PTK to the driver wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) WPA: RSC - hexdump(len=6): b8 02 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 wlan0: WPA: Key negotiation completed with 00:1f:1f:67:da:48 [PTK=CCMP GTK=CCMP] wlan0: Cancelling authentication timeout wlan0: State: GROUP_HANDSHAKE -> COMPLETED wlan0: CTRL-EVENT-CONNECTED - Connection to 00:1f:1f:67:da:48 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event EAPOL: startWhen --> 0 EAPOL: disable timer tick wlan0: BSS: Expire BSS 0 due to age wlan0: BSS: Remove id 0 BSSID 70:71:bc:c6:04:3e SSID 'UPC278012' wlan0: BSS: Expire BSS 1 due to age wlan0: BSS: Remove id 1 BSSID 00:23:f8:9f:75:4c SSID 'Pruh' wlan0: BSS: Expire BSS 3 due to age wlan0: BSS: Remove id 3 BSSID 74:ea:3a:eb:b6:8a SSID 'Zichac' wlan0: BSS: Expire BSS 4 due to age wlan0: BSS: Remove id 4 BSSID e0:69:95:f2:cf:e3 SSID 'UPC931954' wlan0: BSS: Expire BSS 5 due to age wlan0: BSS: Remove id 5 BSSID 00:23:f8:9f:75:4d SSID 'VOIP' wlan0: BSS: Expire BSS 6 due to age wlan0: BSS: Remove id 6 BSSID c8:6c:87:89:89:d0 SSID 'Internet'