Monday, March 31, 2008

Hostapd WPA-PSK message log

# hostapd -dd /etc/sysconfig/hostapd.conf
Configuration file: /etc/sysconfig/hostapd.conf
Line 11: DEPRECATED: 'debug' configuration variable is not used anymore
ctrl_interface_group=0
Configure bridge br0 for EAPOL traffic.
madwifi_set_iface_flags: dev_up=0
madwifi_set_privacy: enabled=0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
Flushing old station entries
madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
madwifi_set_privacy: enabled=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=0
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=1
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=2
madwifi_del_key: addr=00:00:00:00:00:00 key_idx=3
Using interface ath0 with hwaddr 06:80:92:3a:a3:bb and ssid 'wende'
SSID - hexdump_ascii(len=5):
77 65 6e 64 65 wende
PSK (ASCII passphrase) - hexdump_ascii(len=12):
6d 79 70 61 73 73 70 68 72 61 73 65 mypassphrase
PSK (from passphrase) - hexdump(len=32): 6a 8e 8c 6c 9e df 3f 0d 21 c8 92 c8 36 aa bf 47 0c 34 05 be 32 83 0c c6 05 bf d7 c0 66 f4 3f 60
madwifbr0: port 1(ath0) entering learning state
i_set_ieee8021x: enabled=1
madwifi_configure_wpa: group key cipher=3
madwifi_configure_wpa: pairwise key ciphers=0x8
madwifi_configure_wpa: key management algorithms=0x2
madwifi_configure_wpa: rsn capabilities=0x0
madwifi_configure_wpa: enable WPA=0x1
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
madwifi_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
madwifi_set_privacy: enabled=1
madwifi_set_iface_flags: dev_up=1
ath0: Setup of interface done.
l2_packet_receive - recvfrom: Network is down
Wireless event: cmd=0x8b1a len=14
br0: topology change detected, propagating
br0: port 1(ath0) entering forwarding state
Wireless event: cmd=0x8c03 len=20
New STA
madwifi req WPA IE - hexdump(len=256): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
madwifi req RSN IE - hexdump(len=256): 8c 2c 00 00 00 00 00 00 00 00 c0 2d 00 00 00 00 00 0a c0 2c ef 90 00 00 00 01 c7 b3 9d 30 c0 02 8d 24 00 00 00 00 c7 0a 8f e0 00 00 00 38 00 00 00 00 c7 b3 9e 30 c0 2d a3 70 7f e3 f8 d8 00 00 00 00 00 00 00 00 00 02 10 30 c7 b3 9d 40 c0 00 76 3c 00 00 00 00 c0 2c 00 00 c7 b3 9d 50 c0 02 8b a8 00 00 00 00 c0 2c 00 00 c7 b3 9d 60 c0 00 78 68 7f e3 f8 d8 00 00 89 f4 c7 b3 9e 20 c0 00 32 b8 47 f1 75 be 04 d5 b7 78 00 00 00 e3 c7 b3 9e 20 c7 85 27 f0 00 00 00 00 00 00 00 3a 00 00 00 10 c7 b3 9e 4c 00 00 00 20 00 00 00 00 00 00 00 00 ff ff 89 f4 00 00 00 04 88 00 44 e8 c7 b3 9d b8 00 00 00 00 00 00 00 00 c7 b3 9e 20 c7 85 27 f0 c0 03 97 20 c7 b3 9d bc c7 b3 9d d0 00 00 00 00 c7 0b 97 a4 00 00 00 00 c7 b3 9d e0 c0 13 fc 24 c7 b2 e3 60 10 16 83 24 c7 b3 9e 00 c0 13
madwifi_del_key: addr=00:18:e7:1a:e6:da key_idx=0
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:18:e7:1a:e6:da key_idx=0
madwifi_set_sta_authorized: addr=00:18:e7:1a:e6:da authorized=0
WPA: 00:18:e7:1a:e6:da WPA_PTK_GROUP entering state IDLE
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state AUTHENTICATION
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state AUTHENTICATION2
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state INITPSK
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state PTKSTART
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
TX EAPOL - hexdump(len=113): 00 18 e7 1a e6 da 06 80 92 3a a3 bb 88 8e 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 7d b3 55 bd 77 43 14 7c 98 c8 6e 37 5c aa 15 8d b7 8d fe 29 0a 00 25 fb 13 07 f4 9e a1 d5 50 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X: 5 bytes from 00:18:e7:1a:e6:da
IEEE 802.1X: version=1 type=1 length=0
ignoring 1 extra octets after IEEE 802.1X packet
IEEE 802.1X: 123 bytes from 00:18:e7:1a:e6:da
IEEE 802.1X: version=1 type=3 length=119
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=06:80:92:3a:a3:bb A2=00:18:e7:1a:e6:da
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=24 keyidx=0 encr=0)
TX EAPOL - hexdump(len=137): 00 18 e7 1a e6 da 06 80 92 3a a3 bb 88 8e 02 03 00 77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 7d b3 55 bd 77 43 14 7c 98 c8 6e 37 5c aa 15 8d b7 8d fe 29 0a 00 25 fb 13 07 f4 9e a1 d5 50 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ef 41 fc 32 41 84 b1 ca 0d 42 02 0d 9a dc ce 61 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
IEEE 802.1X: 99 bytes from 00:18:e7:1a:e6:da
IEEE 802.1X: version=1 type=3 length=95
WPA: 00:18:e7:1a:e6:da WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:18:e7:1a:e6:da key_idx=0
madwifi_set_sta_authorized: addr=00:18:e7:1a:e6:da authorized=1
madwifi_sta_clear_stats: addr=00:18:e7:1a:e6:da
WPA: 00:18:e7:1a:e6:da WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=16 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=24): [REMOVED]
TX EAPOL - hexdump(len=137): 00 18 e7 1a e6 da 06 80 92 3a a3 bb 88 8e 02 03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 03 7d b3 55 bd 77 43 14 7c 98 c8 6e 37 5c aa 15 8d b7 8d fe 29 0a 00 25 fb 13 07 f4 9e a1 d5 50 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ba 32 d2 0c 33 dc cb 10 06 20 67 ec e2 e4 bf 9e 00 18 c3 d1 94 d1 48 dd 01 b0 4a 99 cf e9 59 e4 19 c5 44 82 cc 0d 2f da cb e0
WPA: 00:18:e7:1a:e6:da WPA_PTK_GROUP entering state REKEYNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=16 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=24): [REMOVED]
TX EAPOL - hexdump(len=137): 00 18 e7 1a e6 da 06 80 92 3a a3 bb 88 8e 02 03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 04 7d b3 55 bd 77 43 14 7c 98 c8 6e 37 5c aa 15 8d b7 8d fe 29 0a 00 25 fb 13 07 f4 9e a1 d5 50 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b6 56 bb 0a 2b 1e ff 13 87 1c fd 83 fc 9b 76 e3 00 18 c3 d1 94 d1 48 dd 01 b0 4a 99 cf e9 59 e4 19 c5 44 82 cc 0d 2f da cb e0
IEEE 802.1X: 99 bytes from 00:18:e7:1a:e6:da
IEEE 802.1X: version=1 type=3 length=95
WPA: 00:18:e7:1a:e6:da WPA_PTK_GROUP entering state REKEYESTABLISHED
WPA: 00:18:e7:1a:e6:da WPA_PTK_GROUP entering state IDLE

No comments: